Abstract:
This disclosure provides methods, components, devices, and systems for wireless communication. Some aspects more specifically relate to dynamic path selection for wireless connectivity. An access point (AP) may receive communication link information and device status information from cellular-enabled devices in a wireless local area network (WLAN). The communication link information may indicate path metrics (such as link quality information) associated with respective connections between the cellular-enabled devices and a communication network (such as the Internet). The device status information may indicate operational metrics associated with the cellular-enabled devices (such as battery status information or cellular subscription information). If, for example, the performance of a default connection between the AP and the communication network deteriorates, the AP may select one of the cellular-enabled devices to relay wireless communications between the communication network and the AP in accordance with the communication link information and the device status information.
Abstract:
This disclosure provides systems, methods and apparatuses for intelligent cloud-edge resource management. An end device may provide edge nodes of an edge computing system with network link information, which may enable the edge nodes to schedule and distribute task workloads more effectively, providing greater performance, power, security, and mission-critical network availability. For example, if the end device transmits a processing task request to a first edge node, the first edge node may assign the processing task to a second edge node according to the network link information. Additionally, or alternatively, the end device may transmit an indication of processing task parameters to one or more edge nodes and may receive an indication of an estimated completion time of the processing task from the one or more edge nodes. Accordingly, the end device may assign the processing task to an edge node with the lowest completion time.
Abstract:
A mobile device may include a plurality of sensors and a processor. The processor may be configured to determine trust data for an asset based upon inputs from the plurality of sensors, determine whether an asset is accessible or not accessible based upon evaluating the trust data with a trust determination algorithm, and continuously update the trust data to continue to allow access to the asset or revoke access to the asset based upon the inputs from the plurality of sensors.
Abstract:
A method and system for performing domain name service (DNS) pre-fetching, content pre-fetching, or a combination thereof, are disclosed for a wireless portable computing device (PCD). The system and method may include rendering a web page on a display screen of the PCD and performing a DNS pre-fetch for any visible links within the web page. Further, the method may include determining whether a screen changing operation (i.e., a scrolling operation) is being performed and placing one or more DNS pre-fetch tasks in a queue for each link that is displayed on the display screen when the screen changing operation is performed. The method and system may reduce wait times for a wireless PCD when it is rendering webpages on its display screen.
Abstract:
This disclosure provides methods, components, devices, and systems for wireless communication. Some aspects more specifically relate to dynamic path selection for wireless connectivity. An access point (AP) may receive communication link information and device status information from cellular-enabled devices in a wireless local area network (WLAN). The communication link information may indicate path metrics (such as link quality information) associated with respective connections between the cellular-enabled devices and a communication network (such as the Internet). The device status information may indicate operational metrics associated with the cellular-enabled devices (such as battery status information or cellular subscription information). If, for example, the performance of a default connection between the AP and the communication network deteriorates, the AP may select one of the cellular-enabled devices to relay wireless communications between the communication network and the AP in accordance with the communication link information and the device status information.
Abstract:
A method and system for performing domain name service (DNS) pre-fetching, content pre-fetching, or a combination thereof, are disclosed for a wireless portable computing device (PCD). The system and method may include rendering a web page on a display screen of the PCD and performing a DNS pre-fetch for any visible links within the web page. Further, the method may include determining whether a screen changing operation (i.e., a scrolling operation) is being performed and placing one or more DNS pre-fetch tasks in a queue for each link that is displayed on the display screen when the screen changing operation is performed. The method and system may reduce wait times for a wireless PCD when it is rendering webpages on its display screen.
Abstract:
Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probability of enabling a mobile device to better determine whether a mobile device behavior is malicious or benign. Based on this analysis, a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to better determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors.
Abstract:
Techniques and systems are provided for image processing. For instance, a process can include obtaining, from one or more image sensors, an image of an environment. The process can further include detecting a first visual code in the image; decoding the first visual code; verifying safety of contents of the first visual code; determining that the contents of the first visual code contain a uniform resource locator (URL); and prefetching data linked by the URL based on verifying the safety of the contents of the first visual code.
Abstract:
A system, methods and server for creating and using manifests to support the rendering of a webpage by a computing device. Multiple computing devices may render a webpage and generate meta data. A server may collect and use the meta data to generate a manifest. The manifest may provide information describing priorities and formats for loading the resources of the webpage. The computing device may transmit information to the server for comparison with the manifest and to determine priorities and formats for retrieving the resources of the webpage. The server may request and send the webpage resources to the computing device based on the manifest information, to which the computing device may render the webpage. The server may access the webpage and generate meta data to create the manifest. The server may alternatively send the manifest information to the computing device.
Abstract:
Methods, systems and devices for generating data models in a client-cloud communication system may include applying machine learning techniques to generate a first family of classifier models that describe a cloud corpus of behavior vectors. Such vectors may be analyzed to identify factors in the first family of classifier models that have the highest probability of enabling a mobile device to better determine whether a mobile device behavior is malicious or benign. Based on this analysis, a second family of classifier models may be generated that identify significantly fewer factors and data points as being relevant for enabling the mobile device to better determine whether the mobile device behavior is malicious or benign based on the determined factors. A mobile device classifier module based on the second family of classifier models may be generated and made available for download by mobile devices, including devices contributing behavior vectors.