|| List of recent Networks-related patents
|System and method for the protection of computers and computer networks against cyber threats|
Systems and methods for protecting against cyber threats are disclosed. The system includes an external network accessing layer (enal) and a core computing asset overlaid by the enal.
|Method and system for detecting fake accounts in online social networks|
Assigning intervals in the ranked list to a fake portion, determined by manual inspection means of the osn provider, based on the degree-normalized trust of the nodes belonging to the intervals.. .
|User authentication using unique hidden identifiers|
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods only require a single human readable identifier be provided and minimize personal information exposure in the event of a network breach..
|Reservation scheduler for real-time operating systems in wireless sensor networks|
A method of scheduling tasks for a real-time operating system (rtos) in a low-power, wireless, mesh network may include receiving, at a scheduler for the rtos, a plurality of tasks to schedule for execution by one or more processors. The plurality of tasks may include a first task; the first task may be associated with an expected execution interval; and the expected execution interval may indicate an expected length of time for the one or more processors to execute the first task.
|Allocating internet protocol (ip) addresses to nodes in communications networks which use integrated is-is|
Previously it has only been possible to allocate unique internet protocol (ip) addresses to nodes in open systems interconnection (osi) communications networks such as those using integrated is-is, by manual configuration. This is time consuming and expensive because an operator must travel to the site of the node.
|Bandwidth allocation for shared network infrastructure|
Methods and systems are provided for adaptive management of local networks (e.g., in-premises networks, which may access or be connected to cable or satellite networks). A network device (e.g., a gateway device) may be configured to function as a network manager in a local network, to manage internal connections and/or communications within the local network.
|Content display monitor|
The invention can enable monitoring of the display of content by a computer system. Moreover, the invention can enable monitoring of the displayed content to produce monitoring information from which conclusions may be deduced regarding the observation of the displayed content by an observer.
|Risk mitigation in data center networks|
A method employing resource orchestration algorithms may find a fewest number of working data centers (dcs) to guarantee k-connect survivability using an overlay network representing a physical optical network. The overlay network may not include certain topological features of the physical optical network.
|Utility-maximization framework for dynamic adaptive video streaming over hypertext transfer protocol in multiuser-multiple input multiple output long-term evolution networks|
A method for scheduling user equipment (ue) devices comprising sorting the plurality of ue devices based on a weight of priority associated with each of the ue devices with respect to a plurality of subbands, and assigning one or more of the ue devices to each of the subbands using the weight of priority associated with the ue devices, wherein the weight of priority is based on one or more network utility functions associated with the ue devices. A computer program product comprising computer executable instructions to receive a media content segment using a dynamic adaptive video streaming over hypertext transfer protocol (http) (dash) protocol, monitor a playback buffer size of a ue device, monitor a battery energy level of the ue device, and adjust a representation quality level in a segment request based on the target requested video rate, the playback buffer size and the battery energy level..
|Method and arrangement for the supervision of transactions in a peer-to-peer overlay network|
The present invention relates to the supervision of transactions in peer-to-peer (p2p) overlay networks. A p2p overlay network often consists of peers interconnected via different access technologies having significant different round-trip time (rtt) delays.
|Consumption profile for mobile media|
Optimizing delivery of content by a mobile media platform includes using a processor of the mobile media platform to configure a consumption profile for a content item comprising attributes of devices on which the content item can be accessed, a profile of networks on which the content item can be delivered, and attributes of the content item. Optimizing delivery of content further includes optimizing at least one of ingestion of content, encoding of content, and hosting of content based on the consumption profile; and optimizing delivery of content based on the consumption profile..
|Instant data center recovery|
Facility for providing backup and restore of all data center components including physical machines, virtual machines, routers, networks, sub-networks, switches, firewall, directory lookup, dns, dhcp and internet access. Virtual or physical machines are associated to data center components and a software defined network, storage, and compute infrastructure is provided..
|Version vector scheme for data synchronization on resource-constrained networks|
Disclosed herein are methods and structures for networks of mobile computers which efficiently synchronizes table data across the mobile computers while exhibiting great tolerance for temporary disconnects.. .
|Selecting storage facilities in a plurality of dispersed storage networks|
A method begins by receiving a data storage request and determining target operational parameters of a set of dispersed storage (ds) units of a dispersed storage network (dsn). The method continues by determining candidate ds units.
|Method and system for providing context awareness based networking operation in smart ubiquitous networks|
Disclosed are a method and a system for providing a context awareness based networking operation in smart ubiquitous networks. The present invention provides a network entity with a networking operation that enables dynamically acquiring context information from various sources (for example, an end user, an end user device, a network, a service, and a content) in smart ubiquitous networks, processing, that is, analyzing and deducing related information in the acquired context information, and thereafter, controlling and managing the network depending on the recognized context..
|Apparatus and methods for event-based communication in a spiking neuron networks|
Apparatus and methods for event based communication in a spiking neuron network. The network may comprise units communicating by spikes via synapses.
|Visually adaptive process improvement system for order taking|
A system for order taking formed with one or more computers, cameras, computer networks and vision based computer algorithms and designed to visually obtain information to facilitate and obtain an order. The system's applications including drive through orders, kiosks, vending machines and other automated ordering or points of sale.
|Consumption profile for mobile media|
Targeting advertising content via a media management platform includes taking at least one consumption profile for content items of the media management platform, wherein the at least one consumption profile includes a profile of devices on which a corresponding content item can be accessed, a profile of networks on which the corresponding content item can be delivered, and attributes of the corresponding content item. Further a targeting input is produced by processing at least a portion of the consumption profile for a content item.
|Systems and methods for online advertising using user preferences|
Various implementations described herein provide systems and methods for online advertising and, more particularly, systems and methods that utilize user preferences in providing online advertising. In various implementations, systems or methods described herein facilitate user control of user-related data with respect to online advertisement systems, which can include supply-side platforms (ssps), advertisement exchanges, demand-side platforms (dsps), content delivery networks (cdns), ad networks, or adservers.
|Live ad processing engine service|
Techniques described herein provide for a live advertising processing engine service to act as an intermediary between client applications and advertising networks. The live advertising processing engine service can provide an interface with which the client can interact, via an application programming interface (api) or directly through the use of a standardized language, thereby allowing client applications to receive advertisement data without the need to be customized to communicate with specific advertising networks.
|System and method for interfacing interactive systems with social networks and media playback devices|
A system and method for interfacing interactive systems with social networks and media playback devices is described. For example, a system for generating and interacting with media content is described.
|Method and apparatus for managing demand response resources in a power distribution network|
In one aspect of the teachings herein, demand responsive loads are selected for involvement in a given dr event using an advantageous approach to selection that is based on using a mathematical network model to evaluate power loss in a power distribution network as a function of different combinations of demand responsive load selections and corresponding load reduction values. The mathematical network model comprises a mathematical representation of the power distribution network as a multi-phase unbalanced distribution network, including mathematical representations of the physical components in the power distribution network and the connecting relationships of those components.
|Method for communication terminal to reside in a plurality of networks and communication terminal|
The present invention provides a method for a communication terminal to reside in a plurality of networks, and a communication terminal thereof. The method comprises the steps of: acquiring a first signal intensity corresponding to a first communication network and acquiring a second signal intensity corresponding to a second communication network; when the first signal intensity is greater than a first threshold, registering a first service in the first communication network; when the second signal intensity is greater than a second threshold, registering a second service in the second communication network; when the second signal intensity is less than or equal to the second threshold, searching for the second communication network and registering the second service in the first communication network; and when the first signal intensity is less than or equal to the first threshold, searching for the first communication network and registering the first service in the second communication network.
|Method and system for self-organizing networks using cooperative sensing|
A method, network element and user equipment, where in one embodiment at a network element within a secondary cell for self-optimizing operation with a primary cell, the method transmitting using an initial transmit power from the network element; requesting feedback from sensors located near a location; receiving the feedback from the sensors; and adjusting a transmit power based on the received feedback.. .
|Method and system for messaging across cellular networks and a public data network|
A method, system and computer program product for instant message communication in a wireless and non-wireless environment. A message is sent from a mobile unit device over a wireless communication network.
|Device, method, mobile communication terminal, computer program and storage medium for frequency control|
The present invention relates to devices, methods, mobile communication terminals, computer programs and storage mediums for frequency control. The frequency control device for a mobile communication terminal only uses one crystal oscillator, but can access different access networks at the same time.
|Systems and methods for interference mitigation in heterogeneous networks|
Disclosed systems and methods mitigate interference in heterogeneous networks. Embodiments include adaptive or selective inter-cell interference coordination, adaptive multi-user zero forcing, adaptive power, and/or combinations of the foregoing.
|Dynamic allocation of wireless spectrum for utilization by wireless operator networks|
Certain embodiments herein are directed to determining an allocation of wireless spectrum, which may include one or more frequencies for communicating content, among operator networks that provide wireless (for example, cellular) services to their customers. Information associated with a supply of wireless spectrum and a demand for wireless spectrum may be analyzed to determine an allocation of the wireless spectrum.
|Electronic device and method for processing scan results|
A method for processing a scan result detects a floating touch signal of the electronic device when a scanning module searches for networks or other electronic devices. The method further displays a current scan result acquired from the scanning unit on a display device.
|Method of improving coverage and optimisation in communication networks|
A method and apparatus for detecting and determining the location of a coverage hole in a communications network such as a cellular communication system wherein the location is determined from operational parameters and/or by network elements themselves. Additionally is a method to reduce a hole by adjusting antennae parameters preferably remotely and automatically and this can be done in conjunction with hole location to optimise the system..
|System for regulating wireless device operations in wireless networks|
A system for managing the device operation rules that govern a device's operation, includes a profiling server configured to receive data from one or more data sources and a processor to aggregate and analyze the received data to dynamically generate profiles for distribution to a plurality of devices. The devices, which are in communication with the profiling server, being responsive to profiles generated by the profiling server to create, update, or modify the said operation rules and communicate with the profiling server the performance of the said profiles, the said rules, and/or the said device.
|Dynamic distribution of authentication sessions|
This disclosure relates to authenticating and providing transport security over unsecured ip networks to network subscribers. The system includes an authentication service that authenticates network subscribers.
|Determining radar sub-channel in communication networks|
A wireless device operating within a wireless communication channel can detect radar signals in one or more sub-channels using sub-channel counter information. The wireless device can receive signal pulses and generate fast fourier transform values based on the signal pulses.
|Crosstalk reduction in optical networks using variable subcarrier power levels|
A method and system for reducing crosstalk among subcarriers of a super-channel may involve adjusting power levels of the subcarriers. In one example, power levels of edge and/or intermediate subcarriers may be reduced relative to center subcarriers in the super-channel band.
|Crosstalk reduction in optical networks using variable subcarrier spectral allocation|
A method and system for reducing crosstalk among subcarriers of a super-channel may apply a frequency shift to selected intermediate subcarrier bands upon optical modulation. The frequency shift may be applied to equally spaced optical frequencies between a first optical frequency and a last optical frequency respectively corresponding to two end subcarrier bands that define a fixed bandwidth of the super-channel.
|Intelligent and scalable routing in multi-domain optical networks|
A method of extending the control plane to a metro sub-domain for a network having a transport plane for carrying subscriber traffic within end-to-end connections, and a control plane for managing at least a portion of resources of the transport plane allocated to the connections. A first set of control-plane enabled nodes of the network is designated as core nodes, each core node being operable to route subscriber traffic between a pair of neighbor core nodes in the network.
|Directly-modulated multi-polarization optical transmitters|
The present invention relates to optical transmitters, transceivers, and transponders used for transmission of information or data in any form through a physical medium dependent (pmd) network. The speed of such networks depends, in part, on the density of information that can be transmitted through the physical medium.
|Two way automatic universal transcription telephone|
A two-way automatic transcription telephone, which can operate over analog and/or digital networks and, during a telephone call, is able to automatically transcribe in real time incoming voice signals and/or outgoing voice signals of the telephone into associated text that can be displayed on a display of the telephone. The incoming and outgoing voice signals are transcribed based on settings received by the telephone via its input keyboard or touch screen input..
|Methods and systems for processing and managing communications|
An online and offline communication processing and tracking using data processing and data/voice networks is described. A phone address from a phone address number pool is automatically assigned to a first entity.
|Efficient multicast delivery to dually connected (vpc) hosts in overlay networks|
In a mesh-based connected data center network architecture, a mechanism is provided to allow efficient delivery of ip multicast frames within the network. Described approaches avoid replication into vlans (or svis) across the fabric by using the outer encapsulated tree to identify trees on which to replicate the traffic.
|Forwarding multicast packets over different layer-2 segments|
Embodiments of the disclosure are directed to forwarding multicast packets among disparate virtual local area networks (vlans). An embodiment receives a multicast packet matching registration criteria of one or more ports and forwards the multicast packet to the one or more ports, wherein the one or more ports are in a different vlan than a port from which the multicast packet was received..
|Methods for mitigating interference in a communications apparatus and communications apparatus utilizing the same|
A communications apparatus includes at least two cellular system radio transceivers capable of simultaneously performing transmitting/receiving radio activities in two cellular networks and a control entity. The control entity is coupled to the cellular system radio transceivers, collects radio activity information of the cellular system radio transceivers, determines whether interference will occur or is occurring and which cellular system radio transceiver is an aggressor transceiver and which cellular system radio transceiver is a victim transceiver when the interference occurs according to the radio activity information, and further determines control information according to the radio activity information for controlling the aggressor transceiver or the victim transceiver to mitigate the interference.
|Methods and systems for transmission of multiple modulated signals over wireless networks|
A method and apparatus for requesting and allocating bandwidth in a broadband wireless communication system. The method and apparatus includes a combination of techniques that allow a plurality of cpes to communicate their bandwidth request messages to respective base stations.
|Apparatus and methods for signaling out-of-standard capability in wireless communication networks|
Aspects of the present disclosure provide a number of approaches to deploy out-of-standard (or proprietary) features/enhancements that are not supported in the current communication standards. A mobile terminal and a network can mutually agree to support certain out-of-standard features/enhancements, and communicate support of such out-of-standard or non-standard features/enhancements by adapting or repurposing currently unused (or reserved) signaling data..
|Method and apparatus for enhanced modulation in a wirless communication system|
Disclosed are methods for facilitating enhanced modulation (such as 256-qam) in wireless networks. The methods generally involve enhancements to physical-layer signaling (such as enhanced mcs tables), enhancements to transport-block tables (to support enhanced mcs values), csi-feedback enhancements (to ensure that the ue signals the appropriate mcs for enhanced modulation), enhancements to higher-layer signaling, allowing ues to signal their ability to use the enhanced modulation, and ue category enhancements..
|White listing for binding in ad-hoc mesh networks|
Techniques are disclosed for specifying and enforcing connections in a network. Embodiments generally include a network device that maintains a data structure that identifies preferred nodes.
|Trading spectrum for energy savings in green cognitive cellular networks|
Technologies are generally described for reducing overall power consumption of a wireless network such as a cellular network through spectrum trading. According to some examples, spectrum may be shared between primary base stations (pbss) and secondary base stations (sbss) to reduce a power consumption of pbss and increase the spectral efficiency of cellular networks.
|Method, apparatus, and computer program product for assigned access slot group indication|
Method, apparatus, and computer program product embodiments of the invention are disclosed for assigned access slot group indication employable, for example, in connection with wireless networks. In an example embodiment of the invention, a method, comprises: receiving at a device from an access node: an encode of a block portion of a start association identifier and an encode of a block portion of an end association identifier; and a first indication and a second indication; calculating, at the device, a middle of the segment; decoding, at the device in view of said first indication, the encode of the block portion of the start association identifier based at least partly on said middle of the segment; and decoding, at the device in view of said second indication, the encode of the block portion of the end association identifier based at least partly on said middle of the segment..
|Selective network merging|
Subsets of isolated communications networks are selectively merged without merging the entire isolated communications networks, and devices are imported across isolated communications networks without merging the isolated communications networks. The presently disclosed technology provides for improved scalability, performance, and security in logical networks spanning two or more physical communications networks..
|Optimization of multi-stage hierarchical networks for practical routing applications|
Significantly optimized multi-stage networks, useful in wide target applications, with vlsi layouts using only horizontal and vertical links to route large scale sub-integrated circuit blocks having inlet and outlet links, and laid out in an integrated circuit device in a two-dimensional grid arrangement of blocks are presented. The optimized multi-stage networks in each block employ several rings of stages of switches with inlet and outlet links of sub-integrated circuit blocks connecting to rings from either left-hand side only, or from right-hand side only, or from both left-hand side and right-hand side; and employ shuffle exchange links where outlet links of cross links from switches in a stage of a ring in one sub-integrated circuit block are connected to either inlet links of switches in the another stage of a ring in the same or another sub-integrated circuit block..
|Virtual service topologies in virtual private networks|
In one embodiment, a method includes storing a service topology route at a network device interconnecting at least two zones comprising a plurality of hosts, and propagating the service topology route to create a service chain comprising a service node in communication with the network device. The service topology route creates a forwarding state at network devices in the service chain for use in inter-zone routing in a virtual private network.
|Payment reconciliation in mixed-ownership low-power mesh networks|
Systems and methods that enable scalable, cost-effective payment reconciliation between owners of devices at least temporarily connected in or to a particular low-power, ad hoc mesh network.. .
|Coordinated access and backhaul networks|
A communications network comprises performance determination circuitry and link control circuitry. The performance determination circuitry is operable to determine performance of a microwave backhaul link between a first microwave backhaul transceiver and a second microwave backhaul transceiver.
|Monitoring breathing via signal strength in wireless networks|
Systems and methods are disclosed for the use of sensor links in a network to estimate the breathing rate of a breathing subject within a structure, estimate the location of the subject within the structure, and detect if the subject is breathing. The structure may be a bed, a building, or a room in the building.
|Monitoring of channel stability and interference in wireless networks|
The stability of a channel in a wireless network is evaluated at a node. Upon transmitting a packet from the node on a network channel, a first counter associated with the channel is incremented.
|Optimization of over-the-top (ott) services on carrier networks|
Methods and apparatus for executing a client-based, over-the-top (ott) application, the client-based ott application for maintaining communications with a second communication device, comprising, in one embodiment, a first transceiver for transmitting and receiving user traffic, a memory for storing processor-executable instructions, and a processor, coupled to the transceiver and the memory, for executing the processor-executable instructions that cause the wireless communication device to establish a first control plane connection, establish a second control plane connection, establish a first data plane for transporting the user traffic, the first data plane connection relating to the first control plane connection, establish a second data plane connection for transporting the user traffic if at least one predetermined event has occurred, the second data plane connection related to the second control plane connection, and to transmit and receive the user traffic over the second data plane connection via the first transceiver.. .
|System and method of automatically configuring i-sids in gmpls controlled ethernet provider backbone bridged networks|
A system and method of automatically configuring a service instance identifier (i-sid) in a generalized multiprotocol label switching (gmpls) controlled network. The method begins by identifying a specific i-sid for a specific service in the gmpls controlled network.
|Method for delivering emergency traffic in software defined networking networks and apparatus for performing the same|
Disclosed are a method for delivering emergency traffic in a sdn based network and an apparatus performing the same. A method for delivering emergency traffic, performed in a controller, may comprise generating an emergency code for delivering the emergency traffic when an emergency state corresponding to a predefined type occurs; transmitting the emergency code to a first openflow switch connected to a transmitting terminal transmitting the emergency traffic; and transmitting a message directing an update of the emergency code to at least one openflow switch included in a forwarding path of the emergency traffic.
|Proximity out-of-band mobile device to device communication by means of low-power mesh networks|
Methods of telecommunicating and systems configured to perform the methods are disclosed. In some embodiments, the methods include establishing a primary communications link, determining that a backup communications link is to be established, and determining a plurality of candidate network nodes.
|High speed signaling techniques to improve performance of integrated circuits|
Techniques are presented to improve the performance, accuracy and power consumption of on-chip voltage biasing and transmission for highly loaded rc networks (such as wordlines or bitlines in nand or 3d memory arrays) that are otherwise limited by the physics of rc time constant. When transitioning the near-end voltage of the network, an under-drive or over-drive level is applied, combined with feedback control to estimate when the far-end voltage approaches the desired level..
|Video coding method, video decoding method, video coder, and video decoder|
A video coding method, a video decoding method, a video coder, and a video decoder are disclosed herein. A video coding method includes: performing base-layer coding for the first view, and extracting prediction information of at least one layer by combining a locally decoded first view and a second view; performing enhancement-layer coding for prediction information of at least one layer respectively; and multiplexing the enhancement-layer codes and the base-layer codes of the first view to obtain encoded information.
|Reconfigurable high-order integrated circuit filters|
Voltage and current mode reconfigurable nth-order filters (rnofs) fabricated in a 0.18 μm cmos process are disclosed. The rnofs utilize an inverse-follow-the-leader-feedback (iflf) signal path with summed outputs, resulting in a follow-the-leader-feedback-summed-outputs (flf-so) filter topology.
|Method and device for determining a maximum leakage current|
The invention relates to a method and a device for determining a maximum leakage current in unearthed power supply networks with a plurality of conductors. The method comprises the steps of: feeding of a measurement signal up with a measurement frequency fpuls into a conductor arrangement, setting the measurement frequency fpuls, measuring a line-to-line voltage ul-e for each conductor, determining a maximum occurring line-to-line voltage ul-emax from the measured line-to-line voltages ul-e, determining a voltage uze across a measurement resistance rm for calculating a leakage impedance ze, calculating the leakage impedance ze, and calculating a maximum leakage current thc.
|Thermo-mechanical process to enhance the quality of grain boundary networks in metal alloys|
Methods to enhance the quality of grain boundary networks are described. The process can result in the production of a metal including a relatively large fraction of special grain boundaries (e.g., a fraction of special grain boundaries of at least about 55%)..
|Fight-through nodes for survivable computer network|
A survivable network is described in which one or more network device includes enhanced functionality to fight through cyber attacks. A fight-through node (ftn) is described, which may be a combined hardware/software system that enhances existing networks with survivability properties.
|Identity module with interchangeable unique identifiers|
A telecommunications system is provided, comprising a plurality of different cellular telecommunications networks, an identity module registrable on the plurality of different networks and containing multiple unique identifiers, each unique identifier being associated with a respective network; and, a device, operative in accordance with the identity module, to communicate with the networks when the identity module is registered on that network. The identity module comprises a common security key associated with at least two of the unique identifiers such that the identity module is registrable on each one of the plurality of networks when a unique identifier of the identity module and its associated security key are authenticated for that network..
|Collaborative authoring with clipping functionality|
Content may be captured in form of clippings and clipping metadata utilized to provide various features and services. Data may be imported from other sources.
|Network connectivity wizard to support automated creation of customized configurations for virtual private cloud computing networks|
A user is provided an interface for selecting network connectivity features for designing a virtual private cloud computing network. Each network connectivity feature has an attribute for connecting tangible storage elements and tangible computing elements in the virtual private cloud computing network.
|Connecting to different network types through a common user interface|
Described is a technology by which network connections are unified into a single user interface for user interaction with those networks. Upon receiving information identifying available networks that correspond to different types of media, a user interface component aggregates the available network connections and displays representations of the available network connections on the user interface.
|Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (wpan)|
A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode.
|Network system capable of implementing stun with the assistance of two network devices and method thereof|
The present invention is to provide a network system, which comprises a coordinator server located in a public network; first and second nats (network address translators) located in first and second private networks and configured as a full-cone nat, respectively; first and second network devices located in the first and second private networks and connected to the public network through the first and second nats, respectively, wherein each of the first and second network devices has registered two mapped addresses with the coordinator server, respectively; a third nat located in a third private network; and a third network device located in the third private network and connected to the public network through the third nat, wherein the third network device can obtain the mapped addresses from the coordinator server and, based on the mapped addresses, conduct nat behavior tests on the third nat through the first and second network devices.. .
|Virtual network and management method of virtual network|
A network system includes: multiple communication systems for communication with a user; multiple physical network management servers that manage multiple physical networks including multiple routers; and a virtual network management server that manages a virtual network connecting the communication systems with each other through the physical networks. The virtual network management server acquires physical network configuration information.
|System and method for providing a software defined protocol stack|
Embodiments are provided for a framework for networks with software defined protocols (sdp) network nodes. The embodiments include a sdm controller component for managing and controlling a data plane protocol for sdp network nodes.
|Apparatus and method for identifying interoperability between object identifier-based heterogeneous identifier nodes for next generation network|
Disclosed herein are an apparatus and method for identifying interoperability between object-identifier-based heterogeneous identifier nodes for a next generation network. The apparatus includes a plurality of identifier registry servers located in a plurality of unit networks connected to an open network, and configured to receive and store identifiers and locators of nodes of corresponding unit networks, and also configured to, as identifiers of destination nodes that are communication target nodes are input from nodes of the unit networks, return locators of the destination nodes, wherein unique object identifiers are assigned to the identifier registry servers.
A receiving apparatus includes a communication unit to receive partial data partitioned from data transmitted from a transmitting apparatus through two or more networks and transfer network state related information based on the partial data respectively received through each of the two or more networks to the transmitting apparatus through a transmission network to be designated; and a network selection unit to designate one network among the two or more networks as the transmission network for transmitting the network state related information, based on a time of receiving each of the partial data through each of the two or more networks.. .
|Congestion management in overlay networks|
A system forwards congestion management messages to a source host updating the source address in the management message. The system may determine that the congestion management message was triggered responsive to an initial communication that was previously forwarded by the system.
A data transfer method and system includes at least one switch device (102) configured, in use, to transfer data, directly or indirectly, between a plurality of computing devices (104). The at least one switch device is configured to provide a plurality of virtual local area networks (vlan), each said vlan being configured as a virtual channel (vc) by receiving data from a said computing device designated as a sole source of data over the vc.
|Data analytics and security in social networks|
A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program.
|Web mining to build a landmark database and applications thereof|
This invention relates to building a landmark database from web data. In one embodiment, a computer-implemented method builds a landmark database.
|Method and system for user initiated query searches based on gaze data|
The invention generally relates to computer implemented systems and methods for utilizing detection of eye movements in connection with interactive graphical user interfaces and, in particular, for utilizing eye tracking data to facilitate and improve information search and presentation in connection with interactive graphical user interfaces. A gaze search index is determined based on information that has been presented on an information presentation area and gaze data signals.
|High-order semi-rbms and deep gated neural networks for feature interaction identification and non-linear semantic indexing|
Systems and method are disclosed for determining complex interactions among system inputs by using semi-restricted boltzmann machines (rbms) with factorized gated interactions of different orders to model complex interactions among system inputs; applying semi-rbms to train a deep neural network with high-order within-layer interactions for learning a distance metric and a feature mapping; and tuning the deep neural network by minimizing margin violations between positive query document pairs and corresponding negative pairs.. .
|Content capability clearing house systems and methods|
A content capability clearing house that can act as a trusted and neutral mediator among network providers to manage rich content capabilities among multiple networks is provided. Content capabilities that can be brokered include, but are not limited to, quality of service and content screening.
|Global commerce synergy|
A system and method for advising and guiding global businesses, companies and corporations, consumers and buyers how to offer, examine, sell and buy goods and services through networks based on networked devices disseminating and sharing experiences, knowledge and data on online offerings, examinations, sold and bought goods and services represented by a plurality of adaptable series of complementary interactive pictures and associated information associating and endowed with a plurality of adaptable themes and trends and compositions of suggestions and recommendations on the offerings, examinations, buys and sells of goods and services in the viewing screens in and among specific and network-selected devices.. .
|System and method for electronic social shopping game platforms|
The present disclosure relates generally to systems and methods for social shopping networks. In one embodiment, a computer-implemented method for providing rewards to a user and a customer via a social shopping game platform associated with a networking web site includes the steps of receiving registration information for the user; receiving product information of at least one product from a merchant; enabling the user to create a user's personal store, wherein the user's personal store displays the product information of the at least one product; enabling a customer of the networking web site to purchase the at least one displayed product from the merchant; and distributing the rewards to the user and the customer for their activities, such as, if the customer makes a purchase from the merchant after visiting the user's store displaying the at least one product..
|Identifying influential and susceptible members of social networks|
Methods, systems, and apparatuses, including computer programs encoded on computer readable media, for generating a message associated with a user, wherein the user is associated with a plurality of peers in a social network. A subset of peers is randomly chosen from the plurality of peers.