摘要:
An IP usage pattern of a first computer system is monitored by a second computer system that is remotely located from the first computer system. The second computer system is associated with an ISP. First parasite software may be identified based on an abnormal change in the IP usage pattern. The abnormal change in the IP usage pattern may be detected by comparing the IP usage pattern to a baseline model of IP usage for the first computer system. Anti-parasite software associated with the first parasite software may be forwarded from the ISP to the first computer system.
摘要:
An IP usage pattern of a first computer system is monitored by a second computer system that is remotely located from the first computer system. The second computer system is associated with an ISP. First parasite software may be identified based on an abnormal change in the IP usage pattern. The abnormal change in the IP usage pattern may be detected by comparing the IP usage pattern to a baseline model of IP usage for the first computer system. Anti-parasite software associated with the first parasite software may be forwarded from the ISP to the first computer system.
摘要:
An Internet Protocol (IP) usage pattern of a first computer system is monitored by a second computer system remotely located from the first computer system. Based on the monitoring, it is determined if the IP usage pattern is abnormal for the first computer system. If the IP usage pattern is abnormal, an alert signal is generated for the first computer system by the second computer system. The alert message indicates a potential presence of parasite software on the first computer system.
摘要:
An Internet Protocol (IP) usage pattern of a first computer system is monitored by a second computer system remotely located from the first computer system. Based on the monitoring, it is determined if the IP usage pattern is abnormal for the first computer system. If the IP usage pattern is abnormal, an alert signal is generated for the first computer system by the second computer system. The alert message indicates a potential presence of parasite software on the first computer system.
摘要:
Methods and systems for closed caption processing are described. In an embodiment, a source signal may be accessed. The source signal may include a video signal and closed caption information embedded within the video signal. The closed caption information may be extracted from the source signal. A content request may be received over a network from an access device. A caption setting associated with the access device may be accessed. The video signal may be provided in a video stream over the network to the access device. The closed caption information may be provided over the network in a caption stream in accordance with accessing of the caption setting. Additional systems and methods are disclosed.
摘要:
A distributed network including at least two Reconfigurable Optical Add/Drop Multiplexers (ROADMs) may be designed by a method including simulating routing of data traffic in a distributed network. The method may also include identifying a first location for placement of a first ROADM based at least partially on the simulated routing of the data traffic. The method may also include simulating rerouting of data traffic in the distributed network including the first ROADM at the first location. The method may further include identifying a second location for placement of a second ROADM based at least partially on the simulated rerouting of the data traffic.
摘要:
A network is represented using a graph. The graph comprises a plurality of vertices and a plurality of edges. The vertices comprise a source vertex, a destination vertex and a vertex u. The edges link corresponding adjacent pairs of the vertices. A minimum cost path in the graph is determined from the source vertex to the destination vertex, wherein the vertex u is in the minimum cost path. An edge from the vertex u in the minimum cost path introduces an additional capital expenditure cost that is dependent on how the minimum cost path traverses from the source vertex to the vertex u.
摘要:
Various embodiments of the disclosed subject matter provide methods and systems to automatically identify preferred distributed programming content based on subscriber-specific profile information generated at least in part from a subscriber's viewing history of viewing broadcast television programs delivered via a television distribution system, automatically store information indicative of the identified preferred distributed programming content, and generate a personalized list of the identified preferred distributed programming content, the personalized list, displayed on initial activation of a video system, including at least one image of the identified preferred distributed programming content.
摘要:
Systems and methods of targeted advertisement are disclosed. In an embodiment, the method includes performing a deep packet inspection process of packet traffic within at least a portion of a communication network. The deep packet inspection process includes determining source data and destination data from the packet traffic without inspecting packet payload data. The method includes receiving aggregate demographic data of users that are associated with at least some of the packet traffic and generating an anonymous first profile of a first user based on first data acquired via the deep packet inspection process and based on the aggregate demographic data. The method also includes retrieving first user profile data from the anonymous first profile and sending the first user profile data to an advertisement system to determine a targeted advertisement based on the first user profile data. The targeted advertisement is displayed to a second user while the second user is participating in a multi-user activity with the first user.
摘要:
A method of determining the number of recipients for an audio content item includes receiving a packet associated with the audio content item at a network monitoring device. The monitoring device includes a packet inspection module that analyzes a data payload of the packet to identify the audio content item. In an embodiment, the packet inspection module identifies the audio content item by determining an audio signature based on the payload, and comparing the signature to a set of known signatures. Once the audio content item is identified, an indicator is recorded to indicate that the content item was communicated. By aggregating the recorded indicators, the number of recipients for the audio content item is determined.