Abstract: Techniques described herein generally include methods and systems related to designing and operating a DRAM device that has significantly reduced refresh energy use. A method for designing a DRAM optimizes or otherwise improves the DRAM for energy efficiency based on a measured or predicted failure probability of memory cells in the DRAM. The DRAM may be configured to operate at an increased refresh interval, thereby reducing DRAM refresh energy but causing a predictable portion of the memory cells in the DRAM to leak electrical energy too quickly to retain data. The DRAM is further configured with a selected number of spare memory cells for replacing the “leaky” memory cells, so that operation of the DRAM at the increased refresh interval may result in little or no reduction in capacity of the DRAM.
Abstract: Techniques described herein generally include methods and systems related to cache partitioning in a chip multiprocessor. Cache-partitioning for a single thread or application between multiple data sources improves energy or latency efficiency of a chip multiprocessor by exploiting variations in energy cost and latency cost of the multiple data sources. Partition sizes for each data source may be selected using an optimization algorithm that minimizes or otherwise reduces latencies or energy consumption associated with cache misses.
Abstract: Technologies are generally described for systems, devices and methods effective to generate a message that may be sent to a social network. Power information from an electronic device may be detected by a power detector and received by a processor. For example, a power consumption profile of an appliance may be detected. The processor may classify the power information to produce descriptive data. For example, the processor may determine that an oven has been turned on for a period of time. The processor may generate the message by applying one or more rules to the descriptive data. For example, the processor may generate a message relating to consumption of dinner based on the determination that the oven has been turned on.
Abstract: Technologies are generally described herein for supporting program and data annotation for hardware customization and energy optimization. A code block to be annotated may be examined and a hardware customization may be determined to support a specified quality of service level for executing the code block with reduced energy expenditure Annotations may be determined as associated with the determined hardware customization. An annotation may be provided to indicate using the hardware customization while executing the code block. Examining the code block may include one or more of performing a symbolic analysis, performing an empirical observation of an execution of the code block, performing a statistical analysis, or any combination thereof. A data block to be annotated may also be examined. One or more additional annotations to be associated with the data block may be determined.
Abstract: Technologies and implementations for wireless communication in a wireless network including transmitting downlink information on a first frequency channel to Frequency Division Duplexing (FDD) User Equipments (UEs), transmitting downlink information on a second frequency channel during downlink portions of Time Domain Duplex (TDD) frame periods of the second frequency channel to TDD UEs, wherein the second frequency channel is the same as the frequency channel on which the FDD UEs are configured to transmit, and controlling uplink transmissions from the FDD UEs to occur only during uplink portions of TDD frame periods of the second frequency channel.
Abstract: In some examples, a first device may detect the presence of a second device or a particular person and, when a triggering event related to the second device or the particular person applies, the first device may change from a first mode to a second mode.
Abstract: Technologies are generally described for activation of actuators based on sensed user characteristics, such as orientation. In some examples, an access control system may be configured to activate an actuator upon determining that an activation device is both in proximity to and has a similar orientation to the actuator. The access control system may be configured to determine orientation similarity by determining an orientation associated with the activation device, determining an orientation associated with the actuator, and comparing a difference between the two orientations to an activation threshold. The actuator may be associated with an entryway such as a building doorway, a room doorway, or a vehicle door, or may be associated with a container such as a safe or vehicle trunk.
July 25, 2016
Date of Patent:
June 18, 2019
Empire Technology Development LLC
Jin Sam Kwak, Geonjung Ko, Min Seok Noh, Hyun Oh Oh, Ju Hyung Son
Abstract: Systems and methods to wirelessly transmit power are provided. A coil assembly is provided. In some examples, the coil assembly is configured to generate a signal in response to an ambient field, and to magnetically couple with a device to deliver power to the device.
Abstract: Systems and methods of dynamically presenting a website. The system includes a storage medium and a server. The storage medium includes data adapted for presentation on a first website. The server includes computer executable instructions configured to receive initial preference data and build a preference profile based on the initial preference data. The server also includes computer executable instructions configured to retrieve select first data from the storage medium based on the preference profile, structure a presentation of the first website based on the select first data; and provide targeted queries or prompts based on the first data.
Abstract: In some examples, a method for encoding and storing data blocks of a data file on multiple file servers is described. The method may include selecting a data clip size S, selecting a number N of data clips to include in each data block, and dividing the data file into data blocks each having data size (S×N). The method may also include, for each data block, dividing the data block into N data clips, generating a random number R where 1?R?N, selecting a number K of redundant data clips where N?K<2^N, encoding K data clips using random linear coding by XORing R data clips K times, and storing the K encoded data clips on the multiple file servers.
Abstract: Technologies and implementations for providing an online game experience using multiple devices are generally disclosed including methods and devices for, in some examples, receiving first data from a first device, the received first data being associated with a first interaction with the online game, receiving a request to utilize a second device and responsive to the received request, transmitting second data to the second device, the second data being associated with a second interaction with the online game, the second interaction related to first interaction but being different from the first interaction.
Abstract: Technologies are generally provided to integrate hardware accelerators in datacenters. In some examples, a datacenter customer may provide a hardware accelerator configuration to be implemented at a datacenter. The hardware accelerator configuration may include, for example, one or more customer accelerator blocks and one or more accelerator blocks. The datacenter may retrieve the accelerator block(s), integrate the accelerator block(s) with the customer accelerator block(s) to form the hardware accelerator, and then implement the hardware accelerator. In other examples, the datacenter may charge the customer for use of the accelerator block(s), but refrain from providing the accelerator block(s) to the customer.
Abstract: Technologies are generally described for identifying whether a propagation path between a mobile device and an access point is line-of-sight. In some examples, a method performed under control of a mobile device may include receiving, from an access point, a first signal transmitted at a first frequency band; receiving, from the access point, a second signal transmitted at a second frequency band; measuring a difference value between propagation properties of the first signal and the second signal; and identifying whether a propagation path between the mobile device and the access point is line-of-sight or non-line-of-sight based at least in part on the difference value.
Abstract: Examples include autonomously authenticating a financial transaction, on behalf of the user, without interacting with the user, via wireless communication link. In various embodiments, the user's cellular phone may be configured to process a message that provides at least partial service context and autonomously authenticate the financial transaction.
Abstract: Technologies are generally described for visualizing spatial relationships and other relationships. In one example, a method includes capturing, by a system comprising a processor, a stereoscopic image based on a view area from a reference point determined by the system. The stereoscopic image comprises objects. The method also includes determining respective depth indication data for a set of the objects based on respective depths of the set of the objects. The method also includes converting the stereoscopic image to a monocular image and initiating a presentation of the monocular image to a viewing device. The respective depths are respective distances determined between the reference point and the set of the objects. The monocular image comprises the depth indication data for the set of the objects and simulates depth perception.
February 5, 2015
Date of Patent:
May 21, 2019
Empire Technology Development LLC
Gary Stephen Shuster, Charles Marion Curry
Abstract: Technologies are generally described for providing a system that allows data use clients direct access to perform complex analysis on data assets without compromising the assets by sharing the data contained may set up the data assets in virtual datacenters (VDCs) within a physical datacenter and open additional resources within the VDCs to data use clients. The data use clients may be enabled to upload and execute analysis applications with access to valuable data. Data traffic exiting the VDCs through such applications however, ma be controlled by a supervisor that analyzes an output and enforces limitations on content and/or volume based on a level of purchased access.
Abstract: Methods and systems to assign threads in a multi-core processor are disclosed. A method to assign threads in a multi-core processor may include determining data relating to memory controllers fetching data in response to cache misses experienced by a first core and a second core. Threads may be assigned to cores based on the number of cache misses processed by respective memory controllers. Methods may further include determining that a thread is latency-bound or bandwidth-bound. Threads may be assigned to cores based on the determination of the thread as latency-bound or bandwidth-bound. In response to the assignment of the threads to the cores, data for the thread may be stored in the assigned cores.
Abstract: When the intensity of visible light is properly modulated, the difference between the modulated visible light and the original visible light is not noticeable to human eyes but detectable to electronic devices. Thus, the modulated visible light may be utilized to form patterns that are only recognizable to electronic devices but not to human eyes.
Abstract: Technologies related to task management across low-power wireless communications are generally described. In some examples, proximal devices in range of low-power wireless communications may cooperate to allow one or more of the proximal devices to suspend task operations, while one or more of the proximal devices manage the task operations. The task operations may be associated with an energy consumption that exceeds an energy consumption associated with the low-power wireless communications, allowing the proximal devices that suspend task operations to reduce their overall energy consumption.
Abstract: Techniques described herein generally include methods and systems related to a MEMS-based audio speaker system that includes a first movable element, formed from a first layer of a semiconductor substrate, and a second movable element, formed from a second layer of the semiconductor substrate that is a different layer than the first layer of the semiconductor substrate. The first movable element may be configured to oscillate along a first directional path substantially orthogonal to the first plane.