Abstract:
A network controller, a user equipment (UE) device, and associated methods for conducting intelligent enhanced multimedia broadcast multicast services (eMBMS). A network controller receives user preference information and location information from a plurality of UEs. The network controller selects one or more data packages to transmit using eMBMS in one or more broadcast regions based on the user preference information and the location information. The one or more data packages may comprise an updated machine learning model in a distributed learning application. The network controller provides an indication to a remote device to broadcast the one or more data packages in the respective one or more broadcast regions using eMBMS.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device.
Abstract:
In some implementations, a mobile device can analyze motion sensor data and proximity sensor data during a voice call to determine whether the mobile device is on a stationary object or worn on a user's body (e.g., in the lap or pocket of a user of the mobile device). The mobile device can adjust the transmit power level of the telephony transceiver during the voice call based on the determination.
Abstract:
Provisioning an embedded subscriber identity module (eSIM) in a user equipment (UE) device with personalized subscriber information. A request may be transmitted for personalized subscriber information. The personalized subscriber information may be received. The personalized subscriber information may be installed in an eSIM in the UE device.
Abstract:
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.
Abstract:
A method includes inter-chip data communications between a power-managed integrated circuit (IC) and a peer IC. The peer IC generates a data frame and prepends a discardable preamble of a predefined size to a payload of the data frame. The predefined size is a size not less than a size of data discarded by the power-managed IC upon the power-managed IC receiving a data frame while in a low-power state. The peer IC transmits the data frame to the power-managed IC. The power-managed IC, while in a low-power state, may receive the data frame from the peer IC and in response to receiving the data frame, begin exiting the low-power state. The power-managed IC, while exiting the low-power state, may discard a portion of the data frame such as for example, some or all of the discardable preamble, without discarding payload.
Abstract:
One embodiment of the present invention provides a system that facilitates intelligent inter-processor communication with power optimization. The system comprises a memory, a first router, a second router, a first physical link coupled between the first router and the second router, and a second physical link coupled between the first router and the second router. Furthermore, the system comprises a first communication bus implemented on the first physical link, as well as a second communication bus implemented on the second physical link. Note that the second communication bus provides lower power consumption and lower bandwidth than the first communication bus. During operation, the system receives a packet at the first router, wherein the packet is destined for the second router. Next, the system selects either the first communication bus or the second communication bus over which to route the packet. Finally, the system routes the packet according to the selection.
Abstract:
A network controller, a user equipment (UE) device, and associated methods for conducting intelligent enhanced multimedia broadcast multicast services (eMBMS). A network controller receives user preference information and location information from a plurality of UEs. The network controller selects one or more data packages to transmit using eMBMS in one or more broadcast regions based on the user preference information and the location information. The one or more data packages may comprise an updated machine learning model in a distributed learning application. The network controller provides an indication to a remote device to broadcast the one or more data packages in the respective one or more broadcast regions using eMBMS.
Abstract:
The subject technology extracts features from each log line of a log file. The subject technology determines, based on the features, a sequence of log lines. The subject technology determines probabilities of log lines occurring within a window of time from a respective log line from the sequence of log lines, and determines probabilities of periods of time within the window of time that a next log line will occur after the respective log line. The subject technology segments log lines from the log file into sequences of log lines based on the probabilities of the set of log lines occurring within the window of time and the probabilities of periods of time that the next log line occurs after the respective log line. The subject technology determines a predicted subsequent log line, and detects an anomaly when an actual subsequent log line differs from the predicted subsequent log line.