Abstract:
Traffic in a radio communication system (FIG. 1) is adaptively balanced (300) to control congestion. A congestion model is maintained (302) with congestion dependencies including first and second types of congestion along with corresponding likelihood functions that indicate a likelihood that the first type of congestion will lead to the second type of congestion. An early warning of an impending congestion is detected (304) from an incoming traffic mix which exceeds an output traffic capability, given a current output allocation and configuration. The congestion model is accessed (306), in response to detecting the impending congestion, to identify and determine a priority for possible sources of the impending congestion. Action is then taken (308, 314, 318) to relieve the impending congestion by doing at least one of (a) increasing output resources and (b) decreasing traffic rates from the possible sources, prioritized in accordance with the congestion model.
Abstract:
A communication system (100) includes a shared communication medium, such as a communication channel or a base station, for providing messages and transmission devices (110) for transmitting the messages over the shared communication medium during sharing periods defined by a sharing pattern (114). A trading center (105) coupled to the transmission devices (110) modifies the sharing pattern (114) in response to traffic handled by the transmission devices (110).
Abstract:
A communication system (100) provides inbound communications from messaging units (120) to a controller (105) and outbound communications from the controller (105) to the messaging units (120). The inbound communications include scheduled packets and unscheduled packets that are transmitted over a reverse channel signal 250 divided into time slots. The controller (105) receives the scheduled and unscheduled packets and provides boundary information to the messaging units (120) to allocate the time slots between the scheduled packets and the unscheduled packets. The boundary information is computed based on previous boundary information for a time period and an average throughput of the unscheduled packets for the time period.
Abstract:
Time sharing of a radio communication channel among a plurality of interfering cells (302) is provided. The radio communication channel transmits information in a plurality of time slots (502). The radio communication channel is partitioned (704) into a plurality of virtual channels (V1, V2). A virtual channel is used for communicating simultaneously with corresponding ones of the plurality of interfering cells which are assigned to the virtual channel. No more than one of the plurality of virtual channels operates during any one of the plurality of time slots, and the time sharing of the radio communication channel is optimized (708, 710) by activating selected ones of the plurality of virtual channels, based upon a traffic load applicable to the corresponding ones of the plurality of interfering cells.
Abstract:
Embodiments infer position information using captured content items. A computing device such as a mobile computing or a cloud service analyzes one or more content items to generate information describing the content items. For content items that include photographs, for example, the photographs are processed to identify faces, objects, places, text, etc. The generated information is compared to reference content items (e.g., image comparison), user data (e.g., calendar data, contact information, etc.), and/or public data (e.g., address information, event information, etc.) to identify at least one match. Location information associated with the matched reference content items, user data, and/or public data is obtained. A position is determined for the content items based on the location information obtained from the matched reference content item, user data, and/or public data. In some embodiments, the obtained location information is used to refine a position determined using a beacon-based positioning service.
Abstract:
An RF fingerprinting methodology is generalized to include non-RF related factors. For each fingerprinted tile, there is an associated distance function between two fingerprints (the training fingerprint and the test fingerprint) from within that tile which may be a linear or non-linear combination of the deltas between multiple factors of the two fingerprints. The distance function for each tile is derived from a training dataset corresponding to that specific tile, and optimized to minimize the total difference between real distances and predicted distances. Upon receipt of an inference request, a result is derived from a combination of the fingerprints from the training dataset having the least distance per application of the distance function. Likely error for the tile is also determined to ascertain whether to rely on other location methods.
Abstract:
Managing use of a location sensor on a computing device for energy efficiency. The location sensor is briefly initialized to measure the signal quality. The measured signal quality is compared to pre-defined signal criteria values. The signal criteria values correspond to acceptable energy consumption, for example. If the signal criteria values are satisfied, location information for the computing device is obtained. Otherwise, the location sensor is disabled without obtaining the location information. In some embodiments, a lower-energy location sensor is used to obtain location information to determine whether to enable a higher-energy location sensor based on expected energy consumption.
Abstract:
Storing and retrieving beacon reference data in a truncated cuckoo hash table. Checksums of beacon identifiers associated with beacons are used to retrieve beacon reference data describing locations of the beacons in a hash table. The data is stored in one or more hash tables by cuckoo hashing to eliminate aliasing. The hash tables are provided to devices such as mobile devices. The devices retrieve the beacon reference data from the tables based using beacon identifiers of observed beacons. Location information for the devices is inferred using the retrieved beacon reference data. The cuckoo hash tables consume less memory storage space and obfuscate the beacon reference data.
Abstract:
The invention concerns a method (300) and communications unit (112) for selective receipt of group calls. The method can include the steps of—at a communications unit—receiving (314) a request to participate in a group call having at least one identification and having a plurality of participating members, comparing (316) the identification associated with the group call with a set of predefined blocking configurations and selectively blocking (318) the request to participate in the group call based on the comparison of the identification associated with the group call with the set of predefined blocking configurations.
Abstract:
A mobile device (106) comprising a processing system (206) including an inter-processor manager (308), and a plurality of processors (304-306) coupled to the inter-processor manager, wherein two or more of the plurality of processors are capable of processing a service application, and wherein the inter-processor manager is programmed to receive (402) a request to delegate the service application to at least one of the plurality of processors, select (406) an optimal one of the plurality of processors (304-306) to execute the service application according to a plurality of projected energy consumptions of the service application corresponding to each of the plurality of processors, and delegate (408) the service application to the optimal processor for execution.