摘要:
Methods, apparatus, systems and articles of manufacture to provide machine assisted programming are disclosed. An example apparatus includes a feature extractor to convert compiled code into a first feature vector; a first machine leaning model to identify a cluster of stored feature vectors corresponding to the first feature vector; and a second machine learning model to recommend a second algorithm corresponding to a second feature vector of the cluster based on a comparison of a parameter of a first algorithm corresponding to the first feature vector and the parameter of the second algorithm.
摘要:
A multi-radio handover manager and supporting algorithms are disclosed. The multi-radio handover manager (MRHM) minimizes the “on” time of one radio when the other radio is connected to the Internet. The MRHM also prevents unnecessary inter-RAT (radio access technologies) WLAN-to-WWAN handovers in a “multi-AP” WLAN, where intra-RAT WLAN-to-WLAN (layer 2) roaming is possible. The MRHM minimizes the impact of IP address changes due to WWAN-to-WLAN handover on an active TCP/IP session. And, the MRHM optimizes its handover-triggering algorithm based on traffic and environment.
摘要:
Methods, apparatus, systems and articles of manufacture to trigger calibration of a sensor node using machine learning are disclosed. An example apparatus includes a machine learning model trainer to train a machine learning model using first sensor data collected from a sensor node. A disturbance forecaster is to, using the machine learning model and second sensor data, forecast a temporal disturbance to a communication of the sensor node. A communications processor is to transmit a first calibration trigger in response to a determination that a start of the temporal disturbance is forecasted and a determination that a first calibration trigger has not been sent.
摘要:
Disclosed in some examples is a method including determining a plurality of user locations, the plurality of user locations determined based upon a clustering of wireless networks scanned by a network interface card communicatively coupled to the processor during an active period of the processor; determining a current location of the user, the current location being one of the plurality of user locations; and scanning for a plurality of wireless networks associated with one or more next locations, the one or more next locations selected from the plurality of user locations based upon the current user location and a measured probability.
摘要:
A mechanism is described for facilitating detection and communication of geo-locations for devices according to one embodiment. A method of embodiments, as described herein, includes tracking, at a first smart device, one or more devices including a second smart device, and first and second smart devices including a computing device, and establishing a first connection with the second smart device, establishing further comprising exchanging first location data between the first smart device and the second smart device, establishing further including communicating a first current location associated with the first smart device to the second smart device. The method may further include identifying a second current location associated with the second smart device. The second current location may be initially recorded and iteratively rewritten at a first local memory of the first smart device.
摘要:
A multi-radio handover manager and supporting algorithms are disclosed. The multi-radio handover manager (MRHM) minimizes the “on” time of one radio when the other radio is connected to the Internet. The MRHM also prevents unnecessary inter-RAT (radio access technologies) WLAN-to-WWAN handovers in a “multi-AP” WLAN, where intra-RAT WLAN-to-WLAN (layer 2) roaming is possible. The MRHM minimizes the impact of IP address changes due to WWAN-to-WLAN handover on an active TCP/IP session. And, the MRHM optimizes its handover-triggering algorithm based on traffic and environment.
摘要:
Disclosed in some examples are methods, systems, and machine readable mediums for secure, low end-user effort computing device configuration. In some examples the IoT device is configured via a user's computing device over a short range wireless link of a first type. This short range wireless communication may use a connection establishment that does not require end-user input. For example, the end user will not have to enter, or confirm a PIN number or other authentication information such as usernames and/or passwords. This allows configuration to involve less user input. In some examples, to prevent man-in-the-middle attacks, the power of a transmitter in the IoT device that transmits the short range wireless link is reduced during a configuration procedure so that the range of the transmissions to and from the user's computing device are reduced to a short distance.
摘要:
A system and method for managing electronic devices based on user identity information is presented. An authenticating entity authenticates and provides secure user identity data and a first electronic device. The first electronic device includes memory that stores first secure user identity data provisioned to the first electronic device and a communication module that discovers a second electronic device and initiates a wireless connection with the discovered second electronic device, in which the second electronic device is provisioned with second secure user identity data, logic that has the first and second electronic devices exchange and validate their respective first and second secure user identity data, and a discovery list that stores attributes of the second electronic device. Upon determining that the first and second electronic devices are associated with the same user, the logic adds self-property to the stored attributes of the second electronic device.
摘要:
Embodiments describe arrangements related to offload scanning of large scan lists. Embodiments may comprise logic such as hardware and/or code to facilitate offloading of the scans of large scan lists, e.g., lists on the order of thousands of networks or access points for networks, to network adapters such as wireless network interface cards. Many embodiments provide a network adapter with a compressed representation of a large scan list that may not fit uncompressed in memory of the network adapter. In some embodiments, the compressed representation of the scan list may be lossy, introducing balances related to the memory size on the network adapter, the extent of compression, and the list size, as well as a balance between the memory size and a probability of false positives. In many embodiments, the network adapter may wake the host device upon identifying a network on a scan list.
摘要:
Disclosed in some examples is a method including determining a plurality of user locations, the plurality of user locations determined based upon a clustering of wireless networks scanned by a network interface card communicatively coupled to the processor during an active period of the processor; determining a current location of the user, the current location being one of the plurality of user locations; and scanning for a plurality of wireless networks associated with one or more next locations, the one or more next locations selected from the plurality of user locations based upon the current user location and a measured probability.