摘要:
A method of interfacing applets with a collaboration program is disclosed. The method may be in the form of application programming interface calls.
摘要:
An application and its associated user interface provide a meeting window for use in organizing and holding meetings using peer-to-peer network facilities. The meeting window offers menu selections for choosing a network over which to hold the meeting and for discovering and inviting meeting participants. The meeting window includes three main panes, one each for managing attendees, for distributing files to attendees, and for streaming presentation materials real-time to attendees. Data streaming is also supported to network devices such as projectors. Control of the presentation may be delegated by the presentation owner to another attendee, and may also be revoked by the presentation owner. The real-time streaming of the presentation may be paused and resumed to accommodate meeting dynamics or real-time changes.
摘要:
A series of unique records may be published to establish and maintain ad hoc or online meetings on a peer-to-peer network. The published records include a creator record, a presentation record, a file sharing record, a friendly name record, and invitation status record, a capabilities record, and a presence record. Each of the published records has a global unique identifier (GUID) a uniquely and universally identifies each of the record types.
摘要:
The claimed method and system describes a dynamic construction of a virtual proxy using a set of virtual proxy hosts. The virtual proxy hosts may maintain a shared data store that contains a record of discovered services on a network. The virtual proxy hosts may work together to respond to discovery requests using the shared data store. Clients on a network having a virtual proxy host may be limited to unicast discovery requests with the virtual proxy host, thereby reducing broadcast traffic.
摘要:
A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings displayed in a meeting management window and send requested showing the selected meaning. Credentials, such as a password, may be supplied with the request. When the request is validated, information is sent to the requester for use in joining the meeting. When an ad hoc wireless session is used to hold a meeting the discovery process may further include analyzing data traffic to determine which wireless sessions are meetings.
摘要:
Methods and computer readable mediums are described that facilitate inviting user entities on a network. The method may include initiating a first application for sending an invitation by a first user entity on a first endpoint, selecting a second user entity to receive the invitation, and selecting an activity. The method may also include sending from the first endpoint to the second user entity the invitation to participate in the activity if the first endpoint determines the activity is supported by a computing application on the first endpoint.
摘要:
A system for locating a wireless device involves the use of the measured signal strength of various base stations in the building or outdoor area under analysis. A topological map of the building or outdoor area under analysis is created. The map is divided into cells, and signal intensities are collected in each cell. For each cell, the signal from a particular base station is fit to a statistical distribution, such as a Gaussian distribution, and the parameters of the statistical distribution are estimated. After a device obtains a set of signal strength measurements, a probabilistic technique is employed to estimate the probability of the existence of the measurements in each of the cells of the building or area under analysis. The estimated location is the cell with the highest probability. A mobile user is tracked with the use of a Markov chain and the system can be calibrated to account for equipment and environmental variations.
摘要:
Methods are described that facilitate presence publication which may include authorizing publication of presence at a first endpoint, if the publication is authorized, assembling a presence data structure, and broadcasting the presence data structure from the first endpoint. The method may also include the presence structure including a friendly name, contact information, and endpoint information. The method further including contact information in at least one of XML format, vCard format, and the endpoint information obtained from a peer name resolution protocol. The method may additionally include the presence data structure encoded as at least one of a generic discovery protocol message, a simple service discovery protocol message, and associating a globally unique identifier with the discovery protocol messages. The method may include a user entity authorizing presence publication, the user entity setting at least one of a default parameter authorizing publication of all presence, some presence, or no presence.
摘要:
A method for creating, discovering, and joining meetings over a peer-to-peer network involves creation of a graph of meetings on a local subnet. When a meeting is created a meeting record is added to the graph where it may be discovered by other potential meeting attendees. A user may select from a list of meetings displayed in a meeting management window and send requested showing the selected meaning. Credentials, such as a password, may be supplied with the request. When the request is validated, information is sent to the requester for use in joining the meeting. When an ad hoc wireless session is used to hold a meeting the discovery process may further include analyzing data traffic to determine which wireless sessions are meetings.