Abstract:
Embodiments analyze crowd-sourced data to identify a moved or moving beacon. The crowd-sourced data involving a particular beacon is filtered based on a cluster start time associated with the beacon. A clustering analysis groups the filtered crowd-sourced data for the beacon into a plurality of clusters based on spatial distance. Timestamps associated with the crowd-sourced data in the clusters are compared to select one of the clusters. The crowd-sourced data associated with the selected cluster is used to determine position information for the moved beacon. The cluster start time for the beacon is adjusted based on the earliest timestamp associated with the positioned observations corresponding to the selected cluster. Adjusting the cluster start time removes from a subsequent analysis the positioned observations associated with one or more prior positions of the beacon.
Abstract:
Estimating positions of beacons based on spatial relationships among neighboring beacons. Beacon reference data defining positions of beacons is stored from beacon fingerprints observed by devices (e.g., enabled with global positioning system receivers). For a received beacon fingerprint having at least one beacon for which the beacon reference data is missing (e.g., from a device without a GPS receiver), beacons in the received beacon fingerprint for which beacon reference data is available are identified. Based on these identified beacons, the missing beacon reference data is calculated. In some embodiments, a set of spatially diverse beacons is selected from the identified beacons prior to calculating the beacon reference data.
Abstract:
Generate tags for content from metadata pre-filtered based on context. A plurality of data items is accessed. Each of the data items has metadata. A context for a user is determined (e.g., at a moment of content capture). One or more of the data items are selected based on the determined context. Upon receipt of content, the received content is compared with the selected data items to identify matches. Metadata is selected from the metadata associated with the matching data items. The selected metadata is associated with the captured content.
Abstract:
Determining semantics for locations based on user data such as user activities and/or user communications. The user data is captured and analyzed to identify keywords including locations. Location data describing the locations is obtained and associated with the user and keywords. The associations represent user context for the locations. The associations are used to deliver services and/or products to the user at various times such as when user approaches or enters a particular location.
Abstract:
Software code sections can include at least one calling procedure (110) and a called procedure (140). The called procedure can include an interpreted code body (144). Execution of the interpreted code body can require the use of an associated interpreter. The software code sections can also include prologue (142) associated with the called procedure. The prologue can be invoked by the at least one calling procedure and can responsively actuate the interpreted code body causing programmatic actions defined within the interpreted code body to execute. Execution of the prologue does not require use of an interpreter. In one embodiment, the interpreted code body of the called procedure can execute upon a platform having an application binary interface (115). The prologue can actuate the interpreted code body according to specifications of the application binary interface.
Abstract:
A computing device (102) includes computer instructions for receiving (202) streaming data, delegating (204) portions of the streaming data to a plurality of processes (302-305), detecting (206) that one or more of the processes is affected by an interruption that would inhibit further processing of the portions of streaming data delegated thereto, and rerouting (214) to other available processes the portions of streaming data supplied to the one or more affected processes at a desired quality of service level.
Abstract:
A method (100) and an apparatus (210) for providing enhanced security using service provider authentication. In addition to authenticating an application signature (245) against a root certificate (235) stored on the network node (210), a first carrier identification (250) associated with the application (240) is compared to a second carrier identification (255). If the first and second carrier identifications match, then the application can be assigned to a trusted protection domain and granted permissions which provide privileged access to the network node. For example, the application can be granted permission to be installed and/or executed on the network node. Otherwise the application can be denied privileged access. Accordingly, a carrier's applications will be only installed onto network nodes that are intended recipients of the applications.
Abstract:
A battery saving interval utilized for communicating with a portable subscriber unit (122) in a radio communication system is dynamically adjusted. An occurrence of a predetermined triggering event associated with the portable subscriber unit is observed (504), and the battery saving interval utilized for communicating with the portable subscriber unit is adjusted (506) in response to the predetermined triggering event, while battery saving intervals of other portable subscriber units in the system are left unchanged.
Abstract:
A method of wireless communication using a hybrid of a transaction protocol and a connection oriented protocol includes the steps of initiating a wireless request from a portable subscriber to a server using the transaction protocol (106) and continuing communications using the transaction protocol (110) if a response from the server is less than a maximum transfer unit size. If the response from the server is greater than a maximum transfer unit size, then the server segments the response into data packets, wherein the portable subscriber unit and server subsequently communicate using the connection oriented protocol (114) until a subsequent wireless request is made from the portable subscriber.
Abstract:
A method and apparatus allocates a first predetermined plurality of frame time slots (102) to a first protocol, and allocates a second predetermined plurality of frame time slots (102) to a second protocol having a base frame management capability. The base frame management capability is applied such that portable selective call receiving devices (10) utilizing the second protocol normally perform battery saving throughout the first predetermined plurality of frame time slots (102).