Inventors listed include AT&T Labs Research employees only. For a full list of inventors, click on patent number.
Tue Jun 24 11:21:41 EDT 2014
A method, system, and machine-readable medium for classifying an image element as one of a plurality of categories, including assigning the image element based on a ratio between an unoccluded perimeter of the image element and an occluded perimeter of the image element and coding the image element according to a coding scheme associated with the category to which the image element is classified. Exemplary applications include image compression, where categories include image foreground and background layers.
Tue Jun 24 11:21:40 EDT 2014
Systems and methods are described that that dynamically configure high-speed data link lightpaths between access routers and backbone routers at geographically dispersed locations to reassign traffic when a backbone router fails or is removed from service. Embodiments reduce the quantity of backbone router ports used in dual backbone router-homed networks.
Tue Jun 24 11:21:40 EDT 2014
Methods, systems and apparatus are disclosed to facilitate ranked network priority. An example method includes obtaining a bid value associated with a first wireless device, calculating a rank of the first wireless device with a plurality of wireless devices based on the bid value, operating characteristics of the first wireless device, and a scheduling model, and allocating a first portion of wireless network resources to the first wireless device based on the rank of the first wireless device.
Tue Jun 24 11:21:39 EDT 2014
Example methods, apparatus and articles of manufacture to perform root cause analysis for network events are disclosed. An example method includes retrieving a symptom event instance from a normalized set of data sources based on a symptom event definition; generating a set of diagnostic events from the normalized set of data sources which potentially cause the symptom event instance, the diagnostic events being determined based on dependency rules; and analyzing the set of diagnostic events to select a root cause event based on root cause rules.
Tue Jun 24 11:21:39 EDT 2014
A system that incorporates teachings of the present disclosure may include, for example, obtaining a message and an importance rating for the message where the importance rating is determined by a second communications management agent of a server based on an analysis of content of the message. The system can access rating feedback information associated with the second communications management agent. A rating accuracy for the importance rating of the particular message can be determined based on the rating feedback information, and the method of providing the message to the intended recipient can be adjusted based on the determined accuracy. Other embodiments are disclosed.
Tue Jun 24 11:21:38 EDT 2014
Assisted global positioning system (AGPS) information is retrieved from mobile devices and employed to facilitate antenna location. Measurement information, including AGPS information, can be received from a plurality of mobile devices dispersed over a geographical region. The measurement information can include location and timing information for the plurality of mobile devices. A timing difference between co-located antennas of a base station associated with the plurality of mobile devices can be computed. The location of the co-located antennas can be determined based on evaluating errors resultant from estimations based on a plurality of test locations. The measurement information can be aggregated over time and can be employed to update the antenna locations.
Tue Jun 24 11:21:38 EDT 2014
A methodology is disclosed for improving searches of a distributed Internet network. A distributed Internet network is searched for a particular information type, searching for a field identified using a predetermined identifier indicating that the field comprises information of the particular information type. When the field identified using the predetermined identifier is found, an association of the contents of the field with the search results is made, and repeated using the same predetermined identifier. Information of a particular information type may then be served in a field identified using a predetermined identifier that identifies the field as containing information of the particular information type.
Tue Jun 24 11:21:38 EDT 2014
A roaming client in communication with an enterprise site through a virtual private network (VPN) gateway maintains an address for a virtual network interface upon becoming a resident client at the enterprise site. A physical interface for the resident includes two valid addresses. Seamless data networking is achieved while promoting routing efficiency by reducing the amount of local traffic addressed to and from the virtual address that is unnecessarily routed through VPN gateways.
Tue Jun 24 11:21:37 EDT 2014
An access point comprising a first interface for communicating with a plurality of subscriber terminals wirelessly, wherein the access point supports an internet protocol push-to-talk service and supports a protocol for a quality of service enabled wireless local area network and a second interface for communicating with a broadband access network terminal is described.
Tue Jun 24 11:21:36 EDT 2014
A network method for using a network telephone voice-mail service, by which a caller may leave a voice-message that includes the identification of an attachment, which may include, as examples only, audio, video, text, programs, spreadsheets and graphic attachments. A video, text, spreadsheet or graphic attachment may be converted to an audible attachment to the voice-mail at the caller's or the voice-mail subscriber's request. Such entries may be made, after receiving an automated prompt for leaving an attachment identifier or conversion request, audibly or by using a keypad entry. A network method is also provided for using a network telephone voice-mail service, by which the voice-mail service may detect an attachment to a voice-mail message and provide access to the attachment to the voice-mail message.
Tue Jun 24 11:21:34 EDT 2014
Disclosed are systems, methods, and computer readable media for identifying an acoustic environment of a caller. The method embodiment comprises analyzing acoustic features of a received audio signal from a caller, receiving meta-data information based on a previously recorded time and speed of the caller, classifying a background environment of the caller based on the analyzed acoustic features and the meta-data, selecting an acoustic model matched to the classified background environment from a plurality of acoustic models, and performing speech recognition as the received audio signal using the selected acoustic model.
Tue Jun 24 11:21:32 EDT 2014
An end user computer is assigned a multicast content distribution group by a network service intelligence platform. The network service intelligence platform authenticates a token sent by the user and signed by a third part content controller, and provides the user with credentials for joining the group. The credentials include an authorization key as well as identifications of the user and the requested content. The credentials are encrypted and authenticated by the third party content controller. The user includes the encrypted and authenticated credentials in a join request sent to a network resource, such as an edge router. After verifying the credentials, the network resource adds the end user computer to the multicast group.
Tue Jun 24 11:21:31 EDT 2014
A method and apparatus for selecting a bandwidth option for a cell in a network are disclosed. For example, the method obtains, for the cell, network traffic data for a geographical area, and a physical characteristic of an antenna in the geographical area, determines busy time data traffic from the network traffic data, determines, for the cell, a cell range from the physical characteristic of the antenna, selects a bandwidth option from a plurality of bandwidth options, and determines an average throughput in accordance with the bandwidth option that is selected and the cell range.
Tue Jun 17 11:21:30 EDT 2014
A method of correlating received communication data with operational communication characteristics is provided. The method includes receiving audible input from a source in a communication over a communications network, recording the received audible input, and transcribing the recorded audible input into a transcript. The method further includes outputting the transcript, specifying features of the transcript to be analyzed, specifying and recording operational communication characteristics particular to the communication, analyzing the transcript for the specified features to identify patterns associated with the audible input, computing statistical correlations of the identified patterns with the operational communication characteristics, and outputting results of the computed statistical correlations on a user interface.
Tue Jun 17 11:21:30 EDT 2014
Information relevant to internet security is received at a data center server. Such information, for example, a network intrusion alert or details on a recent outbreak of an network virus, may be examined to determine the nature and scope of the security-related information. A security alert is promptly generated in response to the information, using previously stored multimedia content divided into categories of security alerts and/or multimedia content generated at the data center shortly after receiving the security information. The security alert is then disseminated to a plurality of mobile device users. The alerts may be disseminated only to the users associated with a certain security event category, or may be sent to different groups of users depending on other relevant criteria.
Tue Jun 10 11:21:29 EDT 2014
A packet trace is received. Inter-arrival times between the multiple packets in the packet trace are determined. An inter-arrival time in the inter-arrival times that is greater than a threshold is identified. An order number of the inter-arrival time is identified. A determination is made as to whether a size of each of at least a portion of the multiple packets is equal to a maximum segment size. When a determination is made that the size of each of at least a portion of the multiple packets is equal to the maximum segment size, a size of the ICW as a product of the order number and the maximum segment size is returned.
Tue Jun 10 11:21:29 EDT 2014
A method and system are disclosed for enabling a subscriber to a service provider to purchase goods or make donations to a third-party unaffiliated with the service provider. The system generates an electronic bill for a service provided to the user, where the electronic bill includes at least one selection for a purchase from or a donation to the third-party. The selection for purchase or donation from the user is received accompanied by an immediate or subsequent receipt of an indication of payment from the user. The payment indication includes payment for the service and the purchase or donation. The user has up until payment is actually made to revoke the purchase or donation selection. The transaction is completed by the service provider with the third-party to effectuate the purchase or donation.
Tue Jun 10 11:21:28 EDT 2014
Methods, systems, and products authenticate users for access to devices, applications, and services. Skills of a user are learned over time, such that an electronic model of random subject matter may be generated. The user is prompted to interpret the random subject matter, such as with a drawing, physical arrangement, or performance. The user's interpretation is then compared to the electronic model of the random subject matter. If the user is truly who they purport to be, their interpretation will match the electronic model, thus authenticating the user. If interpretation fails to match the electronic model, authentication may be denied.
Tue Jun 10 11:21:28 EDT 2014
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for handling missing speech data. The computer-implemented method includes receiving speech with a missing segment, generating a plurality of hypotheses for the missing segment, identifying a best hypothesis for the missing segment, and recognizing the received speech by inserting the identified best hypothesis for the missing segment. In another method embodiment, the final step is replaced with synthesizing the received speech by inserting the identified best hypothesis for the missing segment. In one aspect, the method further includes identifying a duration for the missing segment and generating the plurality of hypotheses of the identified duration for the missing segment. The step of identifying the best hypothesis for the missing segment can be based on speech context, a pronouncing lexicon, and/or a language model. Each hypothesis can have an identical acoustic score.
Tue Jun 10 11:21:28 EDT 2014
A method, computer readable medium and apparatus for hashing wireless traffic are disclosed. For example, the method hashes the wireless traffic uniformly by a plurality of probe servers based on at least one first key to provide a plurality of streams, and hashes at least one output stream of each of the plurality of probe servers uniformly based on at least one second key to provide a plurality of output streams. The method then provides the plurality of output streams to at least one aggregator server.
Tue Jun 10 11:21:27 EDT 2014
Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.
Tue Jun 10 11:21:26 EDT 2014
A broadband access network terminal comprising a hardware integrated circuit is disclosed. The hardware integrated circuit is for communicating with a plurality of access points. The plurality of access points is for communicating with a plurality of subscriber terminals via a wireless local area network. The hardware integrated circuit is further for communicating with a broadband access network. In addition, the broadband access network terminal comprises an internet protocol multicast enabled broadband access network terminal, The broadband access network terminal further supports an internet protocol push-to-talk service for the plurality of subscriber terminals via the wireless local area network and supports media stream mixing and multicasting of information associated with the internet protocol push-to-talk service.
Tue Jun 10 11:21:25 EDT 2014
Geographic gaming via a scalable, wireless geographic broadcast protocol enables multiplayer gaming between communication devices without relying on traditional network elements. Games can be fully distributed over an ad hoc network of mobile communications devices. The scalable nature of the wireless geographic broadcast protocol enables multiplayer games to function equally well in both remote areas with no or little network service and in crowded areas containing both game players and other users of mobile communications devices. Wireless geographic broadcast messages distributed among multiplayer game participants can be used to control gameplay features and/or game elements of multiplayer games. Embodiments include simulated artillery battles, simulated throw and catch games, and simulated reconnaissance elements.
Tue Jun 10 11:21:25 EDT 2014
A method of receiving content includes joining an in-progress multicast stream to receive a first portion of a content. The method further includes sending a request to a peer for a catch-up portion of the content, the request including a deadline for delivery of the content, and receiving the catch-up portion of the content from the peer prior to the deadline.
Tue Jun 10 11:21:24 EDT 2014
In a tool for use by network planners in designing metropolitan IP aggregation networks, several optimization methods are integrated into a tool. A k-means algorithm is used to choose access packet switch locations. A dual-k-means algorithm is used to choose the backbone switch locations. Each access packet switch is dual homed to two backbone packet switches using two diverse paths. The diverse path configuration is found using a maxflow-mincost algorithm on a modified fiber map topology. The link topology connecting the backbone packet switches to each other is designed using a heuristic that creates a skeleton network topology and then adds express links one by one, testing each link to assure reduced overall network cost. The resulting network topology is then improved upon by local search.
Tue Jun 10 11:21:24 EDT 2014
A speaker-verification digital signature system is disclosed that provides greater confidence in communications having digital signatures because a signing party may be prompted to speak a text-phrase that may be different for each digital signature, thus making it difficult for anyone other than the legitimate signing party to provide a valid signature.
Tue Jun 10 11:21:23 EDT 2014
Systems, methods, and computer readable-media for dynamically constructing personalized contextual video programs include extracting video metadata from a video program, extracting component metadata from video components stored in a media object library, extracting viewer preferences, receiving synchronization information about the video program, identifying a video program segment susceptible to inserting a video component, and transmitting the video component to a playback device and instructions detailing how to insert the video component in the video program segment. Video metadata can be extracted in real time. A viewer profile can be based on demographic information and user behavior. The video program and the video component can be combined before transmitting the video component and instructions to the playback device. A video component can be selected based on which advertiser offers to pay the most. The transmitted video component and instructions can be stored as a construction list for future use.
Tue Jun 10 11:21:20 EDT 2014
Methods and systems are described to store and forward multicast traffic. The method includes receiving a request to add a first node to a membership tree including a first plurality of nodes associated with a multicast group, identifying a second node in the first plurality of nodes, communicating a node identifier that identifies the first node over a network to the second node where the node identifier is stored at the second node to add the first node to the membership tree where the node identifier is stored in the membership tree to enable the second node to forward multicast traffic to the first node, and where the first and second nodes are separated from each other by at least one other node of the first plurality of node. The first node can be associated with a multicast member that has been added to the multicast group. Other embodiments are disclosed.
Tue Jun 10 11:21:16 EDT 2014
Described is a system and method for determining a classification of an application that includes initiating a stress test on the application, the stress test including a predetermined number of stress events, wherein the stress events are based on a network impairment. A response by the application to each stress event is identified and the application is classified as a function of the response into one of a first classification and a second classification, the first classification indicative of a normal application and the second classification indicative of an undesired application. If, the application is in the second classification, a network response procedure is executed.
Tue Jun 03 11:21:16 EDT 2014
Systems and methods for increasing the power and resource efficiency of a mobile network device are presented herein. More particularly, described herein is a novel Tail Optimization Protocol (TOP) and/or other mechanisms, systems and methods for enabling cooperation between a mobile device and an associated radio access network to eliminate idle periods (e.g., tails) when possible. Various systems and methods described herein can leverage the ability of applications and/or their associated connections to accurately predict a long tail time, from which a mobile device can notify an associated cellular network on such an imminent tail in order to allow the cellular network to immediately release tail resources. Various other aspects provided herein realize TOP via fast dormancy and/or other similar notification mechanisms, which enable a handset or other device to notify a cellular network for immediate resource release.
Tue Jun 03 11:21:15 EDT 2014
Media is distributed via a scalable ad hoc geographic routing/broadcast protocol. Media can be transmitted from a mobile device to a cluster of mobile devices that are geographically located in a particular region. Devices that are located between the source and the intended target can act as routers with the ability to forward data packets toward the intended destination. In essence, a geocast network cloud is established, allowing any device within the cloud to communicate with any other device in the cloud. Devices in the network can constantly change position and the transmission path through the network can be constantly changing. The geocast protocol adapts to the changing conditions.
Tue Jun 03 11:21:15 EDT 2014
A system, a method, an apparatus, and a computer-readable medium are provided. Co-occurrences of words or terms in a group of text documents are determined. A score for each of the co-occurrences of words or terms is calculated. A graphic view is presented. The graphic view has nodes that include at least one word or term and edges that join at least two nodes and depict a relationship among the at least two nodes. A layout of the graphic view includes a minimum number of crossings of the edges.
Tue Jun 03 11:21:14 EDT 2014
A system that incorporates teachings of the present disclosure may include, for example, a server including a controller to receive audio signals and content identification information from a media processor, generate text representing a voice message based on the audio signals, determine an identity of media content based on the content identification information, generate an enhanced message having text and additional content where the additional content is obtained by the controller based on the identity of the media content, and transmit the enhanced message to the media processor for presentation on the display device, where the enhanced message is accessible by one or more communication devices that are associated with a social network and remote from the media processor. Other embodiments are disclosed.
Tue Jun 03 11:21:13 EDT 2014
Systems and techniques for collecting information as authorized by information providers and sharing the information with information recipients according to criteria specified by the information providers. Information is collected from one or more of a variety of sources and stored in a provider profile, with the provider profile also specifying criteria for sharing the information, including payment required for sharing the information with particular categories of recipients. An exchange system is maintained allowing recipients to request or to otherwise specify needs for particular categories of information and payments to be provided by the information, and needs or requests of recipients for information are matched with criteria specified by providers, with information being transferred or used to provide results for a recipient and payment being transferred from the recipient to a provider or providers when a match between information needs and criteria for sharing information is identified.
Tue Jun 03 11:21:12 EDT 2014
A system, method and computer readable medium that enhances a speech database for speech synthesis is disclosed. The method may include labeling audio files in a primary speech database, identifying segments in the labeled audio files that have varying pronunciations based on language differences, identifying replacement segments in a secondary speech database, enhancing the primary speech database by substituting the identified secondary speech database segments for the corresponding identified segments in the primary speech database, and storing the enhanced primary speech database for use in speech synthesis.
Tue Jun 03 11:21:11 EDT 2014
A method, non-transitory computer readable medium and apparatus for detecting a tethering function being performed by an endpoint device in a communications network are disclosed. For example, the method analyzes a data packet directed towards the endpoint device, detects a signature based upon analyzing the data packet, and identifies the endpoint device as performing the tethering function based upon detecting the signature.
Tue May 27 11:21:10 EDT 2014
The disclosure provides a method and corresponding system for personalizing and disbursing content material in an automated fashion based on differing characteristics or profiles of the recipients. The system includes a database of potential recipients with key characteristics such as location data, revenue, product ownership, customer status, tenure with the company/organization, payment status, credit rating, whether they have recently responded to other material, and the like. Dissemination media include email communications, collaterals, brochures, textual materials, image and video information, and any similar media, where the contents of the communication material is customized based on the key characteristics profiles of the recipients and driven by a set of business rules that can be adapted to fit various scenarios.
Tue May 27 11:21:10 EDT 2014
A system, method and computer readable media are disclosed for presenting a simultaneous multimedia experience to a plurality of computing devices, each at different locations. The method involves coordinating a simultaneous presentation of multimedia content to a plurality of computing devices, receiving a control signal from a computer of one of the plurality of computing devices to control the presentation of multimedia content, and broadcasting the control assigned to each of the plurality of computing devices such that a control event substantially simultaneously occurs in the presentation of a multimedia content at each of the plurality of computing devices. Where commercial breaks and length of presentation differences occur in various time zones or geographically disparate areas, the method may include utilizing synchronization points, adding new content in time gaps at a computing device and/or modifying the length of the presentation to maintain synchronization among the computing devices in a group.
Tue May 27 11:21:09 EDT 2014
A system and method for translating received input from a sender to recipient in an instant messaging dialog is disclosed. The method comprises receiving instant messaging input from a sender for recipient, wherein the instant messaging input comprises at least one subculture specific term. A category is identified the defines a difference between the sender and the recipient and the received instant messaging input is modified from the sender by generating an output associated with the least one subculture specific term and based on the identified category. Multiple recipients in a chat session may also each receive a translated or annotated message according to characteristics of each individual recipient.
Tue May 27 11:21:09 EDT 2014
A method includes generating a first principle bilateral filtered image component from a source image. The first principle bilateral filtered image component corresponds to a second pixel value of a set, the second pixel value greater than or equal to a first pixel value. The method includes selectively updating a result pixel of a result image based on the first principle bilateral filtered image component and deallocating the first principle bilateral filtered image component. After deallocating the first principle bilateral filtered image component, a second principle bilateral filtered image component is generated from the source image. The second principle bilateral filtered image component corresponds to a third pixel value. The third pixel value is greater than the second pixel value. The third pixel value is less than or equal to a fourth pixel value. The result pixel is selectively updated based on the second principle bilateral filtered image component.
Tue May 27 11:21:08 EDT 2014
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for assigning saliency weights to words of an ASR model. The saliency values assigned to words within an ASR model are based on human perception judgments of previous transcripts. These saliency values are applied as weights to modify an ASR model such that the results of the weighted ASR model in converting a spoken document to a transcript provide a more accurate and useful transcription to the user.
Tue May 27 11:21:06 EDT 2014
Scrambling code conflicts can be mitigated by primary scrambling code reuse that minimizing a potential interference Primary scrambling codes are applied to a first set of cells located in a portion of the network being considered. A second set of cells are evaluated for primary scrambling code reuse based on a distance parameter and/or a coverage area. If the distance parameter is greater than a defined distance, primary scrambling code reuse can be applied. If all distance parameters evaluated are less than the distance parameter, a length of the distance parameter is reduced and the distance between cells is reevaluated.
Tue May 27 11:21:06 EDT 2014
A method includes identifying an area in an image that is associated with strong directional energy. The method further includes determining a first estimate of signal energy for the area and a second estimate of aliasing energy for the area. The method further includes estimating a severity of an aliasing error of the image based on the first estimate and the second estimate.
Tue May 20 11:21:05 EDT 2014
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a synthetic voice. A system configured to practice the method combines a first database of a first text-to-speech voice and a second database of a second text-to-speech voice to generate a combined database, selects from the combined database, based on a policy, voice units of a phonetic category for the synthetic voice to yield selected voice units, and synthesizes speech based on the selected voice units. The system can synthesize speech without parameterizing the first text-to-speech voice and the second text-to-speech voice. A policy can define, for a particular phonetic category, from which text-to-speech voice to select voice units. The combined database can include multiple text-to-speech voices from different speakers. The combined database can include voices of a single speaker speaking in different styles. The combined database can include voices of different languages.
Tue May 20 11:21:04 EDT 2014
A method and apparatus for tracking communications in a network are disclosed. For example, the method receives a subscription from a customer for a service to track at least one variable associated with a plurality of communicants of the customer. The method identifies a plurality of members of a social network of the customer, and gathers communication data associated with the plurality of members for tracking the at least one variable. The method then displays at least one result derived from the communication data to the customer.
Tue May 20 11:21:04 EDT 2014
The invention concerns a method and apparatus for performing packet loss or Frame Erasure Concealment (FEC) for a speech coder that does not have a built-in or standard FEC process. A receiver with a decoder receives encoded frames of compressed speech information transmitted from an encoder. A lost frame detector at the receiver determines if an encoded frame has been lost or corrupted in transmission, or erased. If the encoded frame is not erased, the encoded frame is decoded by a decoder and a temporary memory is updated with the decoder's output. A predetermined delay period is applied and the audio frame is then output. If the lost frame detector determines that the encoded frame is erased, a FEC module applies a frame concealment process to the signal. The FEC processing produces natural sounding synthetic speech for the erased frames.
Tue May 20 11:21:02 EDT 2014
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.
Tue May 20 11:21:02 EDT 2014
Methods and apparatus to determine network link weights are disclosed. An example method disclosed herein to determine link weights for routing in a communication network comprises iteratively updating a plurality of vectors using a genetic algorithm, the vectors including a plurality of individual values decodable into possible link weights, and decoding a first one of the vectors updated using the genetic algorithm into a first plurality of link weights providing a possible routing of a load through the communication network, the load to be split among a plurality of paths having respective path lengths determined from the plurality of link weights, at least two of the paths having different path lengths.
Tue May 20 11:21:01 EDT 2014
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for speech synthesis. A system practicing the method receives a set of ordered lists of speech units, for each respective speech unit in each ordered list in the set of ordered lists, constructs a sublist of speech units from a next ordered list which are suitable for concatenation, performs a cost analysis of paths through the set of ordered lists of speech units based on the sublist of speech units for each respective speech unit, and synthesizes speech using a lowest cost path of speech units through the set of ordered lists based on the cost analysis. The ordered lists can be ordered based on the respective pitch of each speech unit. In one embodiment, speech units which do not have an assigned pitch can be assigned a pitch.
Tue May 20 11:21:01 EDT 2014
The current invention relates to a system and method for tracking or locating a target entity on a data network, such as the public Internet, by analyzing network traffic and communication among interacting network nodes. The invention describes a system of creating an information set of data related to the traffic patterns associated with a specific entity over a time period, and comparing the information set to other information related to the traffic patterns associated with a group of entities over the same time period. By excluding information that is common to both the specific entity and the group of entities from the information set, the information set is left with only the information that helps identify the specific entity on the network.
Tue May 20 11:21:00 EDT 2014
Certain exemplary embodiments comprise a method comprising: for selected traffic that enters a backbone network via a predetermined ingress point and is addressed to a predetermined destination, via a dynamic tunnel, automatically diverting the selected traffic from the predetermined ingress point to a processing complex; and automatically forwarding the selected traffic from the processing complex toward the predetermined destination.
Tue May 13 11:21:00 EDT 2014
Tue May 13 11:20:59 EDT 2014
A method of performing receive antenna selection is presented. The method executes a determination operation for a set of receive antennas, determines a maximum result of the determination operation for two of the antennas, eliminates one of the two antennas from the set of antennas, and repeats the determination and elimination process until only a predetermined number of antennas remain in the set. The signals from these remaining antennas are then processed. The present invention reduces receiver complexity and cost.
Tue May 06 11:20:59 EDT 2014
A method and apparatus for displaying a plurality of secondary images based on image data of a primary image include displaying a primary image and a plurality of secondary images based on the image data of the primary image. Each of the plurality of secondary images is displayed having a size based on a relevance of each respective one of the plurality of secondary images to the primary image. The primary image can be selected from a plurality of images or a frame of a video. Subsets of secondary images can be displayed in clusters including images having content similar to particular content of the primary image.
Tue May 06 11:20:58 EDT 2014
An audio conference is supplemented based on speaker content. Speaker content from at least one audio conference participant is monitored using a computer with a tangible non-transitory processor and memory. A set of words is selected from the speaker content. The selected set of words is determined to be associated with supplemental media content from at least one external source. The supplemental media content is made available to at least one audience member for the audio conference. The supplemental media content is selectively presented to the at least one audience member.
Tue May 06 11:20:58 EDT 2014
A system and method provides a natural language interface to world-wide web content. Either in advance or dynamically, webpage content is parsed using a parsing algorithm. A person using a telephone interface can provide speech information, which is converted to text and used to automatically fill in input fields on a webpage form. The form is then submitted to a database search and a response is generated. Information contained on the responsive webpage is extracted and converted to speech via a text-to-speech engine and communicated to the person.
Tue May 06 11:20:57 EDT 2014
Disclosed is a method and apparatus for responding to an inquiry from a client via a network. The method and apparatus receive the inquiry from a client via a network. Based on the inquiry, question-answer pairs retrieved from the network are analyzed to determine a response to the inquiry. The QA pairs are not predefined. As a result, the QA pairs have to be analyzed in order to determine whether they are responsive to a particular inquiry. Questions of the QA pairs may be repetitive and, without more, will not be useful in determining whether their corresponding answer responds to an inquiry.
Tue May 06 11:20:54 EDT 2014
Certain exemplary embodiments comprise a method comprising: within a backbone network: for backbone network traffic addressed to a particular target and comprising attack traffic and non-attack traffic, the attack traffic simultaneously carried by the backbone network with the non-attack traffic: redirecting at least a portion of the attack traffic to a scrubbing complex; and allowing at least a portion of the non-attack traffic to continue to the particular target without redirection to the scrubbing complex.
Tue Apr 29 11:20:53 EDT 2014
Described is a system and method for receiving first data corresponding to usage of a network, receiving second data corresponding to usage of the network, comparing the first data to the second data and providing an indication of a network event when the second data varies from the second data greater than a predetermined threshold.
Tue Apr 29 11:20:52 EDT 2014
A system that incorporates teachings of the present disclosure may include, for example, a server having a memory coupled to a processor. The processor can be operable to receive a request for promotional information responsive to a media processor detecting a promotional tag in a media program stream and transmit to the media processor promotional information associated with a promotion responsive to a determination that a promotional offer is available. The processor can also be operable to receive from the media processor a request for redeemable material associated with the promotion and store the redeemable material in a portion of a database associated with a user of the media processor. Other embodiments are disclosed.
Tue Apr 29 11:20:52 EDT 2014
Tue Apr 29 11:20:51 EDT 2014
A method and apparatus for anomaly detection in a data stream are disclosed. In one embodiment, the present method detects an anomalous condition in a data stream, by calculating at least one expected base event count for at least one event in the data stream for a time interval, obtaining an actual event count for the at least one event in the data stream, applying at least one shrinkage factor to the at least one expected base event count to obtain at least one actual estimated event count and detecting the anomalous condition in accordance with the actual event count and the at least one actual estimated event count.
Tue Apr 29 11:20:50 EDT 2014
The present disclosure is directed to systems, methods, and computer-readable storage media for data feed management. Data feeds can be received at one or more landing directories associated with a feed management system. The feed management system can be configured to map the data feeds in the landing directories to one or more subscribers, and the data feeds can be moved to one or more staging directories associated with the subscribers. The data feeds can be delivered to the one or more subscribers from the staging directories. Receipts indicating delivery of the data feeds can be stored by the feed management system. The feed management system can be configured to manage data feeds, landing directories, and staging directories.
Tue Apr 29 11:20:49 EDT 2014
Devices and methods are disclosed which relate to tactile communication. Devices are included for direct tactile input and having logic for conversion of speech and other forms of audio into vibrotactile sequences. Vibrotactile sequences are transmitted to devices equipped with tactile output, such as vibrators. Voice coil vibrators create sensations of tapping and rubbing in addition to vibration.
Tue Apr 29 11:20:48 EDT 2014
Security in a mobile ad hoc network is maintained by using various forms of encryption, various encryption schemes, and various multi-phase keying techniques. In one configuration, an over the air, three-phase, re-keying technique is utilized to ensure that no authorized nodes are lost during re-keying and that nodes that are intended to be excluded from re-keying are excluded. In another configuration, an over the air, two-phase keying technique, is utilized to maintain backwards secrecy.
Tue Apr 22 11:20:47 EDT 2014
A system and method for mediating anomaly notifications in health data to health alerts using data structures and logic to organize, contain, and disposition identified health anomalies. Multiple generators of anomaly notifications operating asynchronously and independently can be processed. The case manager organizes anomaly notifications and supports collaborative decision making among users with diverse areas of expertise.
Tue Apr 22 11:20:46 EDT 2014
In one embodiment, the present invention is a method and apparatus for layering agents in a distributed computing system. In one embodiment, a system for monitoring and controlling a distributed computer network including a plurality of components (e.g., devices) includes a plurality of cells, each of the cells being deployed to directly monitor and control one of the components of the network. The system also includes at least one federation, where the federation is made up of cells that cooperate to solve common problems, and at least one supercell, where the supercell provides supplemental decision making capabilities to the cells and federations. In this manner, problems detected by a cell that cannot be resolved by the cell may be forwarded to the cell's associated federations or supercells for resolution.
Tue Apr 22 11:20:46 EDT 2014
In a geographic location based game (geogame), players, utilizing wireless devices, are required to continuously physically move within a defined boundary throughout the geogame. The wireless devices, with the aid of a location system, such as GPS, track the movements of the players. As players move, virtual tails are generated behind each player, and their locations are determined and geocast, via a wireless geographic broadcast protocol, to all players of the geogame. Each player observes all players movements and tail locations on his/her wireless device. If a player stops moving, the player is expelled from the game. If a player exits the confines of the boundary, the player is expelled from the game. If a player crosses a virtual tail, the player is expelled from the game. If two virtual tails cross, both players are expelled from the game. The last player remaining is the winner.
Tue Apr 15 11:20:45 EDT 2014
A method, computer readable medium and apparatus for managing a degree of parallelism of streams are disclosed. For example, the method analyzes wireless traffic to determine a profile of the wireless traffic, determines an amount of available processing resources, and manages the degree of parallelism of streams based on the profile and the amount of available processing resources in a probe server.
Tue Apr 15 11:20:45 EDT 2014
A computer implemented method is disclosed, the method including but not limited to detecting an event of interest in video conference data for a plurality of video conference participants and notifying an end user of the event of interest. A computer readable medium is also disclosed for containing a computer program for performing the method. A computer implemented method is also disclosed for receiving at an end user device, a notification of an event of interest in a video teleconference, the method including but not limited to receiving at an end user device from a notification indicating a detection of the event of interest in video conference data from the video teleconference for a plurality of video conference participants; and sending data from the end user device to the server requesting a transcription of comments from the speaker in video teleconference.
Tue Apr 15 11:20:44 EDT 2014
Methods and apparatus to route packets in a network are disclosed. A disclosed example method includes receiving a packet in a packet aggregator, accessing a forwarding table to determine a router within a router array to which the packet is to be forwarded, transmitting the packet to the determined router via a first interface of the packet aggregator, identifying a second interface within the router to which the packet is to be forwarded, forwarding the packet from the router via the second interface to a virtual interface within the packet aggregator, and statically forwarding the packet from the packet aggregator to a destination based on the virtual interface that received the packet.
Tue Apr 15 11:20:43 EDT 2014
Tue Apr 15 11:20:42 EDT 2014
A method for detecting Web sites used for phishing, including preselecting one or more Web sites to be examined for duplication, selecting at least one or more elements that are present in the preselected Web site and that relate to characteristic identifying features of the preselected Web site, forming at least one search query using the one or more elements, and submitting the at least one search query to an indexed public search engine. The elements illustratively may be URL substrings, content identification substrings, or tree structure-related substrings. A report of Web sites using the selected one or more search terms is received from the public search engine in response to the query, and the preselected Web site is eliminated from the Web sites found in the search. The remaining Web sites retrieved in the search are further analyzed, by additional focused searching of the retrieved pages, by comparing header or tree structure information, or other techniques to compare them with the preselected Web site to identify unauthorized near-replicas of the known legitimate Web site for responsive action.
Tue Apr 15 11:20:41 EDT 2014
A method and apparatus for providing passive optical networks with extended reach and/or splitting ratio are disclosed. For example, the optical network comprises a first optical line termination (OLT) device having a transceiver for sending and receiving optical signals. The optical network further comprises an optical extender box comprising at least one hybrid SOA-Raman amplifier, wherein the optical extender box is coupled to the first optical line termination device via a first standard single mode fiber section. Finally, the optical network further comprises an optical splitter coupled to the optical extender box via a second standard single mode fiber section.
Tue Apr 15 11:20:40 EDT 2014
Methods and apparatus for discovering hosts on an Internet Protocol (IP) version 6 (IPv6) network are disclosed. An example implementation includes probing a network to determine an Internet Protocol (IP) version 4 (IPv4) address that is in use on the network; determining a Media Access Control (MAC) address associated with the IPv4 address; determining a local-prefix; determining a first IP version 6 (IPv6) address, the first IPv6 address including the MAC address and the local-prefix; determining a second IPv6 address, the second IPv6 address including the MAC address and the local-prefix and the second IPv6 address being different than the first IPv6 address; probing the network to determine if the first IPv6 address is in use; probing the network to determine if the second IPv6 address is in use; and storing an indication of whether at least one of the first or second IPv6 address is in use.
Tue Apr 15 11:20:40 EDT 2014
Computational models of dialog context have often focused on unimodal spoken dialog or text, using the language itself as the primary locus of contextual information. But as spoken unimodal interaction is replaced by situated multimodal interaction on mobile platforms supporting a combination of spoken dialog with graphical interaction, touch-screen input, geolocation, and other non-linguistic contextual factors, a need arises for more sophisticated models of context that capture the influence of these factors on semantic interpretation and dialog flow. The systems, methods, and computer program products disclosed herein address this need. A method for multimodal search includes, in part, determining an intended location of search query based upon information received from a remote mobile device that issued the search query.
Tue Apr 08 11:20:38 EDT 2014
A system that incorporates teachings of the present disclosure may include, for example, distorting a seed image to generate first and second images where the distortions cause the first and second images to have a potential false tie according to a target quality estimator and generating a third image from the first and second images where the third image is generated based on a proxy quality estimator so that the third image has a potential false ordering according to the target quality estimator. Other embodiments are disclosed.
Tue Apr 08 11:20:38 EDT 2014
A system that incorporates teachings of the present disclosure may include, for example, a controller to determine a behavioral profile of an end user from packet traffic generated by activities of the end user, and share the behavioral profile with a network element for distributing targeted advertisements to the end user according to the behavioral profile. Additional embodiments are disclosed.
Tue Apr 08 11:20:38 EDT 2014
A method for routing and wavelength assignment (RWA) in an optical network with improved heuristics for reducing the computational times required for the RWA. The method minimizes the number of wavelengths by packing the lightpaths using a minimum number of bins in a bin packing problem. Computational efficiency is enhanced by using several novel methods to determine shortest paths and eliminate arcs in a graph that represents the network topology.
Tue Apr 08 11:20:37 EDT 2014
A method, computer readable medium and apparatus for correlating measures of wireless traffic are disclosed. For example, the method obtains the wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds, wherein the plurality of feeds comprises a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers to provide a correlated control plane and a correlated data plane, and extracts at least partial path information of a flow from the correlated control plane. The method then correlates performance information from the correlated data plane for the flow.
Tue Apr 08 11:20:37 EDT 2014
The invention relates to a system and method for gathering data for use in a spoken dialog system. An aspect of the invention is generally referred to as an automated hidden human that performs data collection automatically at the beginning of a conversation with a user in a spoken dialog system. The method comprises presenting an initial prompt to a user, recognizing a received user utterance using an automatic speech recognition engine and classifying the recognized user utterance using a spoken language understanding module. If the recognized user utterance is not understood or classifiable to a predetermined acceptance threshold, then the method re-prompts the user. If the recognized user utterance is not classifiable to a predetermined rejection threshold, then the method transfers the user to a human as this may imply a task-specific utterance. The received and classified user utterance is then used for training the spoken dialog system.
Tue Apr 08 11:20:35 EDT 2014
Tue Apr 01 11:20:35 EDT 2014
Disclosed is a method for training a spoken dialog service component from website data. Spoken dialog service components typically include an automatic speech recognition module, a language understanding module, a dialog management module, a language generation module and a text-to-speech module. The method includes selecting anchor texts within a website based on a term density, weighting those anchor texts based on a percent of salient words to total words, and incorporating the weighted anchor texts into a live spoken dialog interface, the weights determining a level of incorporation into the live spoken dialog interface.
Tue Apr 01 11:20:35 EDT 2014
Methods and systems for content recording and indexing are described. Content may be accessed from a content source. The content may be processed to generate an index of the content. Programming data for future content may be accessed. A content selection guide may be generated in accordance with the index and the programming data. The content selection guide may include a listing of the indexed content and the future content.
Tue Apr 01 11:20:34 EDT 2014
Tue Apr 01 11:20:32 EDT 2014
Example methods disclosed herein include, in response to receiving, at a server, a first control packet from a first router, selecting a first auxiliary router to forward the first control packet, and updating a forwarding table in the first router to associate a destination address of the first control packet with a first control path from the first router to the first auxiliary router, the forwarding table initially causing the first control packet to be routed from the physical router to the server, the first control path being determined by routing the first control packet from the first router to the first auxiliary router through the server, the updating of the forwarding table to cause subsequent data packets associated with the first control packet to be forwarded from the first router to the first auxiliary router via the first control path without being routed through the server.
Tue Apr 01 11:20:31 EDT 2014
In one or more embodiments, one or more methods and/or systems described can perform producing a lattice of object hypotheses based on multiple reference objects from image information; receiving input speech information that includes a request for information associated with at least one reference object of the multiple reference objects; producing a lattice of speech hypotheses based on at least a first possible description included in the speech information; producing a lattice of scored semantic hypotheses based on at least the lattice of object hypotheses and the lattice of speech hypotheses; determining that a single semantic interpretation score of the lattice of scored semantic hypotheses exceeds a predetermined value; and providing requested information associated with the at least the first reference object of the plurality of reference objects.
Tue Mar 25 11:20:30 EDT 2014
Database table aggregation is implemented by a method that includes encoding first and second components via a waveform definition, the first and second components specifying criteria for aggregating data, and the first component is defined to provide data aggregation at a higher granularity than the second component. The method also includes generating a complex waveform representing the components in a pattern corresponding to the waveform definition and criteria, which spans a first axis indicative of a time period for the aggregation. The method includes providing a byte count for aggregated data stored in a first table defined by the criteria, aggregating the data for the time period, and updating the complex waveform to reflect results of the aggregation that includes generating a waveform representing a second table along a second axis depicted at a location corresponding to a time in which the data aggregation for the first table was initiated.
Tue Mar 25 11:20:30 EDT 2014
Methods and apparatus to design a survivable Internet Protocol link topology are disclosed. An example method to generate a network topology is described, which includes identifying a plurality of potential express links based on a first subset of a plurality of physical links coupling a plurality of communication network nodes, wherein one or more of the potential express links includes a network layer link traversing more than one of the physical links, determining an amount of network layer traffic that may be carried on a first potential express link, selecting the first potential express link as a chosen express link based on at least one of the traffic or a first number of network layer links on the physical links, adding the chosen express link to a list of express links, generating a plurality of network topologies by selecting one or more different numbers of express links from the list of express links, and selecting one of the generated network layer topologies based on a cost of the generated network layer topologies.
Tue Mar 25 11:20:29 EDT 2014
A method, system and module for automatically validating dialogs associated with a spoken dialog service. The method comprises extracting key data from a dialog call detail record associated with a spoken dialog service, transmitting the key data as a dialog to a state-based representation (such as a finite-state machine) associated with a call-flow for the spoken dialog service and determining whether the dialog associated with the key data is a valid dialog for the call-flow.
Tue Mar 18 11:20:29 EDT 2014
A system and method are provided for use in establishing secure end-to-end communication links over a VPN gateway via a network interface unit. Illustrative embodiments include establishing and providing secure communication relationships between users (customers) and companies for e-commerce and other business purposes. Each company's data and linkage to users remaining private and secure from the other participating companies as well as from the general public over the Internet. Login by user with network interface units, addressing, authentication, and other configuration operations achieved using a web page-based GUI are applied in establishing tunnels from LAN clients to desired VPN destinations. Required authentication exchanges and required encryption key exchanges facilitate the secure communications. Financial arrangements regarding the provisioning and use of network interface units are also disclosed.
Tue Mar 18 11:20:28 EDT 2014
In one embodiment, the present invention is a method and apparatus for dynamically allocating resources for large-scale multimedia conferences. In one embodiment, a method for allocating resources to a multimedia conference includes receiving a request from a potential participant to join the multimedia conference and dynamically assigning the request to one of a plurality of media servers serving the multimedia conference.
Tue Mar 18 11:20:28 EDT 2014
Tue Mar 18 11:20:27 EDT 2014
A system, device and method for a proximity sensor network are disclosed. The proximity detection device includes a short range wireless receiver, a wireless network transceiver; and a controller connected to the receiver and transceiver. The device receives a short-range radio signal from a user's mobile communications device, and locates the user and takes various actions based on the identity of the user.
Tue Mar 18 11:20:27 EDT 2014
Devices, systems and methods are disclosed which relate to a wearable alert device that emits a physical stimulation upon receiving a signal from a wireless communication device. The wireless communication device is in wireless communication with the wearable alert device, and the wireless communication device sends alerts to the wearable alert device each time it receives an incoming call. The alert is received by the wearable alert device, which in turn emits the physical stimulation to the user wearing it.
Tue Mar 18 11:20:26 EDT 2014
A method and apparatus for selecting a bandwidth option for a cell in a network are disclosed. For example, the method obtains, for the cell, network traffic data for a geographical area for mobility traffic and fixed wireless traffic, a physical characteristic of an antenna in the geographical area, and a type of connectivity at a customer premise, determines a busy time data traffic from the network traffic data for both the fixed wireless traffic and the mobility traffic, determines, for the cell, a cell range from the physical characteristic of the antenna and the type of connectivity at the customer premise, selects a bandwidth option from a plurality of bandwidth options, and determines an average throughput in accordance with the bandwidth option that is selected and the cell range, wherein the average throughput comprises a throughput for serving both the mobility traffic and the fixed wireless traffic.
Tue Mar 11 11:20:25 EDT 2014
A system for visualization of performance measurements is disclosed. The system may include an electronic data processor configured to receive a stream of the performance measurements and select a maximum number of leaf nodes of a plurality of nodes for use in an adaptive decision tree. Additionally, the electronic processor may be configured to determine a depth of each branch in the adaptive decision tree needed to differentiate performance among internet protocol addresses in an internet protocol prefix of each node. Each of the plurality of nodes may be annotated with a predicted latency category and the processor may be configured to generate the adaptive decision tree based on the maximum number of leaf nodes selected, the depth of each branch determined, the predicted latency category, and on the stream of performance measurements associated with the network. Moreover, the processor may display the adaptive decision tree.
Tue Mar 11 11:20:25 EDT 2014
A network includes a cache server and a network aware server that operates to determine an optimization between a cost of retrieving content from a communication network and a cost of caching content at the cache server. The optimization is determined as a minimum of a sum of a transit cost, a backbone cost, and a caching cost. The transit cost includes a money cost per data unit. The backbone cost includes a money cost per data unit and time unit. The caching cost includes a money cost per server unit. In response to determining the optimization, the network aware server sends a content identifier to the cache server, and the cache server receives the content identifier, determines a source of a content item, and if the source is the same as the content identifier, then cache the content item.
Tue Mar 11 11:20:24 EDT 2014
An example method involves for a first virtual private network (VPN) installed on a candidate hub router, selecting a first spoke-to-hub assignment solution having a first least memory utilization cost to assign the candidate hub router a quantity of first virtual private edge (VPE) routers serving the first VPN; for a second VPN installed on the candidate hub router, selecting a second spoke-to-hub assignment solution having a second least memory utilization cost to assign the candidate hub router a quantity of second VPE routers serving the second VPN; determining third least memory utilization costs to assign the candidate hub router to a quantity of the first VPE routers, and fourth least memory utilization costs to assign the candidate hub router to a quantity of the second VPE routers; and selecting the first or second spoke-to-hub assignment solution for the candidate hub router based on the least memory utilization costs.
Tue Mar 04 11:20:22 EST 2014
A system and method are disclosed for generating customized text-to-speech voices for a particular application. The method comprises generating a custom text-to-speech voice by selecting a voice for generating a custom text-to-speech voice associated with a domain, collecting text data associated with the domain from a pre-existing text data source and using the collected text data, generating an in-domain inventory of synthesis speech units by selecting speech units appropriate to the domain via a search of a pre-existing inventory of synthesis speech units, or by recording the minimal inventory for a selected level of synthesis quality. The text-to-speech custom voice for the domain is generated utilizing the in-domain inventory of synthesis speech units. Active learning techniques may also be employed to identify problem phrases wherein only a few minutes of recorded data is necessary to deliver a high quality TTS custom voice.
Tue Mar 04 11:20:22 EST 2014
A management system for a guard chip. The guard chip is adapted to prevent malware communications between a user operating system and an external network without user interaction. The management system comprises an authentication function to authenticate interactions between the guard chip and the management system with each communication, an update function to provide updates to the guard chip without user interaction, and a control function to prevent users control of the guard chip. The management system can comprise an administrator to create the updates.
Tue Mar 04 11:20:22 EST 2014
Disclosed herein are systems, methods, and computer readable media for modifying IP backbone link weights such that multicast traffic and unicast traffic will not travel on a same path between nodes. The method comprises assigning link weights to nodes within an IP backbone such that multicast forwarding paths and unicast forwarding paths are failure disjoint, and delivering undelivered multicast packets using IP unicast encapsulation to the loopback address of next hop router on a multicast tree upon link/interface failure.
Tue Mar 04 11:20:21 EST 2014
A method and apparatus are provided for automatically acquiring grammar fragments for recognizing and understanding fluently spoken language. Grammar fragments representing a set of syntactically and semantically similar phrases may be generated using three probability distributions: of succeeding words, of preceding words, and of associated call-types. The similarity between phrases may be measured by applying Kullback-Leibler distance to these three probability distributions. Phrases being close in all three distances may be clustered into a grammar fragment.
Tue Mar 04 11:20:20 EST 2014
Methods, systems, and products measure health data related to a user. A time-stamped device identifier is received that uniquely identifies a communications device. A time-stamped sensor measurement is separately-received. A difference in time between the time-stamped device identifier and the time-stamped sensor measurement is determined. When the difference in time is within a window of time, then the sensor measurement is associated with the device identifier.
Tue Feb 25 11:20:19 EST 2014
A method and apparatus for handling internet access telephone calls made via cable company telephone services. A head end data terminal receives cable signals and converts them into individual signals. An intelligent switch detects signals destined for an internet service provider and routes those signals on a separate path to the internet service provider. A central switch routes the other signals along a telephone network. A computer program can control the steps of receiving cable signals, converting them into voice band signals, routing the signals that are not for the intended recipient to a central switch, multiplexing the signals for the intended recipient together, and sending the multiplexed signals to the intended recipient.
Tue Feb 25 11:20:18 EST 2014
A system that incorporates teachings of the present disclosure may include, for example, includes a broadband signal access point, which may be located internally or externally to the premises, in combination with the existing cabling is used with radiation device(s) to provide distribution of services, including broadband services, within the premises. Additional embodiments are disclosed.
Tue Feb 25 11:20:18 EST 2014
A system and method for configuring media resources is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a network element having a controller element to present a graphical user interface (GUI) to identify available configuration settings for one or more self-describing services offered to one or more media devices in the network, and manage a network connectivity of the media devices in the network to receive the one or more self-describing services in accordance with a selection of the available configuration settings. Additional embodiments are disclosed.
Tue Feb 25 11:20:17 EST 2014
Systems and methods that utilize femtocell access points (FAP) to perform radio frequency (RF) network sweeps are provided. In one embodiment, a method includes: predicting an availability of an access point (AP) to perform an RF network sweep; and determining that the access point is available to perform the RF network sweep based, at least, on a prediction that a mobile device on a white list for the access point is not likely to access the access point during a time interval associated with performing the RF network sweep. In another embodiment, a method includes: comparing a network quality characteristic for a wireless channel associated with a FAP with a network quality characteristic for a wired network communicatively coupled to the FAP. The network quality characteristics can be the same. The method can then include employing the comparison to determine to which network an impairment is attributable.
Tue Feb 25 11:10:51 EST 2014
A subscriber of the Emergency Alert System (EAS) receiving an EAS alert message can obtain additional multimedia information in based upon the location of the subscriber. The additional multimedia information can include information pertaining to available shelter, medical facilities, the location of emergency supplies, a plume map, evacuation routes, or the like. In an example embodiment, the Global Positioning System or other device location systems is utilized to determine the location of the subscriber. The location information along with EAS alert information is used to query a database to obtain the additional information.
Tue Feb 18 11:20:17 EST 2014
System(s), method(s), and device(s) that provide generic paging service for applications, including third-party applications, over a wireless network are presented. A mobile device generates a token that is used to prove an existing relationship with, and is provided to, an application server, which can relate to a third-party application. The server includes a paging initiator component that presents the token to a paging coordinator component in the network to facilitate proving the server's relationship with, and triggering paging of, the mobile device, without the server having to establish a prior relationship with the network. The paging coordinator component can verify the token to ensure that the initiated paging event is a legitimate paging, and, when verified, transmits the paging to the mobile device. In response, the mobile device can switch out of power-saving dormant mode and establish an IP connection to the server to retrieve a notification(s).
Tue Feb 18 11:20:16 EST 2014
Tue Feb 18 11:20:16 EST 2014
A content monitor includes a processor that at least receives requests from a plurality of clients for content, instructs each client to retry their respective request at a first later time if the request is received before a first time, counts the requests to determine if a number of the requests exceeds a threshold if the request is received before a second time, instructs each client to retry their respective request at a second later time if the counted number of requests does not exceed a first threshold, instructs each client to join a multicast group to receive the content when the number of requests exceeds the first threshold, and counts a number of late clients joining the multicast group after a first portion of the content has been sent to the multicast group.
Tue Feb 18 11:20:15 EST 2014
Disclosed herein are systems, methods and computer-readable media for transmedia video bookmarks, the method comprising receiving a first place marker and a second place marker for a segment of video media, extracting metadata from the video media between the first and second place markers, normalizing the extracted metadata, storing the normalized metadata, first place marker, and second place marker as a video bookmark, and retrieving the media represented by the video bookmark upon request from a user. Systems can aggregate video bookmarks from multiple sources and refine the first place marker and the second place marker based on the aggregated video bookmarks. Metadata can be extracted by analyzing text or audio annotations. Metadata can be normalized by generating a video thumbnail representing the video media between the first place marker and the second place marker. Multiple video bookmarks may be searchable by metadata or by the video thumbnail visually.
Tue Feb 18 11:20:15 EST 2014
A system and a method are provided. A speech recognition processor receives unconstrained input speech and outputs a string of words. The speech recognition processor is based on a numeric language that represents a subset of a vocabulary. The subset includes a set of words identified as being for interpreting and understanding number strings. A numeric understanding processor contains classes of rules for converting the string of words into a sequence of digits. The speech recognition processor utilizes an acoustic model database. A validation database stores a set of valid sequences of digits. A string validation processor outputs validity information based on a comparison of a sequence of digits output by the numeric understanding processor with valid sequences of digits in the validation database.
Tue Feb 18 11:20:14 EST 2014
Tue Feb 18 11:10:42 EST 2014
In accessing communication networks using access technologies such as wireless LAN, a subset of intermediary network operators is selected in accordance with one or more optimization methods from among a larger set of potential intermediary network operators. The selected subset is advertised to a user's terminal so that authentication information can be passed between an access network and a user's home network.
Tue Feb 18 11:10:41 EST 2014
Data from live events is incorporated into virtual simulations and games. The data may be obtained from various sensors and transferred over a network. However, should one of the participants be a threat, then portions of the virtual simulations and games may be disabled to protect the other participants.
Tue Feb 18 11:10:41 EST 2014
Peer-to-peer networks may be established by considering various characteristics of the peers when clustering the peers within the network. The characteristics may include operational criteria such as the cost of data transfer by each peer, the type and status of power being supplied to each peer, and the bandwidth available to each peer. The peer-to-peer networks may be established by requiring credentials to gain access to the peer-to-peer network, where those credentials may be a network access identifier that has previously been used to gain access to an underlying data network of the peer-to-peer network. The operational criteria used to select peers for clustering may be stored and accessed through association to the credentials used to gain access to the peer-to-peer network.
Tue Feb 11 11:20:12 EST 2014
A system includes an analyzer module, a content request data collection module, and a domain name server. The content request data collection module is configured to receive a content request sent to a tracking address, collect content request information about the content request, and provide the content request information to the analyzer module. The domain name server is configured to receive an address request from a local domain name server for a cache server address, provide a tracking address to the local domain name server, collect address request information about the address request, and provide the address request information to the analyzer module. The analyzer module is configured to receive the address request information and the content request information, and determine properties of clients served by the local domain name server based on the address request information and the content request information.
Tue Feb 11 11:20:11 EST 2014
A persona determination approach can be utilized to apply digital personas across multiple communications domains. A service gateway can determine whether to transfer a request for communications services to a Persona Determination Mechanism (PDM). The PDM can select a digital persona based on available information and transmit the digital persona to the service gateway. The service gateway can process the communications services based on the selected digital persona or based on the determination not to transfer the request. In some methods, the service gateway can forward the processed request to one or more network elements for further processing. Related systems are also disclosed.
Tue Feb 11 11:20:11 EST 2014
Distribution of content between publishers and consumers is accomplished using an overlay network that may make use of XML language to facilitate content identification. The overlay network includes a plurality of routers that may be in communication with each other and the publishers and consumers on the Internet. Content and queries are identified by content descriptors that are routed from the originator to a nearest router in the overlay network. The nearest router, for each unique content descriptor, generates a hash identification of the content descriptor which is used by remaining routers in the overlay network to provide the appropriate functions with respect to the content descriptor. In particular, this allows all routers in the overlay network except the nearest router to properly route content without processing every content descriptor.
Tue Feb 11 11:20:10 EST 2014
A method and system are described to multicast with an adaptive dual state. The system receives multicast traffic over a membership tree including a first plurality of nodes connected in a first topology destined for a plurality of multicast members of a first multicast group. Next, the system determines a rate of multicast traffic that exceeds a predetermined threshold based on the receiving the multicast traffic. Next, the system generates a dissemination tree including a second plurality of nodes connected in a second topology to reduce a number of hops to communicate the multicast traffic to the plurality of multicast members of the first multicast group. Finally, the system forwards the multicast traffic to the plurality of multicast members of the first multicast group over the dissemination tree.
Tue Feb 11 11:10:40 EST 2014
Emergency instructional messages are utilized to provide instructions to a user in the event of an emergency. The instructional message may be various media, including, but not limited to, text, images, video, audio, and/or multimedia. The instructional message can be prerecorded and stored in a mobile device and/or on a communications network. Instructional message may be provided manually by an alert initiator and/or automatically based upon a type of alert. The instructional message may be initiated based upon the initiation of an emergency alert system (EAS) transmission, the occurrence of an event, a designated person, or a security violation, for example. Further, the instructional message may be tailored depending upon a location, such as the expected or determined location of the intended recipient or communication device of the instructional message.
Tue Feb 04 11:20:10 EST 2014
A method and apparatus for processing at least one information feed are disclosed. For example, the method receives at least one content via at least one automated feed. The method associates the at least one content to one or more geographical locations on a map, wherein the one or more geographical locations are determined from the at least one content. The method then presents an access to the at least one content to a user via the map.
Tue Feb 04 11:20:10 EST 2014
A system and method is provided to automatically generate content for ITV products and services by processing primary media sources. In one embodiment of the invention, keywords are automatically extracted from the primary media sources using one or more of a variety of techniques directed to video, audio and/or textual content of the multimodal source. In some embodiments, keywords are then processed according to one or more disclosed algorithms to narrow the quantity of downstream processing that is necessary to associate secondary sources (reference items) with the primary video source. Embodiments of the invention also provide automatic searching methods for the identification of reference items based on the processed keywords in order to maximize the value added by the association of reference items to the video source.
Tue Feb 04 11:20:09 EST 2014
A method and apparatus for propagating updates in databases are disclosed. For example, the present method uses "blocking" and/or "thresholding" to delay update propagation and/or to limit the propagation of updates to an optimal stage. For example, the present method receives at least one database update and extracts at least one token from the at least one database update. The method then determines whether a threshold for propagating the at least one database update for the at least one token is reached. The method then propagates the at least one database update for updating an index structure of a database pertaining to the at least one token whose threshold has been reached.
Tue Feb 04 11:20:09 EST 2014
A method and apparatus for providing collaborative viewing of a media stream are disclosed. For example, the method establishes a viewing group having a plurality of members, and provides at least one media stream that is accessible by the plurality of members of the viewing group. The method then receives one or more annotations from at least one of the plurality of members of the viewing group relating to the at least one media stream, and saves each of the one or more annotations with a temporal marker. The method then provides the one or more annotations to at least one of the plurality of members of the viewing group.
Tue Feb 04 11:20:08 EST 2014
The specification describes data processes for analyzing large data steams for target anomalies. "Sequential dependencies" (SDs) are chosen for ordered data and present a framework for discovering which subsets of the data obey a given sequential dependency. Given an interval G, an SD on attributes X and Y, written as X.fwdarw.G Y, denotes that the distance between the Y-values of any two consecutive records, when sorted on X, are within G. SDs may be extended to Conditional Sequential Dependencies (CSDs), consisting of an underlying SD plus a representation of the subsets of the data that satisfy the SD. The conditional approximate sequential dependencies may be expressed as pattern tableaux, i.e., compact representations of the subsets of the data that satisfy the underlying dependency.
Tue Feb 04 11:20:08 EST 2014
A voice-enabled help desk service is disclosed. The service comprises an automatic speech recognition module for recognizing speech from a user, a spoken language understanding module for understanding the output from the automatic speech recognition module, a dialog management module for generating a response to speech from the user, a natural voices text-to-speech synthesis module for synthesizing speech to generate the response to the user, and a frequently asked questions module. The frequently asked questions module handles frequently asked questions from the user by changing voices and providing predetermined prompts to answer frequently asked questions.
Tue Feb 04 11:20:07 EST 2014
A method and apparatus for providing planning of a plurality of base station controllers in a wireless network are disclosed. For example, the method obtains input data, and determines a limit for at least one base station controller parameter in accordance with the input data. The method determines if the limit for the at least one base station controller parameter is exceeded and determines an optimal output for an objective function, wherein the objective function is based on a plurality of penalty factors, if the limit for the at least one base station controller parameter is exceeded.
Tue Feb 04 11:20:07 EST 2014
A mobile device that can use both data from a GPS or other GNSS receiver and signals from a wireless network to provide location based services based on the location of the mobile device is controlled at least partly by a locationing resource control module in the wireless network. The module provides network-assisted optimization of utilization of the GPS receiver and other resources by activating the GPS receiver and associated components when fine resolution location data is needed for provision of the location based services, and deactivating the GPS components when coarse resolution will suffice. The selective control of the GPS components is performed in the wireless network in response to receipt from the mobile device of location requisition data, conditions specifying what actions are to be performed by the mobile device, and current location data from the wireless network. The wireless network may also specify and prioritize at least some conditions.
Tue Feb 04 11:20:05 EST 2014
A method for using predictive modeling of a physical process in order to determine and implement a solution to the physical process. The method includes analyzing the physical process to determine the relevant physical relationships, observations, data, and outcome probabilities associated with the physical relationships of the physical process, and storing representations of the relevant physical relationships, observations, data and outcome probabilities in a memory of a computer. The method also includes recursively analyzing the stored representations by the computer, and generating at least one tree structure that models the physical process, the tree structure including at least one root node, a plurality of decision nodes, and a plurality of end nodes. The method further includes partitioning observations at each decision node into probable outcomes using target partitioning, generating a plurality of other decision nodes based on the target partitioning, determining a solution to the physical process based on criterion variables, by the computer using the tree structure of the physical process to arrive at an end node, and implementing a physical solution to the physical process.
Tue Feb 04 11:20:05 EST 2014
Methods and systems for facilitating preemptive based radio access control are provided. The methods and systems include receiving queue data corresponding to a set of requests for highly prioritized communications included on a prioritized queue and utilizing the queue data to determine whether a set of conditions for involuntarily terminating a radio communication session has been met. Session data corresponding to characteristics for each of a plurality of radio communication sessions are also received and utilized to determine which of the plurality of radio communication sessions to terminate if the set of conditions for involuntarily terminating a radio communication session have been met.
Tue Feb 04 11:10:28 EST 2014
Tue Jan 28 11:20:01 EST 2014
Disclosed herein are systems, methods, and computer readable-media for contextual adaptive advertising. The method for contextual adaptive advertising comprises tracking user behavior across multiple modalities or devices, storing one or more representations of user behavior in a log as descriptors, normalizing the descriptors, merging the normalized descriptors into a unified click or interactive stream, and generating a behavioral model by analyzing the click or interactive stream.
Tue Jan 28 11:20:01 EST 2014
A method and apparatus for handling an overload condition in a communication network are disclosed. For example, the method calculates a call target rate by at least one core signaling network element for at least one edge signaling network element. The method then sends the call target rate by the at least one core signaling network element to the at least one edge signaling network element, when a total queueing delay of the at least one core signaling network element exceeds a predefined high threshold in a measurement interval, wherein the call target rate is used by the at least one edge signaling network element in an overload control that throttles signaling traffic.
Tue Jan 28 11:20:00 EST 2014
Techniques are disclosed for generating conditional functional dependency (CFD) pattern tableaux having the desirable properties of support, confidence and parsimony. These techniques include both a greedy algorithm for generating a tableau and, for large data sets, an "on-demand" algorithm that outperforms the basic greedy algorithm in running time by an order of magnitude. In addition, a range tableau, as a generalization of a pattern tableau, can achieve even more parsimony.
Tue Jan 28 11:19:59 EST 2014
A device detects and diagnoses correlated anomalies of a network. The device includes an anomaly detection module receiving a first data stream including an event-series related to the network. The anomaly detection module executes at least one algorithm to detect a potential anomaly in the event-series. The device further includes a correlating module receiving a second data stream including other event-series related to the network. The correlating module determines whether the potential anomaly is false and determines whether the potential anomaly is a true anomaly.
Tue Jan 28 11:19:58 EST 2014
Tue Jan 28 11:10:25 EST 2014
Emergency alert area definitions are mapped to associated cell sites. Emergency alert messages are provided to subscribers within the alert area. Areas not having cellular coverage are identified. The identification of areas not having cellular coverage is provided to appropriate personnel, such as an incident commander. Accordingly, alternate mechanisms can be utilized for providing the alert message to the areas not having cellular coverage.
Tue Jan 28 11:10:22 EST 2014
Quality of Service (QoS) and/or bandwidth allocation can be provided for interactive gaming via a Regional/Access Network (RAN). The RAN can provide end-to-end transport between a Gaming Application Service Provider (GASP) and a Customer Premises Network (CPN) that includes a Routing Gateway (RG). Quality of Service (QoS) and/or bandwidth allocation can be provided by determining different levels of subscription service for different subscribers to an interactive game between a plurality of participants. Different QoS and/or bandwidth allocations can be provided to different gaming traffic flows associated with the different subscribers to the interactive game based on the different levels of subscription service of the different subscribers.
Tue Jan 28 11:10:20 EST 2014
A method for delivering targeted advertisement data to opt-in subscribers in an internet protocol television (IPTV) system is disclosed, the system comprising selecting an advertising target group of opt-in IPTV subscribers based on an advertiser's advertising target request; and multicasting an advertisement from an IPTV advertising server to the advertising target group. A system for performing the method is disclosed.
Tue Jan 21 11:19:58 EST 2014
A method and apparatus that employ the use of CDRs to effectively monitor and proactively respond to network or service events that impact performance within a network are disclosed. For example, the method receives a plurality of call detail records (CDRs), wherein each of the plurality of call detail records comprises a plurality of fields. The method determines a n-field rule signature from each of the call detail records (CDRs), and analyzes the n-field rule signatures from the plurality of call detail records (CDRs) for detecting at least one network performance problem.
Tue Jan 21 11:19:57 EST 2014
A method, system and module for automatically converting a call flow into a state-based representation are disclosed. The method comprises walking a call flow and converting each page of the call flow into a rule of a higher level representation of the call flow, augmenting the higher level representation with terminal symbols representing state variable assignments and comparisons associated with decision and computation shapes in the call flow and converting the higher level representation into a state-based representation.
Tue Jan 14 11:19:57 EST 2014
A method and system for mining a database for product migration analysis includes querying product usage data for a legacy product and a new product from the database as time series data. The product usage data is representative for a large number of consumers of the legacy and new products. A mathematical model may be used to determine a relationship between the two time series data. Product migration values and other features related to product migration, such as a transition period of product usage, may be estimated, determined or predicted.
Tue Jan 14 11:19:56 EST 2014
A computer-implemented method guides a user in designing a product defined by data. The method involves examining (420) items of the data to detect whether each item conforms to rules (106) or violates the rules; performing (431 . . . ) at least one action in response to a detection of a rule violation; displaying (450) the data to the user in a manner emphasizing at least one particular data item that caused the rule violation; receiving (460) any new data input from the user; and repeating the examining, action performing, and displaying steps using the new data. The displaying step may involve displaying data defining a current state of the product in a tabular (spreadsheet) format, including displaying data detected to have caused the rule violation in a first manner that is visibly distinct from displaying other data that is not detected to have caused the rule violation.
Tue Jan 14 11:19:56 EST 2014
The present disclosure is directed to systems, methods, and computer-readable storage media for generating data and data sets that are resistant to minimality attacks. Data sets having a number of tuples are received, and the tuples are ordered according to an aspect of the tuples. The tuples can be split into groups of tuples, and each of the groups may be analyzed to determine if the group complies with a privacy requirement. Groups that satisfy the privacy requirement may be output as new data sets that are resistant to minimality attacks.
Tue Jan 14 11:19:55 EST 2014
A repository receives metadata from databases associated with different service providers. The repository converts the received metadata to a common format, such as MPEG7, and stores the converted metadata in a central database. The repository can also receive a query from a client device. The repository retrieves metadata associated with the query from the central database and provides it to the requesting client device. The repository can also convert the provided metadata to an appropriate format for the requesting device. Because the metadata is stored at a common location in a common format, content from different providers can be efficiently identified.
Tue Jan 14 11:10:17 EST 2014
A wireless telecommunications system can receive position information associated with a wireless mobile device of a user and a medical access point name from the wireless mobile device, can determine a gateway based on the position information and the access point name, can receive medical information associated with the user from the wireless mobile device via the gateway, and can provide, based on the medical information and the position information, the medical information to a computer system of a medical facility. The medical information can include drug allergies, food allergies, health issues, physician contact information, emergency contact information, and/or a preferred medical facility, among others. The medical information can be useful in providing medical aid to the user of the wireless mobile device if the user is not able to communicate via verbal means, via written means, and/or via sign means.
Tue Jan 07 11:19:54 EST 2014
Methods, systems, and products answer questions using heuristics. A question and an input are received. A set of heuristic rules is retrieved, and the question is answered by evaluating an accuracy of each heuristic rule. Multiple accuracies from the set of heuristic rules are combined to produce a confidence level for the answer to the question.
Tue Jan 07 11:19:54 EST 2014
A method and apparatus for enabling multiple optical line termination (OLT) devices to share a feeder fiber are disclosed. For example, the optical network comprises a plurality of optical line termination (OLT) devices, where each OLT device having a transceiver for sending and receiving optical signals. The optical network further comprises a wave division multiplexer (WDM) combiner, coupled to the plurality of OLT devices, for combining optical signals received from the plurality of OLT devices. The optical network further comprises an optical extender box comprising at least one hybrid SOA-Raman amplifier, wherein the optical extender box is coupled to the WDM combiner via a first standard single mode fiber section. Finally, the optical network further comprises at least one optical splitter coupled to the optical extender box via a second standard single mode fiber section.
Tue Jan 07 11:19:53 EST 2014
A method and apparatus for providing planning of a plurality of radio network controllers in a wireless network are disclosed. For example, the method obtains input data, and determines a limit for at least one radio network controller parameter in accordance with the input data. The method determines if the limit for the at least one radio network controller parameter is exceeded and determines an optimal output for an objective function, wherein the objective function is based on a plurality of penalty factors, if the limit for the at least one radio controller parameter is exceeded.
Tue Jan 07 11:19:52 EST 2014
A method and apparatus for enabling a packet network based service feature to record verbal notes or other spoken (or even artificially generated audio) information on behalf of a subscriber while in a conversation are disclosed. In one embodiment, the present method allows a subscriber to effectively self-record or verbally transcribe desired portions of a conversation without the fear of privacy invasion.
Tue Jan 07 11:19:51 EST 2014
Multimodal utterances contain a number of different modes. These modes can include speech, gestures, and pen, haptic, and gaze inputs, and the like. This invention use recognition results from one or more of these modes to provide compensation to the recognition process of one or more other ones of these modes. In various exemplary embodiments, a multimodal recognition system inputs one or more recognition lattices from one or more of these modes, and generates one or more models to be used by one or more mode recognizers to recognize the one or more other modes. In one exemplary embodiment, a gesture recognizer inputs a gesture input and outputs a gesture recognition lattice to a multimodal parser. The multimodal parser generates a language model and outputs it to an automatic speech recognition system, which uses the received language model to recognize the speech input that corresponds to the recognized gesture input.
Tue Jan 07 11:19:51 EST 2014
Methods and apparatus are disclosed to anonymize a dataset of spatial data. An example method includes generating a spatial indexing structure with spatial data, establishing a height value associated with the spatial indexing structure to generate a plurality of tree nodes, each of the plurality of tree nodes associated with spatial data counts, calculating a localized noise budget value for respective ones of the tree nodes based on the height value and an overall noise budget, and anonymizing the plurality of tree nodes with a anonymization process, the anonymization process using the localized noise budget value for respective ones of the tree nodes.
Tue Jan 07 11:10:14 EST 2014
Systems and methods to mitigate impulse noise are provided. A particular method includes providing a signal from a transmission source to a mitigator. The mitigator checks the signal for complex impulse noise comprising at least a first periodic impulse noise component correlated to a first portion of a sinusoid representing frequency of an alternating current power source associated with the transmission source and a second periodic impulse noise component correlated to a second portion of the sinusoid. The method further includes receiving noise mitigation instructions from the mitigator at the transmission source to compensate for the complex impulse noise.
Tue Jan 07 11:10:12 EST 2014
Tue Jan 07 11:10:11 EST 2014
A wireless communication network that is in communication with a mobile device, perhaps a cell phone, includes a call message system and a configurable component. The configurable component is configured to include a first mode that puts a call to the mobile device in a hold state for a first time period when the first mode is activated a first time. The configurable component is configured to also include a second mode that puts the call in communication with the call message system when the second mode is activated. The configurable component may activate the second mode when signaled to do so from the call.
Tue Dec 31 12:56:27 EST 2013
A method and an apparatus for providing media content using a mobile device as a media server. For example, the method discovers at least one target mobile device, and determines whether the at least one target mobile device is capable of supporting wireless streaming media. The method streams the media content to the at least one target mobile device using the mobile device if the at least one target mobile device is determined to be capable of supporting wireless streaming media.
Tue Dec 31 12:56:24 EST 2013
A method and apparatus for accessing media with a portable communication device presents media available for display to a user based on user preferences. A user can select media to be output from an external display by entering commands into the portable communications device. In addition, a second external display can be used to display a subset of the media available for display.
Tue Dec 31 12:56:23 EST 2013
Disclosed is a system and method for selective email processing. A traffic separator includes an interface for receiving electronic mail traffic from a source network address. The traffic separator also includes a processor for comparing the source network address to a stored list of network addresses to determine a categorization of the network source address. The traffic separator also includes at least one interface for forwarding the electronic mail traffic to one of many message transfer agents (MTAs) based upon said determination. A database stores the list of network addresses. In one embodiment, one or more network addresses in the stored list are network address ranges.
Tue Dec 31 12:56:22 EST 2013
A system that incorporates teachings of the present disclosure may include, for example, a recipient client device having a controller operable to receive and store a media object from an originating device, track locations where the media object has been since the media object has been stored in the recipient client device, track identifiers associated with a device or a user that has accessed the media object at the locations, and track and store annotations about the media object by the device or the user that accessed the media object. Other embodiments are disclosed.
Tue Dec 31 12:56:21 EST 2013
A system that incorporates teachings of the present disclosure may include, for example, a gateway having a controller to transport media data between a service provider network and one or more end user devices associated with the gateway, and transmit connection signals to a second gateway for establishing a management channel between the gateway and the service provider network when an undesired condition is detected, where the management channel transports management data associated with the gateway to the second gateway for transport to the service provider network using a separate transport queue of the second gateway. Other embodiments are disclosed.
Tue Dec 31 12:56:16 EST 2013
A method and apparatus for classifying packets, e.g., at wire speed are disclosed. The method receives a packet and processes the packet through a hardware-based packet classifier having at least one evolving rule. The method then processes the packet through a software-based packet classifier if the hardware-based packet classifier is unable to classify the packet. In one embodiment, the at least one evolving rule is continuously modified in accordance with learned traffic characteristics of the received packets.
Tue Dec 31 12:56:12 EST 2013
Systems and methods for providing synthesized speech in a manner that takes into account the environment where the speech is presented. A method embodiment includes, based on a listening environment and at least one other parameter associated with at least one other parameter, selecting an approach from the plurality of approaches for presenting synthesized speech in a listening environment, presenting synthesized speech according to the selected approach and based on natural language input received from a user indicating that an inability to understand the presented synthesized speech, selecting a second approach from the plurality of approaches and presenting subsequent synthesized speech using the second approach.
Tue Dec 31 12:56:06 EST 2013
Systems, methods, and apparatus for centrally managing service related information within a roaming environment are presented herein. A decision component can be configured to decide, based on information associated with a service level agreement, whether to accept, reject, or dynamically negotiate a communication service requested via a mobile device roaming within a visited network. Furthermore, an analysis component can be configured to map one or more parameters related to a quality of the communication service to one or more service policies as a function of the information. Moreover, a distribution component can be configured to distribute the one or more service policies to one or more policy servers of the network; or forward information of the one or more service policies to another network.
Tue Dec 24 12:56:00 EST 2013
Devices, methods and computer-readable media for providing quality of service optimization via policy-based rearrangements. Customers are grouped for potential rearrangement. Multiple alternative options are generated for a particular group using policy rules. Policy rules for the particular group are used to evaluate each option using common metrics. Policy rules are used to select a best option for the particular group. The best option for the particular group is implemented.
Tue Dec 24 12:55:58 EST 2013
A Passive Optical Network (PON) component, such as a Gigabit Interface Converter (GBIC) or similar pluggable transceiver, provides the combined functionality of the GBIC (or similar device) and an Optical Network Unit (ONU). The result is a device with a reduced form factor by eliminating redundant components and simplified fault management of the end-system.
Tue Dec 17 12:55:55 EST 2013
A system and method disclosed for using and updating a database of template responses for a live agent in response to user communications. The method includes computing an average string distance between each response from a live agent and a template, use to generate the response, modifying the computed average string distance based on a customer satisfaction score associated with each response and selecting a response that minimizes the computed average string distance and maximizes customer satisfaction. Upon receiving a further communication on a certain issue, the system presents a prototype response that has been added to the template database to the live agent for use in generating a response to the further communication that reduces handling time and increases customer satisfaction.
Tue Dec 17 12:55:55 EST 2013
A system and method are disclosed that improve automatic speech recognition in a spoken dialog system. The method comprises partitioning speech recognizer output into self-contained clauses, identifying a dialog act in each of the self-contained clauses, qualifying dialog acts by identifying a current domain object and/or a current domain action, and determining whether further qualification is possible for the current domain object and/or current domain action. If further qualification is possible, then the method comprises identifying another domain action and/or another domain object associated with the current domain object and/or current domain action, reassigning the another domain action and/or another domain object as the current domain action and/or current domain object and then recursively qualifying the new current domain action and/or current object. This process continues until nothing is left to qualify.
Tue Dec 17 12:55:53 EST 2013
A method for providing multimedia data from at least one controllable multimedia source to a mobile device includes providing a request path from the mobile device to a mobile service platform, receiving a request from the mobile device, obtaining a device profile from the mobile device, authenticating the identity of a user of the mobile device, and determining a user profile in response to the user identity. The method further includes authorizing control and access to the at least one multimedia source, providing a control channel from the mobile service platform to at least one multimedia server, providing multimedia data delivery information to the at least one multimedia server, and providing multimedia data to the mobile device in response to the request via the at least one multimedia server.
Tue Dec 17 12:55:52 EST 2013
A system that incorporates teachings of the present disclosure may include, for example, a server having a controller to receive presence information from each presence source of a plurality of presence sources, wherein the presence information is associated with a user, receive a Session Initiation Protocol (SIP) Uniform Resource Identifier (URI) which identifies the user, wherein identification information associated with the user from each presence source is mapped to the SIP URI, select at least a portion of the received presence information to be utilized in determining a presence status of the user, determine the presence status of the user based on the selected presence information, and transmit the presence status and the SIP URI to a computing device operably coupled to an Internet Protocol Multimedia Subsystem (IMS) network. Other embodiments are disclosed.
Tue Dec 17 12:55:47 EST 2013
A method and system for monitoring one or more wireless channels of an Radio Frequency Identification (RFID) network are disclosed. For example, the method reads one or more RFID reference tags periodically to obtain RFID reference tag reading results for each time interval. The method then processes the RFID reference tag reading results for monitoring the one or more wireless channels of the RFID network.
Tue Dec 17 12:55:47 EST 2013
The disclosed subject matter relates to an architecture that can opportunistically leverage existing periods of inactivity or low activity for sending data at virtually no marginal cost. In particular, the architecture can receive data that is to be transmitted over a communications network. The data can be examined to determine whether or not the data is delay-tolerant. If so, then such data can be stored to a staging queue. The data can then be transmitted at a later time, particularly during a high-energy state facilitated by a different data transaction, but for which there are inactive or low-activity times.
Tue Dec 17 12:55:46 EST 2013
A device is configured to enter a stealth mode in response to a trigger and/or triggering event. The trigger/triggering event can be a voice command, a depression(s) of a button(s) or pattern of buttons on the device, a keyboard and/or softkey entry, entry of a pattern on the display of the device, a designated movement of the device, detection of an event, and/or lack of detection of an event. The device activates the stealth mode without any indication to the user of the device that the device is activating the stealth mode. The stealth mode operates concurrently with all other functions of the device. A virtual secure channel can be established that allows communication with the device without providing an indication that the device is communicating via the virtual secure channel. A token can be utilized for authentication and to discriminate be stealth and normal modes.
Tue Dec 17 12:55:42 EST 2013
A method and system for processing wireless traffic of a wireless network, e.g., a cellular network are disclosed. For example, the method obtains wireless traffic, and processes the wireless traffic by a plurality of probe servers, where each of the plurality of probe servers generates a plurality of feeds comprising a data feed and a control feed. The method correlates the plurality of feeds from the plurality of probe servers by a plurality of aggregator servers, where the data feed and the control feed of each of the plurality of probe servers are correlated with at least one other probe server of the plurality of probe servers, and outputs a correlated result from the correlating.
Tue Dec 17 12:55:41 EST 2013
An emergency alert message in the form of multimedia is distributed via an Internet Protocol multimedia broadcast system utilizing wireless communications networks. In an example embodiment, the IP multimedia broadcast based system includes the Multimedia Broadcast Multicast Service (MBMS) and is utilized with Global System for Mobile communications/Universal Mobile Telecommunications System/Long Term Evolution (GSM/UMTS/LTE) networks, the Broadcast and Multicast Services (BCMCS) and is utilized with Code Division Multiple Access (CDMA) networks, or a combination thereof. Multimedia information can include text, maps, graphics, video clips, audio clips, still pictures, and/or images, for example. In an example embodiment, the multimedia emergency alert message is provided along with a link to additional multimedia information related to the emergency alert.
Tue Dec 17 12:55:41 EST 2013
A system and method for delivering calling area information to a called party device within a telecommunications system are provided. The calling area information is stored in a network and/or a device calling area database and is accessible by their respective call processors. Upon receipt of an incoming call, a called party device can obtain calling area information from either database and can present it to the called party on a device display in the subscriber's preferred language.
Tue Dec 17 12:55:40 EST 2013
A resilient load balancing method uses fixed paths and a fixed path-splitting strategy to enable ingress routers to efficiently reroute traffic after a failure. An off-line management system computes a set of fixed paths and a set of splitting ratios for routing demand from ingress routers to egress routers, with sufficient capacity to meet demands under each failure scenario. That data is then used by the ingress router to reroute demand after observing a failure.
Tue Dec 17 12:55:39 EST 2013
A method and an apparatus for providing multi-homing to an aggregate endpoint device over a network are disclosed. In one embodiment, the method receives a session request directed towards a user endpoint device by a routing device. The method receives at least one Public User Identity (PUID) for the user endpoint device if the session request is for a subscriber of a service with multi-homing via an aggregate endpoint device. The method selects a route for sending the session request in accordance with the at least one PUID and a route priority information of the PUID associated with the user end point device, wherein the route with a highest priority is selected, and forwards the session request via the selected route.
Tue Dec 17 12:55:38 EST 2013
A method, a computer readable medium and an apparatus for providing a dynamic inactivity timer are disclosed. For example, the method monitors a timer for a time threshold associated with a burst of a plurality of bursts of packets, and determines if the timer for the time threshold associated with the burst has expired. The method predicts an inter-burst time for the burst, if the timer for the time threshold associated with the burst has expired and sets the dynamic inactivity timer in accordance with the inter-burst time for the burst.
Tue Dec 17 12:55:34 EST 2013
A method for performing packet loss or Frame Erasure Concealment (FEC) for a speech coder receives encoded frames of compressed speech information transmitted from an encoder. The method determines whether an encoded frame has been lost, corrupted in transmission, or erased, synthesizes properly received frames, and decides on an overlap-add window to use in combining a portion of the synthesized speech signal with a subsequent speech signal resulting from a received and decoded packet, where the size of the overlap-add window is based on the unavailability of packets. If it is determined that an encoded frame has been lost, corrupted in transmission, or erased, the method performed an overlap-add operation on the portion of the synthesized speech signal and the subsequent speech signal, using the decided-on overlap-add window.
Tue Dec 17 12:55:32 EST 2013
A method is disclosed for applying a multi-state barge-in acoustic model in a spoken dialogue system. The method includes receiving an audio speech input from the user during the presentation of a prompt, accumulating the audio speech input from the user, applying a non-speech component having at least two one-state Hidden Markov Models (HMMs) to the audio speech input from the user, applying a speech component having at least five three-state HMMs to the audio speech input from the user, in which each of the five three-state HMMs represents a different phonetic category, determining whether the audio speech input is a barge-in-speech input from the user, and if the audio speech input is determined to be the barge-in-speech input from the user, terminating the presentation of the prompt.
Tue Dec 17 12:55:27 EST 2013
Methods, systems, and computer-readable media provide for adapting a quality of service mechanism based on feedback. A condition that affects quality of service of a communications network is monitored. An adaptation of the quality of service mechanism is determined based on a change to the condition. The adaptation is implemented on the communications network to improve the quality of service.
Tue Dec 17 12:55:26 EST 2013
A rule-based method and apparatus for evaluating the cost of operating a network infrastructure are disclosed. For example, the method receives a request to evaluate the cost of operating a network infrastructure in a form of one or more rules, e.g., in a natural language format. The one or more rules are translated into at least one cost model. The method then applies the at least one cost model to determine the cost of operating the network infrastructure.
Tue Dec 10 12:55:25 EST 2013
A method, computer readable medium and apparatus for performing a demotion in a cellular communications network are disclosed. For example, the method receives a packet indicating that a batching transfer is completed, determines if a background packet was received after receiving the packet indicating that the batching transfer is completed and demotes a state of a state machine implemented by a radio network controller to a lower state if the background packet was not received.
Tue Dec 10 12:55:24 EST 2013
A secondary Ethernet-like wireless communication system overlapped by a dominant Ethernet-like wireless communication system, and including radio access and communication for activation, association, and authentication of a wireless device in the secondary Ethernet-like wireless communication system. An automated private service activation (APSA) port is used for accepting access and communication requests of a wireless device seeking activation, association and authentication in the secondary Ethernet-like wireless communication system. The APSA port provides an access and communication channel for radiating signals at a level exceeding a signal level of the access and communication channel only within limited spatial constraints. In addition the APSA port provides space for receiving the wireless device for activation and communication in the secondary Ethernet-like wireless communication system.
Tue Dec 10 12:55:23 EST 2013
A method, apparatus, and computer-readable medium for editing a data stream based on a corpus are provided. The data stream includes stream words. A sequence includes a predetermined number of sequential words of the stream words. The method, apparatus, and computer-readable medium determine whether the sequence exists in the corpus at least at a predetermined minimum frequency. When the sequence exists in the corpus at least at the predetermined minimum frequency, the sequence is edited in the data stream.
Tue Dec 10 12:55:21 EST 2013
A particular method includes determining estimated popularity scores for programs identified in an electronic program guide for a time interval. The programs identified in the electronic program guide for the time interval include programs being aired. One or more estimated popularity scores are based on viewing trends of the programs being aired. The method also includes determining a voice search vocabulary based on the estimated popularity scores. The voice search vocabulary includes one or more keywords usable for a keyword search of the electronic program guide during the time interval based on a received voice search request.
Tue Dec 10 12:55:12 EST 2013
A content delivery network includes first and second sets of cache servers, a domain name server, and an anycast island controller. The first set of cache servers is hosted by a first autonomous system and the second set of cache servers is hosted by a second autonomous system. The cache servers are configured to respond to an anycast address for the content delivery network, to receive a request for content from a client system, and provide the content to the client system. The first and second autonomous systems are configured to balance the load across the first and second sets of cache servers, respectively. The domain name server is configured to receive a request from a requestor for a cache server address, and provide the anycast address to the requestor in response to the request. The anycast island controller is configured to receive load information from each of the cache servers, determine an amount of requests to transfer from the first autonomous system to the second autonomous system; send an instruction to the first autonomous system to transfer the amount of requests to the second autonomous system.
Tue Dec 10 12:55:11 EST 2013
Devices, systems and methods are disclosed which relate to restricting access to a secure resource by requiring a multimodal input sequence as a passkey to access the secure resource. Certain techniques allow a user to provide simultaneous input through a plurality of input sensors on a handheld device to create a multimodal input sequence, which is used as a unique passkey required to access secure resources. Combinations of input sensors are used to complete the multimodal input sequence. Among the available input sensors are an accelerometer, a touch screen, a camera, a proximity sensor, a position sensor, etc. The secure resource can be data or materials.
Tue Dec 10 12:55:05 EST 2013
A method of adaptively evaluating a top-k query involves (1204) forming a servers having respective server queues storing candidate answers, processing (1322) the candidate answers, and (1232) providing a top-k set as a query evaluation. Processing includes (1402) adaptively choosing a winning server to whose queue a current candidate answer should be sent; (1404) sending the current candidate answer to the winning server's queue; (1334) adaptively choosing a next candidate answer to process from the winning server's queue; (1336) computing a join between the current candidate answer and next candidate answers at the winning server, so as to produce a new current candidate answer; and (1338) updating the top-k set with the new current candidate answer only if a score of the new current candidate answer exceeds a score of a top-k answer in a top-k set. A method of calculating scores for candidate answers is also provided.
Tue Dec 03 12:54:58 EST 2013
A system and method for providing a scalable spoken dialog system are disclosed. The method comprises receiving information which may be internal to the system or external to the system and dynamically modifying at least one module within a spoken dialog system according to the received information. The modules may be one or more of an automatic speech recognition, natural language understanding, dialog management and text-to-speech module or engine. Dynamically modifying the module may improve hardware performance or improve a specific caller's speech processing accuracy, for example. The modification of the modules or hardware may also be based on an application or a task, or based on a current portion of a dialog.
Tue Dec 03 12:54:57 EST 2013
Methods, systems, and products measure health data related to a user. A spoken phrase is received and time-stamped. The user is identified from the spoken phrase. A window of time is determined from a semantic content of the spoken phrase. A sensor measurement is received and time-stamped. A difference in time between the time-stamped spoken phrase and the time-stamped sensor measurement is determined and compared to the window of time. When the difference in time is within the window of time, then the sensor measurement is associated with the user.
Tue Dec 03 12:54:56 EST 2013
A NAT device and method implemented on the device for filtering tunneled IPv6 traffic is disclosed. The method comprises: receiving an IP traffic stream at an ingress network interface to the NAT, performing deep packet inspection on the traffic stream to detect the tunneled IPv6 packets, and applying a filter to the IPv6 packets.
Tue Dec 03 12:54:55 EST 2013
Disclosed is a method and apparatus for enabling communication between a first party and a second party. The method and apparatus determine that the second party is calling the first party while the first party is leaving a message on the voicemail of the second party. The message is then aborted and the first party is connected to the second party.
Tue Dec 03 12:54:55 EST 2013
Disclosed herein are systems, methods, and computer-readable storage media for training adaptation-specific acoustic models. A system practicing the method receives speech and generates a full size model and a reduced size model, the reduced size model starting with a single distribution for each speech sound in the received speech. The system finds speech segment boundaries in the speech using the full size model and adapts features of the speech data using the reduced size model based on the speech segment boundaries and an overall centroid for each speech sound. The system then recognizes speech using the adapted features of the speech. The model can be a Hidden Markov Model (HMM). The reduced size model can also be of a reduced complexity, such as having fewer mixture components than a model of full complexity. Adapting features of speech can include moving the features closer to an overall feature distribution center.
Tue Dec 03 12:54:50 EST 2013
A method and an apparatus for providing privacy in a network are disclosed. For example, the method receives a request, e.g., an HTTP request, from a user for information, wherein the information includes at least a Uniform Resource Locator (URL) of at least an aggregator. The method identifies all personally identifiable information of the user. The method then masks the personally identifiable information from the browser in the endpoint device of the user, while responding to the request.
Tue Dec 03 12:54:50 EST 2013
Disclosed are systems, methods, and computer readable media for performing speech recognition. The method embodiment comprises selecting a codebook from a plurality of codebooks with a minimal acoustic distance to a received speech sample, the plurality of codebooks generated by a process of (a) computing a vocal tract length for a each of a plurality of speakers, (b) for each of the plurality of speakers, clustering speech vectors, and (c) creating a codebook for each speaker, the codebook containing entries for the respective speaker's vocal tract length, speech vectors, and an optional vector weight for each speech vector, (2) applying the respective vocal tract length associated with the selected codebook to normalize the received speech sample for use in speech recognition, and (3) recognizing the received speech sample based on the respective vocal tract length associated with the selected codebook.
Tue Dec 03 12:54:49 EST 2013
An arrangement provides for improved synthesis of speech arising from a message text. The arrangement stores prerecorded prompts and speech related characteristics for those prompts. A message is parsed to determine if any message portions have been recorded previously. If so then speech related characteristics for those portions are retrieved. The arrangement generates speech related characteristics for those parties not previously stored. The retrieved and generated characteristics are combined. The combination of characteristics is then used as the input to a speech synthesizer.
Tue Dec 03 12:54:48 EST 2013
An electronic education service module identifies a target education topic for a user and obtains user profile information associated with the user from a database communicatively coupled to the electronic education service. A plurality of tasks to provide the target education topic are identified based on the identified target education topic and the obtained user profile information. Execution of actions by application service providing modules, other than the electronic education service, to carry out the identified tasks is requested to provide the target education topic to the user.
Tue Dec 03 12:54:47 EST 2013
A spoken dialog system and method having a dialog management module are disclosed. The dialog management module includes a plurality of dialog motivators for handling various operations during a spoken dialog. The dialog motivators comprise an error handling, disambiguation, assumption, confirmation, missing information, and continuation. The spoken dialog system uses the assumption dialog motivator in either a-priori or a-posteriori modes. A-priori assumption is based on predefined requirements for the call flow and a-posteriori assumption can work with the confirmation dialog motivator to assume the content of received user input and confirm received user input.
Tue Dec 03 12:54:46 EST 2013
Methods, systems, and products are disclosed for enforcing a rate limit for data traffic. One method identifies a unidirectional stream of data packets flowing through a server to a downstream end user. The unidirectional stream is classified according to a rate class, with each rate class having an associated rate limit. Each rate limit specifies a maximum bit rate at which the unidirectional stream may flow. When the actual bit rate of the unidirectional stream exceeds the maximum bit rate permitted for the associated rate class, packets of data are discarded to reduce the bit rate.
Tue Dec 03 12:54:42 EST 2013
Tue Nov 26 12:54:42 EST 2013
A disclosed method for implementing time decay in the analysis of streaming data objects is based on the age, referred to herein as the forward age, of a data object measured from a landmark time in the past to a time associated with the occurrence of the data object, e.g., an object's timestamp. A forward time decay function is parameterized on the forward age. Because a data object's forward age does not depend on the current time, a value of the forward time decay function is determined just once for each data object. A scaling factor or weight associated with a data object may be weighted according to its decay function value. Forward time decay functions are beneficial in determining decayed aggregates, including decayed counts, sums, and averages, decayed minimums and maximums, and for drawing decay-influenced samples.
Tue Nov 26 12:54:40 EST 2013
Communication devices may utilize services of multiple communication networks to obtain service for the various applications that the communication device provides. The communication device and/or one or more communication networks may determine which network is best suited to each application based on dynamic information regarding the service provided by each communication network. The application may be associated with a network at various times, such as upon the communication device encountering a network that supports a service needed by the application and/or upon initial invocation of the application. The communication device may be communicating with several communication networks simultaneously so that a single application may make use of multiple communication networks and/or so that multiple applications may each utilize different networks.
Tue Nov 26 12:54:40 EST 2013
A method and apparatus reliably encode and decode information over a communication system. The method includes transforming two coefficients into two pairs of random variables, one random variable in each pair having substantially equal energy as one random variable in the other pair. The method further includes quantizing each of the pairs of random variables and entropy coding each quantized random variable separately creating an encoded bitstreams. The encoded bitstreams are received by a decoder which first determines which channels of the communication system are working. The encoded bitstream is entropy decoded, inversed quantized and inversed transformed. An inverse transform performs three different transformations depending upon which channels are working, i.e., whether the first, second or both channels are working.
Tue Nov 26 12:54:38 EST 2013
Cell broadcast protocols are utilized to distribute emergency alerts to mobile devices. Emergency alerts may be received from an emergency provider or governmental agency. Parameters of an emergency alert may be derived and mapped to parameters of a cell broadcast message, which may then be transmitted to mobile devices. The mobile devices may be configured to compared parameters of the cell broadcast message to a search list or exclusion list stored on the mobile device, and present the contents of the cell broadcast message to the user based on the comparison.
Tue Nov 26 12:54:37 EST 2013
A method and apparatus for locating a Wi-Fi hotspot for offloading wireless traffic from a cellular network are disclosed. For example, the method obtains network traffic data for the second type of wireless access network for a geographical area, and obtains a list of sectors in the geographical area. The method selects at least one sector from the list of sectors to be relieved, and determines a geographical range for the at least one sector. The method then obtains at least one hotspot of the first type of wireless access network within the geographical range, wherein the at least one hotspot is a potential location for offloading the wireless traffic from the second type of wireless access network.
Tue Nov 26 12:54:36 EST 2013
A link in a communications network is provisioned with a particular bandwidth capacity determined as a function of a "sub-par customer data fraction." The sub-par data fraction is given by a) the amount of data transferred under sub-par condition divided by b) the total data transferred, where "sub-par condition" means that data is transferred below a given target bit rate.
Tue Nov 26 12:54:36 EST 2013
A method, computer readable medium and apparatus for calculating a capacity for high speed packet access data in a link in a communications network are disclosed. For example, the method initializes parameters associated with streaming data, long elastic data and short elastic data, determines, via a processor, a capacity value such that a quality of service metric is met for the streaming data, the long elastic data and the short elastic data and provisions the link with the capacity value if the quality of service metric is met.
Tue Nov 26 12:54:34 EST 2013
A method includes sending a unicast transmission including at least a portion of media content to a media device in response to determining, at a media distribution computing device, that a request for a media stream to be provided to the media device does not indicate a scheduled recording of the media content associated with the media stream and joining the media device to a multicast group associated with the media stream without sending the unicast transmission to the media device in response to determining, at the media distribution computing device, that the request indicates the scheduled recording of the media content.
Tue Nov 26 12:54:33 EST 2013
The subject disclosure provides a system and method for wireless monitoring of sports activities. A subject participating in a sports activity is associated with biometric sensors which measure the subject's body movements. In one aspect, the system includes a sensor for continuously gathering biometric data from a subject performing a sports activity where the biometric data associated with the body movements of the subject. A wireless transceiver coupled to the sensor transmits the biometric data and a database engine receives the biometric data from the wireless transceiver and providing real-time feedback. The real-time feedback associated with the biometric data from the subject is characterized by instructions associated with the sports activity.
Tue Nov 19 12:54:31 EST 2013
A method is disclosed that includes receiving a multimedia data stream comprising audio data, video data, and text data at a first electronic device of a plurality of electronic devices responsive to a network. A content structure of the multimedia data stream is automatically determined at least partially based on the text data. The portion of multimedia data stream is stored in a local media database and the associated content structure is stored in a local content index. A network index alert is generated to update a centralized content index of available media content via the network.
Tue Nov 19 12:54:31 EST 2013
A method, system and machine-readable medium are provided for watermarking natural language digital text. A deep structure may be generated and a group of features may be extracted from natural language digital text input. The deep structure may be modified based, at least partly, on a watermark. Natural language digital text output may be generated based on the modified deep structure.
Tue Nov 19 12:54:30 EST 2013
Network activity in a network is regulated. Network activity scores that correspond to network usage patterns for respective network users are calculated. A network user is assigned into one of multiple risk classes responsive to a respective one of the network activity scores. A subsequent action is selected responsive to which of the risk classes the network user is assigned.
Tue Nov 19 12:54:28 EST 2013
A disclosed method of distributing multimedia content to end users in a multimedia content distribution network includes segmenting time in a series of intervals referred to herein as limited-chain relay (LCR) intervals. The LCR intervals may have a duration of time T although an LCR interval may be terminated before the duration expires. During any interval, the LCR distribution method includes responding to a first request for a program of multimedia content (PMC) from a first requestor by delivering the PMC from a video server to the customer premises equipment (CPE) of the requestor and storing the PMC on the CPE of the first requestor. The method further includes responding to subsequent requests for the PMC that occur before the time T and before the interval terminates otherwise from subsequent requestors by delivering at least some portion of the PMC to the subsequent requestors from the CPE of at least one previous requestor.
Tue Nov 19 12:54:27 EST 2013
A method and system for reporting data from a spoken dialog service is disclosed. The method comprises extracting data regarding user dialogs using a dialog logging module in the spoken dialog service, analyzing the data to identify trends and reporting the trends. The data may be presented in a visual form for easier consumption. The method may also relate to identifying data within the control or outside the control of a service provider that is used to adjust the spoken dialog service to maximize customer retention.
Tue Nov 19 12:54:27 EST 2013
Methods, systems, and products adapt recommender systems with pairwise feedback. A pairwise question is posed to a user. A response is received that selects a preference for a pair of items in the pairwise question. A latent factor model is adapted to incorporate the response, and an item is recommended to the user based on the response.
Tue Nov 19 12:54:26 EST 2013
A method, a system and a machine-readable medium are provided for an on demand translation service. A translation module including at least one language pair module for translating a source language to a target language may be made available for use by a subscriber. The subscriber may be charged a fee for use of the requested on demand translation service or may be provided use of the on demand translation service for free in exchange for displaying commercial messages to the subscriber. A video signal may be received including information in the source language, which may be obtained as text from the video signal and may be translated from the source language to the target language by use of the translation module. Translated information, based on the translated text, may be added into the received video signal. The video signal including the translated information in the target language may be sent to a display device.
Tue Nov 19 12:54:25 EST 2013
Disclosed herein are systems, methods, and computer-readable storage media for performing speech recognition based on a masked language model. A system configured to practice the method receives a masked language model including a plurality of words, wherein a bit mask identifies whether each of the plurality of words is allowed or disallowed with regard to an adaptation subset, receives input speech, generates a speech recognition lattice based on the received input speech using the masked language model, removes from the generated lattice words identified as disallowed by the bit mask for the adaptation subset, and recognizes the received speech based on the lattice. Alternatively during the generation step, the system can only add words indicated as allowed by the bit mask. The bit mask can be separate from or incorporated as part of the masked language model. The system can dynamically update the adaptation subset and bit mask.
Tue Nov 19 12:54:20 EST 2013
A method and apparatus for providing an anonymization of data are disclosed. For example, the method receives a request for anonymizing, wherein the request comprises a bipartite graph for a plurality of associations or a table that encodes the plurality of associations for the bipartite graph. The method places each node in the bipartite graph in a safe group and provides an anonymized graph that encodes the plurality of associations of the bipartite graph, if a safe group for all nodes of the bipartite graph is found.
Tue Nov 19 12:54:19 EST 2013
A method and apparatus for providing an anonymization of data are disclosed. For example, the method receives a communications graph that encodes a plurality of types of interactions between two or more entities. The method partitions the two or more entities into a plurality of classes, and applies a type of anonymization to the communications graph.
Tue Nov 19 12:54:12 EST 2013
Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host computer, configured to identify each application in use, tag the application identity with a host identity, combine these and other information into a data packet, and securely transmit the data packet to the network based firewall. The embodiment also includes an application identity listener on the network based firewall, configured to receive the information data packet, decode the data packet and provide to the network based firewall the identity of the application. The network based firewall is provided with an application-awareness via an extension of firewall filtering or security policy rules via the addition of a new application identity parameter upon which filtering can be based. Other systems and methods are also provided.
Tue Nov 19 12:54:11 EST 2013
A system that incorporates teachings of the present disclosure may include, for example, an avatar engine having a controller to retrieve a user profile associated with a user, present the user an avatar having characteristics that correlate to the user profile, detect one or more responses of the user during a communication exchange between the user and the avatar, identify from the one or more responses a need of the user, establish a communication session with a second avatar engine responsive to the identified need of the user, engage in a communication exchange with the second avatar engine in relation to the identified need of the user, and identify one or more results from the communication exchange. Other embodiments are disclosed.
Tue Nov 19 12:54:07 EST 2013
A rollover management system (RMS) receives and stores rollover data that includes subscriber identification and a balance of the rollover usage units that may be "rolled-over" to offset overage units used by a subscriber in excess of package plan usage units in a subsequent billing cycle. In response to receiving requests, the RMS presents rollover data elements to the requesting entities. The balance of the rollover usage units may be rolled over and measured in at least one of a plurality of billable units and may be shared by the subscriber's multiple communication services. The rollover usage units expire after a predetermined number of billing cycles where the predetermined number may vary between package plans. The RMS receives post-billing data elements to update the rollover data elements. The RMS is further operative to account for and present for review unbilled communication service usage to subscribers.
Tue Nov 12 12:54:06 EST 2013
Methods and apparatus to deploy fiber optic based access networks are disclosed. An example access network comprises a first fiber optic cable segment to couple an optical access head-end to a first pedestal and to transport user data, a second fiber optic cable segment to couple the first pedestal to a second pedestal and to transport a first portion of the user data to the second pedestal, a drop cable segment to couple the first pedestal to a customer premises and to transport a second portion of the user data to the customer premises, and a switch at the first pedestal to route the first portion of the user data between the first and second fiber optic cable segments and to route the second portion of the user data between the first fiber optic cable segment and the drop cable segment.
Tue Nov 12 12:54:05 EST 2013
A method and system for converting data message formats in a message server is provided. The message server receives a first data message including origin format information from a first user. The message server then sends the first data message including origin format information to a second user. The message server receives a second data message from a second user, the second data message including the origin format. The second data message is converted to the origin format if the first user is unable to receive the second data message. The message server then sends the converted second data message to the first user.
Tue Nov 12 12:54:05 EST 2013
A system and method are disclosed for transporting deterministic traffic in a gigabit passive optical network. A system that incorporates teachings of the present disclosure may include, for example, an Optical Line Termination (OLT) for exchanging data traffic in a Gigabit Passive Optical Network (GPON) having a controller programmed to generate a timeslot schedule for transport of a desired bandwidth of constant bit rate (CBR) data traffic by selecting one or more timeslots from periodic frame clusters operating according to a GPON Transmission Convergence (GTC) protocol. Additional embodiments are disclosed.
Tue Nov 12 12:54:01 EST 2013
Method and apparatus for maintaining state information on a client device configured for voice-over-internet protocol (VOIP) communication is described. In one example, a VOIP call between the client device and an endpoint device through a packet network is established. State information is sent from the client device to the endpoint device during the VOIP call. The state object having the state information embedded therein is received from the endpoint device at the client device. The state object is stored in the client device. The state object may be retrieved from the client device during the VOIP call or a subsequent VOIP call in response to an authenticated request from the endpoint device. Alternatively, the state object may be retrieved from the client device during a subsequent web session in response to an authenticated request from a host.
Tue Nov 12 12:54:00 EST 2013
Remote assistance is provided to a mobile device across a network to enable malware detection. The mobile device transmits potentially infected memory pages to a remote server across a network. The remote server performs analysis, and provides feedback to the mobile device. Based on the received feedback, the mobile device halts a process, or retrieves and transmits additional memory pages to the remote server for more analysis. This process is repeated until a compromised region of memory is identified and/or isolated for further repair to be performed. The feedback from the remote server reduces the processing and storage burden on the mobile device, resulting in a more reliable detection that uses fewer resources. Embodiments including hypervisors and virtual machines are disclosed.
Tue Nov 12 12:53:58 EST 2013
Methods and systems for providing asymmetric Ethernet service are disclosed. An example method to provide asymmetric Ethernet service to a subscriber includes communicating at least a first portion of a subscriber data communication via a first asymmetric Ethernet connection between a first asymmetric Ethernet modem at a point of service and a second asymmetric Ethernet modem at a service provider location, communicating at least a second portion of the subscriber data communication via a second asymmetric Ethernet connection between a third asymmetric Ethernet modem at the point of service and a fourth asymmetric Ethernet modem at the service provider location, wherein the first and second asymmetric Ethernet connections provide a faster aggregated download bandwidth than an aggregated upload bandwidth to provide an asymmetric Ethernet connection between the point of service and the service provider location, and aggregating the first and second portions of the subscriber data communication for transmission to an Ethernet data network.
Tue Nov 05 12:53:56 EST 2013
A method, computer readable medium and apparatus for performing content aware optimized tunneling in a communication network are disclosed. For example, the method authenticates a user endpoint device, establishes a tunnel to the user endpoint device if the user endpoint device is authenticated, analyzes content of a data packet transmitted through the tunnel to determine if the tunnel should be re-directed, and re-directs the tunnel to a gateway general packet radio services support node light based upon the content of the data packet.
Tue Nov 05 12:53:55 EST 2013
Described herein are systems and methods for uniquely identifying, or "fingerprinting," optical fibers based upon hi-resolution measurements of the backscattered light. One embodiment of the disclosure of this application is related to a computer readable storage medium including a set of instructions that are executable by a processor. The set of instructions being operable to retrieve a profile for an intended fiber, the profile including unique measurement data of the intended fiber, receive from an optical frequency-domain reflectometer further measurement data from a connected fiber within a network, compare the unique measurement data of the intended fiber to the further measurement data of the connected fiber, and confirm an identity of the connected fiber as being the intended fiber when the unique measurement data matches the further measurement data, and trigger an alert when the unique measurement data does not match the further measurement data.
Tue Nov 05 12:53:53 EST 2013
A packet trace is received. The packet trace is transformed into a sequence of pulse signals in a temporal domain. The sequence of pulse signals in the temporal domain is transformed into a sequence of pulse signals in a frequency domain. Peaks are detected within relevant frequency bands in the sequence of pulse signals in the frequency domain. A fundamental frequency is identified within the peaks. The fundamental frequency, which represents the TCP flow clock, is returned.
Tue Oct 29 12:53:50 EDT 2013
Disclosed herein are systems, methods, and computer readable-media for enriching spoken language translation with prosodic information in a statistical speech translation framework. The method includes receiving speech for translation to a target language, generating pitch accent labels representing segments of the received speech which are prosodically prominent, and injecting pitch accent labels with word tokens within the translation engine to create enriched target language output text. A further step may be added of synthesizing speech in the target language based on the prosody enriched target language output text. An automatic prosody labeler can generate pitch accent labels. An automatic prosody labeler can exploit lexical, syntactic, and prosodic information of the speech. A maximum entropy model may be used to determine which segments of the speech are prosodically prominent. A pitch accent label can include an indication of certainty that a respective segment of the speech is prosodically prominent and/or an indication of prosodic prominence of a respective segment of speech.
Tue Oct 29 12:53:49 EDT 2013
Tue Oct 29 12:53:48 EDT 2013
An arrangement for providing synchronization between a number of overlapping area access points within a wireless LAN utilizes a Power over Ethernet (PoE) cable connection to transmit synchronization signals from a centralized hub/switch to each of the access points connected to the cable. The synchronization signal takes the form of a direct sequence spread spectrum (DS-SS) signal that is coupled onto the twisted pair used to provide the low voltage PoE signal to various powered devices. At each access point, a filter is used to remove the synchronization signal from the PoE transport, allowing for the group of access points to share a common beacon signal and allow for frequency re-use among the access points. The DS-SS signal is preferable created by a combination of a baseband signal and a set of separate pseudo noise (PN) sequences defining a precision phase ("pilot tone") signal, a time mark (superframe/beacon) signal, and a time-of-day (real-time clock) signal.
Tue Oct 29 12:53:42 EDT 2013
Disclosed herein are systems, methods, and computer-readable storage media for improving speech recognition accuracy using textual context. The method includes retrieving a recorded utterance, capturing text from a device display associated with the spoken dialog and viewed by one party to the recorded utterance, and identifying words in the captured text that are relevant to the recorded utterance. The method further includes adding the identified words to a dynamic language model, and recognizing the recorded utterance using the dynamic language model. The recorded utterance can be a spoken dialog. A time stamp can be assigned to each identified word. The method can include adding identified words to and/or removing identified words from the dynamic language model based on their respective time stamps. A screen scraper can capture text from the device display associated with the recorded utterance. The device display can contain customer service data.
Tue Oct 29 12:53:41 EDT 2013
Described herein are systems and methods for uniquely identifying, or "fingerprinting," optical fibers based upon measurements from an optical time-domain reflectometer ("OTDR"). One embodiment of the disclosure of this application is related to a computer readable storage medium including a set of instructions that are executable by a processor. The set of instructions being operable to retrieve a profile for an intended fiber, the profile including unique measurement data of the intended fiber, collect further measurement data from a connected fiber within a network, compare the unique measurement data of the intended fiber to the further measurement data of the connected fiber, and confirm an identity of the connected fiber as being the intended fiber when the unique measurement data matches the further measurement data, and trigger an alert when the unique measurement data does not match the further measurement data.
Tue Oct 29 12:53:40 EDT 2013
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a model for use with automatic speech recognition. These principles can be implemented as part of a streamlined tool for automatic training and tuning of speech, or other, models with a fast turnaround and with limited human involvement. A system configured to practice the method receives, as part of a request to generate a model, input data and a seed model. The system receives a cost function indicating accuracy and at least one of speed and memory usage, The system processes the input data based on seed model and based on parameters that optimize the cost function to yield an updated model, and outputs the updated model.
Tue Oct 29 12:53:36 EDT 2013
A method includes receiving an image having a first resolution and generating an upsampled image having a second resolution based on the image. A multi-dimensional data structure corresponding to a multi-dimensional image space is generated from the upsampled image. Each node of the data structure is determined based on a weighted sum of values of one or more pixels in the upsampled image. Each of the one or more pixels corresponds to a pixel in the received image and is located within a region of the image space having a vertex defined by the node. A filter modifies the values of the nodes and a second upsampled image is generated based on the modified values. Each pixel of the second upsampled image not corresponding to a pixel in the received image is determined based on a weighted sum of the modified values of one or more nodes.
Tue Oct 22 12:53:28 EDT 2013
Systems, methods, and non-transitory computer-readable media for referring to entities. The method includes receiving domain-specific training data of sentences describing a target entity in a context, extracting a speaker history and a visual context from the training data, selecting attributes of the target entity based on at least one of the speaker history, the visual context, and speaker preferences, generating a text expression referring to the target entity based on at least one of the selected attributes, the speaker history, and the context, and outputting the generated text expression. The weighted finite-state automaton can represent partial orderings of word pairs in the domain-specific training data. The weighted finite-state automaton can be speaker specific or speaker independent. The weighted finite-state automaton can include a set of weighted partial orderings of the training data for each possible realization.
Tue Oct 22 12:53:28 EDT 2013
A system to generate a response to a text-based natural language message includes a user interface, processing device, and a computer-readable storage medium storing executable instructions to generate the response to the text-based natural language message. The instructions and a method for generating the response include identifying a sentence in the text-based natural language message, identifying an input clause in the sentence, and parsing the input clause, thereby defining a relationship between words in the input clause. The instructions and method also include assigning a semantic tag to the parsed input clause, comparing the input clause to a previously received clause, the previously received clause being correlated with a previously generated response clause, and generating an output response message derived from the previously generated response clause.
Tue Oct 22 12:53:27 EDT 2013
A layered syndicated feed or content is provided having layers defined according to a media type (e.g., text, graphic, audio, or video) wherein each layer has a plurality of levels such that each level provides either inclusive or exclusive content of the layer's media type in varying degrees of detail or depth. Furthermore, a system is provided for requesting and storing user and mobile device profiles indicative of the syndicated content layers and levels that the user is interested in receiving and that the user's mobile device is capable of receiving.
Tue Oct 22 12:53:25 EDT 2013
A method and apparatus for measuring and extracting proximity in networks are disclosed. In one embodiment, the present method receives a network from a user for analysis and extraction of a smaller proximity sub-graph. The method computes a candidate sub-graph and determines at least one Cycle Free Escape Conductivity (CFEC) proximity of at least two nodes in accordance with the candidate sub-graph. The method then extracts and presents a proximity sub-graph that best captures the proximity.
Tue Oct 22 12:53:21 EDT 2013
A dynamic voice-based emergency notification system (ENS) provides wireless operators the ability to manage and deliver voice-based ENS services to subscribers within an alert area who are serviced by the wireless operator. The ENS services are provided efficiently with minimal impact to other wireless subscribers. In an example embodiment, only wireless devices, including any visitors or roamers, within the alert area receive ENS notifications.
Tue Oct 22 12:53:20 EDT 2013
A system and method of generating and operating a spoken dialog service for a web-site are disclosed. The system parses web-site data and organizes the web-site data in a task knowledge data bank. The system receives text associated with a user query; processes the received text in a spoken language understanding (SLU) module, the SLU module using the web-site data from the task knowledge data bank; generates a ranked list of relevant responses to the user query; generates a hierarchical tree using the web-site data and the ranked list of relevant responses to the user query, generates a response to the user query using the hierarchical tree; and presents the response to the user.
Tue Oct 22 12:53:17 EDT 2013
In one embodiment, a system generates a customized interface based on displayed programming. The system stores a program that a user displayed through a media device; searches through a network for information related to the displayed program; and extracts data associated with the information related to the displayed program. A custom interface is generated based substantially on the data associated with the information related to the displayed program.
Tue Oct 22 12:53:17 EDT 2013
A system and method for improving the response time of text-to-speech synthesis using triphone contexts. The method includes identifying a set of triphone sequences, tabulating the set of triphone sequences using a plurality of contexts, where each context specific triphone sequence of the plurality of context specific triphone sequences has a top N triphone units made of the triphone units having lowest target costs when each triphone unit is individually combined into a 5-phoneme combination. Input texts having one of the contexts are received, and one of the context specific triphone sequences is selected based on the context. Input text is then synthesized using the context specific triphone sequence.
Tue Oct 22 12:53:15 EDT 2013
A system and method are disclosed for synthesizing speech based on a selected speech act. A method includes modifying synthesized speech of a spoken dialogue system, by (1) receiving a user utterance, (2) analyzing the user utterance to determine an appropriate speech act, and (3) generating a response of a type associated with the appropriate speech act, wherein in linguistic variables in the response are selected, based on the appropriate speech act.
Tue Oct 22 12:53:14 EDT 2013
Aspects relate to automatically establishing neighbor relations for adjacent sectors based on one or more network events. The neighbor relations can be established between sectors that can be identified as inter-frequency neighbors or intra-frequency neighbors. In an aspect, the network events can be active call data events received from one or more mobile devices. The active call data events can be radio access bearer establishments and internal system releases. In another aspect, the network events can be idle call data events received from one or more mobile devices. If a first event ended on a first sector and a second event started on a second sector before expiration of an interval that started when the first event ended, the first sector and second sector can be defined as neighbors.
Tue Oct 22 12:53:13 EDT 2013
Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.
Tue Oct 22 12:53:05 EDT 2013
The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data.
Tue Oct 15 12:53:02 EDT 2013
A method and apparatus for providing a personalized channel on packet networks are disclosed. For example, a customer may subscribe to a personalized channel service. In one embodiment, a network service provider determines a customer's viewing preference and matches the customer's viewing preference to at least one program that is currently being broadcasted on one of a plurality of broadcast channels. In turn, the personalized channel is populated with the at least one program, i.e., with the program of most interest to the customer.
Tue Oct 15 12:52:59 EDT 2013
Systems, methods and computer readable media are disclosed for initiating an emergency alert system alert from a mobile device. In addition to the general system, methods and computer readable medium for such initiating of an emergency alert system alert from a mobile device the process may further implement receiving multiple such emergency alert system alert initiation messages and combining them to determine a more accurate location area of the emergency.
Tue Oct 15 12:52:58 EDT 2013
A system that incorporates teachings of the present disclosure may include, for example, a Power Over Ethernet (PoE) device (PD) having a controller to receive signals over a first cable having twisted pair wires from at least one of a network element and a gateway where the network element is associated with a service provider where the gateway is associated with a premises and where the service provider provides network communications to the premises, adjust the signals, transmit the adjusted signals over a second cable having twisted pair wires to at least one of the network element and the gateway, and receive power from at least one of the network element and the gateway, where the power is received over at least one of the first and second cables, where the power is received according to PoE protocol, and where the PD is positioned between the network element and the gateway. Other embodiments are disclosed.
Tue Oct 15 12:52:57 EDT 2013
A system includes a gateway operative to couple the system to a user. The system further includes a first infolet coupled to the gateway, and operative to couple the system to a first virtual world application, a second infolet coupled to the gateway and to the first infolet, and operative to couple the system to a real world application. The system is operable to obtain first information requested by the user from the second infolet and send the first information to the virtual world application through the first infolet.
Tue Oct 15 12:52:54 EDT 2013
A location of a calling party is provided to a called party. The location can be provided if the calling party is using a mobile communications device or a wireline system. The location of the calling party can be provided in a hierarchy of various levels of accuracy/precision representative of different geographies provided by a service provider. The choice of levels for each received call or all received calls can be configurable by the called party. The called party may subscribe to a service that provides the location information. The called party may have the option to receive location information on a per call basis. The calling party may be asked for consent. Location information can be provided for any appropriate type of call, such as, for example, voice calls, text based calls (e.g., SMS messages), or the like. In an example configuration, the SS7 network is utilized.
Tue Oct 15 12:52:52 EDT 2013
A website mining tool is disclosed that extracts information from, for example, a company's website and presents the extracted information in a graphical user interface (GUI). In one embodiment, web pages from a website are stored in, for example, computer memory and a structure of the web pages is identified. A plurality of blocks of information is then extracted as a function of this structure and a category is assigned to each block of information. The elements in the blocks of information are then displayed, for example to a salesperson, as a function of these categories. In another embodiment, Document Object Modeling parsing is used to identify the structure of the web pages. In yet another embodiment, a support vector machine is used to categorize each block of information.
Tue Oct 15 12:52:49 EDT 2013
A system includes first and second cache servers a domain name server, and a route controller. The cache servers are each configured to respond to an anycast address. Additionally, the first cache server is configured to respond to a first unicast address, and the second cache server is configured to respond to a second unicast address. The router controller configured to determine wither the status of the first cache server is non-overloaded, overloaded, or offline. The route controller is further configured to instruct the domain name server to provide the second unicast address when the status is overloaded or offline, and modify routing of the anycast address to direct a content request sent to the anycast address to the second cache server when the status is offline. The domain name server is configured to receive a request from a requestor for a cache server address. Additionally, the domain name server is configured to provide an anycast address to the requestor when the status of the first cache server is non-overloaded, and provide the second unicast address to the requestor when the status of the first cache server is offline or overloaded.
Tue Oct 15 12:52:43 EDT 2013
A cache server for providing content includes a processor configured to receive a first datagram from a client system sent to an anycast address, send a response datagram to the client system in response to the first datagram, receive a request datagram from the client system sent to the anycast address, and send a batch of content datagrams to the client system. The first datagram includes a universal resource locator corresponding to the content. The response datagram includes a content identifier for the content. The request datagram includes the content identifier, an offset, and a bandwidth indicator. The batch of content datagrams includes a portion of the content starting at the offset.
Tue Oct 15 12:52:43 EDT 2013
The present invention provides for a method and apparatus for segmenting a multi-media program based upon audio events. In an embodiment a method of classifying an audio stream is provided. This method includes receiving an audio stream. Sampling the audio stream at a predetermined rate and then combining a predetermined number of samples into a clip. A plurality of features are then determined for the clip and are analyzed using a linear approximation algorithm. The clip is then characterized based upon the results of the analysis conducted with the linear approximation algorithm.
Tue Oct 15 12:52:40 EDT 2013
A method, non-transitory computer readable medium and apparatus for providing security on a mobile endpoint device are disclosed. For example, the method scans for a radio frequency signal, determines a state of the mobile endpoint device and triggers an alarm on the mobile endpoint device if the radio frequency signal is not detected for a predefined period of time and the state of the mobile endpoint device is an inactive state.
Tue Oct 08 12:52:35 EDT 2013
A system and method for sharing annotations corresponding to media content among a plurality of members of a group over a communications network. The system generally includes at least one server coupled to the communications network and configured for receiving at least one annotation from a first group member corresponding to media content from the communications network; adding the at least one annotation to a database; accessing a list of members of the group, each member of the group having a user profile stored in memory; and automatically sending a notification to at least a second member of the group upon receipt of each annotation. The annotation comprises annotation content and a temporal identifier that identifies a segment of the media content to which the annotation corresponds, and the at least one server is configured for sending the annotation to at least the second group member and optionally a media stream including at least the segment of the media content with the annotation.
Tue Oct 08 12:52:31 EDT 2013
Methods, systems, and media for determining a response to be generated in an environment are provided. The methods, systems, and media monitor the environment for a voice activity of an individual. The voice activity of the individual is detected and analyzed. A content descriptor of the voice activity is determined based on the voice activity of the individual. A demographic descriptor of the individual is determined based on the voice activity of the individual. The content descriptor, the demographic descriptor, and known information are correlated to determine the response to be generated in the environment.
Tue Oct 08 12:52:29 EDT 2013
A method of providing content comprises making the content available on a central server, and surveying a plurality of peers for a portion of the content. The portion of the content from one of the peers is obtained when the portion of the content is available from the one of the peers, and obtained from the central server when the portion of the content is not available from the plurality of peers.
Tue Oct 08 12:52:28 EDT 2013
A method includes receiving a problem report from a customer via an access interface of a plurality of access interfaces at a first horizontal layer of a problem management system, wherein the problem report indicates that the customer is having a problem with one of the network-based services, receiving a request from the customer for self-service problem resolution via the access interface, identifying a workflow related to the problem, obtaining the workflow from a second layer of the problem management system, providing a diagnostic tool to the customer via the access interface, according to the workflow, and providing the diagnostic tool to an agent via another access interface after the customer contacts the agent.
Tue Oct 08 12:52:27 EDT 2013
A system and method for facilitating the distribution of emergency alert messages to electronic devices via a communications network, such as a commercial mobile wireless network. The system includes a commercial mobile service provider (CMSP) gateway that is in communication with an alert gateway and the communications network. The CMSP gateway has a commercial mobile alert system (CMAS) interface, such as an application programming interface (API), that is configured to receive an emergency alert message from the alert gateway. The emergency alert message includes elements that have been mapped from a corresponding emergency alert message that was issued by an alert initiator. The CMAS interface is further configured to process the emergency alert message into a format suitable for distribution to electronic devices that are in communication with the communications network. The emergency alert message is then distributed to the appropriate electronic devices via the communications network.
Tue Oct 08 12:52:26 EDT 2013
A system that incorporates teachings of the present disclosure may include, for example, a Media Content Processor (MCP) having a controller to detect a communication device roaming into a personal area network, receive a communication identifier from the communication device, authenticate the communication device responsive to validating the communication identifier, and enable the communication device to manage operations of the MCP according to a profile of a subscriber of said communication device responsive to a successful authentication of said communication device. Other embodiments are disclosed.