Abstract:
Some embodiments are implemented in a communication system that includes a first wireless communication system that includes a Femtocell access point (FAP) and a network controller that can communicatively couple the FAP to a second wireless communication system. In some embodiments, the network controller can communicatively couple to the second wireless communication system through a UTRAN Iu interface. In some embodiments, the FAP can communicatively couple to a user equipment using a short-range licensed wireless frequency. Some embodiments provide method that determines whether a user equipment (UE) has roved-out of the first wireless communication system. The method receives a periodic message at the FAP from the UE. When the FAP fails to receive a pre-determined number of the periodic messages, the method sends a deregister message to the network controller over a unique connection dedicated to the UE and releases the dedicated connection.
Abstract:
A method of preventing theft of service in a communication system that includes a first wireless communication system and a second wireless communication system that includes a Femtocell access point (FAP) and a network controller that can communicatively couple the FAP to the first wireless communication system. The method creates an authorized session that includes a session identify for a first user equipment (UE). The UE is recognized by the first communication as an authorized UE to use the FAP. The method rejects a request by the FAP to register a second UE when the identity of the second UE does not match any identity in the set of first UE identities. The rejected request includes the session identity of the authorized session and the identity of the second UE. The second UE is not recognized by the first communication system as an authorized UE to use the FAP.
Abstract:
The invention finds matches in ordered sequences, e.g. program function call stacks from anomalous software program executions for discovering related or identical software flaws and possible known solutions. Call stacks are matched after removing recursive and uninformative subpatterns, e.g. names of common error handling routines, to see if they were generated due to the same possibly known problem. Sequences statistically unlikely to be matches are pruned from the search. Matches found earlier in the sequences may be weighted differently, e.g. to be more important in call stacks, than other matches. Sequences are indexed so that those relevant to a query are identified automatically without detailed exhaustive search. Maximum matches are found by optimizing a cost function based on weighted sequence similarity.
Abstract:
The present invention provides methods and compositions for making and using transgenic plants that exhibit increased nitrogen storage capacity compared to wild-type plants. Methods of the invention comprise inducing overexpression of monocot-derived vegetative storage proteins (VSPs) in plants, particularly in monocots. In some embodiments, at least one nucleotide construct comprising a nucleotide sequence encoding the ZmLox6 protein or a biologically active fragment or variant thereof is introduced into a plant. Depending upon the objective, the nucleotide construct may optionally comprise an operably linked coding sequence for a vacuolar sorting signal or plastid transit peptide in order to direct storage of the ZmLox6 protein or biologically active fragment or variant thereof into the vacuolar compartment or plastid compartment, respectively, of the cells in which the VSP is expressed. The invention further provides methods for producing plants with increased nitrogen content and/or increased nutritional value, which is desirable in commercial crops, including those used for forage, silage, and grain production.
Abstract:
Some embodiments provide a system for handling communications between an unlicensed mobile access (UMA) network controller (UNC) and a licensed wireless communication system. The systems of these embodiments include a serving general packet radio service support node (SGSN) or a mobile switching center (MSC) that is communicatively coupled to the UNC. In such systems the UNC and the SGSN communicate utilizing a subset of a protocol standard message set. The protocol standard message set includes messages for handing discovery and registration, circuit switching domain and packet switching domain signaling, and circuit switching based data and packet switching based data. The subset for the SGSN is for handling packet switched domain signals and packet switching based data. The subset for the MSC is for handling circuit switched domain signals and circuit switching based data.
Abstract:
Techniques for performing messaging between mobile stations (MSs) and UMA network controllers (UNCs) in an unlicensed mobile access network (UMAN). URR (UMA radio resource) messages are exchanged between an MS and one or more UNCs to perform various operations associated with UMAN. The MS may access the UMAN via a wireless access point (AP) that is communicatively coupled to the UNC via an IP network. The URR messages are sent between MSs and UNCs using an Up interface comprising a set of layered protocols over an underlying IP transport.
Abstract:
Methods and messages for performing assignment and activation of voice bearer channels for mobile stations (MSs) in an unlicensed mobile access network (UMAN). URR (UMA radio resource) channel activation messages are exchanged between an MS and a UMA network controller (UNC) operating in the UMAN to assign a voice bearer channel to the MS and verify the channel is available for uplink. The MS may access the UMAN via a wireless access point (AP) that is communicatively coupled to the UNC via an IP network. The URR channel activation messages are sent between the MS and the UNC using an Up interface comprising a set of layered protocols over an underlying IP transport.
Abstract:
Methods and messages for performing handovers between an unlicensed mobile access network (UMAN) comprising a first radio access network and a second radio access network. URR (UMA radio resource) handover messages are exchanged between a mobile station (MS) and a UMA network controller (UNC) operating in the UMAN. The MS may access the UMAN via a wireless access point (AP) that is communicatively coupled to the UNC via an IP network. The URR handover messages are sent between the MS and the UNC using an Up interface comprising a set of layered protocols over an underlying IP transport. The handover methods include both handover from a UMAN to the second radio access network, and handover from the second radio access network to the UMAN.
Abstract:
Methods for performing various operations via unlicensed mobile access (UMA) radio link control (URLC) messages in an unlicensed mobile access network (UMAN). The UMAN comprises a first radio access network that may be employed for accessing data services provided by a core network comprising a second radio access network. URLC messages are exchanged between mobile stations (MSs) and UMA network controllers (UNCs) to perform various operations associated with the UMAN. An MS may access the UMAN via a wireless access point (AP) that is communicatively coupled to a UNC via an IP network. The URLC messages are sent between MSs and UNCs using an Up interface comprising a set of layered protocols over an underlying IP transport.
Abstract:
A metastable depassivation lithography process for fabricating microstructures on a surface which utilizes the energy contained in neutral metastable rare gas atoms to remove passivating atoms from selected areas of a surface. Removal of the passivating atoms in a pattern allows further chemical processing to add or remove material to the exposed areas. The neutral metastable rare gas atoms can be directed to the surface using atom optical techniques to effect a desired pattern of exposure by the atoms. Alternatively, a mask can be used to effect a desired pattern of exposure.