Abstract:
Explicit congestion notification (ECN) data that is utilized in a core portion of a cellular communication network has known issues associated with a first use scenario and an infrequent use scenario. A probe comprising probe data and a data structure for storing certain ECN data can be transmitted in order to mitigate these issues. Transmitting the probe in response to a communication session being established with a device of a network can mitigate the first use issue. Transmitting the probe in response to expiration of a probe timer in connection with a network traffic idle period can mitigate the infrequent use scenario.
Abstract:
A method includes receiving at a directory server a notification from a client system, where the notification indicates that the first client received a corrupt packet of a playfile from a first peer. The method also includes determining if the first peer is a poor quality peer, updating a first peer score for the first peer if the first peer is not a poor quality peer, identifying a second peer that is not on a blacklist, and providing a peer identification associated with the second peer to the client system.
Abstract:
Recommendation systems are widely used in Internet applications. In current recommendation systems, users only play a passive role and have limited control over the recommendation generation process. As a result, there is often considerable mismatch between the recommendations made by these systems and the actual user interests, which are fine-grained and constantly evolving. With a user-powered distributed recommendation architecture, individual users can flexibly define fine-grained communities of interest in a declarative fashion and obtain recommendations accurately tailored to their interests by aggregating opinions of users in such communities. By combining a progressive sampling technique with data perturbation methods, the recommendation system is both scalable and privacy-preserving.
Abstract:
Example methods disclosed herein include, in response to receiving, at a server, a first control packet from a first router, selecting a first auxiliary router to forward the first control packet, and updating a forwarding table in the first router to associate a destination address of the first control packet with a first control path from the first router to the first auxiliary router, the forwarding table initially causing the first control packet to be routed from the physical router to the server, the first control path being determined by routing the first control packet from the first router to the first auxiliary router through the server, the updating of the forwarding table to cause subsequent data packets associated with the first control packet to be forwarded from the first router to the first auxiliary router via the first control path without being routed through the server.
Abstract:
Disclosed herein are systems, methods, and computer-readable storage devices for reducing inter-cellsite interference during full-duplex communication. A system receives a channel amplitude and a phase estimate between a first station and a second station, the first station and the second station creating inter-cellsite interference on a channel during full-duplex communications. The system calculates a level of the inter-cellsite interference between the first station and the second station based on the channel amplitude and the phase estimate and generates a cancellation signal based on the inter-cellsite interference. The system then communicates the cancellation signal to the first station for transmission with additional data during additional full-duplex communications.
Abstract:
Aspects of the subject disclosure may include, for example, a broadcast services platform includes a memory that stores operational instructions. A processor executes the operational instructions to: receive user data, the user data including a list of users and performance metric data corresponding to individual ones of the users; sort the list of the users in order of the performance metric data to generate a sorted list of the users; partition the sorted list of the users to generate a plurality of user groups; and generate network resource allocation data that allocates network resources to provide broadcast services to the users. Other embodiments are disclosed.
Abstract:
Explicit congestion notification (ECN) data that is utilized in a core portion of a cellular communication network has known issues associated with a first use scenario and an infrequent use scenario. A probe comprising probe data and a data structure for storing certain ECN data can be transmitted in order to mitigate these issues. Transmitting the probe in response to a communication session being established with a device of a network can mitigate the first use issue. Transmitting the probe in response to expiration of a probe timer in connection with a network traffic idle period can mitigate the infrequent use scenario.
Abstract:
Recommendation systems are widely used in Internet applications. In current recommendation systems, users only play a passive role and have limited control over the recommendation generation process. As a result, there is often considerable mismatch between the recommendations made by these systems and the actual user interests, which are fine-grained and constantly evolving. With a user-powered distributed recommendation architecture, individual users can flexibly define fine-grained communities of interest in a declarative fashion and obtain recommendations accurately tailored to their interests by aggregating opinions of users in such communities. By combining a progressive sampling technique with data perturbation methods, the recommendation system is both scalable and privacy-preserving.
Abstract:
A content monitor includes a processor that at least receives requests from a plurality of clients for content, instructs each client to retry their respective request at a first later time if the request is received before a first time, counts the requests to determine if a number of the requests exceeds a threshold if the request is received before a second time, instructs each client to retry their respective request at a second later time if the counted number of requests does not exceed a first threshold, instructs each client to join a multicast group to receive the content when the number of requests exceeds the first threshold, and counts a number of late clients joining the multicast group after a first portion of the content has been sent to the multicast group.
Abstract:
A content monitor includes a processor that at least receives requests from a plurality of clients for content, instructs each client to retry their respective request at a first later time if the request is received before a first time, counts the requests to determine if a number of the requests exceeds a threshold if the request is received before a second time, instructs each client to retry their respective request at a second later time if the counted number of requests does not exceed a first threshold, instructs each client to join a multicast group to receive the content when the number of requests exceeds the first threshold, and counts a number of late clients joining the multicast group after a first portion of the content has been sent to the multicast group.