-
11.
公开(公告)号:US09379875B2
公开(公告)日:2016-06-28
申请号:US14108207
申请日:2013-12-16
Applicant: Intel Corporation
Inventor: Qinghua Li , Xintian E. Lin , Guangjie Li , Kuilin Clark Chen , Xiaoyun May Wu
CPC classification number: H04B7/0413 , H04B7/0417 , H04B7/043 , H04B7/0632 , H04B7/0634 , H04B7/0639 , H04B17/24 , H04B17/26 , H04B17/309 , H04L5/0058 , H04W72/1273
Abstract: Embodiments of methods and apparatus for providing downlink channel parameters determination for downlink channels associated with a multiple-input-multiple-output (MIMO) system are generally described herein. Other embodiments may be described and claimed.
-
公开(公告)号:US12074806B2
公开(公告)日:2024-08-27
申请号:US17711921
申请日:2022-04-01
Applicant: Intel Corporation
Inventor: S M Iftekharul Alam , Satish Chandra Jha , Ned M. Smith , Vesh Raj Sharma Banjade , Kshitij Arun Doshi , Francesc Guim Bernat , Arvind Merwaday , Kuilin Clark Chen , Christian Maciocco
Abstract: A resource management framework may be used to improve performance of dominant and non-dominant resources for edge multi-tenant applications. The resource management framework may include an admission control mechanism, which may be used to balance disproportionate resource allocations by controlling allocation of unconstrained resources proportional to the requested dominant resources based on resource availability. The admission control mechanism may provide ongoing monitoring of dominant and non-dominant resource utilization, such as using a hybrid centralized-distributed telemetry collection approach. The resource management framework may also include a lightweight resource monitoring and policy enforcement mechanism on distributed networking elements to reduce or eliminate the exploitations of non-dominant resources.
-
公开(公告)号:US12063511B2
公开(公告)日:2024-08-13
申请号:US17130631
申请日:2020-12-22
Applicant: Intel Corporation
Inventor: Florian Geissler , S M Iftekharul Alam , Yaser M. Fouad , Michael Paulitsch , Rafael Rosales , Kathiravetpillai Sivanesan , Kuilin Clark Chen
IPC: H04W12/104 , H04W4/40 , H04W12/00
CPC classification number: H04W12/104 , H04W4/40 , H04W12/009
Abstract: V2X trusted agents provide technical solutions for technical problems facing falsely reported locations of connected vehicles within V2X systems. These trusted agents (e.g., trusted members) may be used to detect an abrupt physical attenuation of a wireless signal and determine whether the attenuation was caused by signal occlusion caused by the presence of an untrusted vehicle or other untrusted object. When the untrusted vehicle is sending a message received by trusted agents, these temporary occlusions allow trusted members to collaboratively estimate the positions of untrusted vehicles in the shared network, and to detect misbehavior by associating the untrusted vehicle with reported positions. Trusted agents may also be used to pinpoint specific mobile targets. Information about one or more untrusted vehicles may be aggregated and distributed as a service.
-
公开(公告)号:US20220124503A1
公开(公告)日:2022-04-21
申请号:US17545721
申请日:2021-12-08
Applicant: INTEL CORPORATION
Inventor: Liuyang Lily Yang , Debabani Choudhury , Sridhar Sharma , Kathiravetpillai Sivanesan , Justin Gottschlich , Zheng Zhang , Yair Yona , Xiruo Liu , Moreno Ambrosin , Kuilin Clark Chen
IPC: H04W12/12 , H04W4/40 , H04W12/06 , H04L9/32 , H04W12/122
Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to detect attacks in V2X networks. An example apparatus includes a challenge handler to (a) transmit a first challenge packet to a first vehicle to request a transmission of a first response, (b) instruct a second challenge packet to be transmitted to a second vehicle to request a transmission of a second response, (c) increment a first counter when the first response is not obtained, (d) increment a second counter when the second response is not obtained, and (e) after repeating (a)-(d), determine that the first and second vehicles are phantom vehicles associated with an attacker with a half-duplex radio when at least one of the first or second counters satisfy a threshold, and a network interface to instruct a third vehicle associated with the V2X network to ignore future messages from the phantom vehicles based on the determination.
-
公开(公告)号:US11296993B2
公开(公告)日:2022-04-05
申请号:US16456886
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: S M Iftekharul Alam , Maria Ramirez Loaiza , Stepan Karpenko , Gabriel Arrobo Vidal , Satish Chandra Jha , Yi Zhang , Ned M. Smith , Zongrui Ding , Kuilin Clark Chen , Kathiravetpillai Sivanesan
IPC: H04L12/801 , H04L47/10 , H04L45/021 , H04L45/74
Abstract: Systems and techniques for information centric network (ICN) approximate computation caching are described herein. For example, an interest packet that includes a feature set of input data may be received. A node may then perform a search of a local data store using the feature set to determine an approximate computation result cached in the local data store. Here, the approximate computation result may be based on input data that differs from the input data named in the interest packet. The node may then return the approximate computation result to an author of the interest packet in response to the search.
-
公开(公告)号:US11140025B2
公开(公告)日:2021-10-05
申请号:US16456443
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Satish Chandra Jha , S. M. Iftekharul Alam , Yi Zhang , Eve M. Schooler , Ned M. Smith , Kathiravetpillai Sivanesan , Venkatesan Nallampatti Ekambaram , Srikathyayani Srikanteswara , Kuilin Clark Chen , Zongrui Ding
Abstract: Systems and techniques for mission critical (MC) push notification mechanism in a high-reliability (HR) information centric network (ICN) are described herein. For example, a node may test network links to other nodes to classify the other nodes into proximate nodes and non-proximate nodes based on a reception metric. The node may then elect a set of leader nodes from the proximate nodes. Here, the set of leader nodes are selected based on link quality between respective leader nodes and non-proximate nodes. The node may detect an MC event and create an ICN data packet that contains data from the MC event. The node may then transmit the ICN data packet to the set of leader nodes that then relay the ICN data packet to the non-proximate nodes.
-
公开(公告)号:US11075810B2
公开(公告)日:2021-07-27
申请号:US16456864
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Satish Chandra Jha , Rath Vannithamby , S. M. Iftekharul Alam , Yi Zhang , Ned M. Smith , Venkatesan Nallampatti Ekambaram , Kathiravetpillai Sivanesan , Kuilin Clark Chen , Srikathyayani Srikanteswara , Zongrui Ding
IPC: H04L12/24 , H04L29/08 , H04L12/911 , H04L12/26
Abstract: Systems and techniques for information centric network (ICN) emergency data collection are described herein. For example, an event coverage area may be measured. An interest packet may be transmitted to map nodes within the coverage area. In an example, the interest packet specifies a group prefix. A group of nodes that respond to the interest packet may be selected as event detecting nodes. Then, an event subscription interest packet may be transmitted to the event-detecting nodes.
-
公开(公告)号:US20200259885A1
公开(公告)日:2020-08-13
申请号:US16457402
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: S. M. Iftekharul Alam , Stepan Karpenko , Satish Chandra Jha , Yi Zhang , Kuilin Clark Chen , Kathiravetpillai Sivanesan , Gabriel Arrobo Vidal , Srikathyayani Srikanteswara , Hassnaa Moustafa , Eve M. Schooler , Sebastian Schoenberg , Venkatesan Nallampatti Ekambaram , Ravikumar Balakrishnan
Abstract: To address technical problems facing managing multiple sources of information from multiple vehicles, vehicular computing power may be exploited to process such information before sharing with others, which may help reduce network traffic overhead. A technical solution to improve this information processing over vehicular networks by using a hybrid Named Function Network (NFN) and Information Centric Network (ICN), such as in a hybrid NFN/ICN. An NFN may be used to orchestrate computations in a highly dynamic environment after decomposing the computations into a number of small functions. A function may include a digitally signed binary supplied by a car vendor or other trusted authority and executed within a controlled environment, such as a virtual machine, container, Java runtime-environment, or other controlled environment.
-
19.
公开(公告)号:US20160277080A1
公开(公告)日:2016-09-22
申请号:US15169247
申请日:2016-05-31
Applicant: Intel Corporation
Inventor: Qinghua Li , Xintian E. Lin , Guangjie Li , Kuilin Clark Chen , Xiaoyun May Wu
CPC classification number: H04B7/0413 , H04B7/0417 , H04B7/043 , H04B7/0632 , H04B7/0634 , H04B7/0639 , H04B17/24 , H04B17/26 , H04B17/309 , H04L5/0058 , H04W72/1273
Abstract: Embodiments of methods and apparatus for providing downlink channel parameters determination for downlink channels associated with a multiple-input-multiple-output (MIMO) system are generally described herein. Other embodiments may be described and claimed.
-
公开(公告)号:US12120550B2
公开(公告)日:2024-10-15
申请号:US17131407
申请日:2020-12-22
Applicant: Intel Corporation
Inventor: Satish Chandra Jha , S M Iftekharul Alam , Ned M. Smith , Vesh Raj Sharma Banjade , Xiaoyun May Wu , Ignacio Javier Alvarez Martinez , Arvind Merwaday , Kuilin Clark Chen
IPC: H04W28/10 , H04L41/147 , H04W28/02 , H04W40/24 , H04W40/30
CPC classification number: H04W28/10 , H04L41/147 , H04W28/0284 , H04W40/246 , H04W40/30
Abstract: Various systems and methods for improving connectivity of a Mobility-as-a-Service (MaaS) node are described herein, including categorizing MaaS communication traffic of a MaaS node into different levels of priority and controlling duplication or repetition of the MaaS communication traffic using the categorized level of priority of the MaaS communication traffic.
-
-
-
-
-
-
-
-
-