Abstract:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
Abstract:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
Abstract:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
Abstract:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
Abstract:
A device and method are provided for concurrently using a plurality of radio access technologies (RATs) to support a wireless-enabled communications session. A set of data is processed at a client node to identify a subset of priority data. The set of data and the subset of priority data are respectively provided to a first and second protocol stack, which correspond to a first and second RAT. The first and second protocol stacks are then used to control the transmission of a first and second set of transmitted data, which in turn respectively comprise the set of data and the subset of priority data. The first and second sets of transmitted data are received by an access node, which uses corresponding first and second protocol stacks to control their reception. The first and second sets of transmitted data are then processed to generate a set of received data.
Abstract:
Systems and methods are provided for encoding and transmitting codewords. A message is encoded in two encoders. For at least one of the two encoders, the message is algebraically modified prior to being encoded. In a specific example, the message is algebraically modified prior to being encoded in each of two traditionally non-systematic encoders, with the result that the output is equivalent to that of a turbo encoder.
Abstract:
Devices and methods are provided for device-assisted interference management in heterogeneous wireless network environments. A mobile station (MS) assists a serving access point (AP) in assigning radio resources according to the interference management capabilities of the MS, the serving AP, and one or more neighboring interfering APs on the downlink, or alternatively, to one or more neighboring APs with interfering mobile stations on the uplink.
Abstract:
A device and method are provided for concurrently using a plurality of radio access technologies (RATs) to support a wireless-enabled communications session. A set of data is processed at a client node to identify a subset of priority data. The set of data and the subset of priority data are respectively provided to a first and second protocol stack, which correspond to a first and second RAT. The first and second protocol stacks are then used to control the transmission of a first and second set of transmitted data, which in turn respectively comprise the set of data and the subset of priority data. The first and second sets of transmitted data are received by an access node, which uses corresponding first and second protocol stacks to control their reception. The first and second sets of transmitted data are then processed to generate a set of received data.
Abstract:
In some implementations, a method in a wireless network includes allocating a radio resource to a plurality of transmitters. The radio resource is configured for simultaneously transmitting and receiving user data with varying transmission delays. User data bursts are received, from the plurality of transmitters, with varying transmission delays transmitted over the allocated radio resource with varying resource identities.
Abstract:
Devices and methods are provided for device-assisted interference management in heterogeneous wireless network environments. A mobile station (MS) assists a serving access point (AP) in assigning radio resources according to the interference management capabilities of the MS, the serving AP, and one or more neighboring interfering APs on the downlink, or alternatively, to one or more neighboring APs with interfering mobile stations on the uplink.