Abstract:
A network entity includes a processor configured to regulate the data rate of transmissions over a wireless channel from a base station to a subscriber station based on feedback from the subscriber station, the feedback relating to the wireless channel conditions, the processor being further configured to determine a substitute data rate for one or more transmissions over the wireless channel.
Abstract:
One or more selectively activated features needed at a device to use a network service may be identified. Authorization information and feature activation key(s) associated with features that the device has been authorized to activate may be obtained at the device. The feature activation key(s) may be used to activate and/or maintain activation of the authorized features that match the selectively activated feature(s) needed to use the network service. An authorization server may obtain a request to activate one or more selectively activated features of a device. The authorization server may verify that the selectively activated feature(s) are authorized to be used at the device based on an authorization agreement obtained at the authorization server. The authorization server may send proof that the device is authorized to use the selectively activated feature(s) and may send feature activation key(s) based on the authorization agreement in response to the request.
Abstract:
A network entity includes a processor configured to regulate the data rate of transmissions over a wireless channel from a base station to a subscriber station based on feedback from the subscriber station, the feedback relating to the wireless channel conditions, the processor being further configured to determine a substitute data rate for one or more transmissions over the wireless channel.
Abstract:
Disclosed herein are techniques for light beam scanning in a light detection and ranging (LIDAR) system. The LIDAR system includes a beam shaping subsystem configured to generate an illumination pattern elongated in a first direction, and a scanning subsystem configured to direct the elongated illumination pattern towards a plurality of positions along a second direction different from the first direction. The LIDAR system further includes a sensor configured to generate a detection signal in response to detecting light reflected by a target object illuminated by the elongated illumination pattern, and a processor configured to determine a characteristic of the target object based on the detection signal.
Abstract:
A device obtains proof of its authority to use a first set of selectively activated features (first proof). An authorization server signs the first proof with its private key. The device sends a request to use a network service to a network node. The device sends the first proof to the network node. The network node validates the first proof using a public key of the authorization server. The network node grants the request to use the network service. The device sends a request for proof of authority for the network node to provide the network service (second proof). The device obtains the second proof, signed by another authorization server, and validates the second proof before using the network service. The first proof and the second proof each include a list of selectively activated features, where the selectively activated features are needed to use or provide the network service.
Abstract:
A device obtains proof of its authority to use a first set of selectively activated features (first proof). An authorization server signs the first proof with its private key. The device sends a request to use a network service to a network node. The device sends the first proof to the network node. The network node validates the first proof using a public key of the authorization server. The network node grants the request to use the network service. The device sends a request for proof of authority for the network node to provide the network service (second proof). The device obtains the second proof, signed by another authorization server, and validates the second proof before using the network service. The first proof and the second proof each include a list of selectively activated features, where the selectively activated features are needed to use or provide the network service.
Abstract:
A method and apparatus for admission control in a communication system. An Access Network (AN) element determines available resources. When available resources are sufficient to support the requirements of a requested application flow, the AN admits the application flow. The AN periodically, and on trigger events, updates a measure of available resources. The admission control may operate in coordination with a scheduler applying a compensation factor to each flow type, and a compensation factor for aggregate flows of a given user.
Abstract:
Techniques to reduce transmit power required for transmission of messages from an access terminal to reduce interference to transmissions from other access terminals. In one aspect, messages to be transmitted are defined and/or coded such that they may be detected at different received signal qualities. The codewords may be defined having different distances to their nearest codewords. In another aspect, messages to be transmitted are assigned to different points in a signal constellation, with the points being located such that they may be received at different signal qualities. Codewords that may be received at a lower signal quality may be assigned to messages more likely to be transmitted at higher transmit power levels (e.g., when the access terminal is located further away) or to more frequently transmitted messages.
Abstract:
One or more selectively activated features needed at a device to use a network service may be identified. Authorization information and feature activation key(s) associated with features that the device has been authorized to activate may be obtained at the device. The feature activation key(s) may be used to activate and/or maintain activation of the authorized features that match the selectively activated feature(s) needed to use the network service. An authorization server may obtain a request to activate one or more selectively activated features of a device. The authorization server may verify that the selectively activated feature(s) are authorized to be used at the device based on an authorization agreement obtained at the authorization server. The authorization server may send proof that the device is authorized to use e selectively activated feature(s) and may send feature activation key(s) based on the authorization agreement in response to the request.
Abstract:
Techniques to reduce transmit power required for transmission of messages from an access terminal to reduce interference to transmissions from other access terminals. In one aspect, messages to be transmitted are defined and/or coded such that they may be detected at different received signal qualities. The codewords may be defined having different distances to their nearest codewords. In another aspect, messages to be transmitted are assigned to different points in a signal constellation, with the points being located such that they may be received at different signal qualities. Codewords that may be received at a lower signal quality may be assigned to messages more likely to be transmitted at higher transmit power levels (e.g., when the access terminal is located further away) or to more frequently transmitted messages.