摘要:
Methods for optimizing battery use for a known future load are described. In an embodiment, one or more battery cells are selected from a set of battery cells to provide power to a computing-based device. The battery cells are selected based on discharge profile data for each battery cell and both the current power requirement and a known future power requirement of the computing-based device. The known future power requirement is calculated based on information available to the operating system running on the computing-based device. In some examples, one or more battery cells may also be selected for charging when a power source is available and these cells may be selected based on charge profile data and the known future power requirement. The selection of the battery cells may also be made in order to satisfy a battery optimization goal, which may be defined by a user.
摘要:
Embodiments provide implementations for estimating a test application's energy usage on a target device based on execution of the test application. Resource usage associated with the execution of the test application is measured. The measured resource usage is input into a power model of the target device to estimate the energy that the test application uses when executed on the target device. An emulation system is configured to execute the test application in a virtual execution environment using resource scaling and simulated target device application programming interfaces to substantially simulate the corresponding capabilities of the target device.
摘要:
Techniques for ability enhancement are described. In some embodiments, devices and systems located in a transportation network share threat information with one another, in order to enhance a user's ability to operate or function in a transportation-related context. In one embodiment, a process in a vehicle receives threat information from a remote device, the threat information based on information about objects or conditions proximate to the remote device. The process then determines that the threat information is relevant to the safe operation of the vehicle. Then, the process modifies operation of the vehicle based on the threat information, such as by presenting a message to the operator of the vehicle and/or controlling the vehicle itself.
摘要:
Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to automatically translate utterances from a first to a second language, based on speaker-related information determined from speaker utterances and/or other sources of information. In one embodiment, the AEFS receives data that represents an utterance of a speaker in a first language, the utterance obtained by a hearing device of the user, such as a hearing aid, smart phone, media player/device, or the like. The AEFS then determines speaker-related information associated with the identified speaker, such as by determining demographic information (e.g., gender, language, country/region of origin) and/or identifying information (e.g., name or title) of the speaker. The AEFS translates the utterance in the first language into a message in a second language, based on the determined speaker-related information. The AEFS then presents the message in the second language to the user.
摘要:
Systems and methods are described relating to accepting a mobile device location query using digital signal processing and presenting an indication of location of the mobile device at least partially based on receiving the location query. Additionally, systems and methods are described relating to means for accepting a mobile device location query using digital signal processing and means for presenting an indication of location of the mobile device at least partially based on receiving the location query.
摘要:
A new media access control (MAC) protocol for cognitive wireless networks is described. The new MAC protocol allows each of multiple nodes, such as cell phones and computers with wireless, to determine utilization of a communication spectrum, such as the television broadcast band. The nodes collaborate to achieve a combined view of spectrum utilization in their local vicinity, in which scheduled users and empty time segments are mapped across a wide range of frequencies. Nodes negotiate with each other to reserve idle segments of the spectrum for packet exchange on negotiated frequencies. Control packet structure allows nodes to become prescient of the local spectrum utilization during handshaking. A cognitive device operating under the new MAC has a first radio that both scans the spectrum and monitors a control channel; and a second reconfigurable radio with adjustable parameters, including frequency and bandwidth, for packet transmission.
摘要:
The minimization of the amount of power consumed by an electronic device in acquiring or maintaining network connectivity with a network may extend the battery life of the electronic device. When the electronic device has established a communication connection with a wireless access point, the electronic device cycles a network interface controller of the electronic device between a power on state and a power off state without terminating the communication connection. Accordingly, the electronic device powers on a main processor of the electronic device when the network interface controller detects a beacon during the power on state that indicates the wireless access point has a buffered data frame for the electronic device.
摘要:
Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components.
摘要:
Wireless protocols in the unlicensed spectrum are developed for different requirements in terms of transmit range and power, which makes it difficult for multiple nodes having disparate transmit ranges to coexist in the same unlicensed spectrum. A short-range wireless node uses adaptive preambles to signal presence to long-range wireless nodes outside of its transmit range. In addition, a long-range wireless node detects an adapter preamble and backs-off transmissions for reservation period dedicated to short-range nodes.
摘要:
Described herein are technologies that facilitate transfer of data-intensive content between portable telephones. Phones are configured to transmit data indicative of phone location to a proxy server by way of respective cellular network data connections. When a user of a phone wishes to acquire content that is labeled as shareable on another phone, the user of the phone initiates a location-based request, which causes the proxy server to provide a list of phones that are estimated to be in Wi-Fi range of such phone. The user thereafter selects a particular phone, and the proxy server instructs that phone to activate its Wi-Fi radio. The phone of the user additionally activates its Wi-Fi radio, and a peer-to-peer connection between phones is established. Thereafter, rich content is transferrable between the phones.