摘要:
The preferred embodiments provide a system and/or method that exploits the presence of multiple interfaces to provide high quality video streaming (or real time streaming). The proposed solution includes three specific strategies 1) receiver buffer management, 2) selective re-transmission of packets and 3) dynamic load balancing across interfaces to achieve high quality video streaming across multiple interfaces.
摘要:
A system and method comprising a framework configured to enable wireless devices to intelligently and simultaneously use multiple wireless interfaces of the wireless devices.
摘要:
A system and method comprising a framework configured to enable wireless devices to intelligently and simultaneously use multiple wireless interfaces of the wireless devices.
摘要:
The preferred embodiments provide a system and/or method that exploits the presence of multiple interfaces to provide high quality video streaming (or real time streaming). The proposed solution includes three specific strategies 1) receiver buffer management, 2) selective re-transmission of packets and 3) dynamic load balancing across interfaces to achieve high quality video streaming across multiple interfaces.
摘要:
A method for determining whether to perform vertical handoff between multiple network. The method comprises obtaining a plurality of selection metrics for each network, calculating, for each of the other communication networks, a predicted utility value from at least the corresponding plurality of selection metrics using a variable kernel regression function, obtaining, for the current communication network, a second plurality of selection metrics; calculating a second predicted utility value for the current communication network from at least the corresponding second plurality of selection metrics using a second variable kernel regression function, comparing each of the predicted utility values for each of the plurality of other communication networks with the second predicted utility value and switching to one of the other communication networks having the highest predicted utility value, if the highest predicted utility value is greater than the second predicted utility value.
摘要:
A method for determining whether to perform vertical handoff between multiple network. The method comprises obtaining a plurality of selection metrics for each network, calculating, for each of the other communication networks, a predicted utility value from at least the corresponding plurality of selection metrics using a variable kernel regression function, obtaining, for the current communication network, a second plurality of selection metrics; calculating a second predicted utility value for the current communication network from at least the corresponding second plurality of selection metrics using a second variable kernel regression function, comparing each of the predicted utility values for each of the plurality of other communication networks with the second predicted utility value and switching to one of the other communication networks having the highest predicted utility value, if the highest predicted utility value is greater than the second predicted utility value.
摘要:
In one embodiment, a line termination unit includes line driver for driving a transmission line, with a first supply voltage input terminal and a second supply voltage input terminal, a power supply, with an analog supply voltage output terminal for feeding an analog part of the line termination unit, and at least one digital supply voltage output terminal for feeding a digital part of the line termination unit, and a ground voltage reference. The analog supply voltage output terminal is coupled to the first supply voltage input terminal, and the line termination unit further includes a selector for selectively coupling one of the at least one digital supply voltage output terminal or the ground voltage reference to the second supply voltage input terminal.
摘要:
A method and system for public key infrastructure key and certificate management provides anonymity to certificate holders and protects the privacy of certificate holders from the compromise of a certificate authority. Functional separation is provided in the authorization of a certificate request and the assignment of certificates and key pairs. The authorizing certificate authority approves or denies each certificate request from a requestor whose identity is not made available to the assigning certificate authority. The assigning certificate authority, upon approval from the authorizing certificate authority, issues one or more certificates and optionally generates and provides the associated key pairs to the requester without disclosing these certificates and key pairs to the authorizing certificate authority. In another aspect, a distributed method is disclosed that allows individual nodes and/or units in a network to select certificates for broadcasting messages to a community of interest with a non-unique key.
摘要:
Systems and methods for mobile peer-to-peer information sharing are disclosed. With the preferred systems and methods, mobile users and devices collect information about networks that they visit, and carry that information as they move to new networks. Mobile users and/or devices then share such information directly with each other.
摘要:
The present invention advantageously provides techniques to solve problems with combinatorial anonymous certificate management by addressing critical issues concerning its feasibility, scalability, and performance. Methods and procedures to manage IEEE 1609.2 anonymous and identifying cryptographic keys and certificates in the Vehicle Infrastructure Integration (VII) system are presented, along with methods for management of identifying and anonymous certificates in a partitioned Certificate Authority architecture designed to enhance vehicle privacy. Novel methods for vehicles to dynamically change an anonymous certificate for use while maintaining vehicle privacy are given. Refinements to basic combinatorial schemes are presented including probabilistic key replacement, rekey counter decrement, dynamic rekey threshold, geographic attack isolation and proofs of geographic position.