摘要:
Described herein are technologies pertaining to protecting user privacy in connection with attribute-based matching services. A user registers with a platform that includes a plurality of non-collaborating partitions, where registration includes transmitting a message to the platform that indicates that the user has one or more attributes corresponding thereto. Through selective encryption and a communications protocol amongst the partitions, none of the partitions are able to ascertain that the user has the attributes. Acting in conjunction, however, the plurality of partitions perform rich attribute
摘要:
Described herein are technologies pertaining to protecting user privacy in connection with attribute-based matching services. A user registers with a platform that includes a plurality of non-collaborating partitions, where registration includes transmitting a message to the platform that indicates that the user has one or more attributes corresponding thereto. Through selective encryption and a communications protocol amongst the partitions, none of the partitions are able to ascertain that the user has the attributes. Acting in conjunction, however, the plurality of partitions perform rich attribute.
摘要:
A platform that facilities preservation of user privacy with respect to location-based applications executing on mobile computing devices is described. The platform registers triggers that are set forth by location-based applications, where a trigger specifies one or more rules and includes a location constraint. The platform causes a sensor on the mobile computing device to output location data, and the platform determines if the trigger has been satisfied by comparing the location constraint with the location data. If the trigger is satisfied, the platform transmits a callback to the application. Accordingly, the application does not receive location data from the sensor.
摘要:
A platform that facilities preservation of user privacy with respect to location-based applications executing on mobile computing devices is described. The platform registers triggers that are set forth by location-based applications, where a trigger specifies one or more rules and includes a location constraint. The platform causes a sensor on the mobile computing device to output location data, and the platform determines if the trigger has been satisfied by comparing the location constraint with the location data. If the trigger is satisfied, the platform transmits a callback to the application. Accordingly, the application does not receive location data from the sensor.
摘要:
A electronic communication system that can detect and adapt to delays in delivery of e-mail messages. The system may adapt to delays by using mechanisms other than the initially intended path to convey the information intended for delivery by e-mail. A possible adaptation is reprioritization of an e-mail message that is found to be experiencing a delay.
摘要:
A traffic sensing system for collecting information on traffic conditions is provided. A traffic sensing system includes a traffic sensing server and a mobile traffic sensing device that sends traffic reports to the traffic sensing server. An MTS device may use an accelerometer integrated into a smart phone to detect potholes, to detect when the vehicle is braking, to detect whether the MTS device is being transported via a vehicle or a pedestrian, to detect horns sounding, and so on. The MTS device reports the various conditions to the traffic sensing server for accurate assessment of traffic conditions at stretches of road through which vehicles transporting MTS devices travel.
摘要:
Notifying a user that an email message sent to the user was not received by the user. Users can register to receive notifications. When a sender sends an email message to a recipient, a separate notification also may be sent to a notification service that populates and controls access to an email notification list. Each notification in the list may comprise a hash of the content of the email message that it represents. A recipient module may be configured to check the notification list periodically and/or in response to a recipient's instructions, and compare notifications to the email messages received for the recipient to determine whether any email messages intended for the recipient were not received. If it is determined from the notifications that an email message was not received, a notice may be sent to the sender, which my include a request that the sender re-send the email message.
摘要:
One or more mobile devices and a cloud server computing device are utilized to provide Internet access to one or more client computing devices. One of the clients is designated as a Wi-Fi access point. The Wi-Fi access point implements a reverse-infrastructure Wi-Fi mode which tethers available mobile devices and other clients to the access point. The cloud server periodically computes an optimal number of the mobile devices to be used for data striping, and transmits a webpage to a requesting client by striping data associated with the webpage across the optimal number of the mobile devices.
摘要:
Described is transparently compressing content for network transmission, including end-to-end compression. An end host or middlebox device sender sends compressed packets to an end host or middlebox device receiver, which decompresses the packets to recover the original packet. The sender constructs compressed packets including references to information maintained at the receiver, which the receiver uses to access the information to recreate actual original packet content. The receiver may include a dictionary corresponding to the sender, e.g., synchronized with the sender's dictionary. Alternatively, in speculative compression, the sender does not maintain a dictionary, and instead sends a fingerprint (hash value) by which the receiver looks up corresponding content in its dictionary; if not found, the receiver requests actual content. Scheduling to maintain fairness and smoothing bursts to coexist with TCP congestion control are also described, as are techniques for routing compressed data over networked end hosts and/or compression-enabled middlebox devices.
摘要:
A system and methodologies are disclosed for determining the geographic location of an Internet host. A first method infers host location based on the DNS names of the host of interest or other nearby network nodes. A second method employs network delay measurements from geographically distributed locations to triangulate the coordinates of the host. A third method couples partial host-to-location mapping information obtained from one or more sources with BGP or other routing information in order to infer location of the host of interest.