Patent application number | Description | Published |
20080270971 | APPLICATION-REQUIREMENT BASED CONFIGURATION DESIGNER FOR DISTRIBUTED COMPUTING SYSTEMS - Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system. | 10-30-2008 |
20080275933 | SYSTEMS AND METHODS FOR STORAGE AREA NETWORK DESIGN - Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported. | 11-06-2008 |
20080275934 | SYSTEMS AND METHODS FOR STORAGE AREA NETWORK DESIGN - Systems and methods for designing storage area network fabric. Preferably included are an arrangement for collecting user requirements on data flows to be supported by the fabric, an arrangement for grouping the data flows into flow groups according to at least one physical location parameter, an arrangement for designing components of fabric for the flow groups, the components being associated with at least one geographical region, and an arrangement for obtaining fabric by joining the fabric components via interconnection fabric, whereby flow groups over a plurality of geographical regions are supported. | 11-06-2008 |
20090049485 | Method For Context-Based Channel Switching in Bandwidth Limited Television Systems - A method for switching channels on a video playback device, the device receiving content from a plurality of channels transmitted by a digital video distribution network, the method including establishing a context for selecting additional channels; receiving a selection for another channel; updating the context with the selection; and transmitting the selection to the device and providing the additional channels for fast channel switching. | 02-19-2009 |
20090177354 | METHOD FOR VEHICLE FAULT DIAGNOSIS USING AUDIO SENSORS - A method for implementing vehicle diagnostics includes: receiving one or more sound signals from a series of sensors distributed and positioned in various operational areas of a vehicle; recording the one or more sound signals in response to a command generated by an operator of the vehicle; storing the one or more sound signals in persistent memory; processing the one or more sound signals; and selecting one or more of the processed sound signals for audio playback in response to a user command; and wherein the audio playback is configured to assist in the diagnosis and prevention of vehicle faults and component defects. | 07-09-2009 |
20090276469 | METHOD FOR TRANSACTIONAL BEHAVIOR EXTACTION IN DISTRIBUTED APPLICATIONS - A method of analyzing log data related to a software application includes: selectively collecting data log entries that are related to the application; agnostically categorizing the data log entries; and associating the categories of the data log entries with one or more operational states of a model. | 11-05-2009 |
20090296710 | System and Method for Obtaining Network Link State Information From Sequential Distance Vector Routing Tables - A method of determining the state of network links based on differences in corresponding distance-vectors in a sequence routing table updates, and a network management system performing the method. The network management system comprises least one monitoring apparatus adapted to determine the state of network links. The monitoring apparatus may be a router in the network adapted to determine link status, or a personal computer or server peered with a router and configured to determine the state of network links based on differences in corresponding distance-vectors in a sequence of routing table updates. | 12-03-2009 |
20090313329 | Methods, Systems and Computer Program Products for Communication of Information in Electronic Conferences - Methods, systems and computer program products for document sharing in collaborative electronic meetings. Exemplary embodiments include a method for control of documents in a collaborative interaction, the method including establishing an out-of-band channel between a first participant and a second participant in the collaborative interaction, transferring a copy of a document on the out-of-band channel between the first participant and the second participant, transferring a command issued on the document by the first participant on an in-band channel established between the first participant and the second participant, invoking the command by the second participant on the copy of the document by the second participant and displaying the result of invoking the command to the second participant. | 12-17-2009 |
20100014424 | DISCOVERING NETWORK TOPOLOGY FROM ROUTING INFORMATION - A method for inferring network link topology includes receiving an address of a seed node in a network, initializing a set of links and monitors of the network, refining, iteratively beginning at the seed node, the set of links and monitors of the network, wherein a local topology of links is inferred from routing information of a current node and a remote topology of links is inferred from routing information of the set of monitors, wherein the set of monitors is created from the local topology of links, and outputting the topology of links including the local and remote topology of links as a topology of the network. | 01-21-2010 |
20100082493 | System and Method for Utility Sampling for Trust Metrics in PKI - A method for measuring trust in a transaction over a public key certificate network includes associating each edge K | 04-01-2010 |
20100091685 | Method and System for Deducing Network Routes by Querying Routers - A method and system for detecting and correcting invalid network paths in a network having a plurality of routers and a set of global invariant rules imbedded in the network including querying a subset of a routing table data structure defining network paths wherein said subset includes a plurality of routing table entries and comparing a network routing table entry with an earlier network routing table entry for the same node. The method and system also includes detecting inconsistencies between the newer network routing table entry and the earlier network routing table entry, and invalidating the network entries of the older network routing table that are inconsistent with the newer entries. The method and system also includes reconstructing the routing structure by replacing the invalidated network routing table entries with new routing table entries that minimize violation of the invariant protocols. | 04-15-2010 |
20100318648 | Selective Instrumentation of Distributed Applications for Transaction Monitoring - Systems and methods provide a selective instrumentation strategy for monitoring the progress of transactions in a distributed computing system. The monitoring of the transactive processing of jobs is considered through a collection of computer operating stages in a distributed system, using limited information. The monitoring is performed by observing log records (or footprints) produced during each stage of processing in the system. The footprints lack unique transaction identifiers resulting in uncertainties in monitoring transaction instances. The processing stages are selective instrumented to reduce monitoring uncertainty under the given constraints such as limited budget for instrumentation cost. | 12-16-2010 |
20100332906 | Quality of Service Management of End User Devices in an End User Network - Methods and apparatus for managing quality of service of computing resources are presented. For example, a method implemented on a processor for managing quality of service of computing resources includes identifying, by the processor, one or more devices of a user on a network of the user; obtaining, by the processor, at least one management module for the identified one or more devices; installing the at least one management module in the processor; monitoring, by the processor, the one or more devices of the user for a problem; and determining, by the processor, a domain in which a root cause of the problem resides and, optionally, the root cause of the problem. The management module comprises information pertaining to a corresponding device. Further, the method may detect quality of service (QoS) problems and determine if the problems reside in a user domain or a service provider domain. | 12-30-2010 |
20110218920 | METHOD AND SYSTEM FOR PROVENANCE TRACKING IN SOFTWARE ECOSYSTEMS - A system and method for tracking provenance for software use and development includes a developer toolkit program stored in memory media and accessible by a software market place wherein the software marketplace provides a library of software bundles that can be used for software development and modification of the software bundles. The developer toolkit includes a user interface configured to enable software creation of original works and derivative works. The development toolkit further includes a provenance tracker configured to track provenance of the derivative works and original works wherein the provenance tracker makes the derivative work and the provenance of the derivative work available in the software market place. The provenance tracker includes a software bundle identification module configured to identify and verify ownership of the original works and derivative works by associating an owner of the derivative works and original works with features included in portions of the derivative works and original works. | 09-08-2011 |
20110219372 | SYSTEM AND METHOD FOR ASSISTING VIRTUAL MACHINE INSTANTIATION AND MIGRATION - A system and method for instantiation of a virtual machine (VM) in a datacenter includes providing a network appliance in a location for listening to management information traffic. Indices are created for data center images in the network appliance. VM instantiation requests are intercepted in the network appliance. Locations from which blocks for the VM should be fetched based upon network cost are determined. VM image blocks are populated from the locations. | 09-08-2011 |
20110289117 | SYSTEMS AND METHODS FOR USER CONTROLLABLE, AUTOMATED RECORDING AND SEARCHING OF COMPUTER ACTIVITY - Systems and methods for automating the process of recording, indexing, and searching computer activity are provided. Events resulting from computer activities trigger capturing of contents and association of operational contextual information to form a searchable record of activities. The searchable record can be stored in local computer for use by its user, or on server computer, such as can be used for a tutorial by multiple users. Storage management can be used to manage the storage requirements of the captured information forming the searchable record. | 11-24-2011 |
20110292834 | Maintaining Time Series Models for Information Technology System Parameters - A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern. Responsive to identifying the previous pattern that matches the event stream, the network-centric modeling mechanism preemptively mitigates any related issues in the component or in a related component in the plurality of components using topology-aware indices associated with the previous pattern. | 12-01-2011 |
20120036362 | Secret-Key Exchange for Wireless and Sensor Networks - A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a second node of the wireless network. The second node provides a first input for the key establishment to the first node using communication encoded with the spreading code. Responsive to obtaining the first input from the second node, the first node provides a second input for the key establishment to the second node using communication encoded with the spreading code. Then, the first node and the second node establish the shared secret-key using the first input and the second input. | 02-09-2012 |
20120188940 | Spatiotemporal Annotation of Data Packets in Wireless Networks - Techniques for annotating data packets with time and/or location information in wireless networks are provided. In one aspect, a method for processing information streams produced by end-computing devices that are transmitted over a wireless network having at least one network element is provided. The method includes the following steps. Data packets which originate from the end-computing devices and are received by the network element are inspected for spatiotemporal metadata. Spatiotemporal metadata is inserted into the data packets and the data packets are transmitted if the step of inspecting the data packets reveals that the data packets are missing spatiotemporal metadata. Otherwise the data packets are transmitted if the step of inspecting the data packets reveals that spatiotemporal metadata is already present in the data packets. | 07-26-2012 |
20120239797 | RECONCILING NETWORK MANAGEMENT DATA - Network management data is managed by determining that a first version and a second version of a set of network management data have been created. The set of network management data is associated with a plurality of managed entities in a network. First and second network graphs are created based on the first version and second version of the set of network management data, respectively. The first and second network graphs include a first and second set of entities in the plurality of managed entities, respectively. A similarity metric is assigned between at least one or more entities in the first and second set of entities. At least a first entity in the first set of entities and at least a second entity in the second set of entities are determined to be identical entities based on the similarity metric being one of equal to and above a first given threshold. | 09-20-2012 |
20120265764 | FILE SEARCHING ON MOBILE DEVICES - Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file. | 10-18-2012 |
20120278476 | PREDICTIVE PLACEMENT OF CONTENT THROUGH NETWORK ANALYSIS - Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed. | 11-01-2012 |
20130006974 | FILE SEARCHING ON MOBILE DEVICES - Systems and methods are provided for file searching on mobile devices. A system includes a user interface and a file query system. The user interface is for receiving a user-provided spatio-temporal query for use in searching for a particular file. The user-provided spatio-temporal query is provided by a user of a mobile device. The file query system is for determining information about the particular file responsive to the user-provided spatio-temporal query, and identifying from the information one or more files as a search result for the particular file. | 01-03-2013 |
20130078961 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130078965 | SMART ONLINE SERVICES PRESENCE IN A CELLULAR NETWORK - A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider. | 03-28-2013 |
20130190026 | ENHANCED RESOURCE MANAGEMENT FOR A NETWORK SYSTEM - According to exemplary embodiments, a method for resource management of network systems includes sampling channel states of a first set of channels from at least one base station associated with a radio network controller providing an application and estimating channel states of a second set of channels from the at least one base station, wherein the estimated channel states are based on previously sampled channel states and currently sampled channel states. The method further includes adapting at least one runtime parameter of the application based on the sampled channel states of the first set of channels and the estimated channel states of the second set of channels. | 07-25-2013 |
20130208888 | MANAGING CONTENT DISTRIBUTION IN A WIRELESS COMMUNICATIONS ENVIRONMENT - A method, system and computer program product for managing content distribution in a mobile communications environment. The communications environment includes a core network and a multitude of end-user devices. In one embodiment, the method comprises downloading content from the core network to the end-user devices; and maintaining a map between the end-user devices, the content downloaded to the end-user devices, and the locations of the end-user devices. When a first of the end-user devices requests a specified content, this map and one or more rules are used to identify a second of the end-user devices having the specified content. The first of the end-user devices fetches the specified content from this identified second of the end-user devices. In one embodiment, object location descriptors embedded in the content are rewritten when the content is downloaded to the end-user devices. | 08-15-2013 |
20130237186 | SERVING TIME CRITICAL INFORMATION TO MOBILE DEVICES - A method, system and computer program product for disseminating information to mobile communication devices from a content provider via a core network. In an embodiment, the content provider sends specified information to the core network, and the content provider sends an information dissemination policy and a time release policy to the core network. The core network determines a time distribution plan for disseminating the specified information, and disseminates the specified information to one or more of the mobile communication devices in accordance with the dissemination policy from the content provider and the time distribution plan. The core network enables the one or more of the mobile devices to release the specified information to a user or users of the one or more of the mobile devices in accordance with the time release policy from the content provider. | 09-12-2013 |
20130260783 | SYSTEMS AND METHODS FOR PROVISIONING SENSING RESOURCES FOR MOBILE SENSOR NETWORKS - An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data. | 10-03-2013 |
20130298175 | CONSTRUCTING A CUSTOMIZED MESSAGE IN A VIDEO-ON-DEMAND SERVICE - A method, system and computer program product for creating a customized message in a video-on-demand service, in which a user accesses the service using a communications device. In an embodiment, the method comprises using a video-on-demand server to intercept the access by the user of the video-on-demand service, obtain information about video content of a local cache of the video-on-demand service, obtain a profile of the user, and identify a context of the user. A customized message is constructed for the communications device based on the information about the local cache, the profile of the user, and the context of the user. The video-on-demand server sends the customized message to the communications device. In one embodiment, the user accesses the video-on-demand service through an edge base station of a core network, and the video-on-demand server is in this base station of the core network. | 11-07-2013 |
20130318300 | Byte Caching with Chunk Sizes Based on Data Type - Methods and apparatus are provided for performing byte caching using a chunk size based on the object type of the object being cached. Byte caching is performed by receiving at least one data packet from at least one network node; extracting at least one data object from the at least one data packet; identifying an object type associated with the at least one data packet; determining a chunk size associated with the object type; and storing at least a portion of the at least one data packet in a byte cache based on the determined chunk size. The chunk size of the object type can be determined, for example, by evaluating one or more additional criteria, such as network conditions and object size. The object type may be, for example, an image object type; an audio object type; a video object type; and a text object type. | 11-28-2013 |
20140013057 | OBJECT TYPE AWARE BYTE CACHING - One or more embodiments perform byte caching. At least one data packet is received from at least one network node. At least one data object is received from the at least one data packet. An object type associated with the at least one data object is identified. The at least one data object is divided into a plurality of byte sequences based on the object type that is associated with the at least one data object. At least one byte sequence in the plurality of byte sequences is stored into a byte cache. | 01-09-2014 |
20140032175 | QUALITY OF INFORMATION ASSESSMENT IN DYNAMIC SENSOR NETWORKS - Quality of information (QoI) assessment in dynamic sensor networks that includes evaluating, by a computer, a first value reflective of available reports from sensors that are dynamically associated with the computer. A second value reflective of reports expected to have been available for evaluation about the observed phenomena is estimated. A QoI of the available reports is assessed. The assessing is based on the first value reflective of the available reports and the second value reflective of reports expected to have been available for evaluation. A third value, based on the assessing is output. | 01-30-2014 |
20140036674 | SPLIT TRANSPORT CONTROL PROTOCOL (TCP) FLOW CONTROL MANAGEMENT IN A CELLULAR BROADBAND NETWORK - Embodiments of the present invention provide a method, system and computer program product for split transport control protocol (TCP) flow control management in a cellular broadband network. In an embodiment of the invention, a method for split TCP flow control management in a cellular broadband network is provided. The method includes first determining a context for a packet received as part of a data flow in a base station of a cellular broadband network and then selecting either an end-to-end TCP connection or a split TCP connection to support the data flow. Thereafter, the data flow is routed using the selected connection. | 02-06-2014 |
20140040451 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. Redirection of the network connection is activated between the client and the server such that the middlebox mediates the connection. Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero. | 02-06-2014 |
20140040457 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero. | 02-06-2014 |
20140064058 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140064141 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140064182 | MOBILITY DETECTION FOR EDGE APPLICATIONS IN WIRELESS COMMUNICATION NETWORKS - Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more Internet Protocol (IP) data packets associated with a wireless communication device are analyzed. The wireless communication device is coupled with the edge entity. A determination is made, based on the analyzing, that the wireless communication device is a newly coupled device at the edge entity. A central entity disposed within the wireless communication network is notified that the wireless communication device is currently coupled to the edge entity. | 03-06-2014 |
20140067987 | BYTE CACHING IN WIRELESS COMMUNICATION NETWORKS - Various embodiments provide byte caching in wireless communication networks. In one embodiment, a plurality of data packets are received through an internet protocol (IP) data flow established between a wireless communication device and at least one server. Each of the plurality of data packets are combined into a packet bundle. A determination is made as to whether a second byte caching system is available. The packet bundle is transformed using one or more byte caching operations based on a second byte caching system being available. The transformed packet bundle is sent to the second byte caching system using an IP communication mechanism. | 03-06-2014 |
20140071803 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140071833 | Packet Loss Recovery on a Wireless Link in a Transmission Layer Protocol Session - Methods and apparatus are provided for recovering from packet loss in an end-to-end network connection having at least one wireless segment. A packet on a wireless segment of an end-to-end network connection is processed by determining whether the packet comprises one or more of a lost packet and a malformed packet; and generating a modified packet for an application associated with the packet to replace one or more of the lost packet and the malformed packet if the application is substantially tolerant to one or more of lost and malformed data. The modified packet comprises, for example, a non-original packet and/or a corrected packet. Link layer information or information from a deep packet inspection can be used to determine whether the packet comprises a lost packet or a malformed packet. | 03-13-2014 |
20140075013 | METHOD FOR VIRTUAL MACHINE MONITORING IN CLOUD INFRASTRUCTURES - A computer implemented method monitors resource usage of a virtual machine. When a virtual machine is instantiated, resource usage of the virtual machine is monitored to form monitoring data. The monitoring is performed externally from the virtual machine. When the virtual machine is later suspended, the monitoring data is stored as metadata associated with the virtual machine. | 03-13-2014 |
20140080457 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURES - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 03-20-2014 |
20140081596 | QUALITY OF INFORMATION ASSESSMENT IN DYNAMIC SENSOR NETWORKS - Quality of information (QoI) assessment in dynamic sensor networks that incudes evaluating, by a computer, a first value reflective of available reports from sensors that are dynamically associated with the computer. A second value reflective of reports expected to have been available for evaluation about the observed phenomena is estimated. A QoI of the available reports is assessed. The assessing is based on the first value reflective of the available reports and the second value reflective of reports expected to have been available for evaluation. A third value, based on the assessing is output. | 03-20-2014 |
20140105005 | PERFORMING VALUE AND CONTEXT AWARE COMMUNICATIONS NETWORKING - An aspect of this invention is a computer-executable method for distributing one or more features associated with information to be transported by a communications network that includes a plurality of end nodes interconnected via a plurality of network nodes. The method includes receiving one or more features associated with information to be transported by the communications network, wherein the one or more features are specified at an end node of the plurality of end nodes for receipt by a network node of the plurality of network nodes; responsive to the one or more received features, configuring at least a portion of the communications network to perform actions on information based upon the features; receiving the information using the plurality of network nodes; and based at least on the received features and the configuring, performing one or more actions with the information. Illustratively, the one or more actions comprise sending the information to one or more edge entity nodes in accordance with the configuring and the received features. | 04-17-2014 |
20140133348 | PERFORMING VALUE AND CONTEXT AWARE COMMUNICATIONS NETWORKING - An aspect of this invention is a computer-executable method for distributing one or more features associated with information to be transported by a communications network that includes a plurality of end nodes interconnected via a plurality of network nodes. The method includes receiving one or more features associated with information to be transported by the communications network, wherein the one or more features are specified at an end node of the plurality of end nodes for receipt by a network node of the plurality of network nodes; responsive to the one or more received features, configuring at least a portion of the communications network to perform actions on information based upon the features; receiving the information using the plurality of network nodes; and based at least on the received features and the configuring, performing one or more actions with the information. Illustratively, the one or more actions comprise sending the information to one or more edge entity nodes in accordance with the configuring and the received features. | 05-15-2014 |
20140143444 | SAVING BANDWIDTH IN TRANSMISSION OF COMPRESSED DATA - A method, system and computer program product for transmitting content across a link in a communications network. In an embodiment, the method comprises examining traffic in the network at a sender end of the link to determine if the traffic is carrying compressed content; when the traffic is carrying compressed content, decompressing at least one portion of the compressed content; and checking a cache to determine if the cache has content matching the at least one decompressed portion of the content. In an embodiment, the method further comprises when the cache has content matching the at least one decompressed portion of the content, determining an identifier associated with the at least one decompressed portion of the content; and using the identifier to reconstruct, at a receiving end of the link, the at least one decompressed portion of the content. In one embodiment, the at least one decompressed portion of the content from the traffic is replaced with an index, the index is compressed to form the associated identifier, and the associated identifier is sent to the receiving end of the link. | 05-22-2014 |
20140266819 | COMPACTLY STORING GEODETIC POINTS - Mechanisms are provided for the compact storage of geographical geometries as a collection of points, where individual points are encoded as binary/ternary strings (with the property that points closer to each other share a longer binary/ternary prefix) and the geometry is encoded by compressing the binary/ternary representation of common-prefix points. Mechanisms are also provided for the representation of a geometry using a ternary string that allows efficient storage of arbitrary shapes (e.g., long line segments, oblong polygons) as opposed to binary representations that are more efficient when the geometries are square or nearly square shaped. | 09-18-2014 |
20140278228 | MAPPING UNCERTAIN GEOMETRIES TO GRATICULES - A geohash based cover for a geometry whose uncertainty is described as a circle with center point and a radius is disclosed. In one example, a geohash cover is computed that does not require any expensive geodesic calculations, providing roughly an order of magnitude improvement in speed up of cover calculation. In another example, distance computations are exact compared to a conventional process. In another example, the geohashes returned by the technique can vary between 4 to 9—with a median 6 (a certain conventional process would always return 9 hashes (all the 8 neighbors and the self geohash)). In another example, results are accurate, while still avoiding expensive geodesic computations. | 09-18-2014 |
20140279970 | COMPACTLY STORING GEODETIC POINTS - Mechanisms are provided for the compact storage of geographical geometries as a collection of points, where individual points are encoded as binary/ternary strings (with the property that points closer to each other share a longer binary/ternary prefix) and the geometry is encoded by compressing the binary/ternary representation of common-prefix points. Mechanisms are also provided for the representation of a geometry using a ternary string that allows efficient storage of arbitrary shapes (e.g., long line segments, oblong polygons) as opposed to binary representations that are more efficient when the geometries are square or nearly square shaped. | 09-18-2014 |
20140280825 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of systems and/or algorithms. | 09-18-2014 |
20140280839 | IDENTIFYING NETWORK FLOWS UNDER NETWORK ADDRESS TRANSLATION - The present disclosure relates generally to the field of identifying network flows (e.g., IP flows) under network address translation. In various examples, identifying network flows (e.g., IP flows) under network address translation may be implemented in the form of methods and/or algorithms. | 09-18-2014 |
20140293885 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140297822 | CONTEXT-AWARE MANAGEMENT OF APPLICATIONS AT THE EDGE OF A NETWORK - A method, system and computer program for operating and managing data and application services at an edge of a network. An example method includes executing an application on an edge node. The edge node provides services to mobile device end users on the edge of a network. The method may include identifying an operating context for executing an application on an edge node. A management step manages the operation and lifecycle of the application on the edge node in response to the identified operating context. | 10-02-2014 |
20140307635 | Resource Sharing Among Multiple Service Providers in a Wireless Network Cloud - Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window. | 10-16-2014 |
20140307640 | Resource Sharing Among Multiple Service Providers in a Wireless Network Cloud - Techniques for resource sharing among wireless service providers in a wireless network cloud (WNC) are provided. In one aspect, a method for spectrum sharing in a WNC that hosts multiple wireless service providers is provided. The method includes the following steps. A spectrum usage is predicted for each of the wireless service providers during a given future time-window. An excess amount of spectrum, if any, each of the wireless service providers will have during the given time-window is determined. The excess amount of spectrum is allocated from the wireless service providers having the excess amount of spectrum to those of the wireless service providers having a spectrum usage that will exceed an allocated spectrum capacity during the given time-window. | 10-16-2014 |
20140328207 | DISCOVERING NETWORK TOPOLOGY FROM ROUTING INFORMATION - A method for inferring network link topology includes receiving an address of a seed node in a network, initializing a set of links and monitors of the network, refining, iteratively beginning at the seed node, the set of links and monitors of the network, wherein a local topology of links is inferred from routing information of a current node and a remote topology of links is inferred from routing information of the set of monitors, wherein the set of monitors is created from the local topology of links, and outputting the topology of links including the local and remote topology of links as a topology of the network. | 11-06-2014 |
20140364096 | INFORMATION SHARING FOR THIRD PARTY APPLICATIONS IN CELLULAR TELECOMMUNICATION INFRASTRUCTURE - A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device. The communications network also sends a second content portion to the communications device, and this second content portion is customized for the user of the communications device based on selected information about the user that the communications network has. In one embodiment, the communications network uses the selected information about the user to customize the second content portion for the user, and sends the customized second content portion to the communications device. In an embodiment, the communications network sends the selected information to the content provider, and the content provider uses the selected information to customize the second content portion. | 12-11-2014 |
20140379628 | PRIVACY RISK METRICS IN LOCATION BASED SERVICES - The present disclosure relates generally to mechanisms for the estimation of location privacy risk, comprising: building one or more trajectory models from auxiliary information (e.g., one or more maps, one or more routes); capturing common behavioral patterns (e.g., shortest route(s),/fastest route(s)); identifying, given unlinked trajectories for a plurality of users, most likely linkages using the trajectory model(s); eliminating one or more unlikely linkages based on deviation from the shortest route(s) and/or the fastest route(s); measuring privacy as the percentage of linkages correctly identified; and outputting the measured privacy. | 12-25-2014 |
20150046452 | GEOTAGGING UNSTRUCTURED TEXT - Mechanisms are described to extract location information from unstructured text, comprising: building a language model from geo-tagged text; building a classifier for differentiating referred and physical location; given unstructured text, identifying referred location using the language model (that is, the location to which the unstructured text refers); given the unstructured text, identifying if referred location is also the physical location using the classifier; and predicting (that is, performing calculation(s) and/or estimation(s) of degree of confidence) of referred and physical location. | 02-12-2015 |