Patent application number | Description | Published |
20090207736 | CONSTRAINED DYNAMIC PATH SELECTION AMONG MULTIPLE COMMUNICATION INTERFACES - Method and apparatus are disclosed for constrained dynamic path selection among multiple available communication interfaces. In some embodiments selection logic is operatively coupled with a number of link-layer interfaces to select a set of link-layer interfaces that satisfy a set of congestion constraint conditions. Metric logic is operatively coupled with the link-layer interfaces to calculate a metric value for each link-layer interface in the set. Switch logic is operatively coupled with the selection logic and metric logic to assign a data stream a link-layer interface in the set of interfaces according to its metric value to optimize communication performance. | 08-20-2009 |
20090239469 | TECHNIQUES FOR DISCOVERING SERVICES PROVIDED IN A WIRELESS NETWORK - An embodiment of the present invention provides a method for discovering services provided in a wireless network, comprising enabling devices equipped with radio interfaces to advertise the services it provides and discover services offered by other nearby devices without establishing a network connection with the devices. | 09-24-2009 |
20090245243 | METHOD AND APPARATUS FOR SENDING A PACKET FROM A SOURCE NODE TO A DESTINATION NODE IN THE SAME BROADCAST DOMAIN - A method of sending a packet from a source node to a destination node in the same broadcast domain. The packet is associated with a traffic flow directed from the source node to the destination node. The source node is connected with the destination node via a first and a second communication path. A criterion based on an attribute of the traffic flow is measured for each of the communication paths. One path is selected between the first and second communication paths based on the measured criterion and the selected communication path is assigned to the associated traffic flow. The packet is then sent via the selected communication path. | 10-01-2009 |
20100254286 | TECHNIQUES FOR DISCOVERING SERVICES PROVIDED IN A WIRELESS NETWORK - An embodiment of the present invention provides a method for discovering services provided in a wireless network, comprising enabling devices equipped with radio interfaces to advertise the services it provides and discover services offered by other nearby devices without establishing a network connection with the devices. | 10-07-2010 |
20120254922 | METHOD AND APPARATUS FOR SENDING A PACKET FROM A SOURCE TO A DESTINATION NODE - A method of sending a packet from a source node to a destination node in the same broadcast domain. The packet is associated with a traffic flow directed from the source node to the destination node. The source node is connected with the destination node via a first and a second communication path. A criterion based on an attribute of the traffic flow is measured for each of the communication paths. One path is selected between the first and second communication paths based on the measured criterion and the selected communication path is assigned to the associated traffic flow. The packet is then sent via the selected communication path. | 10-04-2012 |
Patent application number | Description | Published |
20130257631 | Automated Driver Alert System - In accordance with some embodiments, an automated system may be implemented in which alerts to drivers are automatically distributed and implemented at the driver's vehicle. Thus, in some embodiments, no involvement by the driver is needed and everything may be done in an automated fashion including filtering alerts and responding to alerts. In some embodiments, each vehicle need not provide its current location to the Amber Alert System, providing greater privacy in some cases. | 10-03-2013 |
20130262208 | Peer-to-Peer Distribution of Advertising - Advertising may be distributed over a location based peer-to-peer network. A first customer may send a received advertisement to other customers over a short range distribution system in some embodiments. An identifier of the first customer may be appended to the transmission. The identifier may be used to reward the first customer for the referral. | 10-03-2013 |
20140033319 | Collecting Data from Processor-Based Devices - In accordance with some embodiments, information may be collected from processor-based devices after the processor-based devices have already been deployed. Moreover, in some cases, the information that is to be collected, the collection sources, and the handling of the data may be specified after the processor-based devices have already been deployed. | 01-30-2014 |
20140059694 | Privacy-Enhanced Car Data Distribution - In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner. This may provide enhanced privacy. At the same time, some types of the data may be encrypted for security and privacy reasons. Different information may be provided under different circumstances to different subscribers, such as the government, family members, location based services providers, etc. | 02-27-2014 |
20140139670 | AUGMENTING ADAS FEATURES OF A VEHICLE WITH IMAGE PROCESSING SUPPORT IN ON-BOARD VEHICLE PLATFORM - Systems and methods directed to augmenting advanced driver assistance systems (ADAS) features of a vehicle with image processing support in on-board vehicle platform are described herein. Images may be received from one or more image sensors associated with an ADAS of a vehicle. The received images may be processed. An action is determined based upon, at least in part, the processed images. A message is transmitted to an ADAS controller responsive to the determination. | 05-22-2014 |
20140180774 | SYSTEMS AND METHODS FOR MANAGING PARKING TRANSACTIONS - Certain embodiments herein are directed to managing parking-related transactions. Such transactions may include, but are not limited to, extending an amount of time purchased for parking a vehicle in a parking space and transferring an amount of parking time between parking spaces. An authentication code may be generated in association with an initial purchase of parking time and subsequently used to facilitate parking time extensions or transfers. A parking transaction server may receive and validate requests for parking transactions, as well as send a response to a parking transaction terminal associated with a request for a parking transaction. Certain embodiments herein also relate to the parking transaction server receiving indications that vehicles have entered or exited a parking space, and based on such indications, may manage an amount of parking time remaining to optimize the amount or parking time available for parking a vehicle in a parking space. | 06-26-2014 |
20140196111 | SECURED ELECTRONIC DEVICE - Methods, systems, and apparatus for communicatively pairing and securing an electronic device to a vehicle based electronic system. The pairing can enable the electronic device to seamlessly communicate with the electronic device and can provide infotainment to users of the vehicle. | 07-10-2014 |
20140200737 | USER IDENTIFICATION AND PERSONALIZED VEHICLE SETTINGS MANAGEMENT SYSTEM - A system and method for identifying an occupant of a vehicle as an authorized user and managing settings and configurations of vehicle components based on personal preferences of the authorized user includes detecting occupant characteristics from multiple sensors, determining whether the occupant is an authorized user of the vehicle based on a comparison of the occupant characteristics with a user database including registered user profiles, and automatically adjusting vehicle cabin and/or control components based on personal preferences of the occupant identified as a registered user. | 07-17-2014 |
20140222341 | Managing Navigation Changes - In accordance with some embodiments, multiple navigation changes to a navigation system may be managed. The navigation system may receive and first set of navigation changes. Then, the navigation system may establish communication with a user device. The navigation system may then receive a second set of navigation changes associated with the user device. As a result, the navigation system may merge the first set of navigation changes with the second set of navigation changes. | 08-07-2014 |
Patent application number | Description | Published |
20120004909 | SPEECH AUDIO PROCESSING - A speech processing engine is provided that in some embodiments, employs Kalman filtering with a particular speaker's glottal information to clean up an audio speech signal for more efficient automatic speech recognition. | 01-05-2012 |
20120252405 | Connecting mobile devices, internet-connected hosts, and cloud services - Applications are downloaded to a device from a cloud-based service by establishing trust with between the device and a host system. The host system and the cloud-based service have a pre-existing trust relationship. | 10-04-2012 |
20120254960 | Connecting mobile devices, internet-connected vehicles, and cloud services - A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle system, such that the mobile device can securely connect to, and obtain status information and/or control the Internet-connected vehicle system, through the cloud-based service. | 10-04-2012 |
20140058583 | Event Data Recording for Vehicles - In accordance with some embodiments, in response to the detection of a particular event, an event data recorder may enter a secure mode. In the secure mode, data from various peripherals is collected over a secure channel and stored in a secure memory within the event data recorder. That data may subsequently be read out under secure conditions with an assurance of reliability while the system is in a secure mode, it may continue to collect data in a non-secure mode in parallel. | 02-27-2014 |
20140195808 | SECURE MESSAGE FILTERING TO VEHICLE ELECTRONIC CONTROL UNITS WITH SECURE PROVISIONING OF MESSAGE FILTERING RULES - A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated with a vehicle; configuring a bus controller to verify authenticity of the message filtering rule, wherein the bus controller is programmed through an interface, the interface inaccessible from the host processor; filtering messages from the host processor using the verified message filtering rule, wherein the filtering is performed by the bus controller; and transmitting the filtered messages from the bus controller over a bus to one or more electronic control units (ECUs), the ECUs communicatively coupled to the bus. | 07-10-2014 |
20140244259 | SPEECH RECOGNITION UTILIZING A DYNAMIC SET OF GRAMMAR ELEMENTS - Speech recognition is performed utilizing a dynamically maintained set of grammar elements. A plurality of grammar elements may be identified, and the grammar elements may be ordered based at least in part upon contextual information. In other words, contextual information may be utilized to bias speech recognition. Once a speech input is received, the ordered plurality of grammar elements may be evaluated, and a correspondence between the received speech input and a grammar element included in the plurality of grammar elements may be determined. | 08-28-2014 |
Patent application number | Description | Published |
20090144980 | SYSTEM AND METHOD FOR ADAPTIVE MACHINING - A method of repair includes removing a deformed portion of a component to define a native component portion and adding a replacement portion to the native component portion. The replacement portion is adaptively machined based on one or more parameters of the native component portion and based on one or more original design parameters of the component. | 06-11-2009 |
20120156777 | CELL CARRIER, ASSOCIATED METHODS FOR MAKING CELL CARRIER AND CULTURING CELLS USING THE SAME - A carrier for growing adherent cells is provided, wherein the carrier comprises one or more outer surfaces; and one or more structured indentations on one or more of the outer surfaces, wherein the carrier has a length at least about 0.2 mm, a width at least about 0.2 mm, and a height in a range from about 0.05 mm to 1.2 mm and each of the structured indentations has a major axis in a range from about 0.1 mm to 0.5 mm, a minor axis in a range from about 0.1 mm to 0.5 mm and a depth in a range from about 0.025 mm to about 0.5 mm. The carrier may comprise a single indentation or ‘cup’ like structure, or may comprise a plurality of indentations. A method of making the carrier, and culturing stromal cells using the same carrier are also provided. | 06-21-2012 |
20120317771 | APPARATUS AND METHOD FOR SERVICING DYNAMOELECTRIC MACHINE COMPONENTS IN-SITU - An apparatus and method are provided for servicing a dynamoelectric machine component. The apparatus includes a tool delivery mechanism adapted for delivering a tool to a desired location in the dynamoelectric machine, and a tool support fixture adapted to be secured onto the body of the dynamoelectric machine, where the tool support fixture can be used for supporting and adjusting the tool delivery mechanism. A sleeve mechanism is attached to the tool support fixture, and the sleeve mechanism is disposed around a portion of the tool delivery mechanism. The apparatus is adapted to service the component of the dynamoelectric machine in-situ. | 12-20-2012 |
20140001158 | SYSTEMS AND METHODS FOR REPAIRING ENCASED COMPONENTS | 01-02-2014 |
Patent application number | Description | Published |
20080228707 | Encoding and Decoding Data System and Method - A system and method for encoding and decoding data. A method includes selecting a subgroup of bits from one or more bytes of binary encrypted information, wherein the binary encrypted information is for tracking, locating, and disabling an electronic device; passing the subgroup of bits to an encoding function that performs binary mapping operations on the subgroup of bits to generate an encoded byte; and encoding the next one or more bytes of binary encrypted information if the end of the binary encrypted information has not been reached. | 09-18-2008 |
20080270602 | Electronic Device Client and Server System and Method - An electronic device security and tracking system. A system includes one or more clients, wherein the clients are electronic devices; and a server computer system connected to each of the clients, wherein the server computer system is capable of tracking and locating each of the clients. In one aspect, the server computer system includes one or more web servers coupled to each of the clients, wherein the web servers include a website for the electronic device security and tracking system; one or more file transfer protocol servers coupled to each of the web servers; and one or more database servers connected to each of the web servers. | 10-30-2008 |
20080276326 | Electronic Device Disabling System and Method - A method for tracking, locating and disabling an electronic device. A method includes checking if an application component operated correctly during last power-up of the device; and placing the device under control of power on self test to proceed with powering-up the device if the application component operated correctly during last device power-up. | 11-06-2008 |
20100299749 | Secure Booting System And Method - In a method for securing and disabling an electronic device, the electronic device automatically executes a basic input/output system (BIOS) component of a security and tracking service during boot up. The BIOS component automatically determines whether an application component of the security and tracking service has requested disabling of the electronic device. In response to a determination that the application component has requested disabling of the electronic device, the BIOS component automatically displays system information and unlock key. The BIOS component also automatically prompts a user of the electronic device to enter an activation password to re-enable the electronic device. Other embodiments are described and claimed. | 11-25-2010 |
Patent application number | Description | Published |
20140248864 | METHOD AND APPARATUS FOR PROVIDING SAFETY SERVICES RELATING TO MOBILE DEVICES - An approach for providing feature configuration management is described. A service controller platform, monitors at least one environmental parameter of a mobile device; determines an event according to a threshold, the event being based on at least a change in the at least one environmental parameter; determines a feature configuration setting associated with at least one of the threshold or the event according to a device profile, wherein the device profile specifies a feature configuration setting that includes at least one of locking the mobile device, limiting access to at least one predetermined application, or disabling the mobile device; and causes the mobile device to change a feature configuration according to the feature configuration setting. | 09-04-2014 |
20150177001 | SYSTEM AND METHOD FOR PROVIDING A DYNAMIC TELEMATICS DASHBOARD - An approach is described for providing telematics information in connection with equipment. The approach includes scanning equipment available in a service vehicle, wherein the service vehicle is located at a service location. The approach also includes determining location information for the service location based on telematics information associated with the service vehicle. The approach further includes mapping the equipment to the service location based on the location information. | 06-25-2015 |
20150220873 | EXPEDITED SERVICE PROVISIONING ARCHITECTURE - A device may receive a provisioning order associated with providing a service to a customer premises. The provisioning order may be based on order information, provided by a technician located on the customer premises, associated with initiating provisioning of the service to the customer premises. The device may identify the provisioning order as a prioritized order. The provisioning order being identified as a prioritized order indicating that the provisioning order is to be processed before a non-prioritized provisioning order. The device may provide an acknowledgement of receipt of the provisioning order based on identifying the provisioning order as a prioritized order. The device may determine provisioning information based on the provisioning order. The provisioning information may include equipment installation or configuration instructions associated with initiating provisioning of the service to the customer premises. The device may provide the provisioning information while the technician is located on the customer premises. | 08-06-2015 |
20150262281 | SYSTEM FOR FACILITATING UPGRADES IN CUSTOMER PREMISES - A system may include an upgrade server device configured to: establish a session with a user device over a network; receive, from the user device during the session, a request to provide a list of recommended upgrades for a customer; obtain the list of recommended upgrades for the customer; send the list to the user device; and receive, from the user device, an order for one of the recommended upgrades in the list. The system may also include a provisioning system configured to provision a product or service associated with the order. | 09-17-2015 |
20150382160 | ALERTS BASED ON VEHICLE AND DEVICE TELEMATICS - A computer device may include logic configured to obtain vehicle telematics data relating to a vehicle operated by a user and to obtain device telematics data relating to a user device operated by the user. The logic may be further configured to determine that a distance between the user device and the vehicle is greater than a first distance threshold, based on the obtained vehicle telematics data and based on the obtained device telematics data; and send an alert to a mobile communication device associated with the user, in response to determining that the distance between the user device and the vehicle is greater than the first distance threshold. | 12-31-2015 |
Patent application number | Description | Published |
20090019345 | Compression of Stream Data Using a Hierarchically-Indexed Database - The present invention, in particular embodiments, is directed to methods, apparatuses and systems that provide an efficient compression technique for data streams transmitted to storage devices or over networks to remote hosts. Local storage as well as network transmission of streams is made more efficient by awareness and utilization of repeated sequences of data blocks. Such data blocks can be placed in a dictionary on persistent storage and shared across all streams. The dictionary is hierarchically indexed (two or more levels of indexing) to combine high efficiency search with efficient access to the stored data blocks. Additionally, data blocks, in particular implementations, are stored sequentially in order to improve overall performance. | 01-15-2009 |
20100146083 | WAFS Disconnected-Mode Read-Write Access - The present invention, in particular embodiments, provides methods, apparatuses and systems directed to providing a Wide Area File System that is robust against network connectivity issues. In particular implementations, the present invention provides a WAFS disconnected-mode read-write access that provides for a more seamless user experience against WAN or other network connectivity failures. Specific embodiments provide for management, at a network device such as an EFG node, of file objects previously opened during a connected state with a remote file server appliance, creation of new file objects during a disconnected state and re-synchronization of those file objects (data and meta-data) when a connection becomes available. | 06-10-2010 |
Patent application number | Description | Published |
20110246312 | ADVERTISEMENT INVENTORY MATCHING - Various embodiments provide techniques for advertisement inventory. In at least some embodiments, a scaled number of impressions can be matched to orders that have scaled impression goals. Impressions can be randomly selected from an offline traffic model and allocated to orders according to a matching algorithm until a number of impression defined by a scale factor is reached. This can occur by sampling the traffic model directly using the scale factor and/or by creating a scaled data set to which the matching algorithm can be applied. The matching algorithm can be configured to identify an order that is farthest away from being complete and then match the randomly selected impression to the identified order. If the scaled orders in the data set can be fulfilled using the scaled number of impressions, a conclusion is made that the original set of orders can be fulfilled using the original impressions. | 10-06-2011 |
20130117062 | ONLINE RESOURCE ALLOCATION ALGORITHMS - Various embodiments provide online algorithms for resource allocation. In one or more embodiments, requests for resources from a service provider are received stochastically. For each request, different options for satisfying the request are evaluated based in part upon shadow costs (e.g., unit costs) that are assigned to resources associated with the different options. One of the options may be selected by optimizing an objective function that accounts for the shadow costs. Resources for the selected option are allocated to the request and an adjustment is made to the shadow costs for remaining resources to reflect differences in rates for allocation and/or consumption of the resources. Thereafter, resources may be allocated to a subsequent request using the updated shadow costs and the costs are adjusted again. By updating shadow costs iteratively in this manner, an increasingly more accurate analysis of the objective function is achieved. | 05-09-2013 |
20130117454 | OFFLINE RESOURCE ALLOCATION ALGORITHMS - Various embodiments provide offline algorithms for resource allocation. A known set of “offline” requests may be matched to available resources using an online resource allocation algorithm that models the offline resource allocation problem as though the requests were received stochastically. Requests may be scaled and then sampled to provide random, stochastic input for the online resource allocation algorithm. For each request, resources are allocated to the request by evaluating multiple options based upon shadow costs assigned to resources associated with the different options. After each request is processed, an adjustment is made to the shadow costs for remaining resources to reflect differences in rates for allocation and/or consumption of the resources and the updated shadow costs are used for a subsequent request. A scaled resource allocation determined using sampled requests in this manner may be scaled back up to obtain a solution for the offline resource allocation problem. | 05-09-2013 |
20150186860 | FRAMEWORK THAT FACILITATES ACCESSING DIGITAL ITEMS - A framework that facilitates the sale of digital items is described herein. The framework is configured to charge an account of a consumer an access price for each access to a digital item, until an aggregate of access prices charged (to the account) for the digital item reaches a threshold. Once the aggregate of access prices charge (to the account) for the digital item reaches the threshold, the account is not charged for subsequent accesses to the digital item. Thus, the consumer has purchased the digital item. | 07-02-2015 |
20150206195 | AUCTION MECHANISM WITH DECOUPLED SELECTION AND RANKING - An auction mechanism that decouples advertisement selection from advertisement ranking is described herein. A page to be displayed on a client computing device has a plurality of advertisement positions. Responsive to receipt of data that is indicative of content to be included on the page, a plurality of bids corresponding to a respective plurality of advertisements are received, wherein each bid has a respective bid value. Further, a respective quality score is computed for each advertisement responsive to the receipt of the data. A subset of advertisements are selected from the plurality of advertisements based upon their respective bid values. Subsequently, the selected advertisements are ranked and assigned to the advertisement positions based upon their quality scores, which are independent of their bid values. | 07-23-2015 |
Patent application number | Description | Published |
20090007159 | Interfaces for digital media processing - APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component's direct access to information within a memory used by a software component, to enable the hardware component to use direct memory access techniques to obtain the contents of the memory, instead of using processor cycles to execute copy commands. The PhysMemDataStructure API exposes one or more fields of data structures associated with units of media content stored in a memory used by a software component, and the exposed fields store information about the physical properties of the memory locations of the units of media content. SyncHelper APIs are used for obtaining information from, and passing information to, hardware components, which information is used to adjust the hardware components' timing for preparing media samples of synchronously-presentable media content streams. | 01-01-2009 |
20130064370 | DISTRIBUTION OF PORTIONS OF CONTENT - Techniques for obtaining and providing a portion of content include receiving a request for the portion of the content, requesting and receiving one or more data chunks, processing the one or more data chunks, and providing one or more data blocks as the requested portion of the content. The processing may include validating, decrypting, and/or decompressing the one or more data chunks to create the one or more data blocks. Techniques for providing metadata and one or more data chunks may include receiving content and dividing the content into data blocks. Processing may then be performed on the data blocks to create data chunks, and the metadata may be generated from the processing. The metadata and one or more of the data chunks may be provided to a device. | 03-14-2013 |
20130067599 | Software distribution service federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application. | 03-14-2013 |
20130081008 | DETECTION AND INSTALLATION OF SOFTWARE ON A PER-USER BASIS - Techniques for detection and installation of software on a per-user basis are disclosed. An update agent in a client device may receive configuration data for a software application, the configuration data indicating availability of updates for the software application. The client device may be configured to have user accounts for a plurality of users. The update agent may determine that the software application is a per-user application. The update agent may identify a subset of the plurality of users for whom the updates for the software application are to be installed. The update agent may download the updates for the software application, and install the updates for a first user of the subset, in response to the first user logging into the client device. | 03-28-2013 |
20140101779 | Software Distribution Service Federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application. | 04-10-2014 |
20140281054 | INTERFACES FOR DIGITAL MEDIA PROCESSING - APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component's direct access to information within a memory used by a software component, to enable the hardware component to use direct memory access techniques to obtain the contents of the memory, instead of using processor cycles to execute copy commands. The PhysMemDataStructure API exposes one or more fields of data structures associated with units of media content stored in a memory used by a software component, and the exposed fields store information about the physical properties of the memory locations of the units of media content. SyncHelper APIs are used for obtaining information from, and passing information to, hardware components, which information is used to adjust the hardware components' timing for preparing media samples of synchronously-presentable media content streams. | 09-18-2014 |
20140359596 | UPDATING SOFTWARE COMPONENTS THROUGH ONLINE STORES - The present invention extends to methods, systems, and computer program products for updating software components through online stores. A computing device interacts with an online store to download applications and frameworks that are distributed from the online store. The computer system includes an operating system configured to keep distributed applications and frameworks updated. The operating system can, automatically and without user intervention, intelligently schedule and attempt application and framework updates in a manner that minimizes user disruptions. The operating system can manage application and framework updating for any and/or all user accounts on a computing device. The operating system can manage updates even when each application and/or framework is to be separately installed for different user accounts that have the application and/or framework installed. | 12-04-2014 |
20150271238 | INTERFACES FOR DIGITAL MEDIA PROCESSING - APIs discussed herein promote efficient and timely interoperability between hardware and software components within the media processing pipelines of media content players. A PhysMemDataStructure API facilitates a hardware component's direct access to information within a memory used by a software component, to enable the hardware component to use direct memory access techniques to obtain the contents of the memory, instead of using processor cycles to execute copy commands. The PhysMemDataStructure API exposes one or more fields of data structures associated with units of media content stored in a memory used by a software component, and the exposed fields store information about the physical properties of the memory locations of the units of media content. SyncHelper APIs are used for obtaining information from, and passing information to, hardware components, which information is used to adjust the hardware components' timing for preparing media samples of synchronously-presentable media content streams. | 09-24-2015 |
Patent application number | Description | Published |
20120275402 | RESOURCE ALLOCATION IN MIMO MULTI-CELLULAR NETWORKS VIA SUBMODULAR OPTIMIZATION - A method to allocate resources in a wireless MIMO system, by enforcing per-cell orthogonality to avoid intra-cell interference; and allocating resources based on interference handling. | 11-01-2012 |
20130170366 | MULTI-USER SCHEDULING IN CELLULAR UPLINKS - Disclosed herein are techniques, methods, and apparatus pertaining to a multi-user scheduling in 4G and 3GPP LTE cellular uplinks. | 07-04-2013 |
20130337858 | DYNAMIC AND CONFIGURATION BASED FRACTIONAL FREQUENCY REUSE FOR UNEVEN LOAD DISTRIBUTIONS - A fractional frequency reuse method for assigning physical resource units of a contiguous frequency band to sectors of cells is disclosed. Each cell includes at least one base station, for transmission of data to users in the sectors The method comprises, for each cell, segmenting the frequency band such that each separate segment includes a first contiguous portion of physical resource units dedicated to all sectors of the cell in vicinities of the center of the cell and a second contiguous portion of physical resource units dedicated for use in only one of the sectors in the cell in an outer area of the cell, assigning each cell with a physical resource unit configuration such that the second contiguous portion of physical resource units of a sector of a given cell partially overlaps with the first contiguous portion of physical resource units in a segment including the second contiguous portion dedicated to the same sector of a cell neighboring the given cell, and transmitting the data to the users in the sectors in accordance with the assigned physical resource unit configurations. Other methods, apparatuses, and systems also are disclosed. | 12-19-2013 |
20140031049 | Cloud-based Radio Access Network for Small Cells - A wireless communications system is disclosed. The system comprises a baseband processing unit (BBU) pool including one or more baseband processing units (BBUs), and a plurality of remote radio heads (RRHs) connected to the BBU pool through a front-haul network, wherein the wireless communications system has a plurality of sectors, each of which includes one or more small cells, each of which is deployed by one of the plurality of RRHs, wherein a BBUs is mapped to two or more RRHs in a sector in a one-to-many configuration, and a BBU is mapped to a single RRH in a sector in a one-to-one configuration, and wherein a combination of the one-to-one configuration and the one-to-many configuration is applied to each sector. Other systems, apparatuses, and methods also are disclosed. | 01-30-2014 |
20140044061 | Coordinated Multipoint Transmission and Reception (CoMP) - A communications method implemented in a transmission point (TP) used in a coordinated multipoint transmission and reception (CoMP) system is disclosed. The communications method comprises transmitting, to a user equipment (UE), attributers for up to four indicators indicating at least physical downlink shared channel (PDSCH) resource element (RE) mapping, and transmitting, to the UE, one of the four indicators, each of which is conveyed in 2 bits, wherein the four indicators comprises ‘00’, ‘01’, ‘10’, and ‘11’ corresponding to a first set, a second set, a third set, and a fourth set of parameters, respectively. Other methods, apparatuses, and systems are also disclosed. | 02-13-2014 |
20140045510 | Coordinated Multipoint Transmission and Reception (CoMP) - A communications method implemented in a transmission point (TP) used in a coordinated multipoint transmission and reception (CoMP) system is disclosed. The communications method includes transmitting, to a user equipment (UE), an indication of a channel state information (CSI) process in a CSI pattern comprising a set of CSI processes, wherein the UE is configured with the CSI process for at least one of the other CSI processes in the CSI pattern, and wherein a reported rank indication (RI) for the CSI process is the same as an RI for said at least one of the other CSI processes. Other methods, apparatuses, and systems are also disclosed. | 02-13-2014 |
20140161058 | Carrier Aggregation - A method implemented in a mobile communications system is disclosed. The method includes selecting primary component carrier c | 06-12-2014 |
20150043499 | Coordinated Multipoint Transmission and Reception (CoMP) - A wireless communications method implemented in a network system that supports coordinated multipoint transmission and reception (CoMP) is disclosed. The wireless communications method includes informing a user equipment (UE) semi-statically of a codebook subset for each channel state information (CSI) process, wherein the UE is restricted to report an indication of a precoding matrix within the codebook subset. Other methods, apparatuses, and systems are also disclosed. | 02-12-2015 |
Patent application number | Description | Published |
20140256286 | Intelligent Protocol Selection - Example apparatus and methods concern intelligent protocol selection to facilitate more efficiently establishing secure network connections from known locations. One example method determines that a mobile device is seeking to make a connection to a secure resource from a location through a network and then acquires identifying information associated with the mobile device, the location, or the secure resource. If preferred connection information related to the identifying information is available to the mobile device, then the connection will be made using the preferred connection information. If preferred connection information related to the identifying information is not available, then the connection will be made using discovered protocol information. Once the connection is made, information about the protocols used to make the connection may be recorded or updated to influence the future establishment of secure connections by a similar device in a similar situation. | 09-11-2014 |
20140279851 | Fingerprint-Based, Intelligent, Content Pre-Fetching - Example apparatus and methods concern fingerprint-based, intelligent, content pre-fetching. An example apparatus may have a memory that is configured to store content items or fingerprints derived from content items. The apparatus may include a set of logics that are configured to selectively asynchronously provide a content item or a fingerprint derived from the content item to a data store on a mobile computing device. The items are provided in response to an event other than a request for content from the mobile computing device. The apparatus may be configured to select the content item based on a proactive, crowd-sourced, predictive and adaptive method. The apparatus may provide the content item or the fingerprint to the mobile device and to other related mobile devices or users. The apparatus may consider the state (e.g., available memory, available battery, available communication channels) of the mobile device before providing content. | 09-18-2014 |
20150263865 | DYNAMIC AND INTEROPERABLE GENERATION OF STATEFUL VPN CONNECTION PROFILES FOR COMPUTING DEVICES - Systems, methods, apparatuses, and computer program products are described herein that enable a computing device to dynamically generate virtual private network (VPN) connection profiles to which policies can be mapped and then subsequently enforced. The VPN connection profiles are dynamically generated by a translation engine by obtaining parameters from payloads received from a plurality of different VPN gateways pursuant to establishing connections therewith in accordance with a respective plurality of different tunneling protocols, which may include both standard and proprietary tunneling protocols. The dynamically-generated VPN connection profiles are then provided to a connection manager, which enforces any policies associated with the VPN connection profiles when servicing requests for connections received from applications running on the computing device. | 09-17-2015 |
Patent application number | Description | Published |
20080235296 | Database management using a file to accumulate changes - Database management is described. A source data structure is copied to create a new data structure. Changes to the source data structure that occur during and after creation of the new data structure are accumulated in a file before they are added to the new data structure. Changes included in the file are subsequently applied to the second data structure. | 09-25-2008 |
20090193060 | EFFICIENT QUERY PROCESSING OF DML SQL STATEMENTS - Various technologies and techniques are disclosed for efficiently processing DML SQL statements through minimal logging and optimized insertions. Rows are inserted into a table in a database in a sorted order. When an insertion of a particular row into the table causes a page split and a new page created during the page split is empty, the new page is locked until an end of a transaction associated with the insertion is completed. When the page split is caused by appending monotonically increasing values at an end of the table, the sorted order will guarantee that the new page is empty. Minimal logging is performed. When the transaction associated with the insertion is completed, a forced checkpoint is performed. | 07-30-2009 |
20090300013 | Optimized Reverse Key Indexes - Aspects of the subject matter described herein relate to optimized reverse key indexes. In aspects, a dispersion function disperses index values such that they are distributed across multiple pages of an index. The dispersion function utilizes a dispersion factor that indicates to what extent the index values are dispersed. Because the index values are dispersed, contention regarding inserts may be reduced or eliminated and other advantages realized. | 12-03-2009 |
20110145201 | DATABASE MIRRORING - Methods, systems, and computer-readable media of database mirroring are disclosed. A particular method includes initiating a transaction that modifies one or more pages of a first database. Each page includes a structure modification operation (SMO) bit and initiating the transaction includes setting the SMO bit of each of the one or more pages to a first value. One or more first records are created at a transaction log of the first database. The transaction log is useable at a second database to mirror the transaction. Each first record indicates the setting of a SMO bit of a particular page to the first value. The database transaction is performed, and the SMO bit of each of the one or more pages is set to a second value. One or more second records are created at the transaction log, each second record indicating the setting of a SMO bit of a particular page to the second value. The method includes committing the transaction. | 06-16-2011 |
20110219020 | COLUMNAR STORAGE OF A DATABASE INDEX - Methods, systems, and computer-readable media of columnar storage of a database index are disclosed. A particular columnar index includes a column store that stores rows of the columnar index in a column-wise fashion and a delta store that stores rows of the columnar index in a row-wise fashion. The column store also includes an absence flag array. The absence flag array includes entries that indicate whether certain rows have been logically deleted from the column store. | 09-08-2011 |
20110231389 | ADAPTIVE ROW-BATCH PROCESSING OF DATABASE DATA - Architecture that provides for greater interoperability between column stores and row stores by leveraging the advantages both have to offer. The architecture operates automatically (e.g., dynamically) to move between row oriented processing mode and batch processing mode, and the combination thereof, when it is more beneficial to run in one mode relative to the other mode, or both modes. The auto-switching of data processing between batch and row oriented mode occurs during the execution of a single query. The architecture can automatically modify an operator in the query tree and/or remove an operator if desired at runtime for more efficient processing. This approach also accounts for memory constraints for either of row or column processing. | 09-22-2011 |
20110231403 | SCALABLE INDEX BUILD TECHNIQUES FOR COLUMN STORES - Architecture that includes an index creation algorithm that utilizes available resources and dynamically adjusts to successfully scale with increased resources and be able to do so for any data distribution. The resources can be processing resources, memory, and/or input/output, for example. A finer level of granularity, called a segment, is utilized to process tuples in a partition while creating an index. The segment also aligns with compression techniques for the index. By choosing an appropriate size for a segment and using load balancing the overall time for index creation can be reduced. Each segment can then be processed by a single thread thereby limiting segment skew. Skew is further limited by breaking down the work done by a thread into parallelizable stages. | 09-22-2011 |
20110276607 | NORMALIZING DATA FOR FAST SUPERSCALAR PROCESSING - A data normalization system is described herein that represents multiple data types that are common within database systems in a normalized form that can be processed uniformly to achieve faster processing of data on superscalar CPU architectures. The data normalization system includes changes to internal data representations of a database system as well as functional processing changes that leverage normalized internal data representations for a high density of independently executable CPU instructions. Because most data in a database is small, a majority of data can be represented by the normalized format. Thus, the data normalization system allows for fast superscalar processing in a database system in a variety of common cases, while maintaining compatibility with existing data sets. | 11-10-2011 |
20140129525 | NORMALIZING DATA FOR FAST SUPERSCALAR PROCESSING - A data normalization system is described herein that represents multiple data types that are common within database systems in a normalized form that can be processed uniformly to achieve faster processing of data on superscalar CPU architectures. The data normalization system includes changes to internal data representations of a database system as well as functional processing changes that leverage normalized internal data representations for a high density of independently executable CPU instructions. Because most data in a database is small, a majority of data can be represented by the normalized format. Thus, the data normalization system allows for fast superscalar processing in a database system in a variety of common cases, while maintaining compatibility with existing data sets. | 05-08-2014 |
20140379725 | ON DEMAND PARALLELISM FOR COLUMNSTORE INDEX BUILD - The degree of parallel processing used to build a database index can be dynamically adjusted based on actual memory usage of individual parallel processing units. Memory can be reserved to prevent an out-of-memory condition. A predetermined number of initial parallel processing units can be activated. The actual usage of resources by the initial activated parallel processing unit(s) can be measured to establish an initial baseline for resource consumption per parallel processing unit. The baseline for resource consumption per parallel processing unit can be used to determine how many additional parallel processing units are activated. The actual resource usage of each parallel processing unit can be measured and used to refine the baseline memory usage. The refined average memory usage can be used to determine how many additional parallel processing units are activated. | 12-25-2014 |
20150193485 | SCALABLE INDEX BUILD TECHNIQUES FOR COLUMN STORES - Architecture that includes an index creation algorithm that utilizes available resources and dynamically adjusts to successfully scale with increased resources and be able to do so for any data distribution. The resources can be processing resources, memory, and/or input/output, for example. A finer level of granularity, called a segment, is utilized to process tuples in a partition while creating an index. The segment also aligns with compression techniques for the index. By choosing an appropriate size for a segment and using load balancing the overall time for index creation can be reduced. Each segment can then be processed by a single thread thereby limiting segment skew. Skew is further limited by breaking down the work done by a thread into parallelizable stages. | 07-09-2015 |
20150234778 | NORMALIZING DATA FOR FAST SUPERSCALAR PROCESSING - A data normalization system is described herein that represents multiple data types that are common within database systems in a normalized form that can be processed uniformly to achieve faster processing of data on superscalar CPU architectures. The data normalization system includes changes to internal data representations of a database system as well as functional processing changes that leverage normalized internal data representations for a high density of independently executable CPU instructions. Because most data in a database is small, a majority of data can be represented by the normalized format. Thus, the data normalization system allows for fast superscalar processing in a database system in a variety of common cases, while maintaining compatibility with existing data sets. | 08-20-2015 |
Patent application number | Description | Published |
20100317178 | REMOTE PLASMA PROCESSING OF INTERFACE SURFACES - Embodiments related to the cleaning of interface surfaces in a semiconductor wafer fabrication process via remote plasma processing are disclosed herein. For example, in one disclosed embodiment, a semiconductor processing apparatus comprises a processing chamber, a load lock coupled to the processing chamber via a transfer port, a wafer pedestal disposed in the load lock and configured to support a wafer in the load lock, a remote plasma source configured to provide a remote plasma to the load lock, and an ion filter disposed between the remote plasma source and the wafer pedestal. | 12-16-2010 |
20100317198 | REMOTE PLASMA PROCESSING OF INTERFACE SURFACES - Embodiments related to the cleaning of interface surfaces in a semiconductor wafer fabrication process via remote plasma processing are disclosed herein. For example, in one disclosed embodiment, a semiconductor processing apparatus comprises a processing chamber, a load lock coupled to the processing chamber via a transfer port, a wafer pedestal disposed in the load lock and configured to support a wafer in the load lock, and a remote plasma source configured to provide a remote plasma to the load lock. | 12-16-2010 |
20110120377 | REMOTE PLASMA PROCESSING OF INTERFACE SURFACES - Embodiments related to the cleaning of interface surfaces in a semiconductor wafer fabrication process via remote plasma processing are disclosed herein. For example, in one disclosed embodiment, a semiconductor processing apparatus comprises a processing chamber, a load lock coupled to the processing chamber via a transfer port, a wafer pedestal disposed in the load lock and configured to support a wafer in the load lock, a remote plasma source configured to provide a remote plasma to the load lock, and an ion filter disposed between the remote plasma source and the wafer pedestal. | 05-26-2011 |
20110133313 | HARDMASK MATERIALS - Hardmask films having high hardness and low stress are provided. In some embodiments a film has a stress of between about −600 MPa and 600 MPa and hardness of at least about 12 GPa. In some embodiments, a hardmask film is prepared by depositing multiple sub-layers of doped or undoped silicon carbide using multiple densifying plasma post-treatments in a PECVD process chamber. In some embodiments, a hardmask film includes a high-hardness boron-containing film selected from the group consisting of Si | 06-09-2011 |
20110135557 | HARDMASK MATERIALS - Hardmask films having high hardness and low stress are provided. In some embodiments a film has a stress of between about −600 MPa and 600 MPa and hardness of at least about 12 GPa. In some embodiments, a hardmask film is prepared by depositing multiple sub-layers of doped or undoped silicon carbide using multiple densifying plasma post-treatments in a PECVD process chamber. In some embodiments, a hardmask film includes a high-hardness boron-containing film selected from the group consisting of Si | 06-09-2011 |
20110244694 | DEPOSITING CONFORMAL BORON NITRIDE FILMS - A method of forming a boron nitride or boron carbon nitride dielectric produces a conformal layer without loading effect. The dielectric layer is formed by chemical vapor deposition (CVD) of a boron-containing film on a substrate, at least a portion of the deposition being conducted without plasma, and then exposing the deposited boron-containing film to a plasma. The CVD component dominates the deposition process, producing a conformal film without loading effect. The dielectric is ashable, and can be removed with a hydrogen plasma without impacting surrounding materials. The dielectric has a much lower wet etch rate compared to other front end spacer or hard mask materials such as silicon oxide or silicon nitride, and has a relatively low dielectric constant, much lower then silicon nitride. | 10-06-2011 |
20120028454 | PLASMA ACTIVATED CONFORMAL DIELECTRIC FILM DEPOSITION - Methods of depositing a film on a substrate surface include surface mediated reactions in which a film is grown over one or more cycles of reactant adsorption and reaction. In one aspect, the method is characterized by intermittent delivery of dopant species to the film between the cycles of adsorption and reaction. | 02-02-2012 |
20120276752 | HARDMASK MATERIALS - Hardmask films having high hardness and low stress are provided. In some embodiments a film has a stress of between about −600 MPa and 600 MPa and hardness of at least about 12 GPa. In some embodiments, a hardmask film is prepared by depositing multiple sub-layers of doped or undoped silicon carbide using multiple densifying plasma post-treatments in a PECVD process chamber. In some embodiments, a hardmask film includes a high-hardness boron-containing film selected from the group consisting of Si | 11-01-2012 |
20130008378 | DEPOSITING CONFORMAL BORON NITRIDE FILMS - A method of forming a boron nitride or boron carbon nitride dielectric produces a conformal layer without loading effect. The dielectric layer is formed by chemical vapor deposition (CVD) of a boron-containing film on a substrate, at least a portion of the deposition being conducted without plasma, and then exposing the deposited boron-containing film to a plasma. The CVD component dominates the deposition process, producing a conformal film without loading effect. The dielectric is ashable, and can be removed with a hydrogen plasma without impacting surrounding materials. The dielectric has a much lower wet etch rate compared to other front end spacer or hard mask materials such as silicon oxide or silicon nitride, and has a relatively low dielectric constant, much lower then silicon nitride. | 01-10-2013 |
20140216337 | PLASMA ACTIVATED CONFORMAL DIELECTRIC FILM DEPOSITION - Methods of depositing a film on a substrate surface include surface mediated reactions in which a film is grown over one or more cycles of reactant adsorption and reaction. In one aspect, the method is characterized by intermittent delivery of dopant species to the film between the cycles of adsorption and reaction. | 08-07-2014 |