Multifactorial optimization system and method

- Hoffberg Family Trust 2

A method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the synthetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents using the synthetic economic value as the currency. A method for allocation among agents, comprising assigning a wealth generation function for generating future wealth to each of a plurality of agents, communicating subjective market information between agents, and transferring wealth generated by the secure wealth generation function between agents in consideration of a market transaction. The method may further comprise the step of transferring at least a portion of the wealth generation function between agents.

Skip to: Description  ·  Claims  ·  References Cited  · Patent History  ·  Patent History
Description
CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a Reissue of U.S. Pat. No. 9,615,264, issued Apr. 4, 2017, on U.S. patent application Ser. No. 13/429,666, which is a Divisional of U.S. patent application Ser. No. 12/089,277, filed Apr. 4, 2008, issued as U.S. Pat. No. 8,144,619, issued Mar. 27, 2012, which is a U.S. National Stage application under 35 U.S.C. §371 of PCT/US06/38759, filed Oct. 3, 2006, and claims benefit of priority from U.S. patent application Ser. No. 11/467,931 filed Aug. 29, 2006, now U.S. Pat. No. 8,874,477, issued Oct. 28, 2014, and claims benefit of priority from U.S. Provisional Patent Application No. 60/723,339, filed Oct. 4, 2005, each of which is expressly incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to the field of multifactorial economic optimization, and more generally to optimization of communities of elements having conflicting requirements and overlapping resources.

BACKGROUND OF THE INVENTION

In modern retail transactions, predetermined price transactions are common, with market transactions, i.e., commerce conducted in a setting which allows the transaction price to float based on the respective valuation allocated by the buyer(s) and seller(s), often left to specialized fields. While interpersonal negotiation is often used to set a transfer price, this price is often different from a transfer price that might result from a best-efforts attempt at establishing a market price. Assuming that the market price is optimal, it is therefore assumed that alternatives are sub-optimal. Therefore, the establishment of a market price is desirable over simple negotiations.

One particular problem with market-based commerce is that both seller optimization and market efficiency depend on the fact that representative participants of a preselected class are invited to participate, and are able to promptly communicate, on a relevant timescale, in order to accurately value the goods or services and make an offer. Thus, in traditional market-based system, all participants are in the same room, or connected by a high quality (low latency, low error) telecommunications link. Alternately, the market valuation process is prolonged over an extended period, allowing non-real time communications of market information and bids. Thus, attempts at ascertaining a market price for non-commodity goods can be subject to substantial inefficiencies, which reduce any potential gains by market pricing. Further, while market pricing might be considered “fair”, it also imposes an element of risk, reducing the ability of parties to predict future pricing and revenues. Addressing this risk may also improve efficiency of a market-based system, that is, increase the overall surplus in the market.

When a single party seeks to sell goods to the highest valued purchaser(s), to establish a market price, the rules of conduct typically define an auction. Typically, known auctions provide an ascending price or descending price over time, with bidders making offers or ceasing to make offers, in the descending price or ascending price models, respectively, to define the market price. After determining the winner of the auction, typically a bidder who establishes a largest economic surplus, the pricing rules define the payment, which may be in accordance with a uniform price auction, wherein all successful bidders pay the lowest successful bid, a second price auction wherein the winning bidder pays the amount bid by the next highest bidder, and pay-what-you-bid (first price) auctions. The pay-what-you-bid auction is also known as a discriminative auction while the uniform price auction is known as a non-discriminative auction. In a second-price auction, also known as a Vickrey auction, the policy seeks to create a disincentive for speculation and to encourage bidders to submit bids reflecting their true value for the good, rather than “shaving” the bid to achieve a lower cost. In the uniform price and second price schemes, the bidder is encourages to disclose the actual private value to the bidder of the good or service, since at any price below this amount, there is an excess gain to the buyer, whereas by withholding this amount the bid may be unsuccessful, resulting in a loss of the presumably desirable opportunity. In the pay-what-you-bid auction, on the other hand, the buyer need not disclose the maximum private valuation, and those bidders with lower risk tolerance will bid higher prices. See, ww.isoc.org/inet98/proceedings/3b/3b_3.html; www.ibm.com/iac/reports-technical/reports-bus-neg-internet.html.

Two common types of auction are the English auction, which sells a single good to the highest bidder in an ascending price auction, and the Dutch auction, in which multiple units are available for sale, and in which a starting price is selected by the auctioneer, which is successively reduced, until the supply is exhausted by bidders (or the minimum price/final time is reached), with the buyer(s) paying the lowest successful bid. The term Dutch auction is also applied to a type of sealed bid auction. In a multi-unit live Dutch auction, each participant is provided with the current price, the quantity on hand and the time remaining in the auction. This type of auction, typically takes place over a very short period of time and there is a flurry of activity in the last portion of the auction process. The actual auction terminates when there is no more product to be sold or the time period expires.

In selecting the optimal type of auction, a number of factors are considered. In order to sell large quantities of a perishable commodity in a short period of time, the descending price auctions are often preferred. For example, the produce and flower markets in Holland routinely use the Dutch auction (hence the derivation of the name), while the U.S. Government uses this form to sell its financial instruments. The format of a traditional Dutch auction encourages early bidders to bid up to their “private value”, hoping to pay some price below the “private value”. In making a bid, the “private value” becomes known, helping to establish a published market value and demand curve for the goods, thus allowing both buyers and sellers to define strategies for future auctions.

In an auction, typically a seller retains an auctioneer to conduct an auction with multiple buyers. (In a reverse auction, a buyer solicits the lowest price from multiple competing vendors for a desired purchase). Since the seller retains the auctioneer, the seller essentially defines the rules of the auction. These rules are typically defined to maximize the revenues or profit to the seller, while providing an inviting forum to encourage a maximum number of high valued buyers. If the rules discourage high valuations of the goods or services, or discourage participation by an important set of potential bidders, then the rules are not optimum. Rules may also be imposed to discourage bidders who are unlikely to submit winning bids from consuming resources. A rule may also be imposed to account for the valuation of the good or service applied by the seller, in the form of a reserve price. It is noted that these rules typically seek to allocate to the seller a portion of the economic benefit that would normally inure to the buyer (in a perfectly efficient auction), creating an economic inefficiency. However, since the auction is to benefit the seller, not society as a whole, this potential inefficiency is tolerated. An optimum auction thus seeks to produce a maximum profit (or net revenues) for the seller. An efficient auction, on the other hand, maximizes the sum of the utilities for the buyer and seller. It remains a subject of academic debate as to which auction rules are most optimum in given circumstances; however, in practice, simplicity of implementation may be a paramount concern, and simple auctions may result in highest revenues; complex auctions, while theoretically more optimal, may discourage bidders from participating or from applying their true and full private valuation in the auction process.

Typically, the rules of the auction are predefined and invariant. Further, for a number of reasons, auctions typically apply the same rules to all bidders, even though, with a priori knowledge of the private values assigned by each bidder to the goods, or a prediction of the private value, an optimization rule may be applied to extract the full value assigned by each bidder, while selling above the seller's reserve.

In a known ascending price auction, each participant must be made aware of the status of the auction, e.g., open, closed, and the contemporaneous price. A bid is indicated by the identification of the bidder at the contemporaneous price, or occasionally at any price above the minimum bid increment plus the previous price. The bids are asynchronous, and therefore each bidder must be immediately informed of the particulars of each bid by other bidders.

In a known descending price auction, the process traditionally entails a common clock, which corresponds to a decrementing price at each decrement interval, with an ending time (and price). Therefore, once each participant is made aware of the auction parameters, e.g., starting price, price decrement, ending price/time, before the start of the auction, the only information that must be transmitted is auction status (e.g., inventory remaining).

As stated above, an auction is traditionally considered an efficient manner of liquidating goods at a market price. The theory of an auction is that either the buyer will not resell, and thus has an internal or private valuation of the goods regardless of other's perceived values, or that the winner will resell, either to gain economic efficiency or as a part of the buyer's regular business. In the later case, it is a general presumption that the resale buyers are not in attendance at the auction or are otherwise precluded from bidding, and therefore that, after the auction, there will remain demand for the goods at a price in excess of the price paid during the auction. Extinction of this residual demand results in the so-called “winner's curse”, in which the buyer can make no profit from the transaction during the auction. Since this detracts from the value of the auction as a means of conducting profitable commerce, it is of concern to both buyer and seller.

Research into auction theory (game theory) shows that in an auction, the goal of the seller is to optimize the auction by allocating the goods inefficiently, if possible, and thus to appropriate to himself an excess gain. This inefficiency manifests itself by either withholding goods from the market or placing the goods in the wrong hands. In order to assure for the seller a maximum gain from a misallocation of the goods, restrictions on resale are imposed; otherwise, post auction trading will tend to undue the misallocation, and the anticipation of this trading will tend to control the auction pricing. The misallocations of goods imposed by the seller through restrictions allow the seller to achieve greater revenues than if free resale were permitted. It is believed that in an auction followed by perfect resale, that any mis-assignment of the goods lowers the seller's revenues below the optimum and likewise, in an auction market followed by perfect resale, it is optimal for the seller to allocate the goods to those with the highest value. Therefore, if post-auction trading is permitted, the seller will not benefit from these later gains, and the seller will obtain sub optimal revenues.

These studies, however, typically do not consider transaction costs and internal inefficiencies of the resellers, as well as the possibility of multiple classes of purchasers, or even multiple channels of distribution, which may be subject to varying controls or restrictions, and thus in a real market, such theoretical optimal allocation is unlikely. In fact, in real markets the transaction costs involved in transfer of ownership are often critical in determining a method of sale and distribution of goods. For example, it is the efficiency of sale that motivates the auction in the first place. Yet, the auction process itself may consume a substantial margin, for example 1-15% of the transaction value. To presume, even without externally imposed restrictions on resale, that all of the efficiencies of the market may be extracted by free reallocation, ignores that the motivation of the buyer is a profitable transaction, and the buyer may have fixed and variable costs on the order of magnitude of the margin. Thus, there are substantial opportunities for the seller to gain enhanced revenues by defining rules of the auction, strategically allocating inventory amount and setting reserve pricing.

Therefore, perfect resale is but a fiction created in auction (game) theory. Given this deviation from the ideal presumptions, auction theory may be interpreted to provide the seller with a motivation to misallocate or withhold based on the deviation of practice from theory, likely based on the respective transaction costs, seller's utility of the goods, and other factors not considered by the simple analyses.

In many instances, psychology plays an important role in the conduct of the auction. In a live auction, bidders can see each other, and judge the tempo of the auction. In addition, multiple auctions are often conducted sequentially, so that each bidder can begin to understand the other bidder's patterns, including hesitation, bluffing, facial gestures or mannerisms. Thus, bidders often prefer live auctions to remote or automated auctions if the bidding is to be conducted strategically.

Internet auctions are quite different from live auctions with respect to psychological factors. Live auctions are often monitored closely by bidders, who strategically make bids, based not only on the “value” of the goods, but also on an assessment of the competition, timing, psychology, and progress of the auction. It is for this reason that so-called proxy bidding, wherein the bidder creates a preprogrammed “strategy”, usually limited to a maximum price, are disfavored as a means to minimize purchase price, and offered as a service by auctioneers who stand to make a profit based on the transaction price. A maximum price proxy bidding system is somewhat inefficient, in that other bidders may test the proxy, seeking to increase the bid price, without actually intending to purchase, or contrarily, after testing the proxy, a bidder might give up, even below a price he might have been willing to pay. Thus, the proxy imposes inefficiency in the system that effectively increases the transaction cost.

In order to address a flurry of activity that often occurs at the end of an auction, an auction may be held open until no further bids are cleared for a period of time, even if advertised to end at a certain time. This is common to both live and automated auctions. However, this lack of determinism may upset coordinated schedules, thus impairing efficient business use of the auction system.

Game Theory

Use of Game Theory to control arbitration of ad hoc networks is well known. F. P. Kelly, A. Maulloo, and D. Tan. Rate control in communication networks: shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49, 1998. citeseer.ist.psu.edu/kelly98rate.html; J. MacKie-Mason and H. Varian. Pricing congestible network resources. IEEE Journal on Selected Areas in Communications, 13(7):1141-1149, 1995. Some prior studies have focused on the incremental cost to each node for participation in the network, without addressing the opportunity cost of a node foregoing control over the communication medium. Courcoubetis, C., Siris, V. A. and Stamoulis, G. D. Integration of pricing and flow control for available bit rate services in ATM networks. In Proceedings IEEE Globecom '96, pp. 644-648. London, UK. citeseer.ist.psu.edu/courcoubetis96integration.html.

A game theoretic approach addresses the situation where the operation of an agent which has freedom of choice, allowing optimization on a high level, considering the possibility of alternatives to a well designed system. According to game theory, the best way to ensure that a system retains compliant agents is to provide the greatest anticipated benefit, at the least anticipated cost, compared to the alternates.

Game Theory provides a basis for understanding the actions of Ad hoc network nodes. A multihop ad hoc network requires a communication to be passed through a disinterested node. The disinterested node incurs some cost, thus leading to a disincentive to cooperate. Meanwhile, bystander nodes must defer their own communications in order to avoid interference, especially in highly loaded networks. By understanding the decision analysis of the various nodes in a network, it is possible to optimize a system which, in accordance with game theory, provides benefits or incentives, to promote network reliability and stability. The incentive, in economic form, may be charged to those benefiting from the communication, and is preferably related to the value of the benefit received. The proposed network optimization scheme employs a modified combinatorial (VCG) auction, which optimally compensates those involved in the communication, with the benefiting party paying the second highest bid price (second price). The surplus between the second price and VCG price is distributed among those who defer to the winning bidder according to respective bid value. Equilibrium usage and headroom may be influenced by deviating from a zero-sum condition. The mechanism seeks to define fairness in terms of market value, providing probable participation benefit for all nodes, leading to network stability.

An ad hoc network is a wireless network which does not require fixed infrastructure or centralized control. The terminals in the network cooperate and communicate with each other, in a self organizing network. In a multihop network, communications can extend beyond the scope of a single node, employing neighboring nodes to forward messages to their destination. In a mobile ad hoc network, constraints are not placed on the mobility of nodes, that is, they can relocate within a time scale which is short with respect to the communications, thus requiring consideration of dynamic changes in network architecture.

Ad hoc networks pose control issues with respect to contention, routing and information conveyance. There are typically tradeoffs involving equipment size, cost and complexity, protocol complexity, throughput efficiency, energy consumption, and “fairness” of access arbitration. Other factors may also come into play. L. Buttyan and J.-P. Hubaux. Rational exchange—a formal model based on game theory. In Proceedings of the 2nd International Workshop on Electronic Commerce (WELCOM), November 2001. citeseer.ist.psu.edu/an01rational.html; P. Michiardi and R. Molva. Game theoretic analysis of security in mobile ad hoc networks. Technical Report RR-02-070, Institut Eurécom, 2002; P. Michiardi and R. Molva. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In Proceedings of WiOpt '03, March 2003; Michiardi, P., Molva, R.: Making greed work in mobile ad hoc networks. Technical report, Institut Eurecom (2002) citeseer.ist.psu.edu/michiardi02making.html; S. Shenker. Making greed work in networks: A game-theoretic analysis of switch service disciplines. IEEE/ACM Transactions on Networking, 3(6):819-831, December 1995; A. B. MacKenzie and S. B. Wicker. Selfish users in aloha: A game-theoretic approach. In Vehicular Technology Conference, 2001. VTC 2001 Fall. IEEE VTS 54th, volume 3, October 2001; J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring. Modelling incentives for collaboration in mobile ad hoc networks. In Proceedings of WiOpt '03, 2003.

Game theory studies the interactions of multiple independent decision makers, each seeking to fulfill their own objectives. Game theory encompasses, for example, auction theory and strategic decision-making. By providing appropriate incentives, a group of independent actors may be persuaded, according to self-interest, to act toward the benefit of the group. That is, the selfish individual interests are aligned with the community interests. In this way, the community will be both efficient and the network of actors stable and predictable. Of course, any systems wherein the “incentives” impose too high a cost, themselves encourage circumvention. In this case, game theory also addresses this issue.

In computer networks, issues arise as the demand for communications bandwidth approaches the theoretical limit. Under such circumstances, the behavior of nodes will affect how close to the theoretical limit the system comes, and also which communications are permitted. The well known collision sense, multiple access (CSMA) protocol allows each node to request access to the network, essentially without cost or penalty, and regardless of the importance of the communication. While the protocol incurs relatively low overhead and may provide fully decentralized control, under congested network conditions, the system may exhibit instability, that is, a decline in throughput as demand increases, resulting in ever increasing demand on the system resources and decreasing throughput. Durga P. Satapathy and Jon M. Peha, Performance of Unlicensed Devices With a Spectrum Etiquette, Proceedings of IEEE Globecom, November 1997, pp. 414-418. citeseer.ist.psu.edu/satapathy97 performance.html. According to game theory, the deficit of the CSMA protocol is that it is a dominant strategy to be selfish and hog resources, regardless of the cost to society, resulting in “the tragedy of the commons.” Garrett Hardin. The Tragedy of the Commons. Science, 162:1243-1248, 1968. Alternate Location: dieoff.com/page95.htm.

In an ad hoc network used for conveying real-time information, as might be the case in a telematics system, there are potentially unlimited data communication requirements (e.g., video data), and network congestion is almost guaranteed. Therefore, using a CSMA protocol as the paradigm for basic information conveyance is destined for failure, unless there is a disincentive to network use. (In power constrained circumstances, this cost may itself provide such a disincentive). On the other hand, a system which provides more graceful degradation under high load, sensitivity to the importance of information to be communicated, and efficient utilization of the communications medium would appear more optimal.

One way to impose a cost which varies in dependence on the societal value of the good or service is to conduct an auction, which is a mechanism to determine the market value of the good or service, at least between the auction participants. Walsh, W. and M. Wellman (1998). A market protocol for decentralized task allocation, in “Proceedings of the Third International Conference on Multi-Agent Systems,” pp. 325-332, IEEE Computer Society Press, Los Alamitos. In an auction, the bidder seeks to bid the lowest value, up to a value less than or equal to his own private value (the actual value which the bidder appraises the good or service, and above which there is no surplus), that will win the auction. Since competitive bidders can minimize the gains of another bidder by exploiting knowledge of the private value attached to the good or service by the bidder, it is generally a dominant strategy for the bidder to attempt to keep its private value a secret, at least until the auction is concluded, thus yielding strategies that result in the largest potential gain. On the other hand, in certain situations, release or publication of the private value is a dominant strategy, and can result in substantial efficiency, that is, honesty in reporting the private value results in the maximum likelihood of prospective gain.

SUMMARY AND OBJECTS OF THE INVENTION

The present invention provides a networking system comprising a network model, said model comprising a network parameter estimate; a packet router, routing packets in dependence on the model; and an arbitrage agent, to arbitrage a risk that said network parameter estimate is incorrect. The arbitrage agent typically operates with superior information or resources, such that its own estimate of the network at a relevant time is different than that produced by the network model, resulting in an arbitrage opportunity. In this case, arbitrage is not necessarily meant to indicate a risk-free gain, but rather a reduced risk potential gain.

The present invention also provides a method for routing a communication, comprising defining a set of available intermediary nodes, a plurality of members of the set being associated with a risk factor and an inclusion cost; defining an acceptable communications risk tolerance and an acceptable aggregate communications cost; defining a set of network topologies, each network topology employing a subset of members of the set of intermediary nodes, having a communications risk within the acceptable communications risk tolerance and a communications cost within the acceptable aggregate communications cost; and routing a communication using one of the set of network topologies. In according with this embodiment of the invention, alternate network topologies are available through the plurality of nodes, and the selection of a network topology is based not only on a potential efficiency of a topology, but also a risk with respect to that topology. Therefore, a less efficient topology with lower risk may be rationally selected based on a risk tolerance. In accordance with this embodiment, the method may further comprise the step of arbitraging a risk to increase a cost-benefit.

A further embodiment of the invention provides a method of routing a communication, comprising: defining a source node, a destination node, and at least two intermediate nodes; estimating a network state of at least one of the intermediate nodes; arbitraging a risk with respect to an accuracy of the estimate of network state with an arbitrage agent; communicating between said source and said destination; and compensating said at least two intermediate nodes and said agent.

A still further object of the invention is top provide method of optimizing relationships between a set of agents with respect to a set of allocable resources, comprising for a plurality of agents, determining at least one of a subjective resource value function, and a subjective risk tolerance value function; providing at least one resource allocation mechanism, wherein a resource may be allocated on behalf of an agent in exchange for value; providing at least one risk transference mechanism, wherein a risk may be transferred from one agent to another agent in exchange for value; selecting an optimal allocation of resources and assumption of risk by maximizing, within an error limit, an aggregate economic surplus of the putative organization of agents; accounting for the allocation of resources and allocation of risk in accordance with the subjective resource value function and a subjective risk tolerance value function for the selected optimal allocation; and allocating resources and risk in accordance with the selected optimal organization. The resource may comprises, for example, a communication opportunity. The agent may have a subjective resource value for failing to gain an allocation of a resource. Likewise, the agent may have an option or ability to defect from the organization. The agent may have a multipart resource requirement, wherein an optimal resource allocation requires allocation of a plurality of resource components. A risk transference agent may be provided to insure a risk. A risk transference agent may be provided to arbitrage a risk. A risk transference agent may be provided which speculatively acquires resources. The optimal resource allocation may comprise an explicit allocation of a first portion of component resources and an implicit allocation of a second portion of component resources, a risk transference agent undertaking to fulfill the second portion.

In accordance with a still further aspect of the invention, a method of optimizing an allocation of resources and deference from contesting the allocation of resources to other agents is provided, comprising: determining a subjective resource value function, and a subjective deference value function for an agent with respect to a resource allocation within a community; selecting an optimal allocation of resources and deference by maximizing, within an error limit, an aggregate economic surplus of the community; allocating resources in accordance with the selected optimal organization; and accounting in accordance with the subjective resource value function, and subjective deference value function. This deference value function thus quantifies in an economic function the deference of one agent to another.

The present invention further provides a method of optimizing an allocation of resources within members of a community, comprising: determining subjective resource value functions for a plurality of resources for members of the community; selecting an optimal allocation of resources, within an error limit, to maximize an aggregate economic surplus of the community; charging members of the community in accordance with the respective subjective resource value functions and member benefits; allocating at least a portion of the economic surplus resulting from the allocation to members who defer gaining a resource allocation benefit of the community. The invention further provides a method of encouraging recruitment of entities into an auction, comprising: defining a set of prevailing parties and a transaction price; defining an economic surplus from the transaction; and distributing a portion of the economic surplus to auction participants not within the set of prevailing parties, in relation to a magnitude of an offer. A further aspect of the invention provides a method for optimizing a market, comprising: recruiting at least four parties comprising at least one buyer, at least one seller, and at least one deferring party; matching bidders with offerors to maximize a surplus; and allocating the surplus at least in part to the deferring party, to motivate deference. In accordance with these embodiments, cooperation with a resource allocation which might otherwise be rejected, or incentivized the members not to defect from the community. Further, this mechanism incentivizes active participation, which may lead to a more liquid market and more optimal allocations. The auction may be a combinatorial auction. A plurality of suppliers may transact with a plurality of buyers in a single transaction. In accordance with one embodiment, only bidders having a significant risk of being within the set of prevailing parties are distributed the portion of the economic surplus. A portion of the economic surplus may be allocated dependent on a risk of being within the set of prevailing parties. Bidders may be required to pay a bid fee, for example a non-refundable deposit. This bid fee may itself be set, scale with the bid, or set by the bidder, wherein the payback may be a function of the winning bid amount, bidder bid, amount paid, and parameters of other bidders. The economic surplus may be allocated in such manner to increase the liquidity of a market.

The present invention further provides an ad hoc communication node, comprising: an input for receiving communications and an output for generating communications; and a processor, for seeking an optimization of an ad hoc communication network, said processor determining a network state for a portion of the network and estimating a network state for a different portion of the network, said processor engaging in a transaction with another node for transferring a risk of an erroneous state estimation.

BRIEF DESCRIPTION OF THE DRAWINGS

The drawings show:

FIG. 1 shows a block diagram of a first embodiment of the present invention;

FIG. 2 shows a block diagram of a second embodiment of the present invention;

FIG. 3 shows a flowchart of a first method in accordance with the present invention;

FIG. 4 shows a flowchart of a second method in accordance with the present invention;

FIG. 5 shows a flowchart of a third method in accordance with the present invention;

FIG. 6 shows a flowchart of a fourth method in accordance with the present invention;

FIG. 7 shows a flowchart of a fifth method in accordance with the present invention;

FIG. 8 shows a block diagram of a third embodiment of the present invention;

DESCRIPTION OF THE INVENTION

This disclosure incorporates herein by reference the entirety of WO/2006/029297.

The present invention seeks, among other aspects, to apply aspects of optimization theory to the control and arbitration of communities of resources, that is, elements or agents which operate independently and therefore cannot be directly controlled without compromise. Rather, the system is controlled by providing incentives and disincentives for various behaviors and actions seeking to promote an efficient outcome for the system as a whole, given the external constraints. Each agent then maximizes its own state based on its own value function, in light of the incentives and disincentives, resulting in an optimal network.

This optimization employs elements of game theory, and the present invention therefore invokes all those elements encompassed within its scope as applied to the problems and systems presented. The ad hoc network of elements typically reside within “communities”, that is, the present invention does not particularly seek to apply principles to trivial networks which can be optimized without compromise or arbitration, although its principles may be applicable. The present invention therefore applies to the enhancement or optimization of communities. These communities may themselves have various rules, reputation hierarchies, arrangements or cultures, which can be respected or programmed as a part of the system operation, or merely operate as constraints on optimization. Thus, in accordance with a game theoretic analysis, various rules and perceived benefits may be applied to appropriately model the real system, or may be imposed to control behavior.

These communities may be formed or employed for various purposes, and typically interoperate in a “commons” or economy, in which all relevant actions of each member of the community have an effect on others, and this effect can be quantified or normalized into “economic” terms. For example, a typical application of this technology would be to arbitrate access to a common or mutually interfering medium, such as a communications network. By optimizing communications, the greatest aggregate value of communications will generally be achieved, which may or may not correspond to a greatest aggregate communications bandwidth. For example, both quantity and quality of service may be independent (or semi-independent) parameters. Thus, the system tends to promote a high quality of service (or at least as high a quality as is required) over a bulk volume of service. This, in turn, permits new applications which depend on reliable communications.

A general type of economic optimization is a market economy, in which independent agents each act to maximize their respective interests. A subset of a market is an auction, in which a resource is allocated to a highest valued user or consumer, or a user or consumer acquires a resource at a lowest cost, in a single process. In a market economy, agents may act as peers, and each agent may act as a source of supply or assert a demand. That is, at some market price, a consumer may relinquish assets to others and become a supplier. Generally, a consumer has a higher private value for a resource than a supplier. The suppler, for example, may have a lower cost to obtain the resource, or a lower value for consumption of the resource, or both. Peers that both buy and sell a resource may seek to arbitrage, that is, seek to establish a committed source of supply at a lower cost than a committed purchaser, thus assuring a profit. In order to be effective, arbitrage requires that the intermediary have an advantage, or else the ultimate buyer would transact directly with the ultimate seller. The advantage(s) may be, for example, information, proprietary elements or methods, location, lower transactional costs, available capital, risk tolerance, storage facility, or the like.

So long as the advantage does not derive from an economically inefficiency monopoly or other structure that artificially and/or “illegally” limits the efficiency of other agents, the arbitrage agent increases net efficiency of the network. That is, the presence and action of the arbitrage agent increases the economic surplus of the transaction and the market in general.

An object of the present invention therefore seeks to overcome the inefficiency of seeking to solve a complex NP-complete optimization problem by providing arbitrage opportunities that allow a market solution to the optimization which balances optimization cost with intermediary profits. Accordingly, while the net result may deviate from an abstract optimum condition, when one considers the cost of achieving this abstract optimum, the arbitrage-mediated result is superior in terms of market surplus. The availability of arbitrage and intermediaries therefore allows a particular agent to balance its own optimization costs against overall gains.

The subject of complexity theory, including combinatorial optimization, and solution of approximation of NP-complete problems, has been extensively studied. See, e.g., the references set forth in the combinatorial optimization and auction appendix, which are expressly incorporated herein by reference.

Assuming a set of rational agents, each agent will seek to locally optimize its state to achieve the greatest gains and incur the lowest net costs. Thus, in a system which seeks to optimize a network of such agents, by permitting each agent to optimize its local environment state, the network may then be approximated by a network of local, environments, each typically comprising a plurality of agents. Thus, in the same way as the complexity of an NP-complete problem grows in polynomial space, the simplification of an NP complete problem will also be polynomial. While this simplification incurs an inefficiency, each agent models a proximate region in the space of interest, which tends to be linear (i.e., superposable) in a preferred embodiment. Agents compete with each other, and therefore the incentive to distort is limited. Likewise, since the preferred simplification of the problem does not impose a heuristic (i.e., a substitution of a first relatively simpler or more readily analytic algorithm for a second more intractable algorithm), it does not accordingly distort the incentives from those inherent in the basic optimization.

In a simple auction, a role is imposed on an agent, while in a market an agent can choose its own role dynamically, in a series of transactions, dependent on its own value function. In a market, a set of agents having a resource or requiring a resource seek to interact to reallocate the resource, such that the needs are generally satisfied, up to a “market clearing price”. That is, individual agents transact to transfer the resource from those with supply to those with demand, at a price between the private values of the two agents, which reallocation occurs until the demand ask price is higher than the supply bid price. An auction is designed to maximize the economic surplus, which is then typically allocated to the more restrictive of the source of supply or consumer or the sponsor. A market, on the other hand, generally operates to minimize the gap between bid and ask over an extended period, and thus the economic surplus tends to proportionate based on the balance of supply and demand at the clearing price. The particular reallocation also depends on the state of information of each agent, inefficiencies in transfer, and the like.

Where a need or supply is not unitary, one possible means for achieving an optimal solution is a combinatorial auction, in which multiple suppliers, or multiple consumers, or both, reallocate the resource or portions thereof. Thus, a single need is not met by a single supplier, but rather there are at least three parties to a transaction. The net result is a competition between parties that raises the potential for a holdout. In fact, one way to circumvent this issue (a “hold-out” problem) is to have direct or indirect (bypass) competition for each element. In such a circumstance, no agent can effectively demand more than the least cost alternate(s).

A combinatorial auction (multifactorial optimization, also known as a Vickrey Clarke Grove [VCG] Auction) seeks to match, for the entire network of possibilities, the highest valued users with the lowest cost suppliers. This leads, however, to a surplus between the two, which must be allocated. In a one-to-many auction, the surplus is generally allocated to the restricted agent, i.e., the agent(s) with “market power”. On the other hand, in an optimal market, the surplus will tend toward zero. That is, the profit to each party will tend toward a competitive mean, with higher profits only gained by undertaking higher risk. In imperfect markets, arbitrage opportunities exist, where profits can be made by trading the same resource.

In a multihop ad hoc network, a path between source and destination consists of a number of legs, with alternate paths available for selection of an optimum. If each node has its own distinct destination, there will likely be competing demands for each intermediate communication node.

One way to promote revealing a private value is if the end result of the process does not penalize those with aberrantly high or low values. One known method is to compute the result of the process as if the bidder or askor was not involved, leading to a so-called second price. Thus, the highest bidder wins, at a price established by a second highest bid. A lowest askor wins, at a price established by the second lowest askor. In a market, the highest bidder and lowest askor win, with a second price dependant on a more restrictive of supply and demand. In a combinatorial auction, this may be extended to price each component as if the highest bidder was uninvolved. In one embodiment of the invention, the second price applies to both buyer and seller, respectively, with the economic surplus allocated to other purposes. Thus, in this case, neither party gains the particular benefit of an imbalance of supply and demand. In fact, this perturbs the traditional market somewhat, in that an imbalance in supply and demand does not particularly recruit new market entrants in the same manner as an allocation of the surplus.

Arbitrage

The present invention seeks to model, within a micro-economy, the elements of the real economy which tend to improve efficiency toward “perfection”, that is, a perfect universal balance of supply and demand, for which no strategy (other than bidding a true private value) will produce a superior result. It is known that combinatorial auctions permit arbitrage opportunities. See, Andrew Gilpin and Tuomas Sandholm. 2004. Arbitrage in Combinatorial Exchanges. AAMAS-04 6th Workshop on Agent Mediated Electronic Commerce (AMEC-VI), New York, N.Y., 2004, expressly incorporated herein by reference.

These efficiency producing elements, paradoxically, are the parasitic elements which thrive off of predictable inefficiencies. That is, by promoting competition among the parasitic elements, an efficient balance of optimization of the direct market and optimization of the derivative markets will produce an overall superior result to an optimization of the direct market alone.

While the use of derivative markets in real economies is well known, the implementation of these as aspects of microeconomies and isolated markets is not well known, and a part of an embodiment of the present invention. For example, in a corporate bankruptcy auction, there are often resellers present who seek to purchase assets cheaply at a “wholesale” price, and to redistribute them on a less urgent basis or in smaller quantities, or at a different location, or otherwise transformed, and to sell them at a higher “retail” price. The auction price is determined by the number and constitution of bidders, as well as the possibility of proxy or absentee bidding. In fact, we presume that the auctioneers themselves are efficient, and that significantly higher bid prices are not available in a modified process without incurring substantial investment, risk, or delay. Indeed, these premises in a narrow sense might be false, i.e., a rational auctioneer might indeed make greater investment, undertake higher risk, or incur greater delay. However, this possible inefficiency merely shifts the allocation of the surplus, and to the extent there is a substantial gain to be made, encourages arbitrage, which in turn encourages competition at subsequent auctions, leading to at least a partial remediation of the allocation “error” in the long term, over a series of auctions.

Therefore, the market system, with derivative and arbitrage possibilities, and deviations from optimal performance is at least partially self-correcting over the long term.

Likewise, because the system has mechanisms for reducing the effects of imperfections in the presumptions and/or the conformance of a real system to the stated mechanisms and applicable rules, particular aspects of the system which impose administrative or overhead burdens may be circumvented by imposing less restrictive criteria and allowing a “self correcting” mechanism to remediate. Thus, for example, if a theoretically ideal mechanism imposes a 15% burden due to overhead, thus achieving an 85% overall efficiency (100−15=85), while a simplifying presumption achieves a result which imposes a 20% efficiency impairment but only a 2% overhead factor (100−20−2=78), and an arbitrage mechanism is available to correct the simplified model to gain 12% efficiency with another 2% overhead (78+12−2), the net result is 88% efficiency, above that of the theoretically ideal mechanism.

An arbitrage mechanism seeks to identify inefficiency based on superior information or mechanism, and a pricing or value disparity, and conduct a countertrade seeking to exploit the disparity while undertaking relatively low risk, to increase overall market efficiency. (That is, to ultimately reallocate resources from a lower valued holder to a higher valued holder).

An ad hoc network generally presents a case where individual nodes have imperfect information, and efforts to gain better information invariably lead to increased overhead. Therefore, by intentionally truncating the information gathering and discovery aspect of the ad hoc network, a residual arbitrage opportunity will remain, but the inherent inefficiency of the arbitrage may be less than the corresponding overhead involved in providing more perfect information to the individual nodes (i.e., overall arbitrage cost is less than efficiency gain).

As such, a design feature of an embodiment of the invention is to provide or even encourage arbitrage mechanisms and arbitrage opportunities, in an effort to improve overall system efficiency. In fact, an embodiment of the system is preferably constructed to regularly provide arbitrage opportunities which can be conducted with low risk and with substantial market efficiency gains, and these arbitrage opportunities may be an important part of the operation of the embodiment.

A second opportunity provides risk transference, such as debt transactions, insurance, and market-making, and/or the like. In such transactions, a market risk is apparent. Each node, on the other and hand, has its own subjective risk tolerance. Likewise, the market risk provides an opportunity for nodes having a high risk tolerance to improve yield, by trading risk for return. Those nodes which have generally greater liquid resources, which inherently have no return while uninvested, and may permit other nodes having lesser resources to borrow, at interest. Because there is a risk of non-payment, nodes may have different credit ratings, and this creates an opportunity for credit rating “agencies” and/or guarantors. In an ad hoc network, there is also a possibility for delivery failure, which, in turn, provides an opportunity for insurance.

Manet System

Multihop Ad Hoc Networks require cooperation of nodes which are relatively disinterested in the content being conveyed. Typically, such disinterested intermediaries incur a cost for participation, for example, power consumption or opportunity cost. Economic incentives may be used to promote cooperation of disinterested intermediaries, also known as recruitment. An economic optimization may be achieved using a market-finding process, such as an auction. In many scenarios, the desire for the fairness of an auction is tempered by other concerns, i.e., there are constraints on the optimization which influence price and parties of a transaction. For example, in military communication systems, rank may be deemed an important factor in access to, and control over, the communications medium. A simple process of rank-based preemption, without regard for subjective or objective importance, will result in an inefficient economic distortion. In order to normalize the application of rank, one is presented with two options: imposing a normalization scheme with respect to rank to create a unified economy, or providing considering rank using a set of rules outside of the economy. One way to normalize rank, and the implicit hierarchy underlying the rank, is by treating the economy as an object-oriented hierarchy, in which each individual inherits or is allocated a subset of the rights of a parent, with peers within the hierarchy operating in a purely economic manner. The extrinsic consideration of rank, outside of an economy, can be denominated “respect”, which corresponds to the societal treatment of the issue, rather than normalizing this factor within the economy, in order to avoid unintended secondary economic distortion. Each system has its merits and limitations.

An economic optimization is one involving a transaction in which all benefits and detriments can be expressed in normalized terms, and therefore by balancing all factors, including supply and demand, at a price, an optimum is achieved. Auctions are well known means to achieve an economic optimization between distinct interests, to transfer a good or right in exchange for a market price. While there are different types of auctions, each having their limitations and attributes, as a class these are well accepted as a means for transfer of goods or rights at an optimum price. Where multiple goods or rights are required in a sufficient combination to achieve a requirement, a so-called Vickrey-Clarke-Groves (VCG) auction may be employed. In such an auction, each supplier asserts a desired price for his component. The various combinations which meet the requirement are then compared, and the lowest selected. In a combinatorial supply auction, a plurality of buyers each seeks a divisible commodity, and each bids its best price. The bidders with the combination of prices which are maximum are selected. In a commodity market, there are a plurality of buyers and sellers, so the auction is more complex. In a market economy, the redistribution of goods or services are typically transferred between those whose value them least to those who value them most. The transaction price depends on the balance between supply and demand; with the surplus being allocated to the limiting factor.

Derivatives, Hedges, Futures and Insurance

In a market economy, the liquidity of the commodity is typically such that the gap between bid and ask is small enough that the gap between them is small enough that it is insignificant in terms of preventing a transaction. In a traditional market, the allocation of the surplus oscillates in dependence on whether it is a buyer's or seller's market. Of course, the quantum of liquidity necessary to assure an acceptably low gap is subjective, but typically, if the size of the market is sufficient, there will be low opportunity for arbitrage, or at least a competitive market for arbitrage. The arbitrage may be either in the commodity, or options, derivatives, futures, or the like.

In a market for communications resources, derivatives may provide significant advantages over a simple unitary market for direct transactions. For example, a node may wish to procure a reliable communications pathway (high quality of service or QoS) for an extended period. Thus, it may seek to commit resources into the future, and not be subject to future competition for or price fluctuation of those resources, especially being subject to a prior broadcast of its own private valuation and a potential understanding by competitors of the presumed need for continued allocation of the resources. Thus, for similar reasons for the existence of derivative, options, futures, etc. markets in the real economy, their analogy may be provided within a communications resource market.

In a futures market analogy, an agent seeks to procure its long-term or bulk requirements, or seeks to dispose of its assets in advance of their availability. In this way, there is increased predictability, and less possibility of self-competition. It also allows transfer of assets in bulk to meet an entire requirement or production lot capability, thus increasing efficiency and avoiding partial availability or disposal.

One issue in mobile ad hoc networks is accounting for mobility of nodes and unreliability of communications. In commodities markets, one option is insurance of the underlying commodity and its production. The analogy in communications resource markets focuses on communications reliability, since one aspect of reliability, nodal mobility is “voluntary” and not typically associated with an insurable risk. On the other hand, the mobility risk may be mitigated by an indemnification. In combination, these, and other risk transfer techniques, may provide means for a party engaged in a communications market transaction to monetarily compensate for risk tolerance factors. An agent in the market having a low risk tolerance can undertake risk transference, at some additional but predetermined transaction costs, while one with a high risk tolerance can “go bare” and obtain a lower transaction cost, or undertake third party risk for profit.

Insurance may be provided in various manners For example, some potential market participants may reserve wealth, capacity or demand for a fee, subject to claim in the event of a risk event. In other cases, a separate system may be employed, such as a cellular carrier, to step in, in the event that a lower cost resource is unavailable (typically for bandwidth supply only). A service provider may provide risk-related allocations to network members in an effort to increase perceived network stability; likewise, if the network is externally controlled, each node can be subject to a reserve requirements requirement which is centrally (or hierarchally hierarchically) allocated.

If an agent promises to deliver a resource, and ultimately fails to deliver, it may undertake an indemnification, paying the buyer an amount representing “damages” or “liquidated damages”, the transaction cost of buyer, e.g., the cost or estimated cost of reprocurement plus lost productivity and/or gains. Likewise, if an agent fails to consume resources committed to it, it owes the promised payment, less the resale value of the remaining resources, if any. An indemnification insurer/guarantor can undertake to pay the gap on behalf of the defaulting party. Typically, the insurer may, but need not be, a normal agent peer.

Hedge strategies may also be employed in known manner.

In order for markets to be efficient, there must be a possibility of beneficial use or resale of future assets. This imposes some complexity, since the assets are neither physical nor possessed by the intermediary. However, cryptographic authentication of transactions may provide some remedy. On the other hand, by increasing liquidity and providing market-makers, the transaction surplus may be minimized, and thus the reallocation of the surplus as discussed above minimized. Likewise, in a market generally composed of agents within close proximity, the interposition of intermediaries may result in inefficiencies rather than efficiencies, and the utility of such complexity may better come from the facilitation of distant transactions. Thus, if one presumes slow, random nodal mobility, little advantage is seen from liquid resource and demand reallocation. On the other hand, if an agent has a predefined itinerary for rapidly relocating, it can efficiently conduct transactions over its path, prearranging communication paths, and thus providing trunk services. Thus, over a short term, direct multihop communications provide long-distance communications of both administrative and content data. On the other hand, over a longer term, relocation of agents may provide greater efficiency for transport of administrative information, increasing the efficiency of content data communications over the limited communications resources, especially if a store-and-forward paradigm is acceptable.

It is noted that in an economy having persistent and deep use of financial derivatives, a stable currency is preferred, and the declining value credit discussed above would provide a disincentive to agents who might otherwise take risks over a long time-frame. It is possible, however, to distinguish between credits held by “consumers” and those held by “arbitrageurs” or institutions, with the former having a declining value but can be spent, and those which have a stable value but must be first converted (at some possible administrative cost) for consumer use.

Bandwidth Auction

A previous scheme proposes the application of game theory in the control of multihop mobile ad hoc networks according to “fair” principles. In this prior scheme, nodes seeking to control the network (i.e., are “buyers” of bandwidth), conduct an auction for the resources desired. Likewise, potential intermediate nodes conduct an auction to supply the resources. The set of winning bidders and winning sellers is optimized to achieve the maximum economic surplus. Winning bidders pay the maximum bid price or second price, while winning sellers receive their winning ask or second price. The remaining surplus is redistributed among the winners and losing bidders, whose cooperation and non-interference with the winning bidders is required for network operation. The allocation of the portion to losing bidders is, for example, in accordance with their proportionate bid for contested resources, and for example, limited to the few (e.g., 3) highest bidders or lowest offerors. The winning bids are determined by a VCG combinatorial process. The result is an optimum network topology with a reasonable, but by no means the only, fairness criterion, while promoting network stability and utility.

The purpose of rewarding losers is to encourage recruitment, and therefore market liquidity. In order to discourage strategic losing bids, one possible option is to impose a statistical noise on the process to increase the risk that a strategically losing bid will be a winning bid. Another way is to allocate the available surplus corresponding to the closeness of the losing bid to the winning bid, not merely on its magnitude. Alternately, a “historical” value for the resource may be established, and an allocation made only if the bid is at or above the trailing mean value. Further, the loser's allocation may be dependent on a future bid with respect to a corresponding resource at or above the prior value. In similar manner, various algorithms for surplus allocation may be designed to encourage recruitment of agents seeking to win, while possibly discouraging bidders who have little realistic possibility of winning. Bidders who do not seek to win impose an inefficiency on the network, for example requiring other agents to communicate, evaluate, acknowledge, and defer to these bids. Therefore, a relatively small bidding fee may be imposed in order to assert a bid, which may be used to increase the available surplus to be allocated between the winning and top losing bidders.

As discussed above, risk may be a factor in valuing a resource. The auction optimization may therefore be normalized or perturbed in dependence on an economic assessment of a risk tolerance, either based on a personal valuation, or based on a third party valuation (insurance/indemnification). Likewise, the optimization may also be modified to account for other factors.

Thus, one issue with such a traditional scheme for fair allocation of resources is that it does not readily permit intentional distortions, that is, the system is “fair”. However, in some instances, a relatively extrinsic consideration to supply and subjective demand may be a core requirement of a system. For example, in military systems, it is traditional and expected that higher military rank will provide access to and control over resources on a favored basis. (Note that, in contrast to an example discussed elsewhere herein, this favoritism is not enforced by a hierarchal wealth generation distribution). In civilian systems, emergency and police use may also be considered privileged. However, by seeking to apply economic rules to this access, a number of issues arise. Most significantly, as a privileged user disburses currency, this is distributed to unprivileged users, leading to an inflationary effect and comparative dilution of the intended privilege. If the economy is real, that is the currency is linked to a real economy, this grant of privilege will incur real costs, which is also not always an intended effect. If the economy is synthetic, that is, it is unlinked to external economies, then the redistribution of wealth within the system can grant dramatic and potentially undesired control to a few nodes, potentially conveying the privilege to those undeserving, except perhaps due to fortuitous circumstances such as being in a critical location or being capable of interfering with a crucial communication.

Two different schemes may be used to address this desire for both economic optimality and hierarchal considerations. One scheme maintains optimality and fairness within the economic structure, but applies a generally orthogonal consideration of “respect” as a separate factor within the operation of the protocol. Respect is a subjective factor, and thus permits each bidder to weight its own considerations. It is further noted that Buttyan et al. have discussed this factor as a part of an automated means for ensuring compliance with network rules, in the absence of a hierarchy. Levente Buttyan and Jean-Pierre Hubaux, Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks, Technical Report DSC/2001/004, EPFL-DI-ICA, January 2001, incorporated herein by reference. See, P. Michiardi and R. Molva, CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, In B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Sep. 26-27, 2002, Portoroz, Slovenia, volume 228 of IFIP Conference Proceedings, pages 107-121. Kluwer Academic, 2002; Sonja Buchegger and Jean-Yves Le Boudec, A Robust Reputation System for P2P and Mobile Ad-hoc Networks, Second Workshop on the Economics of Peer-to-Peer Systems, June 2004; Po-Wah Yau and Chris J. Mitchell, Reputation Methods for Routing Security for Mobile Ad Hoc Networks; Frank Kargl, Andreas Klenk, Stefan Schlott, and Micheal Weber. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Network. The 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004); He, Qi, et al., SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-Hoc Networks, IEEE Wireless Communications and Networking Conference 2004, each of which is expressly incorporated herein by reference.

The bias introduced in the system operation is created by an assertion by one claiming privilege, and deference by one respecting privilege. One way to avoid substantial economic distortions is to require that the payment made be based on a purely economic optimization, while selecting the winner based on other factors. In this way, the perturbations of the auction process itself is subtle, that is, since bidders realize that the winning bid may not result in the corresponding benefit, but incurs the publication of private values and potential bidding costs, there may be perturbation of the bidding strategy from optimal. Likewise, since the privilege is itself unfair and predictable, those with lower privilege ratings will have greater incentive to defect from, or act against, the network. Therefore, it is important that either the assertion of privilege be subjectively reasonable to those who must defer to it, or the incidence or impact of the assertions be uncommon or have low anticipated impact on the whole. On the other hand, the perturbation is only one-sided, since the payment is defined by the network absent the assertion of privilege.

In the extreme case, the assertion of privilege will completely undermine the auction optimization, and the system will be prioritized on purely hierarchal grounds, and the pricing non-optimal or unpredictable. This condition may be acceptable or even efficient in military systems, but may be unacceptable where the deference is voluntary and choice of network protocol is available, i.e., defection from the network policies is an available choice.

It is noted that those seeking access based on respect, must still make an economic bid. This bid, for example, should be sufficient in the case that respect is not afforded, for example, from those of equal rank or above, or those who for various reasons have other factors that override the assertion of respect. Therefore, one way to determine the amount of respect to be afforded is the self-worth advertised for the resources requested. This process therefore may minimize the deviation from optimal and therefore promotes stability of the network. It is further noted that those who assert respect based on hierarchy typically have available substantial economic resources, and therefore it is largely a desire to avoid economic redistribution rather than an inability to effect such a redistribution, that compels a consideration of respect.

In a combinatorial auction, each leg of a multihop link is separately acquired and accounted. Therefore, administration of the process is quite involved. That is, each bidder broadcasts a set of bids for the resources required, and an optimal network with maximum surplus is defined. Each leg of each path is therefore allocated a value. In this case, it is the winning bidder who defers based on respect, since the other resources are compensated equally and therefore agnostic.

Thus, if pricing is defined by the economic optimization, then the respect consideration requires that a subsidy be applied, either as an excess payment up to the amount of the winning bid, or as a discount provided by the sellers, down to the actually bid value.

Since the pricing is dependent on the network absent the respect consideration, there is an economic deficit or required subsidy. In some cases, the respected bidder simply pays the amount required, in excess of its actual bid. If we presume that the respected bidder could have or would have outbid the winning bidder, it then pays the third price, rather than the second price. If the respected bidder does not have, or will not allocate the resources, then the subsidy must come from the others involved. On one hand, since the respect in this case may be defined by the otherwise winning bidder, this bidder, as an element of its respect, may pay the difference. However, this cost (both the lost economic gains of the transaction and the subsidy) will quickly disincentivize any sort of grant of respect. The recipients could also provide a discount; however this would require consent of both the winning bidder and the recipients, making concluding the transaction more difficult. One other possibility is to request “donations” from nearby nodes to meet the subsidy, a failure of which undermines the assertion of respect.

Another alternate is to assume that there is a surplus between the aggregate winning bid and the aggregate cost, and so long as the bidder claiming respect pays the minimum cost, then the system remains operable, although the benefits of surplus allocation are lost, and all affected nodes must defer to this respect mechanism. In this case, it is more difficult to arbitrate between competing demands for respect, unless a common value function is available, which in this case we presume is not available.

The node demanding respect may have an impact on path segments outside its required route and the otherwise optimal interfering routes; and thus the required payment to meet the differential between the optimum network and the resulting network may thus be significant.

It is noted that, in the real economy, where the U.S. Government allocates private resources, it is required to pay their full value. This model appears rational, and therefore a preferred system requires a node claiming privilege and gaining a resulting benefit to pay the winning bid value (as an expression of market value), and perhaps in addition pay the winning bidder who is usurped its anticipated benefit, that is, the difference in value between the second price and its published private valuation, this having an economically neutral affect, but also requiring a respected node to potentially possess substantial wealth.

A further possible resolution of this issue provides for an assessment of an assertion of respect by each involved node. Since the allocation of respect is subjective, each bidder supplies a bid, as well as an assertion of respect. Each other node receives the bids and assertions, and applies a weighting or discount based on its subjective analysis of the respect assertion. In this case, the same bid is interpreted differently by each supplier, and the subjective analysis must be performed by or for each supplier. By converting the respect assertion into a subjective weighting or discount, a pure economic optimization may then be performed, with the subjectively perturbed result by each node reported and used to compute the global optimization.

An alternate scheme for hierarchal deference is to organize the economy itself into a hierarchy, as discussed in the first example. In a hierarchy, a node has one parent and possibly multiple children. At each level, a node receives an allocation of wealth from its parent, and distributes all or a portion of its wealth to children. A parent is presumed to control its children, and therefore can allocate their wealth or subjective valuations to its own ends. When nodes representing different lineages must be reconciled, one may refer to the common ancestor for arbitration, or a set of inherited rules to define the hierarchal relationships.

In this system, the resources available for reallocation between branches of the hierarchy depend on the allocation by the common grandparent, as well as competing allocations within the branch. This system presumes that children communicate with their parents and are obedient. In fact, if the communication presumption is violated, one must then rely on a priori instructions, which may not be sufficiently adaptive to achieve an optimal result. If the obedience presumption is violated, then the hierarchal deference requires an enforcement mechanism within the hierarchy. If both presumptions are simultaneously violated, then the system will likely fail, except on a voluntary basis, with results similar to the “reputation” scheme described herein.

Thus, it is possible to include hierarchal deference as a factor in optimization of a multihop mobile ad hoc network, leading to compatibility with tiered organizations, as well as with shared resources.

Application of Game Theory to Ad Hoc Networks

There are a number of aspects of ad hoc network control which may be adjusted in accordance with game theoretic approaches. An example of the application of game theory to influence system architecture arises when communications latency is an issue. A significant factor in latency is the node hop count. Therefore, a system may seek to reduce node hop count by using an algorithm other than a nearest neighbor algorithm, bypassing some nodes with longer distance communications. In analyzing this possibility, one must not only look at the cost to the nodes involved in the communication, but also the cost to nodes which are prevented from simultaneously accessing the network due to interfering uses of network resources. As a general proposition, the analysis of the network must include the impact of each action, or network state, on every node in the system, although simplifying presumptions may be appropriate where information is unavailable, or the anticipated impact is trivial.

Game theory is readily applied in the optimization of communications routes through a defined network, to achieve the best economic surplus allocation. In addition, the problem of determining the network topology, and the communications themselves, are ancillary, though real, applications of game theory. Since the communications incidental to the arbitration require consideration of some of the same issues as the underlying communications, corresponding elements of game theory may apply at both levels of analysis. Due to various uncertainties, the operation of the system is stochastic. This presumption, in turn, allows estimation of optimality within a margin of error, simplifying implementation as compared to a rigorous analysis without regard to statistical significance.

There are a number of known and proven routing models proposed for forwarding of packets in ad hoc networks. These include Ad Hoc On-Demand Distance Vector (AODV) Routing, Optimized Link State Routing Protocol (OLSR), Dynamic Source Routing Protocol (DSR), and Topology Dissemination Based on Reverse-Path Forwarding (TBRPF).

There can be significant differences in optimum routing depending on whether a node can modulate its transmit power, which in turn controls range, and provides a further control over network topology. Likewise, steerable antennas, antenna arrays, and other forms of multiplexing provide further degrees of control over network topology. Note that the protocol-level communications are preferably broadcasts, while information conveyance communications are typically point-to-point. Prior studies typically presume a single transceiver, with a single omnidirectional antenna, operating according to in-band protocol data, for all communications. The tradeoff made in limiting system designs according to these presumptions should be clear.

It is the general self-interest of a node to conserve its own resources, maintain an opportunity to access network resources, while consuming whatever resource of other nodes as it desires. Clearly, this presents a significant risk of the “tragedy of the commons”, in which selfish individuals fail to respect the very basis for the community they enjoy, and a network of rational nodes operating without significant incentives to cooperate would likely fail. On the other hand, if donating a node's resources generated a sufficient associated benefit to that node, while consuming network resources imposed a sufficient cost, stability and reliability can be achieved. So long as the functionality is sufficient to meet the need, and the economic surplus is “fairly” allocated, that is, the cost incurred is less than the private value of the benefit, and that cost is transferred as compensation to those burdened in an amount in excess of their incremental cost, adoption of the system should increase stability. In fact, even outside of these bounds, the system may be more stable than one which neither taxes system use nor rewards altruistic behavior. While the basic system may be a zero sum system, and over time, the economic effects will likely average out (assuming symmetric nodes), in any particular instance, the incentive for selfish behavior by a node will be diminished.

One way to remedy selfish behavior is to increase the cost of acting this way, that is, to impose a cost or tax for access to the network. In a practical implementation, however, this is problematic, since under lightly loaded conditions, the “value” of the communications may not justify a fixed cost which might be reasonable under other conditions, and likewise, under heavier loads, critical communications may still be delayed or impeded. A variable cost, dependent on relative “importance”, may be imposed, and indeed, as alluded to above, this cost may be market based, in the manner of an auction. In a multihop network, such an auction is complicated by the requirement for a distribution of payments within the chain of nodes, with each node having potential alternate demands for its cooperation. The market-based price-finding mechanism excludes nodes which ask a price not supported by its market position, and the auction itself may comprise a value function encompassing reliability, latency, quality of service, or other non-economic parameters, expressed in economic terms. The network may further require compensation to nodes which must defer communications because of inconsistent states, such as in order to avoid interference or duplicative use of an intermediary node, and which take no direct part in the communication. It is noted that the concept of the winner of an auction paying the losers is not generally known, and indeed somewhat counterintuitive. Indeed, the effect of this rule perturbs the traditional analysis framework, since the possibility of a payment from the winner to the loser alters the allocation of economic surplus between the bidder, seller, and others. Likewise, while the cost to the involved nodes may be real, the cost to the uninvolved nodes may be subjective. While it would appear that involved nodes would generally be better compensated than uninvolved nodes, the actual allocation or reallocation of wealth according to the optimization may result in a different outcome.

The network provides competitive access to the physical transport medium, and cooperation with the protocol provides significant advantages over competition with it. Under normal circumstances, a well developed ad hoc network system can present as a formidable coordinated competitor for access to contested bandwidth by other systems, while within the network, economic surplus is optimized. Thus, a node presented with a communications requirement is presented not with the simple choice to participate or abstain, but rather whether to participate in an ad hoc network with predicted stability and mutual benefit, or one with the possibility of failure due to selfish behavior, and non-cooperation. Even in the absence of a present communication requirement, a network which rewards cooperative behavior may be preferable to one which simply expects altruism without rewarding it.

The protocol may also encompass the concept of node reputation, that is, a positive or negative statement by others regarding the node in question. P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communication and Multimedia Security 2002 Conference, 2002. This reputation may be evaluated as a parameter in an economic analysis, or applied separately, and may be anecdotal or statistical. In any case, if access to resources and payments are made dependent on reputation, nodes will be incentivized to maintain a good reputation, and avoid generating a bad reputation. Therefore, by maintaining and applying the reputation in a manner consistent with the community goals, the nodes are compelled to advance those goals in order to benefit from the community. Game theory distinguishes between good reputation and bad reputation. Nodes may have a selfish motivation to assert that another node has a bad reputation, while it would have little selfish motivation, absent collusion, for undeservedly asserting a good reputation. On the other hand, a node may have a selfish motivation in failing to reward behavior with a good reputation.

Economics and reputation may be maintained as orthogonal considerations, since the status of a node's currency account provides no information about the status of its reputation.

This reputation parameter may be extended to encompass respect, that is, a subjective deference to another based on an asserted or imputed entitlement. While the prior system uses reputation as a factor to ensure compliance with system rules, this can be extended to provided deferential preferences either within or extrinsic to an economy. Thus, in a military hierarchy, a relatively higher ranking official can assert rank, and if accepted, override a relatively lower ranking bidder at the same economic bid. For each node, an algorithm is provided to translate a particular assertion of respect (i.e., rank and chain of command) into an economic perturbation. For example, in the same chain of command, each difference in rank might be associated with a 25% compounded discount, when compared with other bids, i.e.
B1=B0×10(1+0.25×ΔR),

Wherein B1 is the attributed bid, B0 is the actual bid, and ΔR is the difference in rank, positive or negative.

Outside the chain of command, a different, generally lower, discount (dNCOC) may be applied, possibly with a base discount as compared to all bids within the chain of command (dCOC), i.e.,
B1=B0×10(1+dCOC+dNCOC×ΔR).
The discount is applied so that higher ranking officers pay less, while lower ranking officers pay more. Clearly, there is a high incentive for each bid to originate from the highest available commander within the chain of command, and given the effect of the perturbation, for ranking officers to “pull rank” judiciously.

The Modified VCG Auction

A so-called Vickrey-Clarke-Groves, or VCG, auction is a type of auction suitable for bidding, in a single auction, for the goods or services of a plurality of offerors, as a unit. Vickrey, W. (1961). Counterspeculation, auctions, and competitive sealed tenders, Journal of Finance 16, 8-37; Clarke, E. H. (1971). Multipart pricing of public goods, Public Choice 11, 17-33.

In the classic case, each bidder bids a value vector for each available combination of goods or services. The various components and associated ask price are evaluated combinatorially to achieve the minimum sum to meet the requirement. The winning bid set is that which produces the maximum value of the accepted bids, although the second (Vickrey) price is paid. In theory, the Vickrey price represents the maximum state of the network absent the highest bidder, so that each bidder is incentivized to bit its private value, knowing that its pricing will be dependent not on its own value, but the subjective value applied by others. In the present context, each offeror submits an ask price (reserve) or evaluatable value function for a component of the combination. If the minimum aggregate to meet the bid requirement is not met, the auction fails. If the auction is successful, then the set of offerors selected is that with the lowest aggregate bid, and they are compensated that amount.

The VCG auction is postulated as being optimal for allocation of multiple resources between agents. It is “strategyproof” and efficient, meaning that it is a dominant strategy for agents to report their true valuation for a resource, and the result of the optimization is a network which maximizes the value of the system to the agents. Game theory also allows an allocation of cost between various recipients of a broadcast or multicast. That is, the communication is of value to a plurality of nodes, and a large set of recipient nodes may efficiently receive the same information. This allocation from multiple bidders to multiple sellers is a direct extension of VCG theory, and a similar algorithm may be used to optimize allocation of costs and benefit.

The principal issue involved in VCG auctions is that the computational complexity of the optimization grows with the number of buyers and their different value functions and allocations. While various simplifying presumptions may be applied, studies reveal that these simplifications may undermine the VCG premise, and therefore do not promote honesty in reporting the buyer's valuation, and thus are not “strategyproof”, which is a principal advantage of the VCG process.

The surplus, i.e., gap between bid and ask, is then available to compensate the deferred bidders. This surplus may be, for example, distributed proportionately to the original bid value of the bidder, thus further encouraging an honest valuation of control over the resource. Thus, if we presume that a bidder may have an incentive to adopt a strategy in which it shaves its bid to lower values, an additional payoff dependent on a higher value bid will promote higher bides and disincentivize shaving. On the other hand, it would be inefficient to promote bidding above a bidder's private value, and therefore care must be exercised to generally avoid this circumstance. In similar manner, potential offerors may be compensated for low bids, to promote availability of supply. It is noted that, by broadcasting supply and demand, fault tolerance of the network is improved, since in the event that an involved node becomes unavailable, a competing node or set of nodes for that role may be quickly enlisted.

The optimization is such that, if any offeror asks an amount that is too high, it will be bypassed in favor of more “reasonable” offerors. Since the bidder pays the second highest price, honesty in bidding the full private value is encouraged. The distribution of the surplus to losing bidders, which exercise deference to the winner, is proportional to the amount bid, that is, the reported value.

In a scenario involving a request for information meeting specified criteria, the auction is complicated by the fact that the information resource content is unknown to the recipient, and therefore the bid is blind, that is, the value of the information to the recipient is indeterminate. However, game theory supports the communication of a value function or utility function, which can then be evaluated at each node possessing information to be communicated, to normalize its value to the requestor. Fortunately, it is a dominant strategy in a VCG auction to communicate a truthful value, and therefore broadcasting the private value function, to be evaluated by a recipient, is not untenable. In a mere request for information conveyance, such as the intermediate transport nodes in a multihop network, or in a cellular network infrastructure extension model, the bid may be a true (resolved) value, since the information content is not the subject of the bidding; rather it is the value of the communications per se, and the bidding node can reasonably value its bid.

Game theory also allows an allocation of cost between various recipients of a broadcast or multicast. That is, in many instances, information which is of value to a plurality of nodes, and a large set of recipient nodes may efficiently receive the same information. This allocation is a direct extension of VCG theory.

Operation of Protocol

The preferred method for acquiring an estimate of the state of the network is through use of a proactive routing protocol. Thus, in order to determine the network architecture state, each node must broadcast its existence, and, for example, a payload of information including its identity, location, itinerary (navigation vector) and “information value function”. Typically, the system operates in a continuous set of states, so that it is reasonable to commence the process with an estimate of the state based on prior information. Using an in-band or out-of-band propagation mechanism, this information must propagate to a network edge, which may be physically or artificially defined. If all nodes operate with a substantially common estimation of network topology, only deviations from previously propagated information need be propagated. On the other hand, various nodes may have different estimates of the network state, allowing efficiency gains through exploitation of superior knowledge as compared with seeking to convey full network state information to each node.

A CSMA scheme may be used for the protocol-related communications because it is relatively simple and robust, and well suited for ad hoc communications in lightly loaded networks. We presume that the network is willing to tolerate protocol related inefficiency, and therefore that protocol communications can occur in a lightly loaded network even if the content communications are saturated. An initial node transmits using an adaptive power protocol, to achieve an effective transmit range, for example, of greater than an average internodal distance, but not encompassing the entire network. This distance therefore promotes propagation to a set of nearby nodes, without unnecessarily interfering with communications of distant nodes and therefore allowing this task to be performed in parallel in different regions. Neighboring nodes also transmit in succession, providing sequential and complete protocol information propagation over a relevance range, for example 3-10 maximum range hops.

If we presume that there is a spatial limit to relevance, for example, 5 miles or 10 hops, then the network state propagation may be so limited. Extending the network to encompass a large number of nodes will necessarily reduce the tractability of the optimization, and incur an overhead which may be inefficient. Each node preferably maintains a local estimate of relevance. This consideration is accommodated, along with a desire to prevent exponential growth in protocol-related data traffic, by receiving an update from all nodes within a node's network relevance boundary, and a state variable which represents an estimate of relevant status beyond the arbitrarily defined boundary. The propagation of network state may thus conveniently occur over a finite number of hops, for example 3-10. In a dense population of nodes, such as in a city, even a single maximum range communication may result in a large number of encompassed nodes. On the other hand, in a deserted environment, there may be few or no communications partners, at any time.

Under conditions of relatively high nodal densities, the system may employ a zone strategy, that is, proximate groups of nodes are is treated as an entity or cluster for purposes of external state estimation, especially with respect to distant nodes or zones. In fact, a supernode may be nominated within a cluster to control external communications for that cluster. Such a presumption is realistic, since at extended distances, geographically proximate nodes may be modeled as being similar or inter-related, while at close distances, and particularly within a zone in which all nodes are in direct communication, inter-node communications may be subject to mutual interference, and can occur without substantial external influence. Alternately, it is clear that to limit latencies and communication risks, it may be prudent to bypass nearby and neighboring nodes, thus trading latency for power consumption and overall network capacity. Therefore, a hierarchal scheme may be implemented to geographically organize the network at higher analytical levels, and geographic cells may cooperate to appear externally as a single coordinated entity.

In order to estimate a network edge condition, a number of presumptions must be made. The effect of an inaccurate estimate of the network edge condition typically leads to inefficiency, while inordinate efforts to accurately estimate the network edge condition may also lead to inefficiency. Perhaps the best way to achieve compromise is to have a set of adaptive presumptions or rules, with a reasonable starting point. For example, in a multihop network, one might arbitrarily set a network edge the maximum range of five hops of administrative data using a 95% reliable transmission capability. Beyond this range, a set of state estimators is provided by each node for its surroundings, which are then communicated up to five hops (or the maximum range represented by five hops). This state estimator is at least one cycle old, and by the time it is transferred five hops away, it is at least six cycles old. Meanwhile, in a market economy, each node may respond to perceived opportunities, leading to a potential for oscillations if a time-element is not also communicated. Thus, it is preferred that the network edge state estimators represent a time-prediction of network behavior under various conditions, rather than a simple scalar value or instantaneous function.

For example, each node may estimate a network supply function and a network demand function, liquidity estimate and bid-ask gap for its environment, and its own subjective risk tolerance, if separately reported; the impact of nodes closer than five hops may then be subtracted from this estimate to compensate for redundant data. Further, if traffic routes are identifiable, which would correspond in a physical setting of highways, fixed infrastructure access points, etc., a state estimator for these may be provided as well. As discussed above, nodes may bid not only for their own needs or resources, but also to act as market-makers or merchants, and may obtain long term commitments (futures and/or options) and employ risk reduction techniques (insurance and/or indemnification), and thus may provide not only an estimate of network conditions, but also “guaranty” this state.

A node seeking to communicate within the five hop range needs to consider the edge state estimate only when calculating its own supply and demand functions, bearing in mind competitive pressures from outside. On the other hand, nodes seeking resources outside the five hop range must rely on the estimate, because a direct measurement or acquisition of information would require excess administrative communications, and incur an inefficient administrative transaction. Thus, a degree of trust and reliance on the estimate may ensue, wherein a node at the arbitrary network edge is designated as an agent for the principal in procuring or selling the resource beyond its own sphere of influence, based on the provided parameters. The incentive for a node to provide misinformation is limited, since nodes with too high a reported estimate value lose gains from competitive sale transactions, and indeed may be requested to be buyers, and vice versa. While this model may compel trading by intermediary nodes, if the information communicated accurately represents the network state, an economic advantage will accrue to the intermediary participating, especially in a non-power constrained, unlicensed spectrum node configuration.

It should be borne in mind that the intended administration of the communications is an automated process, with little human involvement, other than setting goals, risk tolerance, cost constraints, etc. In a purely virtual economy with temporally declining currency value, the detriment of inaccurate optimizations is limited to reduced nodal efficiency, and with appropriate adaptivity, the system can learn from its “mistakes”. (A defined decline in currency value tends to define the cost constraints for that node, since wealth cannot be accumulated nor overspent).

A supernode within a zone may be selected for its superior capability, or perhaps a central location. The zone is defined by a communication range of the basic data interface for communications, with the control channel preferably having a longer range, for example at least double the normal data communications range. Communications control channel transmitters operate on a number of channels, for example at least 7, allowing neighboring zones in a hexagonal tiled array to communicate simultaneously without interference. In a geographic zone system, alternate zones which would otherwise be interfering may use an adaptive multiplexing scheme to avoid interference. All nodes may listen on all control channels, permitting rapid analysis and propagation of control information. As discussed elsewhere herein, directional antennas of various types may be employed, although it is preferred that out-of-band control channels employ omnidirectional antennas, having a generally longer range (and lower data bandwidth) than the normal data communications channels, in order to have a better chance to disseminate the control information to potentially interfering sources, and to allow coordination of nodes more globally.

In order to effectively provide decentralized control, either each node must have a common set of information to allow execution of an identical control algorithm, or nodes defer to the control signals of other nodes without internal analysis for optimality. A model of semi-decentralized control is also known, in which dispersed supernodes are nominated as master, with other topologically nearby nodes remaining as slave nodes. In the pure peer network, relatively complete information conveyance to each node is required, imposing a relatively high overhead. In a master-slave (or supernode) architecture, increased reliance on a single node trades-off reliability and robustness (and other advantages of pure peer-to-peer networks) for efficiency. A supernode within a cellular zone may be selected for its superior capability, or perhaps is at a central location or is immobile.

Once each control node (node or supernode) has an estimate of network topology, the next step is to optimize network channels. According to VCG theory, each agent has an incentive to broadcast its truthful value or value function for the scarce resource, which in this case, is control over communications physical layer, and or access to information. This communication can be consolidated with the network discovery transmission. Each control node then performs a combinatorial solution to select the optimum network configuration from the potentially large number of possibilities, which may include issues of transmit power, data rate, path, timing, reliability and risk criteria, economic and virtual economic costs, multipath and redundancy, etc., for the set of simultaneous equations according to VCG theory (or extensions thereof). This solution should be consistent between all nodes, and the effects of inconsistent solutions may be resolved by collision sensing, and possibly an error/inconsistency detection and correction algorithm specifically applied to this type of information. Thus, if each node has relatively complete information, or accurate estimates for incomplete information, then each node can perform the calculation and derive a closely corresponding solution, and verify that solutions reported by others are reasonably consistent to allow or promote reliance thereon.

As part of the network mapping, communications impairment and interference sources are also mapped. GPS assistance may be particularly useful in this aspect. Where network limitations are caused by interfering communications, the issue is a determination of a strategy of deference or competition. If the interfering communication is continuous or unresponsive, then the only available strategy is competition. On the other hand, when the competing system uses, for example, a CSMA system, such as 802.11, competition with such a communication simply leads to retransmission, and therefore ultimately increased network load, and a deference strategy may be more optimal, at least and until it is determined that the competing communication is incessant. Other communications protocols, however, may have a more or less aggressive strategy. By observation of a system over time, its strategies may be revealed, and game theory permits composition of an optimal strategy to deal with interference or coexistence. It is noted that this strategy may be adopted adaptively by the entire ad hoc network, which may coordinate deference or competition as determined optimal.

The optimization process produces a representation of optimal network architecture during the succeeding period. That is, value functions representing bids are broadcast, with the system then being permitted to determine an optimal real valuation and distribution of that value. Thus, prior to completion of the optimization, potentially inconsistent allocations must be prevented, and each node must communicate its evaluation of other node's value functions, so that the optimization is performed on a normalized economic basis. This step may substantially increase the system overhead, and is generally required for completion of the auction. This valuation may be inferred, however, for intermediate nodes in a multihop network path, since there is little subjectivity for nodes solely in this role, and the respective value functions may be persistent. For example, the valuation applied by a node to forward information is generally independent of content and involved party.

A particular complication of a traffic information system is that the nature of the information held by any node is private to that node (before transmission), and therefore the valuation is not known until after all bids are evaluated. Thus, prior to completion of optimization, each node must communicate its evaluation of other nodes' value functions, so that the optimization is performed on an economic basis. This required step substantially increases the system overhead. This valuation may be inferred, however, for transit nodes in a multihop network path.

As discussed above, may of the strategies for making the economic markets more efficient may be employed either directly, or analogy, to the virtual economy of the ad hoc network. The ability of nodes to act as market maker and derivative market agents facilitates the optimization, since a node may elect to undertake a responsibility (e.g., transaction risk), rather than relay it to others, and therefore the control/administrative channel chain may be truncated at that point. If the network is dense, then a node which acts selfishly will be bypassed, and if the network is sparse, the node may well be entitled to gain transactional profit by acting as a principal and trader, subject to the fact that profits will generally be suboptimal if pricing is too high or too low.

After the network architecture is defined, compensation is paid to those nodes providing value or subjected to a burden (including foregoing communication opportunity) by those gaining a benefit. The payment may be a virtual currency, with no specific true value, and the virtual currency system provides a convenient method to flexibly tax, subsidize, or control the system, and thus steer the virtual currency to a normalized extrinsic value. In a real currency system, external controls are more difficult, and may have unintended consequences. A hybrid economy may be provided, linking both the virtual and real currencies, to some degree. This is especially useful if the network itself interfaces with an outside economy, such as the cellular telephony infrastructure (e.g., 2G, 2.5G, 3G, 4G, proposals for 5G, WiFi (802.11x) hotspots, WiMax (802.16x), etc.)

Using the protocol communication system, each node transmits its value function (or change thereof), passes through communications from neighboring nodes, and may, for example transmit payment information for the immediate-past bid for incoming communications.

Messages are forwarded outward (avoiding redundant propagation back to the source), with messages appended from the series of nodes. Propagation continues for a finite number of hops, until the entire community has an estimate of the state and value function of each node in the community. Advantageously, the network beyond a respective community may be modeled in simplified form, to provide a better estimate of the network as a whole. If the propagation were not reasonably limited, the information would be stale by the time it is employed, and the system latency would be inordinate. Of course, in networks where a large number of hops are realistic, the limit may be time, distance, a counter or value decrement, or other variable, rather than hops. Likewise, the range may be adaptively determined, rather than predetermined, based on some criteria.

After propagation, each node evaluates the set of value functions for its community, with respect to its own information and ability to forward packets. Each node may then make an offer to supply or forward information, based on the provided information. In the case of multihop communications, the offers are propagated to the remainder of the community, for the maximum number of hops, including the originating node. At this point, each node has a representation of the state of its community, with community edge estimates providing consistency for nodes with differing community scopes, the valuation function each node assigns to control over portions of the network, as well as a resolved valuation of each node for supplying the need. Under these circumstances, each node may then evaluate an optimization for the network architecture, and come to a conclusion consistent with that of other members of its community. If supported, node reputation may be updated based on past performance, and the reputation applied as a factor in the optimization and/or externally to the optimization. As discussed above, a VCG-type auction is employed as a basis for optimization. Since each node receives bid information from all other nodes within the maximum node count, the VCG auction produces an optimized result.

As discussed above, by permitting futures, options, derivatives, insurance/indemnification/guaranties, long and short sales, etc., the markets may be relatively stabilized as compared to a simple set of independent and sequential auctions, which may show increased volatility, oscillations, chaotic behavior, and other features which may be inefficient.

Transmissions are preferably made in frames, with a single bidding process controlling multiple frames, for example a multiple of the maximum number of hops. Therefore, the bid encompasses a frame's-worth of control over the modalities. In the event that the simultaneous use of, or control over, a modality by various nodes is not inconsistent, then the value of the respective nodes may be summed, with the resulting allocation based on, for example, a ratio of the respective value functions. As a part of the optimization, nodes are rewarded not only for supporting the communication, but also for deferring their own respective communications needs. As a result, after controlling the resources, a node will be relatively less wealthy and less able to subsequently control the resources, while other nodes will be more able to control the resources. The distribution to deferred nodes also serves to prevent pure reciprocal communications, since the proposed mechanism distributes and dilutes the wealth to deferring nodes.

Another possible transaction between nodes is a loan, that is, instead of providing bandwidth per se, one node may loan a portion of its generator function or accumulated wealth to another node. Presumably, there will be an associated interest payment. Since the currency in the preferred embodiment is itself defined by an algorithm, the loan transaction may also be defined by an algorithm. While this concept is somewhat inconsistent with a virtual currency which declines in value over time and/or space, it is not completely inconsistent, and, in fact, the exchange may arbitrage these factors, especially location-based issues.

Because each node in the model presented above has complete information, for a range up to the maximum node count, the wealth of each node can be estimated by its neighbors, and payment inferred even if not actually consummated. (Failure of payment can occur for a number of reasons, including both malicious and accidental). Because each hop adds significant cost, the fact that nodes beyond the maximum hop distance are essentially incommunicado is typically of little consequence; since it is very unlikely that a node more than 5 or 10 hops away will be efficiently directly included in any communication, due to the increasing cost with distance, as well as reduction in reliability and increase in latency. Thus, large area and scalable networks may exist.

Communications are generally of unencrypted data. Assuming the network is highly loaded, this may allow a node to incidentally fulfill its data requirements as a bystander, and thus at low cost meet its needs, allowing nodes with more urgent or directed needs to both control and compensate the network. While this may reduce compensation to intermediaries and data sources, the improvements in efficiency will likely benefit the network as a whole in increase stability, since we assume that peak load conditions will occur frequently.

Enforcement of responsibility may be provided by a centralized system which assures that the transactions for each node are properly cleared, and that non-compliant nodes are either excluded from the network or at least labeled. While an automated clearinghouse which periodically ensures nodal compliance is preferred, a human discretion clearinghouse, for example presented as an arbitrator or tribunal, may be employed.

It is clear that, once an economic optimization methodology is implemented, various factors may be included in the optimization, as set forth in the Summary and Objects of the invention and claims. Likewise, the optimization itself may have intrinsic limitations, which may create arbitrage opportunities. One set of embodiments of the present invention encourages such arbitrage as a means for efficiently minimizing perturbations from optimality—as the model deviance from reality creates larger arbitrage opportunities, there will be a competitive incentive for recruitment of agents as arbitragers, and also an incentive to create and implement better models. The resulting equilibrium may well be more efficient than either mechanism alone.

The Synthetic Economy

Exerting external economic influences on the system may have various effects on the optimization, and may exacerbate differences in subjective valuations. The application of a monetary value to the virtual currency substantially also increases the possibility of misbehavior and external attacks. On the other hand, a virtual currency with no assessed real value is self-normalizing, while monetization leads to external and generally irrelevant influences as well as possible external arbitrage (with potential positive and negative effects). External economic influences may also lead to benefits, which are discussed in various publications on non-zero sum games.

In order to provide fairness, the virtual currency (similar to the so-called “nuglets” or “nugglets” proposed for use in the Terminodes project) is self-generated at each node according to a schedule, and itself may have a time dependent value. L. Blazevic, L. Buttyan, S. Capkun, S. Giordiano, J.-P. Hubaux, and J.-Y. Le Boudec. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine, 39(6):166-174, June 2001; M. Jakobsson, J. P. Hubaux, and L. Buttyan. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of Financial Crypto 2003, January 2003; J. P. Hubaux, et al., “Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project”, IEEE Communications, 39(1), 2001. citeseer.ist.psu.edu/hubaux01toward.html; Buttyan, L., and Hubaux, J.-P. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Tech. Rep. DSC/citeseer.ist.psu.edu/buttyan01stimulating.html; Levente Buttyan and Jean-Pierre Hubaux, “Enforcing Service Availability in Mobile Ad-Hoc WANs”, 1st IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC citeseer.ist.psu.edu/buttyan00enforcing.html; L. Buttyan and J.-P. Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. Technical Report DSC/2001, citeseer.ist.psu.edu/article/buttyan01nuglets.html; Mario Cagalj, Jean-Pierre Hubaux, and Christian Enz. Minimum-energy broadcast in all-wireless networks: Np-completeness and distribution issues. In The Eighth ACM International Conference on Mobile Computing and Networking (Mobi-Com 2002), citeseer.ist.psu.edu/cagalj02minimumenergy.html; N. Ben Salem, L. Buttyan, J. P. Hubaux, and Jakobsson M. A charging and rewarding scheme for packet forwarding. In Proceeding of Mobihoc, June 2003. For example, the virtual currency may have a half-life or temporally declining value. On the other hand, the value may peak at a time after generation, which would encourage deference and short term savings, rather than immediate spending, and would allow a recipient node to benefit from virtual currency transferred before its peak value. This also means that long term hoarding of the currency is of little value, since it will eventually decay in value, while the system presupposes a nominal rate of spending, which is normalized among nodes. The variation function may also be adaptive, but this poses a synchronization issue for the network. An external estimate of node wealth may be used to infer counterfeiting, theft and failure to pay debts, and to further effect remediation.

The currency is generated and verified in accordance with micropayment theory. Rivest, R. L., A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, also presented at the RSA '96 conference, http//theory.lcs.mit.edu/rivest/RivestShamirmpay.ps, citeseer.ist.psu.edu/rivest96payword.html; Silvio Micali and Ronald Rivest. Micropayments revisited. In Bart Preneel, editor, Progress in Cryptology—CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science. Springer-Verlag, Feb. 18-22, 2002. citeseer.ist.psu.edu/micali02micropayments.html.

Micropayment theory generally encompasses the transfer of secure tokens (e.g., cryptographically endorsed information) having presumed value, which are intended for verification, if at all, in a non-real time transaction, after the transfer to the recipient. The currency is circulated (until expiration) as a token, and therefore may not be subject to immediate definitive authentication by source. Since these tokens may be communicated through an insecure network, the issue of forcing allocation of payment to particular nodes may be dealt with by cryptographic techniques, in particular public key cryptography, in which the currency is placed in a cryptographic “envelope” (cryptolope) addressed to the intended recipient, e.g., is encrypted with the recipient's public key, which must be broadcast and used as, or in conjunction with, a node identifier. This makes the payment unavailable to other than the intended recipient. The issue of holding the encrypted token hostage and extorting a portion of the value to forward the packet can be dealt with by community pressure, that is, any node presenting this (or other undesirable) behavior might be ostracized. The likelihood of this type of misbehavior is also diminished by avoiding monetization of the virtual currency. Further, redundant routing of such information may prevent single-node control over such communications.

This currency generation and allocation mechanism generally encourages equal consumption by the various nodes over the long term. In order to discourage excess consumption of bandwidth, an external tax may be imposed on the system, that is, withdrawing value from the system based on usage. Clearly, the effects of such a tax must be carefully weighed, since this will also impose an impediment to adoption as compared to an untaxed system. On the other hand, a similar effect use-disincentive may be obtained by rewarding low consumption, for example by allocating an advertising subsidy between nodes, or in reward of deference. The external tax, if associated with efficiency-promoting regulation, may have a neutral or even beneficial effect.

Each node computes a value function, based on its own knowledge state, risk profile and risk tolerance, and wealth, describing the value to it of additional information, as well as its own value for participating in the communications of others. The value function typically includes a past travel history, future travel itinerary, present location, recent communication partners, and an estimator of information strength and weakness with respect to the future itinerary. It may be presumed that each node has a standard complement of sensors, and accurately acquired descriptive data for its past travel path. Otherwise, a description of the available information is required. One advantage of a value function is that it changes little over time, unless a need is satisfied or circumstances change, and therefore may be a persistent attribute. Using the protocol communication system, each node transmits its value function (or change thereof), passes through communications from neighboring nodes, and may, for example transmit payment information for the immediate-past bid for incoming communications.

Messages are forwarded outward (avoiding redundant propagation back to the source), with messages appended from the series of nodes. Propagation continues for a finite number of hops, until the entire community has an estimate of the state and value function of each node in the community. Advantageously, the network beyond a respective community may be modeled in simplified form, to provide a better estimate of the network as a whole.

After propagation, each node evaluates the set of value functions for its community, with respect to its own information and ability to forward packets. Each node may then make an offer to supply or forward information, based on the provided information. In the case of multihop communications, the offers are propagated to the remainder of the community, for the maximum number of hops, including the originating node. At this point, each node has a representation of the state of its community, with community edge estimates providing consistency for nodes with differing community scopes, the valuation function each node assigns to control over portions of the network, as well as a resolved valuation of each node for supplying the need. Under these circumstances, each node may then evaluate an optimization for the network architecture, and come to a conclusion consistent with that of other members of its community. If supported, node reputation may be updated based on past performance, and the reputation applied as a factor in the optimization and/or externally to the optimization. As discussed above, a VCG-type auction is employed as a basis for optimization. Since each node receives bid information from all other nodes within the maximum node count, the VCG auction produces an optimized result.

Transmissions are made in frames, with a single bidding process controlling multiple frames, for example a multiple of the maximum number of hops. Therefore, the bid encompasses a frame's-worth of control over the modalities. In the event that the simultaneous use of, or control over, a modality by various nodes is not inconsistent, then the value of the respective nodes may be summed, with the resulting allocation based on, for example, a ratio of the respective value functions. As a part of the optimization, nodes are rewarded not only for supporting the communication, but also for deferring their own respective needs. As a result, after controlling the resources, a node will be relatively less wealthy and less able to subsequently control the resources, while other nodes will be more able to control the resources. The distribution to deferred nodes also serves to prevent pure reciprocal communications, since the proposed mechanism distributes and dilutes the wealth to deferring nodes.

Because each node in the model presented above has complete information, for a range up to the maximum node count, the wealth of each node can be estimated by its neighbors, and payment inferred even if not actually consummated. (Failure of payment can occur for a number of reasons, including both malicious and accidental). Because each hop adds significant cost, the fact that nodes beyond the maximum hop distance are essentially incommunicado is typically of little consequence; since it is very unlikely that a node more than 5 or 10 hops away will be efficiently included in any communication, due to the increasing cost with distance, as well as reduction in reliability and increase in latency. Thus, large area and scalable networks may exist.

Typically, cryptography is employed for both authentication and to preserve privacy. External regulation, in a legal sense at least, is typically imposed by restrictions on hardware and software design, as well as voluntary compliance at risk of detection and legal sanction.

A synthetic economy affords the opportunity to provide particular control over the generator function, which in turn supports a hierarchy. In this scheme, each node controls the generator function at respectively lower nodes, and thus can allocate wealth among subordinates. If one assumes real time communications, then it is clear that the superordinate node can directly place bids on behalf of subordinates, thus effectively controlling its entire branch. In the absence of real time communications, the superordinate node must defer to the discretion of the subordinate, subject to reallocation later if the subordinate defects. If communications are impaired, and a set of a priori instructions are insufficient, then it is up to the subjective response of a node to provide deference.

It is noted that when sets of nodes “play favorites”, the VCG auction will no longer be considered “strategyproof”. The result is that bidders will assume bidding strategies that do not express their secret valuation, with the result being likely suboptimal market finding during the auction. This factor can be avoided if hierarchal overrides and group bidding play only a small role in the economy, and thus the expected benefits from shaded bidding are outweighed by the normal operation of the system. For example, by taxing transactions, over-valued bidding will be disincentivized, and by redistributing economic surplus to bystanders, the aggregate wealth of the controlling group will be mitigated.

A synthetic economy affords the opportunity to provide particular control over the generator function, which in turn provides particular advantages with respect to a hierarchal organization. In this scheme, each node has the ability to control the generator function at respectively lower nodes, and thus can allocate wealth among subordinates. If one assumes real time communications, then it is clear that the superordinate node can directly place bids on behalf of subordinates, thus effectively controlling its entire branch. In the absence of real time communications, the superordinate node must defer to the discretion of the subordinate, subject to reallocation later if the subordinate defects. If communications are impaired, and a set of a priori instructions are insufficient, then it is up to the subjective response of a node to provide deference. Thus, a node may transfer all or a portion of its generator function, either for a limited time or permanently, using feed-forward or feedback control. In this sense, the hierarchal and financial derivatives, options, futures, loans, etc. embodiments of the invention share a common theme.

It is noted that when sets of nodes “play favorites”, the VCG auction will no longer be considered “strategyproof”. The result is that bidders will assume bidding strategies that do not express their secret valuation, with the result being likely suboptimal market price finding during the auction. This factor can be avoided if hierarchal overrides and group bidding play only a small role in the economy, and thus the expected benefits from shaded bidding are outweighed by the normal operation of the system. On the other hand, the present invention potentially promotes competition within branches of a hierarchy, to the extent the hierarchy does not prohibit this. Between different branches of a hierarchy, there will generally be full competition, while within commonly controlled branches of a hierarchy, cooperation will be expected. Since the competitive result is generally more efficient, there will be incentive for the hierarchal control to permit competition as a default state, asserting control only where required for the hierarchal purpose.

Military Hierarchy

In a typical auction, each player is treated fairly; that is, the same rules apply to each player, and therefore a single economy describes the process. The fair auction therefore poses challenges for an inherently hierarchal set of users, such as a military organization. In the military, there is typically an expectation that “rank has its privileges”. The net result, however, is a decided subjective unfairness to lower ranking nodes. In a mobile ad hoc network, a real issue is user defection or non-compliance. For example, where a cost is imposed on a user for participating in the ad hoc network, e.g., battery power consumption, if the anticipated benefit does not exceed the cost, the user will simply turn off the device until actually needed, to conserve battery power outside the control of the network. The result of mass defection will of course be the instability and failure of the ad hoc network itself. Thus, perceived fairness and net benefit is required to important for network success, assuming that defection or non-compliance remains possible.

On the other hand, in military systems, the assertion of rank as a basis for priority is not necessarily perceived as arbitrary and capricious, and is generally not perceived subjectively as such. Orders and communications from a central command are critical for the organization itself. Therefore, the difficulty in analyzing the application of a fair game to a hierarchal organization is principally a result of conceptualizing and aligning the individual incentives with those of the organization as a whole. Since the organization exists outside of the ad hoc network, it is generally not unrealistic to expect compliance with the hierarchal attributes both within and outside of the network.

An artificial economy provides a basis for an economically efficient solution. In this economy, each node has a generator function for generating economic units which are used in a combinatorial auction with other nodes. The economic units may have a declining value, so that wealth does not accumulate over long periods, and by implication, wealth accumulated in one region is not available for transfer in a distant region, since the transfer may be subject to latency and/or cost. Even if a low latency system is employed to transfer the value, an express spatially declining value function may also be imposed. The geographic decline may also be explicit, for example based on a GPS or navigational system. In other cases, nodal motility is valuable, and mobile nodes are to be rewarded over those which are stationary. Therefore, the value or a portion thereof, or the generator function, may increase with respect to relocations.

This scheme may be extended to the hierarchal case by treating each chain of command as an economic unit with respect to the generator function. At any level of the hierarchy, the commander retains a portion of the wealth generation capacity, and delegates the remainder to its subordinates. In the case of real-time communications, a commander may directly control allocation of the generator function at each time period. Typically, there is no real-time communications capability, and the wealth generator function must be allocated a priori. Likewise, wealth may also be reallocated, although a penalty is incurred in the event of an initial misallocation since the transfer itself incurs a cost, and there will be an economic competitive distortion, under which a node's subjective value of a resource is influenced by its subjective wealth. If a node is supplied with wealth beyond its needs, the wealth is wasted, since it declines in value and cannot be hoarded indefinitely. If a node is supplied with insufficient wealth, economic surplus through transactional gains are lost. Thus, each node must analyze its expected circumstances to retain or delegate the generator function, and to optimally allocate wealth between competing subordinates.

In any transaction, there will be a component which represents the competitive “cost”, and a possible redistribution among nodes within a hierarchal chain. This redistribution may be of accumulated wealth, or of the generation function portion. In the former case, if the communication path fails, no further transfers are possible, while in the later case, the result is persistent until the transfer function allocation is reversed. It is also possible to transfer an expiring or declining portion of the generating function; however, this might lead a node which is out of range to have no ability to rejoin the network upon return, and thus act as an impediment to efficient network operation. As discussed above, one possibility is for nodes to borrow or load currency. In this case, a node deemed credit-worthy may blunt the impact of initially having insufficient wealth by merely incurring a transaction cost (including interest, if applied).

In practice, the bulk of the wealth generating function will be widely distributed, and not concentrated at the top of the hierarchy. If this is true, under most circumstances, the network will appear to operate according to a non-hierarchal or fair VCG model, but in some circumstances, normal operation may be usurped by nodes which have apparent excess wealth resulting from a superior wealth generator function. Typically, hierarchically superior nodes will use their ability to transfer wealth to themselves, or to recruit subordinates to cooperate, in order to directly or indirectly control the network resources. It is possible, however, for nodes within one branch of a hierarchy to conspire against nodes outside that branch, resulting in a different type of distortion. Since the ad hoc network typically gains by having a larger number of participating nodes, this type of behavior may naturally be discouraged. On the other hand, hierarchically superior nodes either retain, or more likely, can quickly recruit surrounding subordinates to allocate their wealth generating function and accumulated wealth to pass urgent or valuable messages.

Where expensive assets are employed, an actual transfer of wealth or the generator function to a single entity may be required. For example, a high level node might have access to a high power broadcast system, which interferes with other communications, or simply incurs a high cost to operate. Low level nodes might ordinarily be limited to cellular (i.e., short range, low power radio) wireless communications. In order for a low level node to control an expensive asset, the assent or cooperation of others may be required, for example by hierarchal superiors.

Since the network should be stable in the absence of command and control communications, a hierarchal superior should assure that subordinate nodes possess sufficient wealth and motivation to maintain ad hoc network operation. Insufficient wealth will tend to eliminate the advantage to nodal participation (and therefore encourage defection), unless payments from acting as intermediary are significant. Thus, a node with insufficient wealth generation function may potentially exhaust its resources, and be unavailable for ad hoc intermediary use, even for the benefit of the hierarchy. On the other hand, an initial allocation of too much wealth will encourage high spending and less active participation as an intermediary. While it is possible in a military system to formulate an “engineered” solution which forces participation and eliminates defection, this solution does not gain the benefit of economic optimization and may have limited application outside of mandatory hierarchies.

Game theory is a useful basis for analyzing ad hoc networks, and understanding the behavior of complex networks of independent nodes. By presuming a degree of choice and decision-making by nodes, we obtain an analysis that is robust with respect to such considerations. The principal issues impeding deployment are the inherent complexity of the system, as well as the overhead required to continuously optimize the system. Determination of a set of simplifying presumptions to reduce protocol overhead and reduce complexity may improve performance. Hierarchal considerations can be imposed to alter the optimization of the system, which would be expected to provide only a small perturbation to the efficient and optimal operation of the system according to a pure VCG protocol. A marketplace auction with competition between potential buyers and potential sellers, and with the economic surplus distributed between parties which must defer to active participants, provides incentive to all affected parties, and therefore may provide a better result than a simple transfer between supply and demand elements only.

The ad hoc network does not exist in a vacuum. There are various competing interests seeking to use the same bandwidth, and technological superiority alone does not assure dominance and commercial success. Game theory may also be used as a tool to analyze the entities which seek to deploy ad hoc networks, especially where they compete.

First Embodiment

In a typical auction, each player is treated fairly; that is, the same rules apply to each player, and therefore a single economy describes the process. The fair auction therefore poses challenges for an inherently hierarchal set of users, such as a military organization, where rank is accompanied by privilege. The net result, however, is a decided apparent disadvantage to lower ranking agents, at least when viewed in light of constricted self-interest. The issues that arise are similar to the relating to “altruism”, although not identical, and thus the game theoretic analysis of altruistic behavior may be imported for consideration, as appropriate.

In a mobile ad hoc communications network, a real issue is user defection or non-compliance. For example, where a cost is imposed on a user for participating in the ad hoc network, e.g., battery power consumption in a mesh radio network, if the anticipated benefit does not exceed the cost, the user will simply turn off or disable the device until actually needed. The result of mass defection will, of course, be the instability and failure of the ad hoc network itself, leading to decreased utility, even for those who gain an unfair or undue advantage under the system. Thus, perceived fairness and net benefit is required for network success, assuming that defection and/or non-compliance are possible.

On the other hand, in military systems, the assertion of rank as a basis for priority is not itself necessarily arbitrary or capricious. Orders and communications from a central command are critical for the organization itself, and thus the lower ranking agents gain at least a peripheral, if not direct benefit as their own chain of command employs their resources. Therefore, the difficulty in analyzing the application of a fair game paradigm to a hierarchal organization is principally a result of conceptualizing and aligning the individual incentives with those of the organization as a whole and the relationship between branches. Thus, in contradistinction to typical self-organizing peer-to-peer networks, a hierarchal network is not seen as self-organizing, at least in terms of the hierarchy, which is extrinsic to the formation of the communications network under consideration.

As discussed below, the “distortions” of the network imposed by the external hierarchy can be analyzed and accounted for by, for example, the concepts of inheritance and delegation. Thus, each branch of a hierarchy tree may be considered an object, which receives a set of characteristics from its root, and from which each sub-branch inherits the characteristics and adds subcharacteristics of, for example, specialization. It is noted that the hierarchy need not follow non-ambiguous or perfect rules, and thus there is no particular limit imposed that the hierarchy necessarily follow these formalisms. Rather, by analyzing those aspects of the hierarchy which comply with these formalisms in accordance therewith, efficiency is facilitated.

In establishing an economic system, a preliminary question is whether the system is microeconomic or macroeconomic; that is, whether the economy is linked to a real economy or insulated from it. One disadvantage of a real economy with respect to a peer relationship is that external wealth can override internal dynamics, thus diminishing the advantages to be gained by optimization, and potentially creating a perception of unfairness for externally less wealthy agents, at least unless and until the system accomplishes a wealth redistribution. An artificial economy provides a solution for a peer network in which each node has an equal opportunity to gain control over the ad hoc network, independent of outside influences and constraints. On the other hand, by insulating the network from external wealth redistribution, real efficiency gains may be unavailable. Therefore, both types of economies, as well as hybrids, are available. Thus, as discussed in more detail below, a “fair” initial (or recurring) wealth distribution may be applied, which may be supplemented with, and/or provide an output of, external wealth. The rules or proportion of external influence may be predetermined, adaptive, or otherwise.

In accordance with the proposed artificial economy, each node has a generator function for generating economic units, which are then used in a transaction (e.g., an auction) with other nodes to create a market economy, that is, each node has a supply and demand function, and acts as a source or sink for a limited resource. In some cases, nodes may have only supply or demand functions, or a degree of asymmetry, but in this case, these are typically subject to an external economic consideration, and the artificial economy will be less effective in providing appropriate incentives. According to one implementation of this embodiment, the artificial economic units have a temporally and/or spatially declining value, so that wealth does not accumulate over long periods and/or cannot be transferred over large distances. The decline may be linear, exponential, or based on some other function. This creates a set of microeconomies insulated from each other. Where distant microeconomies must deal with each other, there is a discount. This architecture provides a number of advantages, for example, by decreasing the influence of more spatially and temporally distant effects, the scope of an optimization analysis may be relatively constrained, while reducing the amount of information which must be stored over time and/or carried over distance in order to permit an optimization. Likewise, since the economy is artificial, the discount need not be recouped within the scope of the system; that is, conservation of capital is not required. In the same manner, a somewhat different incentive structure may be provided; that is, economic units generated at one location and at one time may have a higher value at a different location and time; this may encourage reduced immediate use of the system resources, and relocation to higher valued locations. As discussed below, one embodiment of the invention permits trading of credits, and thus, for example, a user may establish a repeater site at an under-served location to gain credits for use elsewhere. Preferably, beyond a “near field” effect, the value does not continue to increase, since this may result in inflationary pressures, and undermine the utility of the system in optimally balancing immediate supply and demand at a particular location.

As can be seen, through modifications of the governing rules and formulae, the system can be incentivized to behave in certain ways, but care should be exercised since a too narrow analysis of the incentive might result in unintended long term or distant effects. To the extent that human behavior and subjective analysis is involved, care should also be exercised in applying a rationality assumption, since this is not always true. Rather, there may be applicable models for human irrational behavior that are better suited to an understanding of the network behavior in response to a perturbation.

The typical peer-to-peer ad hoc network may be extended to the hierarchal case by treating each branch (including sub-branches) within the chain of command as an economic unit with respect to the generator function. At any level of the hierarchy, the commander optionally retains a portion of the wealth generation capacity, and delegates the remainder to its subordinates. Therefore, the rank and hierarchal considerations are translated to an economic wealth (or wealth generation) distribution. One aspect of this system allows wealth transfer or redistribution, although in a real system, a time delay is imposed, and in the event of a temporally and/or spatially declining value, the transfer will impose a cost. Thus, an initial misallocation is undesired, and there will be an incentive to optimally distribute the wealth initially. Of course, if centralized control with low penalty is desired, it is possible to limit the penalty, if any, for wealth redistribution through appropriate rules, although the time for propagation through the network remains an issue, and blind nodes (i.e., those which do not have an efficient communication path, or have insufficient resources to utilize otherwise available paths through the hierarchy) may also lead to limitations on system performance.

In this system, there may be an economic competitive distortion, under which a node's subjective value of a resource is influenced by its then subjective wealth. If a node is supplied with wealth beyond its needs, the wealth is wasted, since it may decline in value and cannot be hoarded indefinitely. (In a network wealth model in which wealth could be hoarded indefinitely, small deviations from optimality and arbitrage opportunities may be exploited to create a perception of unfairness, thus, this is not preferred.) If a node is supplied with insufficient wealth, economic surplus through transactional gains are lost. Thus, each node must analyze its expected circumstances to retain or delegate the generator function, and to optimally allocate wealth between competing subordinates. Likewise, there may be a plurality of quasi-optimal states.

In any economic transaction, there is an amount that a seller requires to part with the resource, a price a buyer is willing to pay, and a surplus between them. Typically, in a two party transaction, the surplus is allocated to the party initiating the transaction, that is, the party initiating the transaction uses some discovery mechanism to find the minimum price acceptable by the buyer. In brokered or agent-mediated transactions, a portion of the surplus is allocated to a facilitator.

In accordance with one aspect of the present invention, compliance with the community rules, as well as an incentive to bid or ask a true private value is encouraged by distributing a portion of the transaction surplus to losing competitive bidders. While according to one proposal, this portion is allocated in accordance with their reported valuations, this creates a potential incentive for bidders who know they will not be winning bidders to overbid, and thereby gain an increased portion of the surplus. In order to reward honest reporting of private values, the reward function must penalize both overreporting and underreporting of private values. This circumstance occurs if, at each bid, there is a risk of winning commensurate with the bid, and thus the system is strategyproof. In order to achieve this circumstance, for example, a statistical noise or probability distribution may be added to the system, with an acceptance of a bid made a statistical process. This results in a “fuzzy” boundary on the bid value, although it may impose an inefficiency on the market since any deviation from the optimal market price represents a loss.

Another approach to minimizing strategic bidding is to impose a bid fee. That is, each bidder must offer a prepayment corresponding to a small portion of its bid, thereby disincentivizing bidding to lose. The winning bidder will then pay a second price plus the deposit bid. The sellers will receive their own lowest cost (or second cost) bid. Losing bidders will receive a payment in accordance with the value of their bid, less the bid deposit. In order to disincentivize strategic bidding, the average return to a bidder is less than the bid cost. In fact, a good target for the bidder deposit is the administrative cost of transacting the bidding negotiations. This, in turn, provides an incentive to keep the administrative overhead low, thus improving overall system performance, especially where the administrative communications compete with normal communications for bandwidth. In this circumstance, those bidding to win receive either the benefit of the transaction or a payment for deference, less the transactional fee. Those who are bidding strategically, in manner seeking to acquire the deference payment, must risk the transactional cost, and to gain substantially, must submit a relatively high bid. When the bids are “competitive”, there is a substantial risk that the bid will be a winning bid, and thus incur the full bid cost. Thus, there is a disincentive to bidding a high value, but without an intent to win. Of course, the bid deposit may be a flat fee, or subject to a mathematical or adaptive function, rather than directly related to administrative cost.

The aggregated bid deposits may, for example, be awarded to a class who are optimally incentivized by the nature of this payment. For example, it may be awarded to those selling bandwidth, in a manner generally inversely proportional to the value of their ask, or, for example, based on allocations during the combinatorial (VCG) auction. This payment would then incentivize sellers to offer services at a low price, improving network availability.

Of course, there may be other classes within the auction population who may be taxed or subsidized, using value derived from the auction process.

In a strategyless auction, automated bidding is quite feasible, since the optimal bid is the computed value. For auctions in which a bidder does not have an incentive to bid its true private value, and this must assume a strategic play, automated bidding becomes more of a challenge, but may also be automated.

In a strategy-less auction, a bidder cannot gain by bidding over or under its private value. If a bidder bids below its private value, it has a reduced chance of gaining the benefit of the transaction.

In an auction which is subject to strategic bidding, the strategy may be mitigated by imposing commensurate risks and costs to balance the perceived advantage toward zero.

In particular, the competitive bidders seeking to allocate a scarce resource for themselves receive compensation for deferring to the winning bidder in an amount commensurate with their reported value. Thus, sellers receive their minimum acceptable value, buyers pay their maximum valuation, the surplus is distributed to the community in a manner tending to promote the highest bids within the private value of the bidder. In a corresponding manner, the auction rules can be established to incentivized sellers to ask the minimum possible amount, above their reserve. For example, a portion of the surplus may be allocated to bidders in accordance with how close they come to the winning ask. Therefore, both incentives may be applied, for example with the surplus split in two, and half allocated to the bidder pool and half allocated to the seller pool. Clearly, other allocations or proportionations are possible.

The winning bidder and/or seller may be included within the rebate pool. This is particularly advantageous where for various reasons, the winning bidder is not selected. Thus, this process potentially decouples the bidding (auction) process and the resulting commercial transaction.

Because of transactional inefficiencies, human behavioral aspects, and a desire to avoid increased network overhead by “false” bidders seeking a share of the allocation pool without intending to win the auction, it may be useful to limit the allocation of the surplus pool to a subset of the bidders and/or sellers, for example the top three of one or both. This therefore encourages bidders and/or sellers to seek to be in the limited group splitting the pool, and thus incentivizes higher bids and lower asks. Of course, a party will have a much stronger incentive to avoid bidding outside its valuation bounds, so the risk of this type of inefficiency is small.

As discussed above, one embodiment of the invention provides a possible redistribution or wealth among nodes within a hierarchal chain. This redistribution may be of accumulated wealth, or of the generation function portion. Trading among hierarchally related parties is preferred, since the perceived cost is low, and the wealth can be repeatedly redistributed. In fact, it is because of the possibility of wealth oscillation and teaming that the declining wealth function is preferred, since this will tend to defeat closely related party control over the network for extended periods.

It is noted that, in a multihop mobile ad hoc network, if a communication path fails, no further transfers are possible, potentially resulting in stalled or corrupt system configuration. It is possible to transfer an expiring or declining portion of the generating function; however, this might lead a node which is out of range to have no ability to rejoin the network upon return, and thus act as an impediment to efficient network operation. Therefore, it is preferred that, in an artificial economy, each node has some intrinsic wealth generator function, so an extended period of inactivity, a node gains wealth likely sufficient to rejoin the network as a full participant.

In practice, in a typical military-type hierarchy, the bulk of the wealth generating function will be distributed to the lowest ranks with the highest numbers. Thus, under normal circumstances, the network will appear to operate according to a non-hierarchal (i.e., peer) model, with the distortion that not all nodes have a common generator function. On the other hand, hierarchically superior nodes either retain, or more likely, can quickly recruit surrounding subordinates to allocate their wealth generating function and accumulated wealth to pass urgent or valuable messages. Thus, if 85% of the wealth and network resources are distributed to the lowest-ranking members, then the maximum distortion due to hierarchal modifications is 15%.

One way that this allocation of wealth may be apparent is with respect to the use of expensive assets. Thus, a high level node might have access to a high power broadcast system or licensed spectrum, while low level nodes might ordinarily be limited to lower power transmission and/or unlicensed spectrum or cellular wireless communications. For a low level node to generate a broadcast using an expensive asset (or to allocate a massive amount of space bandwidth product), it must pass the request up through the chain of command, until sufficient wealth (i.e., authority) is available to implement the broadcast.

In fact, such communications and authorizations are quite consistent with the expectations within a hierarchal organization, and this construct is likely to be accepted within a military-type hierarchal organization.

Under normal circumstances, a superior would have an incentive to assure that each subordinate node possesses sufficient wealth to carry out its function and be incentivized to participate in the network. If a subordinate has insufficient initial wealth (or wealth generating function) allocation, it may still participate, but it must expend its internal resources to obtain wealth for participation toward its own benefit. This, in turn, leads to a potential exhaustion of resources, and the unavailability of the node for ad hoc intermediary use, even for the benefit of the hierarchy. An initial surplus allocation will lead to overbidding for resources, and thus inefficient resource allocation, potential waste of allocation, and a disincentive to act as an intermediary in the ad hoc network. While in a traditional military hierarchy, cooperation can be mandated, in systems where cooperation is perceived as contrary to the net personal interests of the actor, network stability may be poor, and defection in spite of mandate.

In a military system, it is thus possible to formulate an “engineered” solution which forces participation and eliminates defection; however, it is clear that such solutions forfeit the potential gains of optimality, and incentivizes circumvention and non-compliance. Further, because such a system is not “cost sensitive” (however the appropriate cost function might be expressed), it fails to respond to “market” forces.

Accordingly, a peer to peer mobile ad hoc network suitable for respecting hierarchal organization structures is provided. In this hierarchal system, the hierarchy is represented by an initial wealth or wealth generation function distribution, and the hierarchally higher nodes can reallocate wealth of nodes beneath themselves, exercising their higher authority. This wealth redistribution can be overt or covert, and if overt, the hierarchal orders can be imposed without nodal assent. In a covert redistribution, trust may be required to assure redistribution by a node to a grandchild node.

The wealth and its distribution can be implemented using modified micropayment techniques and other verifiable cryptographic techniques. This wealth can be applied to auctions and markets, to allocate resources. Various aspects of this system are discussed in more detail elsewhere in this specification.

In accordance with aspects of this embodiment, an example is provided. In this scenario, a vehicle traveling along a highway seeks traffic information 10-20 miles ahead on the road. The transceiver in the vehicle has a range of about 0.5 miles, meaning that, assuming maximum hop range, 20-40 hope would be necessary in each direction in order to fulfill a response to a request for information. If we further assume that the traffic density allows an average density of compatible transceivers of 1 per 0.05 miles2, then it would appear that for each hop, a number of intermediaries would be possible. We further assume that each vehicle has a pair of antennas (which may operate on different frequencies), forward and backward looking, so that forward And backward communications are non-interfering. It is noted that, in operation, it is not a single vehicle that seeks information responding to a request; rather, it is likely that 2-25% of vehicles will seek information within a short period, especially of the cost of fulfilling a request is relatively low. We also assume that there is no common trigger event, such as an accident, which would provoke essentially all vehicles to request the same information, a circumstances that could be addressed through a multicast or broadcast.

If the vehicle sought to arrange a communication over the entire 10-20 miles in advance of communicating, this would require a multifactorial optimization likely involving over 100 transceivers, and if even one of the 20-40 intermediates fails, the entire communication fails. The administrative overhead for this process may not outweigh its advantages.

On the other hand, if we instead presume that the vehicle only optimize a path over a limited range or number of hops, e.g., 1 mile or 5 hops, then the optimization is facilitated and the administrative overhead reduced. On the other hand, this requires that vehicles or nodes at the fringe arrange for completion of the communication. It is here that the statistical aspects of the network architecture may be exploited to achieve efficiencies. Thus, in observing or participating in the network activities over a period of time, a node can model the behavior of nearby nodes, and determine a degree of risk with respect to the model. That node may then undertake the risk associated with its assessment of its environment, and communicate an offer to act as agent for completion of the communication, without explicitly communicating the details of the communication. Therefore, the originating node optimizes a local region ad hoc network, and then adopts an estimate of the network state beyond the edge of the local region.

Economically, the vehicle seeking the information broadcasts a bid or value function of its valuation of the resources it requires. This bid is propagated to the local region or beyond, and compared with the bids or value functions of other vehicles or nodes. A winning vehicle or node then assumes control over the minimum temporal-spatial-frequency channel required. As stated above, at the edge of the local region, nodes may act as proxies or agents, and undertake the risk of the more distant communication, adding a risk premium to their ask. The node with the lowest ask is selected as the agent or proxy. It is noted that the role of communication intermediary and proxy or agent is discrete, and therefore need not be a single element, though certain efficiencies are gained if this is the case. The agent or proxy must also conduct an auction for the next stage of the communication, in a process which is repeated until the destination node is included within the local region.

The proxy or agent undertakes the risk of the cost of the downstream communications, as well as the risk of non-payment, and thus may well charge a substantial premium over its actual risk-free cost. Therefore, the efficiency gained through the use of the agent or proxy derives from the administrative efficiencies gained, as well as comprehension that the risks are inherent, and must generally be undertaken by some element of the network. The incrementally added risks may be small, but are transferred. A node which promotes itself for acting as agent or proxy may do so because it has lower risks, costs or otherwise unproductive assets. For example, a cellular telephone carrier may choose to participate in the network, using its fixed infrastructure as a backup, or bypass. In that case, if the network fails, or is less efficient, it has the option of using its own facilities.

The agent or proxy therefore arbitrages the risk, based on its own knowledge of its local region which is different from the local region of the originator of the communication. There may be less competition for the role of arbitrageur, allowing it to claim a larger portion of the economic surplus. In fact, an arbitrageur may pre-acquire resources at a defined price, and resell them later at a profit. Thus, it is seen that economic efficiencies and increased profits for intermediaries are not inconsistent, where opportunities for reduction in inefficiencies exist.

Adding hierarchal element to this example, it is noted that certain risks are reduced when transactions are conducted between related entities. For example, if their respective wealth is interlinked, over the long term, the risk of non-payment is abated. Likewise, the risk of defection or non-compliance is reduced. Further, since it is presumed that the benefit function of related nodes is intertwined, actual costs may be reduced, since the communication itself is a countervailing benefit to the cost of a related node conveying the message or packet. Thus, there will likely be a preference for communications between more closely related nodes than between more distantly related or unrelated nodes. On the other hand, since wealth (virtual or real) itself is desirable, and inter-party transactions limit wealth gain opportunities, there will also be an incentive to conduct transactions with unrelated nodes for full value. As discussed above, in a hierarchy, a top level node is initially allocated the entire wealth and/or wealth generation function for its subordinates, which is then redistributed as appropriate or desired. The top level node will generally not maintain more wealth than required, since this is inefficient, and redistributions incur their own inefficiencies.

The economy is preferably virtual, employing arbitrary value credits generated using a cryptographic function. One possible exception is where external elements, such as cellular telephone carriers, are integrated into the system. Since these are real economy agents, there must be some interchange in value between credits and cash, unless the cellular carrier gains a benefit from the ad hoc network. One such possible benefit is extension of its fixed infrastructure to serve under-covered areas. Another possible benefit is the ability to provide information from the ad hoc network to more remote areas. A further benefit is the ability to use unlicensed spectrum for its activities in a standard and non-interfering manner.

In the virtual economy, each node has a physically and/or logically secure cryptographic module, which sequentially generates values which have a unique index number, and may be verified as to node and time of origin, and possibly chain of owners. A node receiving this value can therefore verify that it is authentic, its time of creation (and therefore amortization schedule), and as an audit trail, the chain of ownership. Each bid is also cryptographically secure and signed, so that if a node places a bid, and later fails to pay, a later investigation can be conducted to correctly account for the transaction, and possibly penalize wrongdoing. The payments for a communication are communicated after the transaction, in a cryptographic wrapper (cryptolope) destined for a target node. Since these are secure, the opportunity for theft is low, and there is little incentive for intentional delay of transmission by any intermediate. Further, these packets may be transmitted along redundant paths, to limit the ability of any one node to disrupt communications.

The ability of a node to spend the same value packet twice is limited by a number of factors. First, since each node has a defined generator function, if its spending exceeds its generation capacity, this will be apparent to nearby nodes. Second, since each packet has an index value, the other nodes may compare these values to make sure that they are not used more than once by any node, before they are transferred to another node. Since the value of the credit declines in value over time, indefinite period monitoring is not required.

In some instances, saving value may be an efficient strategy. In order to take advantage of these gains, special bank nodes may be established which have the ability to hoard credits and then reissue new credits when required. Typically, there will be no interest, and in fact there may be discount and delay. The net result of promoting savings will typically be a reduction in demand with respect to supply, thus increasing availability of resources. By allowing withdrawal of savings, periods of inflation and high peak demand is possible. Further, if the withdrawn wealth has the same amortization schedule as newly generated credits, an event which provokes a “run on the bank” may result in a rapid diminution of saved wealth, unless the immediate recipients bank the newly transferred wealth.

As is seen, many of the economic institutions of the real economy have equivalents in the virtual economy, and therefore may be employed in their traditional and known roles to improve efficiency where the self-organizing features of the network alone incur corresponding inefficiencies, thus creating opportunities. Where necessary, links to a real economy, in order to pay for capital investment, efforts, or compensate for risks, may be employed, however it is preferred that these links be attenuated in order to isolate the bulk of the ad hoc network from the influence of real-economy node wealth, and therefore to promote defection of those nodes who are disadvantaged thereby.

Second Embodiment

Multihop Ad Hoc Networks require cooperation of nodes which are relatively disinterested in the content being conveyed. Typically, such disinterested intermediaries incur a cost for participation, for example, power consumption or opportunity cost. Economic incentives may be used to promote cooperation of disinterested intermediaries. An economic optimization may be achieved using a market price-finding process, such as an auction. In many scenarios, the desire for the fairness of an auction is tempered by other concerns, i.e., there are constraints on the optimization which influence price and parties of a transaction. For example, in military communication systems, rank may be deemed an important factor in access to, and control over, the communications medium. A simple process of rank-based preemption, without regard for subjective or objective importance, will result in an inefficient economic distortion. In order to normalize the application of rank, one is presented with two options: imposing a normalization scheme with respect to rank to create a unified economy, or considering rank using a set of rules outside of the economy. One way to normalize rank, and the implicit hierarchy underlying the rank, is by treating the economy as an object-oriented hierarchy, in which each individual inherits or is allocated a subset of the rights of a parent, with peers within the hierarchy operating in a purely economic manner. The extrinsic consideration of rank, outside of an economy, can be denominated “respect”, which corresponds to the societal treatment of the issue, rather than normalizing this factor within the economy, in order to avoid unintended secondary economic distortion. Each system has its merits and limitations. An economic optimization is one involving a transaction in which all benefits and detriments can be expressed in normalized terms, and therefore by balancing all factors, including supply and demand, at a price, an optimum is achieved. Auctions are well known means to achieve an economic optimization between distinct interests, to transfer a good or right in exchange for a market price. While there are different types of auctions, each having their limitations and attributes, as a class these are well accepted as a means for transfer of goods or rights at an optimum price. Where multiple goods or rights are required in a sufficient combination to achieve a requirement, a so-called Vickrey-Clarke-Groves (VCG) auction may be employed. In such an auction, each supplier asserts a desired price for his component. The various combinations which meet the requirement are then compared, and the lowest cost combination selected. In a combinatorial supply auction, a plurality of buyers each seeks a divisible commodity, and each bids its best price. The bidders with the combination of prices which are maximum are selected. In a commodity market, there are a plurality of buyers and sellers, so the auction is more complex. In a market economy, the redistribution of goods or services is typically transferred between those who value them least to those who value them most. The transaction price depends on the balance between supply and demand; with the surplus being allocated to the limiting factor.

There has thus been shown and described novel communications devices and systems and methods which fulfill all the objects and advantages sought therefore. Many changes, modifications, variations, combinations, subcombinations and other uses and applications of the subject invention will, however, become apparent to those skilled in the art after considering this specification and the accompanying drawings which disclose the preferred embodiments thereof. All such changes, modifications, variations and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by the invention, which is to be limited only by the claims which follow.

Claims

1. A networking system for controlling an allocation of at least one physical resource by at least one automated control within a network having a changing network state associated with a network state risk, based on a received control signal, comprising:

a memory configured to store parameters of a network model, comprising a first set of stored values representing an estimate of the changing network state;
an automated arbitrage agent, comprising at least one automated processor and being operationally associated with the memory and the an automated communication network interface port, configured to: (1) engage in a negotiation of an automatic arbitrage transaction based on at least; (a) an analysis of the network state risk, and (b) a self-interest of the automated arbitrage agent, with at least one automated counterparty, with respect to a communication of information relating to the first set of stored values, the negotiation comprising at least one automated communication through the automated communication network interface port, (2) engage in the transaction comprising a communication of at least a portion of information defining the estimate of the changing network state through the automated communication network interface port, (3) update the network model;, and (4) generate the control signal selectively dependent on the updated network model; and
an output of the automated arbitrage agent configured to communicate at least one of the generated control signal and information dependent on the generated control signal.

2. The networking system according to claim 1, wherein the automated arbitrage agent is configured:

to receive the network state information through the automated communication network interface port and
to store the received network state information in the memory, and
to transmit information to compensate for the received network state information.

3. The networking system according to claim 1, wherein the network state risk comprises a risk of impaired availability of the at least one physical resource within the network, and the transaction comprises a communication of information adapted to decrease an uncertainty of the network state risk.

4. The networking system according to claim 1, wherein the automated arbitrage agent is configured to automatically sense network state information, and to communicate the automatically sensed network state information to the at least one automated counterparty as a result of the transaction.

5. The networking system according to claim 1, wherein the automatic arbitrage agent is further configured to:

receive network state information comprising sensed system condition information from at least one first automated counterparty in at least one first transaction for a first compensation,
transmit the network state information comprising the sensed system condition information to at least one second automated counterparty in at least one second transaction for a second compensation, and
to negotiate the at least one first transaction and the at least one second transaction to produce a profit based on an excess of the second compensation over the first compensation and a transactional cost.

6. The networking system according to claim 1, wherein the at least one automated arbitrage agent has an associated risk tolerance, wherein the transaction reduces an assessment of the network state risk incurred by the automated arbitrage agent, and the automated arbitrage agent is further configured to compensate the at least one automated counterparty as part of the automatic arbitrage transaction dependent on an at least amount of the reduction in the assessed network state risk.

7. The networking system according to claim 1, wherein the automated arbitrage agent competes with other automated arbitrage agents for the transaction, and the transaction has a compensation which is competitively determined based on the competition with the other automated arbitrage agents.

8. The networking system according to claim 1, wherein the automated arbitrage agent is configured to automatically selectively receive information adapted to improve the network model, through the automated communication network interface portadapted to improve the network model, and to automatically selectively transmit information stored in the memory dependent on the network model.

9. The networking system according to claim 1, wherein the network model comprises information describing the network state risk comprising a respective risk of availability and an inclusion cost of a set of available intermediary nodes which engage in communications through the network.

10. The networking system according to claim 1, wherein the physical resource comprises a node of a mobile ad hoc communication network.

11. The networking system according to claim 1,

wherein the at least one automated counterparty has a risk tolerance with respect to an assessed network state risk associated with allocation of the at least one physical resource within the network, and
wherein the transaction communicates sufficient information to the at least one automated counterparty to reduce an assessment of the network state risk by the automated counterparty from a level above its risk tolerance to a level below its risk tolerance.

12. The networking system according to claim 1, wherein the automated control is configured to select one of a plurality of future configurations of a network, representing potential network states, comprising the at least one physical resource, wherein at least one of the future configurations has an associated risk of failure, and wherein the automated arbitrage agent is configured to automatically negotiate the transaction to reduce the associated network state risk comprising a risk of failure, and to selectively produce the control signal in dependence thereon.

13. The networking system according to claim 1, wherein the network model further comprises at least one predicted future state of availability of the at least one physical resource.

14. The networking system according to claim 1, wherein the automated arbitrage agent is configured to conduct the negotiation of the automatic arbitrage negotiation transaction with another automated arbitrage agent having its own respective network model comprising a second set of stored values representing an estimate of the changing network state, wherein the negotiation of the automatic arbitrage transaction negotiation between the automated arbitrage agent and the other automated arbitrage agent is dependent on differences in the first set of stored values and the second set of stored values.

15. A networking method for producing a control signal for automatically controlling an allocation of at least one physical resource within an automated network, comprising: maintaining a network model as a set of stored parameters in a memory, representing an estimate of a changing network state subject to a communication risk dependent on the allocation of the at least one physical resource;

providing an automated arbitrage agent, comprising at least one automated processor operationally associated with the memory and an automated communication network interface port;
engaging in an automated negotiation of an automatic arbitrage transaction based on at least (a) an analysis of the communication risk, and (b) a self-interest of the automated arbitrage agent, between the automated arbitrage agent and at least one automated counterparty by communications through the automated communication network interface port, the automatic arbitrage transaction being for communicating information to alter an estimate of the communication risk by the automated arbitrage agent;
engaging in the negotiated automatic arbitrage transaction comprising communicating the information to alter the estimate of the communication risk by the automated arbitrage agent;
updating the maintained network model;
generating the control signal dependent on at least the altered estimate of the communication risk by the automated arbitrage agent; and
at least one of communicating the generated control signal and communicating information dependent on the generated control signal.

16. The network method according to claim 15, wherein said engaging in the negotiated automatic arbitrage transaction further comprises conveying compensation to the at least one automated counterparty.

17. The network method according to claim 15, wherein the automated network comprises a shared communication medium, and the automated communication network interface port communicates with the at least one automated counterparty through the shared communication medium.

18. A networking method comprising:

storing parameters defining a network model of a communication network having a changing state in a memory, comprising network state information for estimating a time-varying state of the communication network and a reliability risk of at least one physical resource within the communication network;
providing an automated arbitrage agent which acts in its own self-interest, comprising at least one automated processor and being associated with the memory;
engaging in an automated negotiation based on at least (a) an analysis of the reliability risk, and the (b) self-interest of the automated arbitrage agent, through an automated communication network between the automated arbitrage agent and at least one automated counterparty, of a transaction comprising a communication of the network state information;
communicating the network state information through the automated communication network in accordance with the automated negotiation of the transaction;
estimating the communication network state and the reliability risk of the at least one physical resource within the communication network based on at least the network model and the communicated network state information;
updating the stored parameters defining the network model in the memory based on at least the communicated network state information;
generating a control signal, by at least one automated control, for automatically altering an allocation of at least one physical resource within the network, dependent on at least the estimated communication network state and the reliability risk of the at least one physical resource within the communication network; and
communicating at least one of the generated control signal and information dependent on the generated control signal.

19. The networking method according to claim 18, further comprising compensating the at least one automated counterparty for said communicating.

20. The networking method according to claim 18, wherein the at least one physical resource comprises a communication network intermediary of the automated communication network through which a communication passes, and the network state information comprises a communication risk dependent on allocation of at least one physical resource within the automated communication network.

21. A communication networking system, comprising:

a memory configured to store a communication network model of an estimate of a varying network state of an automated communication network comprising a plurality of physical communication resources, comprising an estimate of a risk of future impaired function of the plurality of physical communication resources, the estimate being dependent on an availability of network state information for the automated communication network;
an automated arbitrage agent, configured to: engage in an automated negotiation with respect to at least (a) a self-interest of the automated arbitrage agent, and (b) an analysis of the risk of future impaired function, through the automated communication network, with at least one other automated arbitrage agent, with respect to a transaction to communicate network state information for the automated communication network, wherein the transaction to communicate the network state information for the automated communication network incurs a transmission cost; conclude the negotiated transaction by communicating the network state information for the automated communication network and a compensation for the transmission cost; update the communication network model based on at least the communicated network state information for the automated communication network; update the estimate of the risk of future impaired function of the plurality of physical communication resources based on the updated communication network model; and produce an automated communication network control signal dependent on at least the updated communication network model updated and the updated estimate of the risk of future impaired function of the plurality of physical communication resources; and
at least one automated control, configured to allocate the plurality of physical communication resources in dependence on at least the automated communication network control signal.

22. The communication networking system according to claim 21, wherein the compensation comprises a transfer of virtual currency through the automated communication network.

23. A networking system comprising:

a network model comprising a set of stored values representing statistical estimates of a varying availability state of an automated network comprising physical elements, an accuracy of the statistical estimates being limited by availability of state information for the automated network; and
an automated arbitrage agent, comprising at least one automated processor and a communication network interface port, configured to: engage in an automated negotiation based on at least (a) an analysis of the statistical estimates of the varying availability state, and (b) a self-interest of the automated arbitrage agent, through the communication network interface port, between the automated arbitrage agent and an automated counterparty agent; engage in an automatic arbitrage transaction through the communication network interface port with the automated counterparty agent, the transaction comprising at least communicating previously unavailable automated network state information for the automated network to increase an accuracy of the statistical estimates, and a token representing compensation for the arbitrage transaction, and update the network model based on the communicated previously unavailable automated network state information for the automated network; and account for the communicated token; and
a control, configured to automatically control the automated network in dependence on the updated network model comprising the set of stored values, the control having an output signal selectively dependent on the network model.

24. The networking method according to claim 23, wherein the communicated token comprises a cryptographically-authenticated virtual currency.

Referenced Cited
U.S. Patent Documents
2006004 June 1935 Wenzel
3014605 December 1961 Heising
3573747 April 1971 Adams
3581072 May 1971 Nymeyer
4048452 September 13, 1977 Oehring et al.
4200770 April 29, 1980 Hellman et al.
4218582 August 19, 1980 Hellman et al.
4264782 April 28, 1981 Konheim
4286118 August 25, 1981 Mehaffey et al.
4291749 September 29, 1981 Ootsuka et al.
4306111 December 15, 1981 Lu et al.
4309569 January 5, 1982 Merkle
4314232 February 2, 1982 Tsunoda
4326098 April 20, 1982 Bouricius et al.
4337821 July 6, 1982 Saito
4351982 September 28, 1982 Miller et al.
4365110 December 21, 1982 Lee et al.
4386233 May 31, 1983 Smid et al.
4393269 July 12, 1983 Konheim et al.
4399323 August 16, 1983 Henry
4401848 August 30, 1983 Tsunoda
4405829 September 20, 1983 Rivest et al.
4407564 October 4, 1983 Ellis
4419730 December 6, 1983 Ito et al.
4438824 March 27, 1984 Mueller-Schloer
4441405 April 10, 1984 Takeuchi
4451887 May 29, 1984 Harada et al.
4453074 June 5, 1984 Weinstein
4458109 July 3, 1984 Mueller-Schloer
4471164 September 11, 1984 Henry
4477874 October 16, 1984 Ikuta et al.
4486853 December 4, 1984 Parsons
4494114 January 15, 1985 Kaish
4514592 April 30, 1985 Miyaguchi
4528588 July 9, 1985 Lofberg
4529870 July 16, 1985 Chaum
4536739 August 20, 1985 Nobuta
4558176 December 10, 1985 Arnold et al.
4564018 January 14, 1986 Hutchison et al.
4564108 January 14, 1986 Widlund et al.
4564840 January 14, 1986 Brisse et al.
4567600 January 28, 1986 Massey et al.
4575621 March 11, 1986 Dreifus
4578531 March 25, 1986 Everhart et al.
4582389 April 15, 1986 Wood et al.
4590470 May 20, 1986 Koenig
4595950 June 17, 1986 Lofberg
4625076 November 25, 1986 Okamoto et al.
4633036 December 30, 1986 Hellman et al.
4636782 January 13, 1987 Nakamura et al.
4653003 March 24, 1987 Kirstein
4672572 June 9, 1987 Alsberg
4677663 June 30, 1987 Szlam
4704610 November 3, 1987 Smith et al.
4706086 November 10, 1987 Panizza
4707788 November 17, 1987 Tashiro et al.
4731769 March 15, 1988 Schaefer et al.
4731841 March 15, 1988 Rosen et al.
4734564 March 29, 1988 Boston et al.
4736203 April 5, 1988 Sidlauskas
4737983 April 12, 1988 Frauenthal et al.
4740779 April 26, 1988 Cleary et al.
4740780 April 26, 1988 Brown et al.
4752676 June 21, 1988 Leonard et al.
4752824 June 21, 1988 Moore
4757529 July 12, 1988 Glapa et al.
4768221 August 30, 1988 Green et al.
4787039 November 22, 1988 Murata
4789928 December 6, 1988 Fujisaki
4789929 December 6, 1988 Nishimura et al.
4795223 January 3, 1989 Moss
4797911 January 10, 1989 Szlam et al.
4799156 January 17, 1989 Shavit et al.
4807279 February 21, 1989 McClure et al.
4809180 February 28, 1989 Saitoh
4812628 March 14, 1989 Boston et al.
4818048 April 4, 1989 Moss
4819267 April 4, 1989 Cargile et al.
4823264 April 18, 1989 Deming
4827508 May 2, 1989 Shear
4827518 May 2, 1989 Feustel et al.
4827520 May 2, 1989 Zeinstra
4837551 June 6, 1989 Iino
4852149 July 25, 1989 Zwick et al.
4853687 August 1, 1989 Isomura et al.
4860216 August 22, 1989 Linsenmayer
4866754 September 12, 1989 Hashimoto
4868376 September 19, 1989 Lessin et al.
4876594 October 24, 1989 Schiffman
4878243 October 31, 1989 Hashimoto
4881178 November 14, 1989 Holland et al.
4887818 December 19, 1989 Escott
4890323 December 26, 1989 Beker et al.
4893301 January 9, 1990 Andrews et al.
4894857 January 16, 1990 Szlam et al.
4896363 January 23, 1990 Taylor et al.
4903201 February 20, 1990 Wagner
4914705 April 3, 1990 Nigawara
4918728 April 17, 1990 Matyas et al.
4924501 May 8, 1990 Cheeseman et al.
4926325 May 15, 1990 Benton et al.
4926480 May 15, 1990 Chaum
4930073 May 29, 1990 Cina, Jr.
4930150 May 29, 1990 Katz
4933964 June 12, 1990 Girgis
4935956 June 19, 1990 Hellwarth et al.
4941168 July 10, 1990 Kelly, Jr.
4941173 July 10, 1990 Boule et al.
4952928 August 28, 1990 Carroll et al.
4953204 August 28, 1990 Cuschleg, Jr. et al.
4958371 September 18, 1990 Damoci et al.
4961142 October 2, 1990 Elliott et al.
4967178 October 30, 1990 Saito et al.
4972476 November 20, 1990 Nathans
4975841 December 4, 1990 Kehnemuyi et al.
4977595 December 11, 1990 Ohta et al.
4979171 December 18, 1990 Ashley
4987587 January 22, 1991 Jolissaint
4988976 January 29, 1991 Lu
4993068 February 12, 1991 Piosenka et al.
4995258 February 26, 1991 Frank
4996959 March 5, 1991 Akimoto
4998272 March 5, 1991 Hawkins, Jr. et al.
5006829 April 9, 1991 Miyamoto et al.
5006983 April 9, 1991 Wayne et al.
5007000 April 9, 1991 Baldi
5007078 April 9, 1991 Masson et al.
5014298 May 7, 1991 Katz
5016170 May 14, 1991 Pollalis et al.
5016270 May 14, 1991 Katz
5020095 May 28, 1991 Morganstein et al.
5020097 May 28, 1991 Tanaka et al.
5020105 May 28, 1991 Rosen et al.
5036461 July 30, 1991 Elliott et al.
5036535 July 30, 1991 Gechter et al.
5040208 August 13, 1991 Jolissaint
5043736 August 27, 1991 Darnell et al.
5046094 September 3, 1991 Kawamura et al.
5048075 September 10, 1991 Katz
5051735 September 24, 1991 Furukawa
5056141 October 8, 1991 Dyke
5056147 October 8, 1991 Turner et al.
5063522 November 5, 1991 Winters
5065429 November 12, 1991 Lang
5067162 November 19, 1991 Driscoll, Jr. et al.
5070323 December 3, 1991 Iino et al.
5070453 December 3, 1991 Duffany
5070525 December 3, 1991 Szlam et al.
5070526 December 3, 1991 Richmond et al.
5070931 December 10, 1991 Kalthoff et al.
5073890 December 17, 1991 Danielsen
5073929 December 17, 1991 Katz
5073950 December 17, 1991 Colbert et al.
5077665 December 31, 1991 Silverman et al.
5077789 December 31, 1991 Clark, Jr. et al.
5081711 January 14, 1992 Rickman, Jr.
5097528 March 17, 1992 Gursahaney et al.
5103449 April 7, 1992 Jolissaint
5103476 April 7, 1992 Waite et al.
5111390 May 5, 1992 Ketcham
5119504 June 2, 1992 Durboraw, III
5121422 June 9, 1992 Kudo
5128984 July 7, 1992 Katz
5131020 July 14, 1992 Liebesny et al.
5131038 July 14, 1992 Puhi et al.
5136501 August 4, 1992 Silverman et al.
5155680 October 13, 1992 Wiedemer
5161181 November 3, 1992 Zwick
5163083 November 10, 1992 Dowden et al.
5163087 November 10, 1992 Kaplan
5163094 November 10, 1992 Prokoski et al.
5164904 November 17, 1992 Sumner
5164981 November 17, 1992 Mitchell et al.
5166974 November 24, 1992 Morganstein et al.
5168517 December 1, 1992 Waldman
5182670 January 26, 1993 Khan et al.
5185786 February 9, 1993 Zwick
5191611 March 2, 1993 Lang
5193110 March 9, 1993 Jones et al.
5193855 March 16, 1993 Shamos
5198797 March 30, 1993 Daidoji
5203499 April 20, 1993 Knittel
5204670 April 20, 1993 Stinton
5206903 April 27, 1993 Kohler et al.
5208858 May 4, 1993 Vollert et al.
5214413 May 25, 1993 Okabayashi et al.
5214688 May 25, 1993 Szlam et al.
5214707 May 25, 1993 Fujimoto et al.
5218635 June 8, 1993 Bonvallet et al.
5224153 June 29, 1993 Katz
5224162 June 29, 1993 Okamoto et al.
5224163 June 29, 1993 Gasser et al.
5224173 June 29, 1993 Kuhns et al.
5228094 July 13, 1993 Villa
5229764 July 20, 1993 Matchett et al.
5235166 August 10, 1993 Fernadez
5235633 August 10, 1993 Dennison et al.
5235680 August 10, 1993 Bijnagte
5237159 August 17, 1993 Stephens et al.
5239574 August 24, 1993 Brandman et al.
5241599 August 31, 1993 Bellovin et al.
5245329 September 14, 1993 Gokcebay
5247569 September 21, 1993 Cave
5251252 October 5, 1993 Katz
5253165 October 12, 1993 Leiseca et al.
5253289 October 12, 1993 Tanaka
5254843 October 19, 1993 Hynes et al.
5255349 October 19, 1993 Thakoor et al.
5257190 October 26, 1993 Crane
5265221 November 23, 1993 Miller
5270921 December 14, 1993 Hornick
5272754 December 21, 1993 Boerbert
5274560 December 28, 1993 LaRue
5274700 December 28, 1993 Gechter et al.
5275400 January 4, 1994 Weingardt et al.
5276732 January 4, 1994 Stent et al.
5276737 January 4, 1994 Micali
5278532 January 11, 1994 Hegg et al.
5278898 January 11, 1994 Cambray et al.
5280527 January 18, 1994 Gullman et al.
5283431 February 1, 1994 Rhine
5283731 February 1, 1994 Lalonde et al.
5283818 February 1, 1994 Klausner et al.
5289530 February 22, 1994 Reese
5291550 March 1, 1994 Levy et al.
5291560 March 1, 1994 Daugman
5293115 March 8, 1994 Swanson
5297146 March 22, 1994 Ogawa
5297195 March 22, 1994 Thorne et al.
5299132 March 29, 1994 Wortham
5299263 March 29, 1994 Beller et al.
5302955 April 12, 1994 Schutte et al.
5309504 May 3, 1994 Morganstein
5309505 May 3, 1994 Szlam et al.
5309513 May 3, 1994 Rose
5311574 May 10, 1994 Livanos
5311577 May 10, 1994 Madrid et al.
5313516 May 17, 1994 Afshar et al.
5315658 May 24, 1994 Micali
5319543 June 7, 1994 Wilhelm
5319703 June 7, 1994 Drory
5319705 June 7, 1994 Halter et al.
5321745 June 14, 1994 Drory et al.
5325292 June 28, 1994 Crockett
5325294 June 28, 1994 Keene
5327490 July 5, 1994 Cave
5329579 July 12, 1994 Brunson
5333190 July 26, 1994 Eyster
5334974 August 2, 1994 Simms et al.
5335276 August 2, 1994 Thompson et al.
5335288 August 2, 1994 Faulkner
5335743 August 9, 1994 Gillbrand et al.
5341412 August 23, 1994 Ramot et al.
5341414 August 23, 1994 Popke
5341428 August 23, 1994 Schatz
5341429 August 23, 1994 Stringer et al.
5341477 August 23, 1994 Pitkin et al.
5343527 August 30, 1994 Moore
5345549 September 6, 1994 Appel et al.
5345817 September 13, 1994 Grenn et al.
5347452 September 13, 1994 Bay, Jr.
5347578 September 13, 1994 Duxbury
5347580 September 13, 1994 Molva et al.
5351041 September 27, 1994 Ikata et al.
5351285 September 27, 1994 Katz
5359645 October 25, 1994 Katz
5361165 November 1, 1994 Stringfellow et al.
5361202 November 1, 1994 Doue
5363453 November 8, 1994 Gagne et al.
5365523 November 15, 1994 Derby et al.
5365575 November 15, 1994 Katz
5369695 November 29, 1994 Chakravarti et al.
5371510 December 6, 1994 Miyauchi et al.
5377095 December 27, 1994 Maeda et al.
5381470 January 10, 1995 Cambray et al.
5390236 February 14, 1995 Klausner et al.
5390330 February 14, 1995 Talati
5392353 February 21, 1995 Morales
5394324 February 28, 1995 Clearwater
5400045 March 21, 1995 Aoki
5400393 March 21, 1995 Knuth et al.
5402474 March 28, 1995 Miller et al.
5404443 April 4, 1995 Hirata
5412727 May 2, 1995 Drexler et al.
5414439 May 9, 1995 Groves et al.
5414755 May 9, 1995 Bahler et al.
5416318 May 16, 1995 Hegyi
5420852 May 30, 1995 Anderson et al.
5420919 May 30, 1995 Arnaud et al.
5422565 June 6, 1995 Swanson
5425093 June 13, 1995 Trefzger
5428544 June 27, 1995 Shyu
5428683 June 27, 1995 Indeck et al.
5430279 July 4, 1995 Fernadez
5430792 July 4, 1995 Jesurum et al.
5432835 July 11, 1995 Hashimoto
5432864 July 11, 1995 Lu et al.
5432904 July 11, 1995 Wong
5434906 July 18, 1995 Robinson et al.
5436967 July 25, 1995 Hanson
5440428 August 8, 1995 Hegg et al.
5442342 August 15, 1995 Kung
5442553 August 15, 1995 Parrillo
5442693 August 15, 1995 Hays et al.
5448045 September 5, 1995 Clark
5448624 September 5, 1995 Hardy et al.
5448631 September 5, 1995 Cain
5450321 September 12, 1995 Crane
5450329 September 12, 1995 Tanner
5450613 September 12, 1995 Takahara et al.
5453601 September 26, 1995 Rosen
5455407 October 3, 1995 Rosen
5457747 October 10, 1995 Drexler et al.
5459761 October 17, 1995 Monica et al.
5459781 October 17, 1995 Kaplan et al.
5465082 November 7, 1995 Chaco
5465286 November 7, 1995 Clare et al.
5467391 November 14, 1995 Donaghue, Jr. et al.
5469506 November 21, 1995 Berson et al.
5475399 December 12, 1995 Borsuk
5475839 December 12, 1995 Watson et al.
5478993 December 26, 1995 Derksen
5479482 December 26, 1995 Grimes
5479487 December 26, 1995 Hammond
5479501 December 26, 1995 Lai
5481596 January 2, 1996 Comerford
5481613 January 2, 1996 Ford et al.
5483601 January 9, 1996 Faulkner
5483632 January 9, 1996 Kuwamoto et al.
5485161 January 16, 1996 Vaughn
5485312 January 16, 1996 Horner et al.
5485506 January 16, 1996 Recht et al.
5485519 January 16, 1996 Weiss
5486840 January 23, 1996 Borrego et al.
5491800 February 13, 1996 Goldsmith et al.
5493658 February 20, 1996 Chiang et al.
5493690 February 20, 1996 Shimazaki
5494097 February 27, 1996 Straub et al.
5495523 February 27, 1996 Stent et al.
5495528 February 27, 1996 Dunn et al.
5497271 March 5, 1996 Mulvanny et al.
5497339 March 5, 1996 Bernard
5497430 March 5, 1996 Sadovnik et al.
5499293 March 12, 1996 Behram et al.
5500899 March 19, 1996 Snow
5502762 March 26, 1996 Andrew et al.
5504482 April 2, 1996 Schreder
5504491 April 2, 1996 Chapman
5504622 April 2, 1996 Oikawa et al.
5506595 April 9, 1996 Fukano et al.
5506898 April 9, 1996 Costantini et al.
5508912 April 16, 1996 Schneiderman
5511112 April 23, 1996 Szlam
5511117 April 23, 1996 Zazzera
5511121 April 23, 1996 Yacobi
5511724 April 30, 1996 Freiberger et al.
5515421 May 7, 1996 Sikand et al.
5517566 May 14, 1996 Smith et al.
5519403 May 21, 1996 Bickley et al.
5519410 May 21, 1996 Smalanskas et al.
5519773 May 21, 1996 Dumas et al.
5519778 May 21, 1996 Leighton et al.
5521722 May 28, 1996 Colvill et al.
5523559 June 4, 1996 Swanson
5523739 June 4, 1996 Manneschi
5524140 June 4, 1996 Klausner et al.
5524147 June 4, 1996 Bean
5525977 June 11, 1996 Suman
5526417 June 11, 1996 Dezonno
5526428 June 11, 1996 Arnold
5528248 June 18, 1996 Steiner et al.
5528492 June 18, 1996 Fukushima
5528496 June 18, 1996 Brauer et al.
5528516 June 18, 1996 Yemini et al.
5528666 June 18, 1996 Weigand et al.
5530235 June 25, 1996 Stefik et al.
5530931 June 25, 1996 Cook-Hellberg et al.
5533103 July 2, 1996 Peavey et al.
5533107 July 2, 1996 Irwin et al.
5533109 July 2, 1996 Baker
5533123 July 2, 1996 Force et al.
5534855 July 9, 1996 Shockley et al.
5534888 July 9, 1996 Lebby et al.
5534975 July 9, 1996 Stefik et al.
5535257 July 9, 1996 Goldberg et al.
5535383 July 9, 1996 Gower
5537467 July 16, 1996 Cheng et al.
5537470 July 16, 1996 Lee
5539645 July 23, 1996 Mandhyan et al.
5539869 July 23, 1996 Spoto et al.
5544220 August 6, 1996 Trefzger
5544232 August 6, 1996 Baker et al.
5544255 August 6, 1996 Smithies et al.
5546452 August 13, 1996 Andrews et al.
5546456 August 13, 1996 Vilsoet et al.
5546462 August 13, 1996 Indeck et al.
5546580 August 13, 1996 Seliger et al.
5547125 August 20, 1996 Hennessee et al.
5553145 September 3, 1996 Micali
5553155 September 3, 1996 Kuhns et al.
5553661 September 10, 1996 Beyerlein et al.
5555172 September 10, 1996 Potter
5555286 September 10, 1996 Tendler
5555290 September 10, 1996 McLeod et al.
5555295 September 10, 1996 Bhusri
5555502 September 10, 1996 Opel
5557668 September 17, 1996 Brady
5557765 September 17, 1996 Lipner et al.
5559520 September 24, 1996 Barzegar et al.
5559867 September 24, 1996 Langsenkamp et al.
5559878 September 24, 1996 Keys et al.
5559885 September 24, 1996 Drexler et al.
5560011 September 24, 1996 Uyama
5561711 October 1, 1996 Muller
5561718 October 1, 1996 Trew et al.
5568540 October 22, 1996 Greco et al.
5570419 October 29, 1996 Cave et al.
5572204 November 5, 1996 Timm et al.
5572576 November 5, 1996 Klausner et al.
5572586 November 5, 1996 Ouchi
5572596 November 5, 1996 Wildes et al.
5573244 November 12, 1996 Mindes
5574782 November 12, 1996 Baird et al.
5574784 November 12, 1996 LaPadula et al.
5576724 November 19, 1996 Fukatsu et al.
5577112 November 19, 1996 Cambray et al.
5578808 November 26, 1996 Taylor
5579377 November 26, 1996 Rogers
5579383 November 26, 1996 Bales et al.
5579393 November 26, 1996 Conner et al.
5579535 November 26, 1996 Orlen et al.
5581602 December 3, 1996 Szlam et al.
5581604 December 3, 1996 Robinson et al.
5581607 December 3, 1996 Richardson, Jr. et al.
5583933 December 10, 1996 Mark
5583950 December 10, 1996 Prokoski
5586171 December 17, 1996 McAllister et al.
5586179 December 17, 1996 Stent et al.
5586262 December 17, 1996 Komatsu et al.
5588049 December 24, 1996 Detering et al.
5588059 December 24, 1996 Chandos et al.
5590171 December 31, 1996 Howe et al.
5590188 December 31, 1996 Crockett
5592408 January 7, 1997 Keskin et al.
5592543 January 7, 1997 Smith et al.
5592549 January 7, 1997 Nagel et al.
5592945 January 14, 1997 Fiedler
5594779 January 14, 1997 Goodman
5594790 January 14, 1997 Curreri et al.
5594791 January 14, 1997 Szlam et al.
5594806 January 14, 1997 Colbert
5600710 February 4, 1997 Weisser, Jr. et al.
5604804 February 18, 1997 Micali
5606609 February 25, 1997 Houser et al.
5608387 March 4, 1997 Davies
5610774 March 11, 1997 Hayashi et al.
5610978 March 11, 1997 Purits
5610982 March 11, 1997 Micali
5613004 March 18, 1997 Cooperman et al.
5613012 March 18, 1997 Hoffman et al.
5615109 March 25, 1997 Eder
5615277 March 25, 1997 Hoffman
5616904 April 1, 1997 Fernadez
5619557 April 8, 1997 Van Berkum
5619991 April 15, 1997 Sloane
5621201 April 15, 1997 Langhans et al.
5621889 April 15, 1997 Lermuzeaux et al.
5623547 April 22, 1997 Jones et al.
5623601 April 22, 1997 Vu
5625676 April 29, 1997 Greco et al.
5625682 April 29, 1997 Gray et al.
5627547 May 6, 1997 Ramaswamy et al.
5629980 May 13, 1997 Stefik et al.
5629982 May 13, 1997 Micali
5631961 May 20, 1997 Mills et al.
5632011 May 20, 1997 Landfield et al.
5633917 May 27, 1997 Rogers
5633922 May 27, 1997 August et al.
5633924 May 27, 1997 Kaish et al.
5633932 May 27, 1997 Davis et al.
5634012 May 27, 1997 Stefik et al.
5634055 May 27, 1997 Barnewall et al.
5636267 June 3, 1997 Utsumi et al.
5636268 June 3, 1997 Dijkstra et al.
5636282 June 3, 1997 Holmquist et al.
5636292 June 3, 1997 Rhoads
5638305 June 10, 1997 Kobayashi et al.
5638436 June 10, 1997 Hamilton et al.
5638443 June 10, 1997 Stefik et al.
5638445 June 10, 1997 Spelman et al.
5640546 June 17, 1997 Gopinath et al.
5640569 June 17, 1997 Miller et al.
5644778 July 1, 1997 Burks et al.
5646839 July 8, 1997 Katz
5646986 July 8, 1997 Sahni et al.
5646988 July 8, 1997 Hikawa
5646997 July 8, 1997 Barton
5647017 July 8, 1997 Smithies et al.
5647364 July 15, 1997 Schneider et al.
5648769 July 15, 1997 Sato et al.
5650770 July 22, 1997 Schlager et al.
5650929 July 22, 1997 Potter et al.
5652788 July 29, 1997 Hara
5653386 August 5, 1997 Hennessee et al.
5654715 August 5, 1997 Hayashikura et al.
5655013 August 5, 1997 Gainsboro
5655014 August 5, 1997 Walsh et al.
5657074 August 12, 1997 Ishibe et al.
5659616 August 19, 1997 Sudia
5659726 August 19, 1997 Sandford, II et al.
5661283 August 26, 1997 Gallacher et al.
5664018 September 2, 1997 Leighton
5664109 September 2, 1997 Johnson et al.
5664115 September 2, 1997 Fraser
5666102 September 9, 1997 Lahiff
5666400 September 9, 1997 McAllister et al.
5666414 September 9, 1997 Micali
5666416 September 9, 1997 Micali
5666420 September 9, 1997 Micali
5666523 September 9, 1997 D'Souza
5668878 September 16, 1997 Brands
5670953 September 23, 1997 Satoh et al.
5672106 September 30, 1997 Orford et al.
5675637 October 7, 1997 Szlam et al.
5677955 October 14, 1997 Doggett et al.
5679940 October 21, 1997 Templeton et al.
5680460 October 21, 1997 Tomko et al.
5682032 October 28, 1997 Philipp
5682142 October 28, 1997 Loosmore et al.
5684863 November 4, 1997 Katz
5687215 November 11, 1997 Timm et al.
5687225 November 11, 1997 Jorgensen
5687236 November 11, 1997 Moskowitz et al.
5689252 November 18, 1997 Ayanoglu et al.
5689652 November 18, 1997 Lupien et al.
5691695 November 25, 1997 Lahiff
5692033 November 25, 1997 Farris
5692034 November 25, 1997 Richardson, Jr. et al.
5692047 November 25, 1997 McManis
5696809 December 9, 1997 Voit
5696818 December 9, 1997 Doremus et al.
5696827 December 9, 1997 Brands
5696908 December 9, 1997 Muehlberger et al.
5699056 December 16, 1997 Yoshida
5699418 December 16, 1997 Jones
5699427 December 16, 1997 Chow et al.
5701295 December 23, 1997 Bales et al.
5702165 December 30, 1997 Koibuchi
5703562 December 30, 1997 Nilsen
5703935 December 30, 1997 Raissyan et al.
5706427 January 6, 1998 Tabuki
5710834 January 20, 1998 Rhoads
5712625 January 27, 1998 Murphy
5712632 January 27, 1998 Nishimura et al.
5712640 January 27, 1998 Andou et al.
5712912 January 27, 1998 Tomko et al.
5712914 January 27, 1998 Aucsmith et al.
5714852 February 3, 1998 Enderich
5715307 February 3, 1998 Zazzera
5715403 February 3, 1998 Stefik
5717387 February 10, 1998 Suman et al.
5717741 February 10, 1998 Yue et al.
5717757 February 10, 1998 Micali
5719950 February 17, 1998 Osten et al.
5720770 February 24, 1998 Nappholz et al.
RE35758 March 31, 1998 Winter et al.
5724418 March 3, 1998 Brady
5724425 March 3, 1998 Chang et al.
5724488 March 3, 1998 Prezioso
5727092 March 10, 1998 Sandford, II et al.
5727154 March 10, 1998 Fry et al.
5727165 March 10, 1998 Ordish et al.
5729600 March 17, 1998 Blaha et al.
5732368 March 24, 1998 Knoll et al.
5734154 March 31, 1998 Jachimowicz et al.
5734204 March 31, 1998 Sobue
5734752 March 31, 1998 Knox
5734973 March 31, 1998 Honda
5737419 April 7, 1998 Ganesan
5737420 April 7, 1998 Tomko et al.
5740233 April 14, 1998 Cave et al.
5740240 April 14, 1998 Jolissaint
5740244 April 14, 1998 Indeck et al.
5742226 April 21, 1998 Szabo et al.
5742675 April 21, 1998 Kilander et al.
5742683 April 21, 1998 Lee et al.
5742685 April 21, 1998 Berson et al.
5745555 April 28, 1998 Mark
5745569 April 28, 1998 Moskowitz et al.
5745573 April 28, 1998 Lipner et al.
5745604 April 28, 1998 Rhoads
5745678 April 28, 1998 Herzberg et al.
5745754 April 28, 1998 Lagarde et al.
5748103 May 5, 1998 Flach et al.
5748711 May 5, 1998 Scherer
5748738 May 5, 1998 Bisbee et al.
5748763 May 5, 1998 Rhoads
5748783 May 5, 1998 Rhoads
5748890 May 5, 1998 Goldberg et al.
5748960 May 5, 1998 Fischer
5749785 May 12, 1998 Rossides
5751809 May 12, 1998 Davis et al.
5751836 May 12, 1998 Wildes et al.
5751909 May 12, 1998 Gower
5752754 May 19, 1998 Amitani et al.
5752976 May 19, 1998 Duffin et al.
5754659 May 19, 1998 Sprunk et al.
5754939 May 19, 1998 Herz et al.
5757431 May 26, 1998 Bradley et al.
5757914 May 26, 1998 McManis
5757916 May 26, 1998 MacDoran et al.
5758311 May 26, 1998 Tsuji et al.
5758328 May 26, 1998 Giovannoli
5761285 June 2, 1998 Stent
5761288 June 2, 1998 Pinard et al.
5761298 June 2, 1998 Davis et al.
5761686 June 2, 1998 Bloomberg
5763862 June 9, 1998 Jachimowicz et al.
5764789 June 9, 1998 Pare, Jr. et al.
5765152 June 9, 1998 Erickson
5767496 June 16, 1998 Swartz et al.
5768355 June 16, 1998 Salibrici et al.
5768360 June 16, 1998 Reynolds et al.
5768382 June 16, 1998 Schneier et al.
5768385 June 16, 1998 Simon
5768388 June 16, 1998 Goldwasser et al.
5768426 June 16, 1998 Rhoads
5770849 June 23, 1998 Novis et al.
5771071 June 23, 1998 Bradley et al.
5772585 June 30, 1998 Lavin et al.
5774073 June 30, 1998 Maekawa et al.
5774357 June 30, 1998 Hoffberg et al.
5774537 June 30, 1998 Kim
5774551 June 30, 1998 Wu et al.
5777394 July 7, 1998 Arold
5778102 July 7, 1998 Sandford, II et al.
5778367 July 7, 1998 Wesinger, Jr. et al.
5778882 July 14, 1998 Raymond et al.
5779634 July 14, 1998 Ema et al.
5781872 July 14, 1998 Konishi et al.
5781890 July 14, 1998 Nematbakhsh et al.
5784461 July 21, 1998 Shaffer et al.
5784463 July 21, 1998 Chen et al.
5784566 July 21, 1998 Viavant et al.
5787156 July 28, 1998 Katz
5787159 July 28, 1998 Hamilton et al.
5787187 July 28, 1998 Bouchard et al.
5789733 August 4, 1998 Jachimowicz et al.
5790665 August 4, 1998 Micali
5790668 August 4, 1998 Tomko
5790674 August 4, 1998 Houvener et al.
5790703 August 4, 1998 Wang
5790935 August 4, 1998 Payton
5793846 August 11, 1998 Katz
5793868 August 11, 1998 Micali
5794207 August 11, 1998 Walker et al.
5796791 August 18, 1998 Polcyn
5796816 August 18, 1998 Utsumi
5796841 August 18, 1998 Cordery et al.
5797127 August 18, 1998 Walker et al.
5797128 August 18, 1998 Birnbaum
5799077 August 25, 1998 Yoshii
5799083 August 25, 1998 Brothers et al.
5799086 August 25, 1998 Sudia
5799087 August 25, 1998 Rosen
5799088 August 25, 1998 Raike
5802199 September 1, 1998 Pare, Jr. et al.
5802502 September 1, 1998 Gell et al.
5805055 September 8, 1998 Colizza
5805719 September 8, 1998 Pare, Jr. et al.
5805803 September 8, 1998 Birrell et al.
5806048 September 8, 1998 Kiron et al.
5806071 September 8, 1998 Balderrama et al.
5809144 September 15, 1998 Sirbu et al.
5809437 September 15, 1998 Breed
5812398 September 22, 1998 Nielsen
5812642 September 22, 1998 Leroy
5812668 September 22, 1998 Weber
5815252 September 29, 1998 Price-Francis
5815551 September 29, 1998 Katz
5815554 September 29, 1998 Burgess et al.
5815566 September 29, 1998 Ramot et al.
5815577 September 29, 1998 Clark
5815657 September 29, 1998 Williams et al.
5819237 October 6, 1998 Garman
5819289 October 6, 1998 Sanford, II et al.
5822400 October 13, 1998 Smith
5822401 October 13, 1998 Cave et al.
5822410 October 13, 1998 McCausland et al.
5822432 October 13, 1998 Moskowitz et al.
5822436 October 13, 1998 Rhoads
5825869 October 20, 1998 Brooks et al.
5825871 October 20, 1998 Mark
5825880 October 20, 1998 Sudia et al.
5826014 October 20, 1998 Coley et al.
5826029 October 20, 1998 Gore, Jr. et al.
5826244 October 20, 1998 Huberman
5828731 October 27, 1998 Szlam et al.
5828734 October 27, 1998 Katz
5828751 October 27, 1998 Walker et al.
5828840 October 27, 1998 Cowan et al.
5828878 October 27, 1998 Bennett
5831545 November 3, 1998 Murray et al.
5832089 November 3, 1998 Kravitz et al.
5832119 November 3, 1998 Rhoads
5832450 November 3, 1998 Myers et al.
5832464 November 3, 1998 Houvener et al.
5832488 November 3, 1998 Eberhardt
5835572 November 10, 1998 Richardson, Jr. et al.
5835726 November 10, 1998 Shwed et al.
5835881 November 10, 1998 Trovato et al.
5835896 November 10, 1998 Fisher et al.
5838237 November 17, 1998 Revell et al.
5838772 November 17, 1998 Wilson et al.
5838779 November 17, 1998 Fuller et al.
5838792 November 17, 1998 Ganesan
5838812 November 17, 1998 Pare, Jr. et al.
5839114 November 17, 1998 Lynch et al.
5839119 November 17, 1998 Krsul et al.
5841122 November 24, 1998 Kirchhoff
5841852 November 24, 1998 He
5841865 November 24, 1998 Sudia
5841886 November 24, 1998 Rhoads
5841907 November 24, 1998 Javidi et al.
5841978 November 24, 1998 Rhoads
5844244 December 1, 1998 Graf et al.
5845211 December 1, 1998 Roach, Jr.
5845253 December 1, 1998 Rensimer et al.
5845266 December 1, 1998 Lupien et al.
5845267 December 1, 1998 Ronen
5848143 December 8, 1998 Andrews et al.
5848155 December 8, 1998 Cox
5848231 December 8, 1998 Teitelbaum et al.
5850428 December 15, 1998 Day
5850442 December 15, 1998 Muftic
5850446 December 15, 1998 Berger et al.
5850451 December 15, 1998 Sudia
5850481 December 15, 1998 Rhoads
5852814 December 22, 1998 Allen
5854832 December 29, 1998 Dezonno
5857013 January 5, 1999 Yue et al.
5857022 January 5, 1999 Sudia
5857023 January 5, 1999 Demers et al.
5862223 January 19, 1999 Walker et al.
5862246 January 19, 1999 Colbert
5862260 January 19, 1999 Rhoads
5864305 January 26, 1999 Rosenquist
5867386 February 2, 1999 Hoffberg et al.
5867559 February 2, 1999 Jorgensen et al.
5867564 February 2, 1999 Bhusri
5867572 February 2, 1999 MacDonald et al.
5867578 February 2, 1999 Brickell et al.
5867795 February 2, 1999 Novis et al.
5867799 February 2, 1999 Lang et al.
5867802 February 2, 1999 Borza
5867821 February 2, 1999 Ballantyne et al.
5869822 February 9, 1999 Meadows, II et al.
5870464 February 9, 1999 Brewster et al.
5870723 February 9, 1999 Pare, Jr. et al.
5870744 February 9, 1999 Sprague
5872833 February 16, 1999 Scherer
5872834 February 16, 1999 Teitelbaum
5872848 February 16, 1999 Romney et al.
5872849 February 16, 1999 Sudia
5873068 February 16, 1999 Beaumont et al.
5873071 February 16, 1999 Ferstenberg et al.
5873782 February 23, 1999 Hall
5875108 February 23, 1999 Hoffberg et al.
5876926 March 2, 1999 Beecham
5878126 March 2, 1999 Velamuri et al.
5878130 March 2, 1999 Andrews et al.
5878137 March 2, 1999 Ippolito et al.
5878144 March 2, 1999 Aucsmith et al.
5881225 March 9, 1999 Worth
5881226 March 9, 1999 Veneklase
5884272 March 16, 1999 Walker et al.
5884277 March 16, 1999 Khosla
5889473 March 30, 1999 Wicks
5889474 March 30, 1999 LaDue
5889799 March 30, 1999 Grossman et al.
5889862 March 30, 1999 Ohta et al.
5889863 March 30, 1999 Weber
5889868 March 30, 1999 Moskowitz et al.
5890129 March 30, 1999 Spurgeon
5890138 March 30, 1999 Godin et al.
5890152 March 30, 1999 Rapaport et al.
5892824 April 6, 1999 Beatson et al.
5892838 April 6, 1999 Brady
5892900 April 6, 1999 Ginter et al.
5892902 April 6, 1999 Clark
5893902 April 13, 1999 Transue et al.
5894505 April 13, 1999 Koyama
5896446 April 20, 1999 Sagady et al.
5897616 April 27, 1999 Kanevsky et al.
5897620 April 27, 1999 Walker et al.
5898154 April 27, 1999 Rosen
5898759 April 27, 1999 Huang
5898762 April 27, 1999 Katz
5898830 April 27, 1999 Wesinger, Jr. et al.
5899998 May 4, 1999 McGauley et al.
5901209 May 4, 1999 Tannenbaum et al.
5901214 May 4, 1999 Shaffer et al.
5901229 May 4, 1999 Fujisaki et al.
5901246 May 4, 1999 Hoffberg et al.
5903454 May 11, 1999 Hoffberg et al.
5903641 May 11, 1999 Tonisson
5903651 May 11, 1999 Kocher
5903880 May 11, 1999 Biffar
5903889 May 11, 1999 de la Huerga et al.
5905505 May 18, 1999 Lesk
5905792 May 18, 1999 Miloslavsky
5905800 May 18, 1999 Moskowitz et al.
5905975 May 18, 1999 Ausubel
5905979 May 18, 1999 Barrows
5907149 May 25, 1999 Marckini
5907601 May 25, 1999 David et al.
5907608 May 25, 1999 Shaffer et al.
5909493 June 1, 1999 Motoyama
5910982 June 8, 1999 Shaffer et al.
5910987 June 8, 1999 Ginter et al.
5910988 June 8, 1999 Ballard
5911132 June 8, 1999 Sloane
5911136 June 8, 1999 Atkins
5911143 June 8, 1999 Deinhart et al.
5911687 June 15, 1999 Sato et al.
5912818 June 15, 1999 McGrady et al.
5912947 June 15, 1999 Langsenkamp et al.
5912974 June 15, 1999 Holloway et al.
5913025 June 15, 1999 Higley et al.
5913195 June 15, 1999 Weeren et al.
5913196 June 15, 1999 Talmor et al.
5914951 June 22, 1999 Bentley et al.
5915008 June 22, 1999 Dulman
5915011 June 22, 1999 Miloslavsky
5915018 June 22, 1999 Aucsmith
5915019 June 22, 1999 Ginter et al.
5915027 June 22, 1999 Cox et al.
5915087 June 22, 1999 Hammond et al.
5915093 June 22, 1999 Berlin et al.
5915209 June 22, 1999 Lawrence
5915240 June 22, 1999 Karpf
5915973 June 29, 1999 Hoehn-Saric et al.
5917893 June 29, 1999 Katz
5917903 June 29, 1999 Jolissaint
5918213 June 29, 1999 Bernard et al.
5918227 June 29, 1999 Polnerow et al.
5919239 July 6, 1999 Fraker et al.
5919246 July 6, 1999 Waizmann et al.
5920058 July 6, 1999 Weber et al.
5920384 July 6, 1999 Borza
5920477 July 6, 1999 Hoffberg et al.
5920628 July 6, 1999 Indeck et al.
5920629 July 6, 1999 Rosen
5920630 July 6, 1999 Wertheimer et al.
5920861 July 6, 1999 Hall et al.
5923745 July 13, 1999 Hurd
5923746 July 13, 1999 Baker et al.
5923763 July 13, 1999 Walker et al.
5924016 July 13, 1999 Fuller et al.
5924074 July 13, 1999 Evans
5924082 July 13, 1999 Silverman et al.
5924083 July 13, 1999 Silverman et al.
5924406 July 20, 1999 Kinugasa et al.
5925126 July 20, 1999 Hsieh
5926528 July 20, 1999 David
5926539 July 20, 1999 Shtivelman
5926548 July 20, 1999 Okamoto
5926796 July 20, 1999 Walker et al.
5928333 July 27, 1999 Landfield et al.
5929753 July 27, 1999 Montague
5930339 July 27, 1999 Nepustil
5930369 July 27, 1999 Cox et al.
5930759 July 27, 1999 Moore et al.
5930777 July 27, 1999 Barber
5930804 July 27, 1999 Yu et al.
5931890 August 3, 1999 Suwa et al.
5933480 August 3, 1999 Felger
5933492 August 3, 1999 Turovski
5933498 August 3, 1999 Schneck et al.
5933515 August 3, 1999 Pu et al.
5933809 August 3, 1999 Hunt et al.
5935071 August 10, 1999 Schneider et al.
5937055 August 10, 1999 Kaplan
5937068 August 10, 1999 Audebert
5937390 August 10, 1999 Hyodo
5937394 August 10, 1999 Wong et al.
5938707 August 17, 1999 Uehara
5940493 August 17, 1999 Desai et al.
5940496 August 17, 1999 Gisby et al.
5940497 August 17, 1999 Miloslavsky
5940504 August 17, 1999 Griswold
5940508 August 17, 1999 Long et al.
5940813 August 17, 1999 Hutchings
5940947 August 24, 1999 Takeuchi et al.
5941813 August 24, 1999 Sievers et al.
5941947 August 24, 1999 Brown et al.
5943403 August 24, 1999 Richardson, Jr. et al.
5943422 August 24, 1999 Van Wie et al.
5943423 August 24, 1999 Muftic
5943424 August 24, 1999 Berger et al.
5944823 August 31, 1999 Jade et al.
5945877 August 31, 1999 Elango et al.
5946387 August 31, 1999 Miloslavsky
5946388 August 31, 1999 Walker et al.
5946394 August 31, 1999 Gambuzza
5946414 August 31, 1999 Cass et al.
5946669 August 31, 1999 Polk
5948040 September 7, 1999 DeLorme et al.
5948136 September 7, 1999 Smyers
5949045 September 7, 1999 Ezawa et al.
5949046 September 7, 1999 Kenneth et al.
5949852 September 7, 1999 Duncan
5949854 September 7, 1999 Sato
5949863 September 7, 1999 Tansky
5949866 September 7, 1999 Coiera et al.
5949876 September 7, 1999 Ginter et al.
5949879 September 7, 1999 Berson et al.
5949881 September 7, 1999 Davis
5949882 September 7, 1999 Angelo
5949885 September 7, 1999 Leighton
5950195 September 7, 1999 Stockwell et al.
5951055 September 14, 1999 Mowry, Jr.
5952638 September 14, 1999 Demers et al.
5952639 September 14, 1999 Ohki et al.
5952641 September 14, 1999 Korshun
5953319 September 14, 1999 Dutta et al.
5953332 September 14, 1999 Miloslavsky
5953405 September 14, 1999 Miloslavsky
5953419 September 14, 1999 Lohstroh et al.
5954583 September 21, 1999 Green
5956392 September 21, 1999 Tanigawa et al.
5956397 September 21, 1999 Shaffer et al.
5956400 September 21, 1999 Chaum et al.
5956408 September 21, 1999 Arnold
5958016 September 28, 1999 Chang et al.
5958050 September 28, 1999 Griffin et al.
5959529 September 28, 1999 Kail, IV
5960073 September 28, 1999 Kikinis et al.
5960083 September 28, 1999 Micali
5960177 September 28, 1999 Tanno
5963632 October 5, 1999 Miloslavsky
5963635 October 5, 1999 Szlam et al.
5963648 October 5, 1999 Rosen
5963657 October 5, 1999 Bowker et al.
5963908 October 5, 1999 Chadha
5963914 October 5, 1999 Skinner et al.
5963924 October 5, 1999 Williams et al.
5966429 October 12, 1999 Scherer
5966446 October 12, 1999 Davis
5966448 October 12, 1999 Namba et al.
5968176 October 19, 1999 Nessett et al.
5970143 October 19, 1999 Schneier et al.
5970479 October 19, 1999 Shepherd
5973616 October 26, 1999 Grebe et al.
5974146 October 26, 1999 Randle et al.
5974389 October 26, 1999 Clark et al.
5974548 October 26, 1999 Adams
RE36416 November 30, 1999 Szlam et al.
5977884 November 2, 1999 Ross
5978475 November 2, 1999 Schneier et al.
5978494 November 2, 1999 Zhang
5978840 November 2, 1999 Nguyen et al.
5978918 November 2, 1999 Scholnick et al.
5979773 November 9, 1999 Findley, Jr. et al.
5982298 November 9, 1999 Lappenbusch et al.
5982325 November 9, 1999 Thornton et al.
5982520 November 9, 1999 Weiser et al.
5982891 November 9, 1999 Ginter et al.
5982894 November 9, 1999 McCalley et al.
5983154 November 9, 1999 Morisawa
5983161 November 9, 1999 Lemelson et al.
5983205 November 9, 1999 Brams et al.
5983208 November 9, 1999 Haller et al.
5983350 November 9, 1999 Minear et al.
5984366 November 16, 1999 Priddy
5986746 November 16, 1999 Metz et al.
5987132 November 16, 1999 Rowney
5987140 November 16, 1999 Rowney et al.
5987153 November 16, 1999 Chan et al.
5987155 November 16, 1999 Dunn et al.
5987440 November 16, 1999 O'Neil et al.
5987459 November 16, 1999 Swanson et al.
5990825 November 23, 1999 Ito
5991399 November 23, 1999 Graunke et al.
5991406 November 23, 1999 Lipner et al.
5991408 November 23, 1999 Pearson et al.
5991429 November 23, 1999 Coffin et al.
5991431 November 23, 1999 Borza et al.
5991519 November 23, 1999 Benhammou et al.
5991731 November 23, 1999 Colon et al.
5991758 November 23, 1999 Ellard
5991877 November 23, 1999 Luckenbaugh
5991878 November 23, 1999 McDonough et al.
5995625 November 30, 1999 Sudia et al.
5995630 November 30, 1999 Borza
5995943 November 30, 1999 Bull et al.
5996076 November 30, 1999 Rowney et al.
5999095 December 7, 1999 Earl et al.
5999629 December 7, 1999 Heer et al.
5999637 December 7, 1999 Toyoda et al.
5999919 December 7, 1999 Jarecki et al.
5999973 December 7, 1999 Glitho et al.
6002326 December 14, 1999 Turner
6002756 December 14, 1999 Lo et al.
6002767 December 14, 1999 Kramer
6002770 December 14, 1999 Tomko et al.
6002772 December 14, 1999 Saito
6003084 December 14, 1999 Green et al.
6003135 December 14, 1999 Bialick et al.
6003765 December 21, 1999 Okamoto
6004276 December 21, 1999 Wright et al.
6005517 December 21, 1999 Friedrichs
6005859 December 21, 1999 Harvell et al.
6005939 December 21, 1999 Fortenberry et al.
6005943 December 21, 1999 Cohen et al.
6006194 December 21, 1999 Merel
6006328 December 21, 1999 Drake
6006332 December 21, 1999 Rabne et al.
6008741 December 28, 1999 Shinagawa et al.
6009177 December 28, 1999 Sudia
6009430 December 28, 1999 Joseph et al.
6009475 December 28, 1999 Shrader
6009526 December 28, 1999 Choi
6011858 January 4, 2000 Stock et al.
6012035 January 4, 2000 Freeman, Jr. et al.
6012039 January 4, 2000 Hoffman et al.
6012045 January 4, 2000 Barzilai et al.
6012049 January 4, 2000 Kawan
6012088 January 4, 2000 Li et al.
6013956 January 11, 2000 Anderson, Jr.
6014605 January 11, 2000 Morisawa et al.
6014627 January 11, 2000 Togher et al.
6014643 January 11, 2000 Minton
6014666 January 11, 2000 Helland et al.
6016318 January 18, 2000 Tomoike
6016476 January 18, 2000 Maes et al.
6016484 January 18, 2000 Williams et al.
6018724 January 25, 2000 Arent
6018739 January 25, 2000 McCoy et al.
6018801 January 25, 2000 Palage et al.
6021202 February 1, 2000 Anderson et al.
6021393 February 1, 2000 Honda et al.
6021397 February 1, 2000 Jones et al.
6021398 February 1, 2000 Ausubel
6021399 February 1, 2000 Demers et al.
6021491 February 1, 2000 Renaud
6021497 February 1, 2000 Bouthillier et al.
6023685 February 8, 2000 Brett et al.
6023686 February 8, 2000 Brown
6023762 February 8, 2000 Dean et al.
6023765 February 8, 2000 Kuhn
6026163 February 15, 2000 Micali
6026166 February 15, 2000 LeBourgeois
6026167 February 15, 2000 Aziz
6026193 February 15, 2000 Rhoads
6026379 February 15, 2000 Haller et al.
6026383 February 15, 2000 Ausubel
6026490 February 15, 2000 Johns-Vano et al.
6028932 February 22, 2000 Park
6028933 February 22, 2000 Heer et al.
6028936 February 22, 2000 Hillis
6028937 February 22, 2000 Tatebayashi et al.
6028939 February 22, 2000 Yin
6029067 February 22, 2000 Pfundstein
6029150 February 22, 2000 Kravitz
6029151 February 22, 2000 Nikander
6029160 February 22, 2000 Cabrera et al.
6029195 February 22, 2000 Herz
6029201 February 22, 2000 Neill
6029245 February 22, 2000 Scanlan
6029247 February 22, 2000 Ferguson
6031910 February 29, 2000 Deindl et al.
6031913 February 29, 2000 Hassan et al.
6031914 February 29, 2000 Tewfik et al.
6032118 February 29, 2000 Tello et al.
6034605 March 7, 2000 March
6034618 March 7, 2000 Tatebayashi et al.
6034626 March 7, 2000 Maekawa et al.
6035041 March 7, 2000 Frankel et al.
6035276 March 7, 2000 Newman et al.
6035280 March 7, 2000 Christensen
6035398 March 7, 2000 Bjorn
6035402 March 7, 2000 Vaeth et al.
6035406 March 7, 2000 Moussa et al.
6037870 March 14, 2000 Alessandro
6038315 March 14, 2000 Strait et al.
6038316 March 14, 2000 Dwork et al.
6038322 March 14, 2000 Harkins
6038337 March 14, 2000 Lawrence et al.
6038560 March 14, 2000 Wical
6038563 March 14, 2000 Bapat et al.
6038581 March 14, 2000 Aoki et al.
6038665 March 14, 2000 Bolt et al.
6038666 March 14, 2000 Hsu et al.
6039244 March 21, 2000 Finsterwald
6040783 March 21, 2000 Houvener et al.
6041122 March 21, 2000 Graunke et al.
6041123 March 21, 2000 Colvin, Sr.
6041349 March 21, 2000 Sugauchi et al.
6041355 March 21, 2000 Toga
6041357 March 21, 2000 Kunzelman et al.
6041408 March 21, 2000 Nishioka et al.
6041410 March 21, 2000 Hsu et al.
6041411 March 21, 2000 Wyatt
6041412 March 21, 2000 Timson et al.
6042005 March 28, 2000 Basile et al.
6044131 March 28, 2000 McEvoy et al.
6044155 March 28, 2000 Thomlinson et al.
6044157 March 28, 2000 Uesaka et al.
6044205 March 28, 2000 Reed et al.
6044257 March 28, 2000 Boling et al.
6044349 March 28, 2000 Tolopka et al.
6044350 March 28, 2000 Weiant, Jr. et al.
6044363 March 28, 2000 Mori et al.
6044388 March 28, 2000 DeBellis et al.
6044401 March 28, 2000 Harvey
6044402 March 28, 2000 Jacobson et al.
6044462 March 28, 2000 Zubeldia et al.
6044463 March 28, 2000 Kanda et al.
6044464 March 28, 2000 Shamir
6044466 March 28, 2000 Anand et al.
6044468 March 28, 2000 Osmond
6045039 April 4, 2000 Stinson et al.
6047051 April 4, 2000 Ginzboorg et al.
6047066 April 4, 2000 Brown et al.
6047067 April 4, 2000 Rosen
6047072 April 4, 2000 Field et al.
6047242 April 4, 2000 Benson
6047264 April 4, 2000 Fisher et al.
6047268 April 4, 2000 Bartoli et al.
6047269 April 4, 2000 Biffar
6047274 April 4, 2000 Johnson et al.
6047322 April 4, 2000 Vaid et al.
6047325 April 4, 2000 Jain et al.
6047374 April 4, 2000 Barton
6047887 April 11, 2000 Rosen
6049610 April 11, 2000 Crandall
6049612 April 11, 2000 Fielder et al.
6049613 April 11, 2000 Jakobsson
6049627 April 11, 2000 Becker et al.
6049671 April 11, 2000 Slivka et al.
6049785 April 11, 2000 Gifford
6049786 April 11, 2000 Smorodinsky
6049787 April 11, 2000 Takahashi et al.
6049838 April 11, 2000 Miller et al.
6049872 April 11, 2000 Reiter et al.
6049874 April 11, 2000 McClain et al.
6049875 April 11, 2000 Suzuki et al.
6052466 April 18, 2000 Wright
6052467 April 18, 2000 Brands
6052468 April 18, 2000 Hillhouse
6052469 April 18, 2000 Johnson et al.
6052645 April 18, 2000 Harada
6052688 April 18, 2000 Thorsen
6052780 April 18, 2000 Glover
6052788 April 18, 2000 Wesinger, Jr. et al.
6055314 April 25, 2000 Spies et al.
6055321 April 25, 2000 Numao et al.
6055494 April 25, 2000 Friedman
6055506 April 25, 2000 Frasca, Jr.
6055508 April 25, 2000 Naor et al.
6055512 April 25, 2000 Dean et al.
6055518 April 25, 2000 Franklin et al.
6055575 April 25, 2000 Paulsen et al.
6055636 April 25, 2000 Hillier et al.
6055637 April 25, 2000 Hudson et al.
6055639 April 25, 2000 Schanze
6056197 May 2, 2000 Hara et al.
6056199 May 2, 2000 Wiklof et al.
6057872 May 2, 2000 Candelore
6058187 May 2, 2000 Chen
6058188 May 2, 2000 Chandersekaran et al.
6058189 May 2, 2000 McGough
6058193 May 2, 2000 Cordery et al.
6058303 May 2, 2000 Åstrom et al.
6058379 May 2, 2000 Odom et al.
6058381 May 2, 2000 Nelson
6058383 May 2, 2000 Narasimhalu et al.
6061003 May 9, 2000 Harada
6061448 May 9, 2000 Smith et al.
6061451 May 9, 2000 Muratani et al.
6061454 May 9, 2000 Malik et al.
6061665 May 9, 2000 Bahreman
6061692 May 9, 2000 Thomas et al.
6061729 May 9, 2000 Nightingale
6061789 May 9, 2000 Hauser et al.
6061790 May 9, 2000 Bodnar
6061791 May 9, 2000 Moreau
6061792 May 9, 2000 Simon
6061794 May 9, 2000 Angelo et al.
6061796 May 9, 2000 Chen et al.
6061797 May 9, 2000 Jade et al.
6061798 May 9, 2000 Coley et al.
6061799 May 9, 2000 Eldridge et al.
6064723 May 16, 2000 Cohn et al.
6064737 May 16, 2000 Rhoads
6064738 May 16, 2000 Fridrich
6064740 May 16, 2000 Curiger et al.
6064741 May 16, 2000 Horn et al.
6064751 May 16, 2000 Smithies et al.
6064764 May 16, 2000 Bhaskaran et al.
6064878 May 16, 2000 Denker et al.
6064968 May 16, 2000 Schanz
6064977 May 16, 2000 Haverstock et al.
6065008 May 16, 2000 Simon et al.
6065119 May 16, 2000 Sandford, II et al.
6065675 May 23, 2000 Teicher
6067466 May 23, 2000 Selker et al.
6067620 May 23, 2000 Holden et al.
6068184 May 30, 2000 Barnett
6069647 May 30, 2000 Sullivan et al.
6069914 May 30, 2000 Cox
6069952 May 30, 2000 Saito et al.
6069954 May 30, 2000 Moreau
6069955 May 30, 2000 Coppersmith et al.
6069969 May 30, 2000 Keagy et al.
6069970 May 30, 2000 Salatino et al.
6070118 May 30, 2000 Ohta et al.
6070141 May 30, 2000 Houvener et al.
6070239 May 30, 2000 McManis
6072870 June 6, 2000 Nguyen et al.
6072874 June 6, 2000 Shin et al.
6072876 June 6, 2000 Obata et al.
6072894 June 6, 2000 Payne
6073106 June 6, 2000 Rozen et al.
6073125 June 6, 2000 Cordery et al.
6073160 June 6, 2000 Grantham et al.
6073172 June 6, 2000 Frailong et al.
6073234 June 6, 2000 Kigo et al.
6073236 June 6, 2000 Kusakabe et al.
6073237 June 6, 2000 Ellison
6073238 June 6, 2000 Drupsteen
6073240 June 6, 2000 Kurtzberg et al.
6073242 June 6, 2000 Hardy et al.
6075455 June 13, 2000 DiMaria et al.
6075852 June 13, 2000 Ashworth et al.
6075854 June 13, 2000 Copley et al.
6075860 June 13, 2000 Ketcham
6075861 June 13, 2000 Miller, II
6075864 June 13, 2000 Batten
6075865 June 13, 2000 Scheldt et al.
6076066 June 13, 2000 DiRienzo et al.
6076077 June 13, 2000 Saito
6076078 June 13, 2000 Camp et al.
6076162 June 13, 2000 Deindl et al.
6076163 June 13, 2000 Hoffstein et al.
6076164 June 13, 2000 Tanaka et al.
6076166 June 13, 2000 Moshfeghi et al.
6076167 June 13, 2000 Borza
6078265 June 20, 2000 Bonder et al.
6078586 June 20, 2000 Dugan et al.
6078663 June 20, 2000 Yamamoto
6078665 June 20, 2000 Anderson et al.
6078667 June 20, 2000 Johnson
6078853 June 20, 2000 Ebner et al.
6078909 June 20, 2000 Knutson
6078946 June 20, 2000 Johnson
6079018 June 20, 2000 Hardy et al.
6079020 June 20, 2000 Liu
6079021 June 20, 2000 Abadi et al.
6079047 June 2000 Cotugno et al.
6079621 June 27, 2000 Vardanyan et al.
6081199 June 27, 2000 Hogl
6081533 June 27, 2000 Laubach et al.
6081597 June 27, 2000 Hoffstein et al.
6081598 June 27, 2000 Dai
6081610 June 27, 2000 Dwork et al.
6081750 June 27, 2000 Hoffberg et al.
6081790 June 27, 2000 Rosen
6081793 June 27, 2000 Challener et al.
6081893 June 27, 2000 Grawrock et al.
6081900 June 27, 2000 Subramaniam et al.
6082776 July 4, 2000 Feinberg
6084510 July 4, 2000 Lemelson et al.
6084969 July 4, 2000 Wright et al.
6085175 July 4, 2000 Gugel et al.
6085216 July 4, 2000 Huberman et al.
6088450 July 11, 2000 Davis et al.
6091956 July 18, 2000 Hollenberg
6092005 July 18, 2000 Okada
6092014 July 18, 2000 Okada
6092724 July 25, 2000 Bouthillier et al.
6098016 August 1, 2000 Ishihara
6098051 August 1, 2000 Lupien et al.
6104101 August 15, 2000 Miller et al.
6105873 August 22, 2000 Jeger
6108644 August 22, 2000 Goldschlag et al.
6108787 August 22, 2000 Anderson et al.
6112181 August 29, 2000 Shear et al.
6115654 September 5, 2000 Eid et al.
6118403 September 12, 2000 Lang
6118874 September 12, 2000 Okamoto et al.
6119229 September 12, 2000 Martinez et al.
6125186 September 26, 2000 Saito et al.
6128391 October 3, 2000 Denno et al.
6131087 October 10, 2000 Luke et al.
6131090 October 10, 2000 Basso, Jr. et al.
6134326 October 17, 2000 Micali
6134328 October 17, 2000 Cordery et al.
6134536 October 17, 2000 Shepherd
6134647 October 17, 2000 Acton et al.
6137884 October 24, 2000 Micali
6138107 October 24, 2000 Elgamal
6138119 October 24, 2000 Hall et al.
6141423 October 31, 2000 Fischer
6141750 October 31, 2000 Micali
6141755 October 31, 2000 Dowd et al.
6141758 October 31, 2000 Benantar et al.
6144336 November 7, 2000 Preston et al.
6145079 November 7, 2000 Mitty et al.
6147598 November 14, 2000 Murphy et al.
6148338 November 14, 2000 Lachelt et al.
6148342 November 14, 2000 Ho
6149440 November 21, 2000 Clark et al.
6151309 November 21, 2000 Busuioc et al.
6151395 November 21, 2000 Harkins
6151589 November 21, 2000 Aggarwal et al.
RE37001 December 26, 2000 Morganstein et al.
6157721 December 5, 2000 Shear et al.
6157914 December 5, 2000 Seto et al.
6158010 December 5, 2000 Moriconi et al.
6161099 December 12, 2000 Harrington et al.
6161139 December 12, 2000 Win et al.
6161181 December 12, 2000 Haynes, III et al.
6163607 December 19, 2000 Bogart et al.
6163701 December 19, 2000 Saleh et al.
6167386 December 26, 2000 Brown
6167522 December 26, 2000 Lee et al.
6169476 January 2, 2001 Flanagan
6169789 January 2, 2001 Rao et al.
6169802 January 2, 2001 Lerner et al.
6169805 January 2, 2001 Dunn et al.
6173159 January 9, 2001 Wright et al.
6174262 January 16, 2001 Ohta et al.
6175626 January 16, 2001 Aucsmith et al.
6175803 January 16, 2001 Chowanic et al.
6175831 January 16, 2001 Weinreich et al.
6178377 January 23, 2001 Ishihara et al.
6182000 January 30, 2001 Ohta et al.
6185514 February 6, 2001 Skinner et al.
6185683 February 6, 2001 Ginter et al.
6189026 February 13, 2001 Birrell et al.
6192472 February 20, 2001 Garay et al.
6192473 February 20, 2001 Ryan, Jr. et al.
6192476 February 20, 2001 Gong
6195698 February 27, 2001 Lillibridge et al.
6199001 March 6, 2001 Ohta et al.
6199050 March 6, 2001 Alaia et al.
6199102 March 6, 2001 Cobb
6201493 March 13, 2001 Silverman
6202022 March 13, 2001 Ando
6202058 March 13, 2001 Rose et al.
6220986 April 24, 2001 Aruga et al.
6225901 May 1, 2001 Kail, IV
6226383 May 1, 2001 Jablon
6226618 May 1, 2001 Downs et al.
6230098 May 8, 2001 Ando et al.
6230146 May 8, 2001 Alaia et al.
6230501 May 15, 2001 Bailey, Sr. et al.
6233520 May 15, 2001 Ito et al.
6236977 May 22, 2001 Verba et al.
6240411 May 29, 2001 Thearling
6243691 June 5, 2001 Fisher et al.
6249873 June 19, 2001 Richard et al.
6252544 June 26, 2001 Hoffberg
6255942 July 3, 2001 Knudsen
6260024 July 10, 2001 Shkedy
6263334 July 17, 2001 Fayyad et al.
6266652 July 24, 2001 Godin et al.
6266692 July 24, 2001 Greenstein
6272473 August 7, 2001 Sandholm
6272474 August 7, 2001 Garcia
6285867 September 4, 2001 Boling et al.
6292736 September 18, 2001 Aruga et al.
6292743 September 18, 2001 Pu et al.
6292787 September 18, 2001 Scott et al.
6304758 October 16, 2001 Iierbig et al.
6308072 October 23, 2001 Labedz et al.
6321212 November 20, 2001 Lange
6321267 November 20, 2001 Donaldson
6321339 November 20, 2001 French et al.
6324519 November 27, 2001 Eldering
6330551 December 11, 2001 Burchetta et al.
6331986 December 18, 2001 Mitra et al.
6333980 December 25, 2001 Hollatz et al.
6338011 January 8, 2002 Furst et al.
6340928 January 22, 2002 McCurdy
6353679 March 5, 2002 Cham et al.
6356822 March 12, 2002 Diaz et al.
6359270 March 19, 2002 Bridson
6359571 March 19, 2002 Endo et al.
6360222 March 19, 2002 Quinn
6366907 April 2, 2002 Fanning et al.
6377809 April 23, 2002 Rezaiifar et al.
6384739 May 7, 2002 Roberts, Jr.
6389400 May 14, 2002 Bushey et al.
6393276 May 21, 2002 Vanghi
6393465 May 21, 2002 Leeds
6397141 May 28, 2002 Binnig
6397167 May 28, 2002 Skinner et al.
6398245 June 4, 2002 Gruse et al.
6400996 June 4, 2002 Hoffberg et al.
6401027 June 4, 2002 Xu et al.
6411221 June 25, 2002 Horber
6411889 June 25, 2002 Mizunuma et al.
6415151 July 2, 2002 Kreppel
6415156 July 2, 2002 Stadelmann
6418367 July 9, 2002 Toukura et al.
6418424 July 9, 2002 Hoffberg et al.
6429812 August 6, 2002 Hoffberg
6430537 August 6, 2002 Tedesco et al.
6430690 August 6, 2002 Vanstone et al.
6434380 August 13, 2002 Andersson et al.
6436005 August 20, 2002 Bellinger
6438694 August 20, 2002 Saito
6442473 August 27, 2002 Berstis et al.
6443841 September 3, 2002 Rossides
6445308 September 3, 2002 Koike
6449535 September 10, 2002 Obradovich et al.
6449612 September 10, 2002 Bradley et al.
6452565 September 17, 2002 Kingsley et al.
6459881 October 1, 2002 Hoder et al.
6463454 October 8, 2002 Lumelsky et al.
6466977 October 15, 2002 Sitaraman et al.
6470265 October 22, 2002 Tanaka
6473688 October 29, 2002 Kohno et al.
6480587 November 12, 2002 Rao et al.
6480753 November 12, 2002 Calder et al.
6484088 November 19, 2002 Reimer
6487541 November 26, 2002 Aggarwal et al.
6487542 November 26, 2002 Ebata et al.
6493682 December 10, 2002 Horrigan et al.
6499018 December 24, 2002 Alaia et al.
6501765 December 31, 2002 Lu et al.
6503170 January 7, 2003 Tabata
6507739 January 14, 2003 Gross et al.
6519702 February 11, 2003 Williams
6522946 February 18, 2003 Weis
6530537 March 11, 2003 Hanlon
6542742 April 1, 2003 Schramm et al.
6546416 April 8, 2003 Kirsch
6556548 April 29, 2003 Kirkby et al.
6556951 April 29, 2003 Deleo et al.
6557756 May 6, 2003 Smith
6560580 May 6, 2003 Fraser et al.
6564192 May 13, 2003 Kinney, Jr. et al.
6570980 May 27, 2003 Baruch
6571277 May 27, 2003 Daniels-Barnes et al.
6581008 June 17, 2003 Intriligator et al.
6587837 July 1, 2003 Spagna et al.
6587946 July 1, 2003 Jakobsson
6591232 July 8, 2003 Kassapoglou
6601036 July 29, 2003 Walker et al.
6606607 August 12, 2003 Martin et al.
6609112 August 19, 2003 Boarman et al.
6609114 August 19, 2003 Gressel et al.
6611812 August 26, 2003 Hurtado et al.
6622116 September 16, 2003 Skinner et al.
6625734 September 23, 2003 Marvit et al.
6629082 September 30, 2003 Hambrecht et al.
6639898 October 28, 2003 Dutta et al.
6639982 October 28, 2003 Stuart et al.
6640145 October 28, 2003 Hoffberg et al.
6641050 November 4, 2003 Kelley et al.
6647373 November 11, 2003 Carlton-Foss
6654459 November 25, 2003 Bala et al.
6654806 November 25, 2003 Wall et al.
6658467 December 2, 2003 Rice et al.
6661379 December 9, 2003 Stilp et al.
6662141 December 9, 2003 Kaub
6665705 December 16, 2003 Daniels-Barnes et al.
6671759 December 30, 2003 Noda et al.
6678245 January 13, 2004 Cooper et al.
6683945 January 27, 2004 Enzmann et al.
6684250 January 27, 2004 Anderson et al.
6687822 February 3, 2004 Jakobsson
6691156 February 10, 2004 Drummond et al.
6704713 March 9, 2004 Brett
6711253 March 23, 2004 Prabhaker
6712701 March 30, 2004 Boylan, III et al.
6718312 April 6, 2004 McAfee et al.
6728266 April 27, 2004 Sabry et al.
6736322 May 18, 2004 Gobburu et al.
6754169 June 22, 2004 Baum et al.
6754643 June 22, 2004 Goldsmith
6766307 July 20, 2004 Israel et al.
6772171 August 3, 2004 Baentsch et al.
6779111 August 17, 2004 Gehrmann et al.
6785606 August 31, 2004 DeKock et al.
6785671 August 31, 2004 Bailey et al.
6791472 September 14, 2004 Hoffberg
6792399 September 14, 2004 Phillips et al.
6799165 September 28, 2004 Boesjes
6804345 October 12, 2004 Bala et al.
6834110 December 21, 2004 Marconcini et al.
6834272 December 21, 2004 Naor et al.
6834811 December 28, 2004 Huberman et al.
6842463 January 11, 2005 Drwiega et al.
6842515 January 11, 2005 Mengshoel et al.
6845367 January 18, 2005 Bendel et al.
6847939 January 25, 2005 Shemesh
6850252 February 1, 2005 Hoffberg
6850502 February 1, 2005 Kagan et al.
6859533 February 22, 2005 Wang et al.
6865559 March 8, 2005 Dutta
6865825 March 15, 2005 Bailey, Sr. et al.
6868525 March 15, 2005 Szabo
6876309 April 5, 2005 Lawrence
6886102 April 26, 2005 Lyle
6901446 May 31, 2005 Chellis et al.
6926796 August 9, 2005 Nishida et al.
6928261 August 9, 2005 Hasegawa et al.
6931538 August 16, 2005 Sawaguchi
6934249 August 23, 2005 Bertin et al.
6937726 August 30, 2005 Wang
6944663 September 13, 2005 Schuba et al.
6954731 October 11, 2005 Montague
6954931 October 11, 2005 Shetty et al.
6955605 October 18, 2005 Young et al.
6956835 October 18, 2005 Tong et al.
6958986 October 25, 2005 Cain
6959288 October 25, 2005 Medina et al.
6959388 October 25, 2005 Bleumer
6968323 November 22, 2005 Bansal et al.
6974412 December 13, 2005 Dobrovolny
6978126 December 20, 2005 Blaker et al.
6978252 December 20, 2005 Shuster
7003485 February 21, 2006 Young
7003499 February 21, 2006 Arditti et al.
7006881 February 28, 2006 Hoffberg et al.
7016870 March 21, 2006 Jones et al.
7023979 April 4, 2006 Wu et al.
7036146 April 25, 2006 Goldsmith
7039598 May 2, 2006 Tobin et al.
7043245 May 9, 2006 Dokko
7043759 May 9, 2006 Kaashoek et al.
7044362 May 16, 2006 Yu
7047242 May 16, 2006 Ponte
7062458 June 13, 2006 Maggioncalda et al.
7062461 June 13, 2006 Ausubel
7069308 June 27, 2006 Abrams
7072942 July 4, 2006 Maller
7075902 July 11, 2006 El Batt
7076553 July 11, 2006 Chan et al.
7085682 August 1, 2006 Heller et al.
7096197 August 22, 2006 Messmer et al.
7099839 August 29, 2006 Madoff et al.
7103565 September 5, 2006 Vaid
7103580 September 5, 2006 Batachia et al.
7107706 September 19, 2006 Bailey, Sr. et al.
7110525 September 19, 2006 Heller et al.
7113780 September 26, 2006 McKenna et al.
7113927 September 26, 2006 Tanaka et al.
7124440 October 17, 2006 Poletto et al.
7130579 October 31, 2006 Rael et al.
7133841 November 7, 2006 Wurman et al.
7136710 November 14, 2006 Hoffberg et al.
7142523 November 28, 2006 Chekuri et al.
7143434 November 28, 2006 Paek et al.
7149801 December 12, 2006 Burrows et al.
7162035 January 9, 2007 Durst et al.
7162639 January 9, 2007 Bleumer
7165046 January 16, 2007 Ausubel
7181017 February 20, 2007 Nagel et al.
7184540 February 27, 2007 Dezonno et al.
7184777 February 27, 2007 Diener et al.
7194515 March 20, 2007 Kirsch
7197639 March 27, 2007 Juels et al.
7200219 April 3, 2007 Edwards et al.
7200571 April 3, 2007 Jenniges et al.
7204041 April 17, 2007 Bailey, Sr. et al.
7206762 April 17, 2007 Sireau
7206814 April 17, 2007 Kirsch
7212634 May 1, 2007 Briscoe
7213260 May 1, 2007 Judge
7219225 May 15, 2007 Rhodes
7219449 May 22, 2007 Hoffberg et al.
7240036 July 3, 2007 Mamdani et al.
7242988 July 10, 2007 Hoffberg et al.
7246164 July 17, 2007 Lehmann et al.
7248841 July 24, 2007 Agee et al.
7249027 July 24, 2007 Ausubel
7249069 July 24, 2007 Alie et al.
7249081 July 24, 2007 Shearer et al.
7249085 July 24, 2007 Kinney, Jr. et al.
7249175 July 24, 2007 Donaldson
7251589 July 31, 2007 Crowe et al.
7263607 August 28, 2007 Ingerman et al.
7264069 September 4, 2007 Fiorenza et al.
7268700 September 11, 2007 Hoffberg
7269253 September 11, 2007 Wu et al.
7271737 September 18, 2007 Hoffberg
7278159 October 2, 2007 Kaashoek et al.
7286665 October 23, 2007 Wang
7287007 October 23, 2007 Detering
7290033 October 30, 2007 Goldman et al.
7290132 October 30, 2007 Aboba et al.
7295806 November 13, 2007 Corbett et al.
7298289 November 20, 2007 Hoffberg
7305445 December 4, 2007 Singh et al.
7310660 December 18, 2007 White et al.
7319973 January 15, 2008 Tobin et al.
7321871 January 22, 2008 Scott et al.
7324971 January 29, 2008 Bookstaber
7328187 February 5, 2008 Suhmoon
7328188 February 5, 2008 Barry
7330826 February 12, 2008 Porat et al.
7334720 February 26, 2008 Hulst et al.
7337139 February 26, 2008 Ausubel
7337195 February 26, 2008 Hrle et al.
7337324 February 26, 2008 Benaloh et al.
7337332 February 26, 2008 Tsuria et al.
7339992 March 4, 2008 Chang et al.
7342876 March 11, 2008 Bellur et al.
7343342 March 11, 2008 Ausubel
7346557 March 18, 2008 Matsuura
7349827 March 25, 2008 Heller et al.
7353531 April 1, 2008 Brown et al.
7356688 April 8, 2008 Wang
7356696 April 8, 2008 Jakobsson et al.
7360080 April 15, 2008 Camnisch et al.
7366695 April 29, 2008 Allen-Rouman et al.
7372952 May 13, 2008 Wu et al.
7373310 May 13, 2008 Homsi
7395614 July 8, 2008 Bailey, Sr. et al.
7398315 July 8, 2008 Atkinson et al.
7398317 July 8, 2008 Chen et al.
7412519 August 12, 2008 Wang
7412605 August 12, 2008 Raley et al.
7415432 August 19, 2008 Gianakouros et al.
7415436 August 19, 2008 Evelyn et al.
7416124 August 26, 2008 Yoshida et al.
7421741 September 2, 2008 Phillips, II et al.
7424617 September 9, 2008 Boyd et al.
7430607 September 30, 2008 Bolles et al.
7437323 October 14, 2008 Valkov et al.
7451005 November 11, 2008 Hoffberg et al.
7457823 November 25, 2008 Shraim et al.
7460065 December 2, 2008 Ogawa et al.
7464057 December 9, 2008 Cole et al.
7465241 December 16, 2008 Comeau et al.
7466823 December 16, 2008 Vestergaard et al.
7469152 December 23, 2008 Cetiner et al.
7470197 December 30, 2008 Massey et al.
7471188 December 30, 2008 Koyama et al.
7472080 December 30, 2008 Goel
7475054 January 6, 2009 Hearing et al.
7475055 January 6, 2009 Hutchison et al.
7487123 February 3, 2009 Keiser et al.
7487206 February 3, 2009 Gu et al.
7493280 February 17, 2009 Guler et al.
7500104 March 3, 2009 Goland
7505056 March 17, 2009 Kurzweil et al.
7506028 March 17, 2009 Mohr
7516089 April 7, 2009 Walker et al.
7519559 April 14, 2009 Appelman
7520421 April 21, 2009 Salafia, III et al.
7523072 April 21, 2009 Stefik et al.
7523085 April 21, 2009 Nigam et al.
7548937 June 16, 2009 Gu et al.
7552176 June 23, 2009 Atkinson et al.
7558759 July 7, 2009 Valenzuela et al.
7559070 July 7, 2009 Nakamura et al.
7567909 July 28, 2009 Billingsley
7574179 August 11, 2009 Barak et al.
7584363 September 1, 2009 Canard et al.
7590589 September 15, 2009 Hoffberg
7590602 September 15, 2009 Luzzatto
7596552 September 29, 2009 Levy et al.
7600017 October 6, 2009 Holtzman et al.
7600255 October 6, 2009 Baugher
7603304 October 13, 2009 Asthana et al.
7603319 October 13, 2009 Raley et al.
7609848 October 27, 2009 Wang et al.
7613225 November 3, 2009 Haque et al.
7627510 December 1, 2009 Jain et al.
7630927 December 8, 2009 Canard et al.
7634598 December 15, 2009 Kim et al.
7636789 December 22, 2009 Li et al.
7640166 December 29, 2009 Wiederin et al.
7641108 January 5, 2010 Kurzweil et al.
7644144 January 5, 2010 Horvitz et al.
7644274 January 5, 2010 Jakobsson et al.
7646343 January 12, 2010 Shtrom et al.
7650319 January 19, 2010 Hoffberg et al.
7653816 January 26, 2010 Avritch et al.
7660783 February 9, 2010 Reed
7660993 February 9, 2010 Birrell et al.
7664708 February 16, 2010 Stefik et al.
7676034 March 9, 2010 Wu et al.
7676423 March 9, 2010 Avery
7676439 March 9, 2010 Tattan et al.
7685642 March 23, 2010 Gilliam et al.
7693939 April 6, 2010 Wu et al.
7698248 April 13, 2010 Olson
7698335 April 13, 2010 Vronay
7702806 April 20, 2010 Gil et al.
7707118 April 27, 2010 James
7710932 May 4, 2010 Muthuswamy et al.
7711808 May 4, 2010 Parry
7715852 May 11, 2010 Chen et al.
7716532 May 11, 2010 Horvitz
7720767 May 18, 2010 Ta et al.
7724896 May 25, 2010 Nimour et al.
7725401 May 25, 2010 Raley et al.
7725414 May 25, 2010 Nigam et al.
7729975 June 1, 2010 Ausubel et al.
7730120 June 1, 2010 Singh et al.
7730314 June 1, 2010 Kim
7739335 June 15, 2010 Siegel et al.
7742972 June 22, 2010 Lange et al.
7743134 June 22, 2010 Kohler, Jr. et al.
7743163 June 22, 2010 Ruppert
7751423 July 6, 2010 Hottinen et al.
7751973 July 6, 2010 Ibrahim
7752064 July 6, 2010 Kauffman
7761471 July 20, 2010 Lee et al.
7773749 August 10, 2010 Durst et al.
7774257 August 10, 2010 Maggioncalda et al.
7774264 August 10, 2010 Ausubel
7774609 August 10, 2010 Rover et al.
7778856 August 17, 2010 Reynolds et al.
7778869 August 17, 2010 Jain et al.
7788155 August 31, 2010 Jones et al.
7788205 August 31, 2010 Chalasani et al.
7797732 September 14, 2010 Tam et al.
7801802 September 21, 2010 Walker et al.
7808922 October 5, 2010 Dekorsy
7813527 October 12, 2010 Wang
7813822 October 12, 2010 Hoffberg
7813989 October 12, 2010 Jones et al.
7817796 October 19, 2010 Clippinger et al.
7827128 November 2, 2010 Karlsson et al.
7831573 November 9, 2010 Lillibridge et al.
7836498 November 16, 2010 Poletto et al.
7843822 November 30, 2010 Paul et al.
7844535 November 30, 2010 Guler et al.
7849139 December 7, 2010 Wolfson et al.
7860486 December 28, 2010 Frank et al.
7869591 January 11, 2011 Nagel et al.
7870240 January 11, 2011 Horvitz
7877304 January 25, 2011 Coulter
7885947 February 8, 2011 Michele et al.
7890581 February 15, 2011 Rao et al.
7894595 February 22, 2011 Wu et al.
7904187 March 8, 2011 Hoffberg et al.
7909243 March 22, 2011 Merkow et al.
7916327 March 29, 2011 Yamaguchi
7916858 March 29, 2011 Heller et al.
7921173 April 5, 2011 Atkinson et al.
7929689 April 19, 2011 Huitema et al.
7933829 April 26, 2011 Goldberg et al.
7937586 May 3, 2011 Torre et al.
7942317 May 17, 2011 Racz et al.
7945464 May 17, 2011 El Homsi
7947936 May 24, 2011 Bobinchak et al.
7949121 May 24, 2011 Flockhart et al.
7953219 May 31, 2011 Freedman et al.
7956807 June 7, 2011 Celebi et al.
7962346 June 14, 2011 Faltings
7966078 June 21, 2011 Hoffberg et al.
7974714 July 5, 2011 Hoffberg
7979628 July 12, 2011 Dolgunov et al.
7983941 July 19, 2011 Munro et al.
7987003 July 26, 2011 Hoffberg et al.
7990947 August 2, 2011 Twitchell, Jr. et al.
8005746 August 23, 2011 Conwell
8015073 September 6, 2011 Ilechko et al.
8015398 September 6, 2011 Camenisch et al.
8015607 September 6, 2011 Appelman
8019814 September 13, 2011 Bou-Ghannam et al.
8020029 September 13, 2011 Aggarwal et al.
8024274 September 20, 2011 Parkes et al.
8024317 September 20, 2011 Nair et al.
8027665 September 27, 2011 Frank
8031060 October 4, 2011 Hoffberg et al.
8032435 October 4, 2011 Henoch
8032477 October 4, 2011 Hoffberg et al.
8032751 October 4, 2011 Avritch et al.
8046292 October 25, 2011 Sireau
8046293 October 25, 2011 Sireau
8046313 October 25, 2011 Hoffberg et al.
8046832 October 25, 2011 Goodman et al.
8051011 November 1, 2011 Luzzatto
8054965 November 8, 2011 Wu et al.
8060035 November 15, 2011 Haykin
8060401 November 15, 2011 Ingman et al.
8060433 November 15, 2011 Conitzer et al.
8065370 November 22, 2011 Hulten et al.
8069072 November 29, 2011 Ingman et al.
8073731 December 6, 2011 Rajasenan
8081969 December 20, 2011 Lauer et al.
8082582 December 20, 2011 Li et al.
8086520 December 27, 2011 Byde et al.
8086700 December 27, 2011 Davis et al.
8086842 December 27, 2011 Sidhu et al.
8098585 January 17, 2012 Jiang et al.
8098637 January 17, 2012 Tewfik
8099386 January 17, 2012 Tysowski et al.
8099668 January 17, 2012 Garbow et al.
8107375 January 31, 2012 Wong et al.
8111646 February 7, 2012 Chang
8112303 February 7, 2012 Eglen et al.
8112483 February 7, 2012 Emigh et al.
8121628 February 21, 2012 Mauti, Jr.
8121708 February 21, 2012 Wilson et al.
8126830 February 28, 2012 Lloyd et al.
8126947 February 28, 2012 Yoshida et al.
8131302 March 6, 2012 Quigley et al.
8132005 March 6, 2012 Tarkkala et al.
8137201 March 20, 2012 Chickering et al.
8138934 March 20, 2012 Veillette et al.
8144619 March 27, 2012 Hoffberg
8148989 April 3, 2012 Kopp
8159493 April 17, 2012 Lecerf et al.
8165916 April 24, 2012 Hoffberg et al.
8166016 April 24, 2012 Higgins et al.
8175578 May 8, 2012 McCown et al.
8195496 June 5, 2012 Gottlieb et al.
8195578 June 5, 2012 Luzzatto
8204856 June 19, 2012 Meyer et al.
8214298 July 3, 2012 McCown
8218502 July 10, 2012 Liu et al.
8220046 July 10, 2012 Hamilton et al.
8224905 July 17, 2012 Bocharov et al.
8225458 July 24, 2012 Hoffberg
8229718 July 24, 2012 Heil et al.
8233918 July 31, 2012 Roin et al.
8245301 August 14, 2012 Evans et al.
8245302 August 14, 2012 Evans et al.
8245921 August 21, 2012 Sol
8249916 August 21, 2012 Gworek
8250650 August 21, 2012 Jeffries et al.
8255297 August 28, 2012 Morgenstern et al.
8261062 September 4, 2012 Aura et al.
8270603 September 18, 2012 Durst et al.
8271506 September 18, 2012 Martinez et al.
8271620 September 18, 2012 Witchey
8275741 September 25, 2012 Tysowski et al.
8281121 October 2, 2012 Nath et al.
8289182 October 16, 2012 Vogel et al.
8296571 October 23, 2012 Hamilton et al.
8300798 October 30, 2012 Wu et al.
8312271 November 13, 2012 Bangerter et al.
8312511 November 13, 2012 Garbow et al.
8315938 November 20, 2012 Forsythe
8316237 November 20, 2012 Felsher et al.
8319766 November 27, 2012 Gormish et al.
8320302 November 27, 2012 Richeson et al.
8321955 November 27, 2012 Feng et al.
8326282 December 4, 2012 Margis
8327443 December 4, 2012 Eiland et al.
8331632 December 11, 2012 Mohanty et al.
8333670 December 18, 2012 Ono
8341547 December 25, 2012 Ingman et al.
8346799 January 1, 2013 Huet et al.
8352302 January 8, 2013 Ingman et al.
8352400 January 8, 2013 Hoffberg et al.
8355018 January 15, 2013 Rhodes et al.
8359265 January 22, 2013 Van Rensburg et al.
8363744 January 29, 2013 Agee et al.
8364136 January 29, 2013 Hoffberg et al.
8369880 February 5, 2013 Citrano, III et al.
8369967 February 5, 2013 Hoffberg et al.
8373582 February 12, 2013 Hoffberg
8385533 February 26, 2013 Flockhart et al.
8402356 March 19, 2013 Martinez et al.
8402490 March 19, 2013 Hoffberg-Borghesani et al.
8407198 March 26, 2013 Yoshida et al.
8411842 April 2, 2013 Wu et al.
8412952 April 2, 2013 Ramzan et al.
8416064 April 9, 2013 Leung
8416197 April 9, 2013 Feng et al.
8418039 April 9, 2013 Birmingham et al.
8429083 April 23, 2013 Appelman
8447804 May 21, 2013 Bai et al.
8462681 June 11, 2013 Pochiraju et al.
8463651 June 11, 2013 Connors et al.
8464067 June 11, 2013 Pashalidis
8468244 June 18, 2013 Redlich et al.
8480483 July 9, 2013 Soussa et al.
8484366 July 9, 2013 Patel et al.
8510200 August 13, 2013 Pearlman et al.
8510324 August 13, 2013 Bai et al.
8516266 August 20, 2013 Hoffberg et al.
8527317 September 3, 2013 Haddad
8533843 September 10, 2013 Levi
8538740 September 17, 2013 Kumar et al.
8538785 September 17, 2013 Coleman et al.
8553623 October 8, 2013 Buer et al.
8559388 October 15, 2013 Viorel et al.
8566247 October 22, 2013 Nagel et al.
8572193 October 29, 2013 Nielsen et al.
8582753 November 12, 2013 Heller et al.
8583263 November 12, 2013 Hoffberg et al.
8583564 November 12, 2013 Wiseman et al.
8584200 November 12, 2013 Frank
8589206 November 19, 2013 Boss et al.
8589884 November 19, 2013 Gorthi et al.
8593946 November 26, 2013 Goldstein et al.
8600830 December 3, 2013 Hoffberg
8600847 December 3, 2013 Gherson et al.
8607305 December 10, 2013 Neystadt et al.
8612271 December 17, 2013 Nielsen et al.
8615087 December 24, 2013 DiCrescenzo et al.
8620887 December 31, 2013 Kheyfets
8621074 December 31, 2013 Shikari et al.
8629789 January 14, 2014 Hoffberg
8635132 January 21, 2014 Wilks et al.
8645514 February 4, 2014 Gnanasambandam et al.
8645697 February 4, 2014 Emigh et al.
8661537 February 25, 2014 Stephens, Jr.
8667288 March 4, 2014 Yavuz
8676394 March 18, 2014 Lo et al.
8682343 March 25, 2014 Schmidt et al.
8682686 March 25, 2014 Warner et al.
8682726 March 25, 2014 Hoffberg
8689003 April 1, 2014 Agrawal
8706516 April 22, 2014 Warner et al.
8706914 April 22, 2014 Duchesneau
8706915 April 22, 2014 Duchesneau
8712918 April 29, 2014 Luzzatto
8713450 April 29, 2014 Garbow et al.
8733632 May 27, 2014 Faith et al.
8737965 May 27, 2014 McCown et al.
8744890 June 3, 2014 Bernier et al.
8761787 June 24, 2014 Chen et al.
8768737 July 1, 2014 Solomon et al.
8768851 July 1, 2014 Appelman
8769373 July 1, 2014 Rogers, Jr. et al.
8774717 July 8, 2014 Ferris et al.
8775822 July 8, 2014 Marino et al.
8777735 July 15, 2014 Fine et al.
8781462 July 15, 2014 Osterloh et al.
8792922 July 29, 2014 Budianu et al.
8793778 July 29, 2014 Marinov et al.
8793780 July 29, 2014 Suffling
8794516 August 5, 2014 Racz et al.
8798246 August 5, 2014 Viswanathan
8813107 August 19, 2014 Higgins et al.
8831205 September 9, 2014 Wu et al.
8831220 September 9, 2014 McCown et al.
8831869 September 9, 2014 Bai et al.
8832073 September 9, 2014 Nagaraj et al.
8838561 September 16, 2014 Yoshida et al.
8849183 September 30, 2014 Edge et al.
8862495 October 14, 2014 Ritter
8869111 October 21, 2014 Gorthi et al.
8874477 October 28, 2014 Hoffberg
8881275 November 4, 2014 Stephens, Jr.
8892221 November 18, 2014 Kram et al.
8892495 November 18, 2014 Hoffberg et al.
8892673 November 18, 2014 Emigh et al.
8892712 November 18, 2014 Kuchibhotla et al.
8892900 November 18, 2014 Bangerter et al.
8897900 November 25, 2014 Smith et al.
8904181 December 2, 2014 Felsher et al.
8909462 December 9, 2014 Lection et al.
8914022 December 16, 2014 Kostanic et al.
8915781 December 23, 2014 Fine et al.
8935366 January 13, 2015 Mehr et al.
8958408 February 17, 2015 Jain et al.
8961300 February 24, 2015 Fine
8961301 February 24, 2015 Fine et al.
8964958 February 24, 2015 Steiner
8965834 February 24, 2015 Burchard
8968082 March 3, 2015 Fine et al.
8968104 March 3, 2015 Fine et al.
8971519 March 3, 2015 Hoffberg
8974284 March 10, 2015 Selby et al.
8984030 March 17, 2015 Nagpal et al.
8984402 March 17, 2015 Rolleston et al.
8986096 March 24, 2015 Fine et al.
8990100 March 24, 2015 Nielsen et al.
8990370 March 24, 2015 Sarmenta et al.
8991716 March 31, 2015 Takigahira
8992311 March 31, 2015 Fine
8992312 March 31, 2015 Fine et al.
8996558 March 31, 2015 Flanagan et al.
9009183 April 14, 2015 Ahmed et al.
9009318 April 14, 2015 Rangarajan et al.
9009492 April 14, 2015 Belenky et al.
9020987 April 28, 2015 Nanda et al.
9045927 June 2, 2015 Hoffberg
9053562 June 9, 2015 Rabin et al.
9055362 June 9, 2015 Zhang
9055511 June 9, 2015 Gupta et al.
9060381 June 16, 2015 Tarte et al.
9070252 June 30, 2015 Riahei et al.
9070253 June 30, 2015 Tung et al.
9071446 June 30, 2015 Kreft
9076294 July 7, 2015 Fine et al.
9076295 July 7, 2015 Fine et al.
9092939 July 28, 2015 Fine et al.
9092940 July 28, 2015 Fine et al.
9094836 July 28, 2015 Lee et al.
9098711 August 4, 2015 Yoshida et al.
9112806 August 18, 2015 Holcomb
9119083 August 25, 2015 Zimmerman
9121217 September 1, 2015 Hoffberg
9122702 September 1, 2015 Biswas et al.
9132352 September 15, 2015 Rabin et al.
9143392 September 22, 2015 Duchesneau
9148473 September 29, 2015 Sharma
RE45775 October 20, 2015 Agee et al.
9151633 October 6, 2015 Hoffberg
9159019 October 13, 2015 Takigahira
9167505 October 20, 2015 Gupta et al.
9177280 November 3, 2015 Nielsen et al.
9189047 November 17, 2015 Bestgen et al.
9200908 December 1, 2015 Diaz et al.
9202178 December 1, 2015 Hall et al.
9202375 December 1, 2015 Sampedro Diaz et al.
9208032 December 8, 2015 McAlister et al.
9208203 December 8, 2015 Re et al.
9208458 December 8, 2015 Nielsen et al.
9208624 December 8, 2015 Rude et al.
9209985 December 8, 2015 Wise
9214063 December 15, 2015 Fine et al.
9215322 December 15, 2015 Wu et al.
9219947 December 22, 2015 Holden et al.
9220018 December 22, 2015 Yang et al.
9224262 December 29, 2015 Fine et al.
9232559 January 5, 2016 Nath et al.
9235821 January 12, 2016 Nielsen et al.
9239951 January 19, 2016 Hoffberg et al.
9256849 February 9, 2016 Nielsen et al.
9256908 February 9, 2016 Dai et al.
9258307 February 9, 2016 Pianese et al.
9261371 February 16, 2016 R et al.
9276404 March 1, 2016 Kayama
9276664 March 1, 2016 Zufall et al.
9276771 March 1, 2016 Zhou et al.
9277482 March 1, 2016 Vasseur et al.
9280778 March 8, 2016 Gillies et al.
9290896 March 22, 2016 Bianco
9294560 March 22, 2016 Klein et al.
9298806 March 29, 2016 Vessenes et al.
9299218 March 29, 2016 Fine et al.
9305428 April 5, 2016 Fine et al.
9311664 April 12, 2016 Bulumulla et al.
9311670 April 12, 2016 Hoffberg
9317830 April 19, 2016 Nielsen et al.
9317997 April 19, 2016 Fine et al.
9317998 April 19, 2016 Fine
9317999 April 19, 2016 Fine et al.
9325504 April 26, 2016 Weiss et al.
9342829 May 17, 2016 Zhou et al.
9344355 May 17, 2016 Vasseur et al.
9344438 May 17, 2016 Xiao et al.
9346428 May 24, 2016 Bortolin
9348419 May 24, 2016 Julian et al.
9355649 May 31, 2016 King et al.
9361616 June 7, 2016 Zhou et al.
9361797 June 7, 2016 Chen et al.
9362742 June 7, 2016 Kayama
9367706 June 14, 2016 Loveland et al.
9377314 June 28, 2016 Tseng et al.
9379981 June 28, 2016 Zhou et al.
9392018 July 12, 2016 Adams et al.
9397985 July 19, 2016 Seger, II et al.
9405750 August 2, 2016 Jiao et al.
9406063 August 2, 2016 Zhou et al.
9406195 August 2, 2016 Tung et al.
9416499 August 16, 2016 Cronin et al.
9419951 August 16, 2016 Felsher et al.
9424509 August 23, 2016 Ashrafi
9424576 August 23, 2016 Vandervort
9425620 August 23, 2016 Chassin et al.
9443383 September 13, 2016 Fine et al.
9449121 September 20, 2016 Marti
9449494 September 20, 2016 Leyerle et al.
9454755 September 27, 2016 Gouget et al.
9455777 September 27, 2016 Johnson et al.
9456086 September 27, 2016 Wu et al.
9461826 October 4, 2016 Kreft
9471910 October 18, 2016 Racz et al.
9473626 October 18, 2016 Nielsen et al.
9489671 November 8, 2016 Zhou et al.
9489762 November 8, 2016 Jenkins
9489798 November 8, 2016 Fine et al.
9495668 November 15, 2016 Juels
9524510 December 20, 2016 Jalali et al.
9535563 January 3, 2017 Hoffberg et al.
9536385 January 3, 2017 Fine et al.
9542642 January 10, 2017 Wood
9551582 January 24, 2017 Hoffberg
9552694 January 24, 2017 Fine et al.
9552696 January 24, 2017 Fine et al.
9553812 January 24, 2017 Mahadevan et al.
9558623 January 31, 2017 Fine et al.
RE46310 February 14, 2017 Hoffberg et al.
9563863 February 7, 2017 Nielsen et al.
9563890 February 7, 2017 Zhou
9576285 February 21, 2017 Zhou
9576426 February 21, 2017 Marshall et al.
9578678 February 21, 2017 Nielsen et al.
9584543 February 28, 2017 Kaminsky
9603033 March 21, 2017 Garg et al.
9607052 March 28, 2017 Shmueli et al.
9608829 March 28, 2017 Spanos et al.
9615264 April 4, 2017 Hoffberg
9619967 April 11, 2017 Fine et al.
9626685 April 18, 2017 Martinez et al.
9635024 April 25, 2017 Pisharody et al.
9635177 April 25, 2017 Hoffberg
9646130 May 9, 2017 Drew et al.
9646300 May 9, 2017 Zhou et al.
9661615 May 23, 2017 Ye et al.
9665101 May 30, 2017 Templeton
9665865 May 30, 2017 Xing et al.
9667649 May 30, 2017 Lategan et al.
9672518 June 6, 2017 Sobel et al.
9684929 June 20, 2017 Shapiro
9688286 June 27, 2017 Wilkes, III et al.
9696418 July 4, 2017 Holder
9699212 July 4, 2017 Adams et al.
9703616 July 11, 2017 Bauerle et al.
9704151 July 11, 2017 Zhou et al.
9705895 July 11, 2017 Gutzmann
9707942 July 18, 2017 Cheatham, III et al.
9710804 July 18, 2017 Zhou et al.
9716653 July 25, 2017 Gage
9722912 August 1, 2017 Zhao et al.
9727042 August 8, 2017 Hoffberg-Borghesani et al.
9728037 August 8, 2017 Fine et al.
9736147 August 15, 2017 Mead
9736308 August 15, 2017 Wu et al.
9747597 August 29, 2017 Wu
9753802 September 5, 2017 Shipilov et al.
9756116 September 5, 2017 Ribeiro et al.
9767651 September 19, 2017 Fine et al.
9773217 September 26, 2017 Nielsen et al.
9774578 September 26, 2017 Ateniese et al.
9775096 September 26, 2017 Gupta et al.
9780853 October 3, 2017 Urzhumov
9785130 October 10, 2017 Hooshmand et al.
9785369 October 10, 2017 Ateniese et al.
9785780 October 10, 2017 Yoshida et al.
9786127 October 10, 2017 Marshall et al.
9787760 October 10, 2017 Folkening
9794074 October 17, 2017 Toll et al.
9794797 October 17, 2017 Hoffberg
9795882 October 24, 2017 Rabin et al.
9800310 October 24, 2017 Urzhumov
9807092 October 31, 2017 Gutzmann
9807106 October 31, 2017 Daniel et al.
9807239 October 31, 2017 Wu et al.
9807621 October 31, 2017 Hui et al.
9813973 November 7, 2017 Ben Bassat et al.
9814071 November 7, 2017 Niedzwiecki et al.
9818136 November 14, 2017 Hoffberg
9820157 November 14, 2017 Rajendran et al.
9826412 November 21, 2017 Henderson et al.
9836661 December 5, 2017 Zhou et al.
9836908 December 5, 2017 Spanos et al.
9837706 December 5, 2017 Neubecker et al.
9842211 December 12, 2017 Krishnapura
9842312 December 12, 2017 Rosati et al.
9849364 December 26, 2017 Tran et al.
9855785 January 2, 2018 Nagelberg et al.
9858569 January 2, 2018 Phan et al.
9859952 January 2, 2018 Keech et al.
9860391 January 2, 2018 Wu et al.
9862222 January 9, 2018 Nagelberg et al.
9866545 January 9, 2018 Beecham
9867112 January 9, 2018 Schwengler et al.
9870591 January 16, 2018 Shah
9875510 January 23, 2018 Kasper
9876775 January 23, 2018 Mossbarger
9881176 January 30, 2018 Goldfarb et al.
9887933 February 6, 2018 Lawrence, III
9890744 February 13, 2018 Li
9892460 February 13, 2018 Winklevoss et al.
9893898 February 13, 2018 Kreft
9894485 February 13, 2018 Finlow-Bates
9896572 February 20, 2018 Belalcazar Otalora
9898782 February 20, 2018 Winklevoss et al.
9906552 February 27, 2018 Brown et al.
9916588 March 13, 2018 Nielsen et al.
9922278 March 20, 2018 Kapinos et al.
9922498 March 20, 2018 Fine et al.
9928290 March 27, 2018 Tiell
9940594 April 10, 2018 Rosati et al.
9942214 April 10, 2018 Burciu et al.
9942262 April 10, 2018 Horowitz et al.
9948467 April 17, 2018 King
9948580 April 17, 2018 Reed et al.
9959065 May 1, 2018 Ateniese et al.
9960909 May 1, 2018 Karighattam et al.
9965628 May 8, 2018 Ford et al.
9965804 May 8, 2018 Winklevoss et al.
9965805 May 8, 2018 Winklevoss et al.
9966220 May 8, 2018 Trevor et al.
9967088 May 8, 2018 Ateniese et al.
9967096 May 8, 2018 Ateniese et al.
9967333 May 8, 2018 Chen et al.
9967334 May 8, 2018 Ford
9973341 May 15, 2018 Ferrin
9986577 May 29, 2018 Bose
9995076 June 12, 2018 Hoffberg
9996574 June 12, 2018 Li et al.
9997023 June 12, 2018 Fine et al.
9998286 June 12, 2018 Ramathal et al.
10002389 June 19, 2018 Winklevoss et al.
10007893 June 26, 2018 Emmerson
10013246 July 3, 2018 Zessin et al.
10013286 July 3, 2018 Chen et al.
10015017 July 3, 2018 Finlow-Bates
10015478 July 3, 2018 Rabin et al.
10021132 July 10, 2018 Adams et al.
10022613 July 17, 2018 Tran et al.
10025797 July 17, 2018 Fonss
10026118 July 17, 2018 Castinado et al.
10027649 July 17, 2018 Beecham
10032212 July 24, 2018 Winkelman et al.
10038695 July 31, 2018 Goldfarb et al.
10042782 August 7, 2018 Struttmann
10043176 August 7, 2018 Gulchenko
10046228 August 14, 2018 Tran et al.
10051060 August 14, 2018 Basu et al.
10051069 August 14, 2018 Hu et al.
10068228 September 4, 2018 Winklevoss et al.
10075298 September 11, 2018 Struttmann
10078822 September 18, 2018 Racz et al.
10083422 September 25, 2018 Rosati et al.
10084607 September 25, 2018 Toll et al.
10084642 September 25, 2018 Goldfarb et al.
10084794 September 25, 2018 Goldfarb et al.
10086949 October 2, 2018 Karunakar et al.
10089489 October 2, 2018 Goldfarb et al.
10091276 October 2, 2018 Bloomquist et al.
10092843 October 9, 2018 Rabin et al.
10095878 October 9, 2018 Goldfarb et al.
10097344 October 9, 2018 Davis
10097356 October 9, 2018 Zinder
10102265 October 16, 2018 Madisetti et al.
10102501 October 16, 2018 Rosati et al.
10103885 October 16, 2018 Davis
10110576 October 23, 2018 Ateniese et al.
10114970 October 30, 2018 Goldfarb et al.
10116693 October 30, 2018 Robinson et al.
10118696 November 6, 2018 Hoffberg
10121015 November 6, 2018 Lemmey et al.
10121019 November 6, 2018 Struttmann
10122661 November 6, 2018 Golan
10127816 November 13, 2018 Hoffberg
10129032 November 13, 2018 Vandervort
10129097 November 13, 2018 Beecham et al.
10129292 November 13, 2018 Jeffries et al.
10135616 November 20, 2018 Finlow-Bates
10135859 November 20, 2018 McLaughlin et al.
10135921 November 20, 2018 Finlow-Bates
10142312 November 27, 2018 Johnsrud et al.
10142491 November 27, 2018 Chandrashekar et al.
10142937 November 27, 2018 Egner et al.
10147076 December 4, 2018 Zhou et al.
10156185 December 18, 2018 Hesselink et al.
10156953 December 18, 2018 Bells et al.
10158527 December 18, 2018 Anderson et al.
10158611 December 18, 2018 Castagna
10160251 December 25, 2018 Nagelberg et al.
10163137 December 25, 2018 Hoffberg
10164952 December 25, 2018 Vandervort
10164983 December 25, 2018 Chen et al.
10168705 January 1, 2019 Kazemi et al.
10169614 January 1, 2019 Brady et al.
10171248 January 1, 2019 King
10176308 January 8, 2019 Mintz et al.
10182065 January 15, 2019 Ryon et al.
10185550 January 22, 2019 Smith et al.
10186115 January 22, 2019 Fine et al.
10187214 January 22, 2019 Ferrin
10191462 January 29, 2019 Brew et al.
10192073 January 29, 2019 Marin
10192198 January 29, 2019 Nazzari et al.
10193696 January 29, 2019 Struttmann et al.
10195513 February 5, 2019 Tran et al.
10198325 February 5, 2019 Davis
10198908 February 5, 2019 Dabrowski
10198949 February 5, 2019 Becker
10200261 February 5, 2019 Cuervo Laffaye et al.
10204148 February 12, 2019 Madisetti et al.
10204341 February 12, 2019 Davis
10205997 February 12, 2019 Epstein et al.
10210079 February 19, 2019 Ray
10217241 February 26, 2019 Rossi et al.
10227739 March 12, 2019 Laugwitz et al.
10229434 March 12, 2019 Cheng et al.
10235516 March 19, 2019 Parello et al.
10235621 March 19, 2019 Zhu
10237349 March 19, 2019 Liu et al.
10237420 March 19, 2019 Wu et al.
10242219 March 26, 2019 Struttmann
10245875 April 2, 2019 Nagelberg et al.
20010000458 April 26, 2001 Shtivelman et al.
20010003172 June 7, 2001 Skinner et al.
20010008013 July 12, 2001 Johnson et al.
20010011228 August 2, 2001 Shenkman
20010013021 August 9, 2001 Saito
20010024497 September 27, 2001 Campbell et al.
20010027431 October 4, 2001 Rupp et al.
20010032164 October 18, 2001 Kim
20010033557 October 25, 2001 Amalfitano
20010034578 October 25, 2001 Ugajin
20010039528 November 8, 2001 Atkinson et al.
20010039624 November 8, 2001 Kellum
20010042785 November 22, 2001 Walker et al.
20010043586 November 22, 2001 Miloslavsky
20010045104 November 29, 2001 Bailey, Sr. et al.
20010047291 November 29, 2001 Garahi et al.
20010049650 December 6, 2001 Moshal et al.
20010051540 December 13, 2001 Hindman et al.
20020002521 January 3, 2002 Shearer et al.
20020006191 January 17, 2002 Weiss
20020007453 January 17, 2002 Nemovicher
20020009190 January 24, 2002 McIllwaine et al.
20020010663 January 24, 2002 Muller
20020010669 January 24, 2002 Street
20020010673 January 24, 2002 Muller et al.
20020013631 January 31, 2002 Parunak et al.
20020013757 January 31, 2002 Bykowsky et al.
20020018554 February 14, 2002 Jensen et al.
20020019846 February 14, 2002 Miloslavsky et al.
20020021693 February 21, 2002 Bruno et al.
20020023027 February 21, 2002 Simonds
20020023215 February 21, 2002 Wang et al.
20020029194 March 7, 2002 Lewis et al.
20020035534 March 21, 2002 Buist et al.
20020040310 April 4, 2002 Lieben et al.
20020042274 April 11, 2002 Ades
20020042769 April 11, 2002 Gujral et al.
20020046122 April 18, 2002 Barber et al.
20020047859 April 25, 2002 Szlam et al.
20020052816 May 2, 2002 Clenaghan et al.
20020052819 May 2, 2002 Burton
20020052873 May 2, 2002 Delgado et al.
20020055899 May 9, 2002 Williams
20020059379 May 16, 2002 Harvey et al.
20020069241 June 6, 2002 Narlikar et al.
20020073018 June 13, 2002 Mulinder et al.
20020073049 June 13, 2002 Dutta
20020077954 June 20, 2002 Slaight et al.
20020082856 June 27, 2002 Gray et al.
20020083175 June 27, 2002 Afek et al.
20020091782 July 11, 2002 Benninghoff
20020094081 July 18, 2002 Medvinsky
20020095327 July 18, 2002 Zumel et al.
20020103999 August 1, 2002 Camnisch et al.
20020114278 August 22, 2002 Coussement
20020116239 August 22, 2002 Reinsma et al.
20020123954 September 5, 2002 Hito
20020128803 September 12, 2002 Skinner et al.
20020131399 September 19, 2002 Philonenko
20020138386 September 26, 2002 Maggioncalda et al.
20020147675 October 10, 2002 Das et al.
20020151992 October 17, 2002 Hoffberg et al.
20020161671 October 31, 2002 Matsui et al.
20020165756 November 7, 2002 Tobin et al.
20020165814 November 7, 2002 Lee et al.
20020165817 November 7, 2002 Rackson et al.
20020174052 November 21, 2002 Guler et al.
20020174344 November 21, 2002 Ting
20020183066 December 5, 2002 Pankaj
20020194256 December 19, 2002 Needham et al.
20020194334 December 19, 2002 Focant et al.
20020198950 December 26, 2002 Leeds
20030002646 January 2, 2003 Gutta et al.
20030009698 January 9, 2003 Lindeman et al.
20030014293 January 16, 2003 Shetty et al.
20030014373 January 16, 2003 Perge et al.
20030016251 January 23, 2003 Kondo
20030018561 January 23, 2003 Kitchen et al.
20030023538 January 30, 2003 Das et al.
20030033302 February 13, 2003 Banerjee et al.
20030035468 February 20, 2003 Corbaton et al.
20030041002 February 27, 2003 Hao et al.
20030055787 March 20, 2003 Fujii
20030055895 March 20, 2003 Peters
20030055898 March 20, 2003 Yeager et al.
20030065608 April 3, 2003 Cutler
20030078867 April 24, 2003 Scott et al.
20030083926 May 1, 2003 Semret et al.
20030086554 May 8, 2003 Krimstock et al.
20030087652 May 8, 2003 Simon et al.
20030088488 May 8, 2003 Solomon et al.
20030095652 May 22, 2003 Mengshoel et al.
20030097325 May 22, 2003 Friesen et al.
20030101124 May 29, 2003 Semret et al.
20030101274 May 29, 2003 Yi et al.
20030115088 June 19, 2003 Thompson
20030115114 June 19, 2003 Tateishi et al.
20030115251 June 19, 2003 Fredrickson et al.
20030119558 June 26, 2003 Steadman et al.
20030120809 June 26, 2003 Bellur et al.
20030135437 July 17, 2003 Jacobsen
20030139995 July 24, 2003 Farley
20030152086 August 14, 2003 El Batt
20030158806 August 21, 2003 Hanley et al.
20030172018 September 11, 2003 Chen et al.
20030172278 September 11, 2003 Farnham et al.
20030182224 September 25, 2003 Horrigan et al.
20030195780 October 16, 2003 Arora et al.
20030204569 October 30, 2003 Andrews et al.
20030217106 November 20, 2003 Adar et al.
20030220978 November 27, 2003 Rhodes
20030225822 December 4, 2003 Olson et al.
20030233274 December 18, 2003 Urken et al.
20030233307 December 18, 2003 Salvadori et al.
20030233584 December 18, 2003 Douceur
20040003283 January 1, 2004 Goodman et al.
20040006528 January 8, 2004 Kevin Fung
20040006529 January 8, 2004 Fung
20040006534 January 8, 2004 Fung
20040015554 January 22, 2004 Wilson
20040024684 February 5, 2004 Montepeque
20040024687 February 5, 2004 Delenda
20040028018 February 12, 2004 Cain
20040034773 February 19, 2004 Balabine et al.
20040039670 February 26, 2004 Fung
20040039685 February 26, 2004 Hambrecht et al.
20040049479 March 11, 2004 Dorne et al.
20040054551 March 18, 2004 Ausubel et al.
20040054610 March 18, 2004 Amstutz et al.
20040054617 March 18, 2004 Fung
20040054741 March 18, 2004 Weatherby et al.
20040059665 March 25, 2004 Suri et al.
20040068416 April 8, 2004 Solomon
20040068447 April 8, 2004 Mao et al.
20040073642 April 15, 2004 Iyer
20040077320 April 22, 2004 Jackson et al.
20040081183 April 29, 2004 Monza et al.
20040083195 April 29, 2004 McCord et al.
20040093278 May 13, 2004 Burchetta et al.
20040093371 May 13, 2004 Burrows et al.
20040095907 May 20, 2004 Agee et al.
20040101127 May 27, 2004 Dezonno et al.
20040103013 May 27, 2004 Jameson
20040111308 June 10, 2004 Yakov
20040111310 June 10, 2004 Szlam et al.
20040111484 June 10, 2004 Young et al.
20040117302 June 17, 2004 Weichert et al.
20040132405 July 8, 2004 Kitazawa et al.
20040138958 July 15, 2004 Watarai et al.
20040141508 July 22, 2004 Schoeneberger et al.
20040148358 July 29, 2004 Singh et al.
20040153375 August 5, 2004 Mukunya et al.
20040181571 September 16, 2004 Atkinson et al.
20040181581 September 16, 2004 Kosco
20040181585 September 16, 2004 Atkinson et al.
20040184478 September 23, 2004 Donescu et al.
20040199597 October 7, 2004 Libbey et al.
20040213400 October 28, 2004 Golitsin et al.
20040215793 October 28, 2004 Ryan et al.
20040228356 November 18, 2004 Adamczyk et al.
20040230678 November 18, 2004 Huslak et al.
20040236817 November 25, 2004 Huberman et al.
20040242275 December 2, 2004 Corbett et al.
20040259558 December 23, 2004 Skafidas et al.
20040260645 December 23, 2004 Yakos
20040264677 December 30, 2004 Horvitz et al.
20040266505 December 30, 2004 Keam et al.
20040268121 December 30, 2004 Shelest et al.
20050002335 January 6, 2005 Adamczyk et al.
20050010502 January 13, 2005 Birkestrand et al.
20050021739 January 27, 2005 Carter et al.
20050022184 January 27, 2005 Birkestrand et al.
20050027816 February 3, 2005 Olney et al.
20050038774 February 17, 2005 Lillibridge et al.
20050044032 February 24, 2005 Lee et al.
20050044228 February 24, 2005 Birkestrand et al.
20050050364 March 3, 2005 Feng
20050055410 March 10, 2005 Landsman et al.
20050065808 March 24, 2005 Fallings
20050065837 March 24, 2005 Kosiba et al.
20050074014 April 7, 2005 Rao et al.
20050075891 April 7, 2005 Arguimbau
20050080710 April 14, 2005 Malato et al.
20050080858 April 14, 2005 Pessach
20050090227 April 28, 2005 Rao et al.
20050102221 May 12, 2005 Sulkowski et al.
20050108164 May 19, 2005 Salafia et al.
20050129217 June 16, 2005 McPartlan et al.
20050137939 June 23, 2005 Calabria et al.
20050141706 June 30, 2005 Regli et al.
20050144064 June 30, 2005 Calabria et al.
20050144065 June 30, 2005 Calabria et al.
20050164664 July 28, 2005 DiFonzo et al.
20050166041 July 28, 2005 Brown
20050187803 August 25, 2005 Jain et al.
20050195960 September 8, 2005 Shaffer et al.
20050197857 September 8, 2005 Avery
20050198031 September 8, 2005 Pezaris et al.
20050246420 November 3, 2005 Little
20050251434 November 10, 2005 Ouimet
20050267824 December 1, 2005 Hurewitz
20050278240 December 15, 2005 Delenda
20050286426 December 29, 2005 Padhye et al.
20050289043 December 29, 2005 Maudlin
20050289650 December 29, 2005 Kalogridis
20060026423 February 2, 2006 Bangerter et al.
20060031770 February 9, 2006 McMenamin
20060039381 February 23, 2006 Anschutz et al.
20060041456 February 23, 2006 Hurewitz
20060046658 March 2, 2006 Cruz et al.
20060059075 March 16, 2006 Hurewitz
20060062376 March 23, 2006 Pickford
20060069621 March 30, 2006 Chang et al.
20060095578 May 4, 2006 Paya et al.
20060148414 July 6, 2006 Tee et al.
20060153356 July 13, 2006 Sisselman et al.
20060155398 July 13, 2006 Hoffberg et al.
20060167703 July 27, 2006 Yakov
20060167784 July 27, 2006 Hoffberg
20060167787 July 27, 2006 Ausubel
20060168119 July 27, 2006 Inoue et al.
20060168140 July 27, 2006 Inoue et al.
20060168147 July 27, 2006 Inoue et al.
20060173730 August 3, 2006 Birkestrand
20060174007 August 3, 2006 Birkestrand
20060190725 August 24, 2006 Huang
20060200253 September 7, 2006 Hoffberg et al.
20060200258 September 7, 2006 Hoffberg et al.
20060200259 September 7, 2006 Hoffberg et al.
20060200260 September 7, 2006 Hoffberg et al.
20060218277 September 28, 2006 Birkestrand
20060222101 October 5, 2006 Cetiner et al.
20060223447 October 5, 2006 Masoomzadeh-Fard et al.
20060224436 October 5, 2006 Matsumoto et al.
20060259957 November 16, 2006 Tam et al.
20060287937 December 21, 2006 Flinn et al.
20070002762 January 4, 2007 Matsumoto et al.
20070005799 January 4, 2007 Matsumoto et al.
20070006224 January 4, 2007 Stocker
20070011453 January 11, 2007 Tarkkala et al.
20070016476 January 18, 2007 Hoffberg et al.
20070038498 February 15, 2007 Powell et al.
20070043811 February 22, 2007 Kim et al.
20070053513 March 8, 2007 Hoffberg
20070054617 March 8, 2007 Nikolajevic et al.
20070061022 March 15, 2007 Hoffberg-Borghesani et al.
20070061023 March 15, 2007 Hoffberg et al.
20070061735 March 15, 2007 Hoffberg et al.
20070063875 March 22, 2007 Hoffberg
20070064912 March 22, 2007 Kagan et al.
20070070038 March 29, 2007 Hoffberg et al.
20070071222 March 29, 2007 Flockhart et al.
20070087756 April 19, 2007 Hoffberg
20070094734 April 26, 2007 Mangione-Smith et al.
20070097205 May 3, 2007 Venkatachalam
20070100748 May 3, 2007 Dheer et al.
20070115125 May 24, 2007 Lyon et al.
20070115916 May 24, 2007 Nguyen et al.
20070115995 May 24, 2007 Kim et al.
20070118463 May 24, 2007 Avery
20070118464 May 24, 2007 Avery
20070118465 May 24, 2007 Avery
20070124395 May 31, 2007 Edge et al.
20070130046 June 7, 2007 Khan et al.
20070136087 June 14, 2007 Yamaguchi
20070156460 July 5, 2007 Nair et al.
20070174179 July 26, 2007 Avery
20070195048 August 23, 2007 Nam et al.
20070217339 September 20, 2007 Zhao
20070233543 October 4, 2007 Oshima
20070245416 October 18, 2007 Dickinson et al.
20070265980 November 15, 2007 Sehgal
20070277248 November 29, 2007 Agrawal et al.
20070294769 December 20, 2007 Bird
20070297328 December 27, 2007 Semret et al.
20080016029 January 17, 2008 John et al.
20080034090 February 7, 2008 Schofield et al.
20080034203 February 7, 2008 Camnisch et al.
20080040749 February 14, 2008 Hoffberg et al.
20080095121 April 24, 2008 Shattil
20080109343 May 8, 2008 Robinson et al.
20080115103 May 15, 2008 Datars et al.
20080120308 May 22, 2008 Martinez et al.
20080132241 June 5, 2008 Hancock et al.
20080139136 June 12, 2008 Shtrom et al.
20080162331 July 3, 2008 Ephrati et al.
20080162486 July 3, 2008 Bells et al.
20080162666 July 3, 2008 Ebihara et al.
20080168001 July 10, 2008 Kagarlis
20080168002 July 10, 2008 Kagarlis et al.
20080189158 August 7, 2008 Bala et al.
20080205501 August 28, 2008 Cioffi et al.
20080207149 August 28, 2008 Unkefer et al.
20080212461 September 4, 2008 Pande et al.
20080227404 September 18, 2008 Harel et al.
20080229097 September 18, 2008 Bangerter et al.
20080232238 September 25, 2008 Agee
20080243577 October 2, 2008 Schwartz et al.
20080262893 October 23, 2008 Hoffberg
20080271144 October 30, 2008 Bleumer
20080279147 November 13, 2008 Hassan et al.
20080299923 December 4, 2008 O'Brien et al.
20080300891 December 4, 2008 Boss et al.
20080300942 December 4, 2008 Boss et al.
20080300947 December 4, 2008 Boss et al.
20080300948 December 4, 2008 Boss et al.
20080300949 December 4, 2008 Boss et al.
20080301022 December 4, 2008 Patel et al.
20080301024 December 4, 2008 Boss et al.
20080301025 December 4, 2008 Boss et al.
20080301026 December 4, 2008 Boss et al.
20080301027 December 4, 2008 Boss et al.
20080301028 December 4, 2008 Boss et al.
20080301029 December 4, 2008 Boss et al.
20080301030 December 4, 2008 Boss et al.
20080301031 December 4, 2008 Boss et al.
20080301688 December 4, 2008 Boss et al.
20080301689 December 4, 2008 Boss et al.
20080313707 December 18, 2008 Jain et al.
20090012875 January 8, 2009 Zanini et al.
20090024430 January 22, 2009 Marcus
20090024438 January 22, 2009 Ingman et al.
20090024590 January 22, 2009 Sturge et al.
20090041100 February 12, 2009 Kimmich et al.
20090048928 February 19, 2009 Gross
20090054018 February 26, 2009 Waheed et al.
20090059912 March 5, 2009 Rauba et al.
20090076632 March 19, 2009 Kram et al.
20090076868 March 19, 2009 Malone et al.
20090091451 April 9, 2009 Jones et al.
20090133123 May 21, 2009 Radha et al.
20090135753 May 28, 2009 Veillette
20090170607 July 2, 2009 Chiao et al.
20090180392 July 16, 2009 Greiner et al.
20090182667 July 16, 2009 Parkes et al.
20090187583 July 23, 2009 Pape et al.
20090216910 August 27, 2009 Duchesneau
20090228309 September 10, 2009 Moll
20090234759 September 17, 2009 Hatheway et al.
20090300347 December 3, 2009 Camenisch et al.
20090327024 December 31, 2009 Nielsen et al.
20100010862 January 14, 2010 Nielsen et al.
20100010863 January 14, 2010 Nielsen et al.
20100010882 January 14, 2010 Nielsen et al.
20100010883 January 14, 2010 Nielsen et al.
20100017870 January 21, 2010 Kargupta
20100037248 February 11, 2010 Lo et al.
20100042456 February 18, 2010 Stinchcombe et al.
20100048134 February 25, 2010 McCarthy et al.
20100076642 March 25, 2010 Hoffberg et al.
20100088135 April 8, 2010 Nielsen et al.
20100088164 April 8, 2010 Nielsen et al.
20100100403 April 22, 2010 Pollock et al.
20100100451 April 22, 2010 Kim et al.
20100111097 May 6, 2010 Karabinis et al.
20100121839 May 13, 2010 Meyer et al.
20100138344 June 3, 2010 Wong et al.
20100145951 June 10, 2010 Van Coeverden De Groot et al.
20100147488 June 17, 2010 Pierre et al.
20100150027 June 17, 2010 Atwal et al.
20100161817 June 24, 2010 Xiao et al.
20100191591 July 29, 2010 Silbert
20100205032 August 12, 2010 Nielsen et al.
20100211574 August 19, 2010 Mislan et al.
20100211894 August 19, 2010 Jahr et al.
20100217696 August 26, 2010 Schuba et al.
20100223096 September 2, 2010 Bosan et al.
20100232380 September 16, 2010 Choi et al.
20100235285 September 16, 2010 Hoffberg
20100267536 October 21, 2010 Ruoff
20100284333 November 11, 2010 Shirota et al.
20100317420 December 16, 2010 Hoffberg
20100318918 December 16, 2010 Mahmoodshahi
20100324969 December 23, 2010 Miller
20100332281 December 30, 2010 Horvitz et al.
20110004513 January 6, 2011 Hoffberg
20110029347 February 3, 2011 Kozat et al.
20110029419 February 3, 2011 Seeger, Jr. et al.
20110029922 February 3, 2011 Hoffberg et al.
20110035245 February 10, 2011 Nielsen et al.
20110035251 February 10, 2011 Nielsen et al.
20110035252 February 10, 2011 Nielsen et al.
20110035260 February 10, 2011 Nielsen et al.
20110035324 February 10, 2011 Nielsen et al.
20110035328 February 10, 2011 Nielsen et al.
20110046999 February 24, 2011 Nielsen et al.
20110087430 April 14, 2011 Boss et al.
20110090118 April 21, 2011 Raeder et al.
20110093500 April 21, 2011 Meyer et al.
20110112880 May 12, 2011 Ryan et al.
20110131081 June 2, 2011 Nielsen et al.
20110137805 June 9, 2011 Brookbanks et al.
20110156896 June 30, 2011 Hoffberg et al.
20110161127 June 30, 2011 Stripling et al.
20110164527 July 7, 2011 Mishra et al.
20110164546 July 7, 2011 Mishra et al.
20110167110 July 7, 2011 Hoffberg et al.
20110178948 July 21, 2011 Cheng et al.
20110213669 September 1, 2011 Vojnovic et al.
20110218916 September 8, 2011 Barber
20110225103 September 15, 2011 Clarke et al.
20110238552 September 29, 2011 Monogioudis
20110246658 October 6, 2011 Dettori et al.
20110251892 October 13, 2011 Laracey
20110295752 December 1, 2011 Parkes et al.
20110295766 December 1, 2011 Tompkins
20120004893 January 5, 2012 Vaidyanathan et al.
20120017232 January 19, 2012 Hoffberg et al.
20120022908 January 26, 2012 Sprimont et al.
20120036016 February 9, 2012 Hoffberg et al.
20120036140 February 9, 2012 Nielsen et al.
20120054626 March 1, 2012 Odenheimer
20120078769 March 29, 2012 Becher et al.
20120089983 April 12, 2012 Chandra et al.
20120144989 June 14, 2012 Du Plessis et al.
20120150651 June 14, 2012 Hoffberg et al.
20120159321 June 21, 2012 Rolleston et al.
20120179966 July 12, 2012 Kappos
20120221380 August 30, 2012 Dissmore et al.
20120238211 September 20, 2012 Ferris et al.
20120253532 October 4, 2012 McMullin et al.
20120260329 October 11, 2012 Suffling
20120271712 October 25, 2012 Katzin et al.
20120310809 December 6, 2012 Wilson, Jr. et al.
20120316688 December 13, 2012 Boardman et al.
20120331285 December 27, 2012 Bangerter et al.
20130006718 January 3, 2013 Nielsen et al.
20130024379 January 24, 2013 Di Tucci et al.
20130036222 February 7, 2013 Mogalayapalli et al.
20130080307 March 28, 2013 Hoffberg
20130085926 April 4, 2013 Wesson et al.
20130116920 May 9, 2013 Cavalcante et al.
20130117143 May 9, 2013 Colella et al.
20130117162 May 9, 2013 Feng et al.
20130121194 May 16, 2013 Heshmati
20130122882 May 16, 2013 Patel et al.
20130147598 June 13, 2013 Hoffberg et al.
20130165070 June 27, 2013 Hoffberg
20130166387 June 27, 2013 Hoffberg
20130211877 August 15, 2013 Kushkuley et al.
20130226669 August 29, 2013 Chiang et al.
20130238455 September 12, 2013 Laracey
20130262680 October 3, 2013 Gujarathi et al.
20140068735 March 6, 2014 Marinov et al.
20140074765 March 13, 2014 Steck
20140081793 March 20, 2014 Hoffberg
20140089241 March 27, 2014 Hoffberg et al.
20140101312 April 10, 2014 Huang et al.
20140108126 April 17, 2014 Carncross et al.
20140122149 May 1, 2014 Nielsen et al.
20140173452 June 19, 2014 Hoffberg et al.
20140229621 August 14, 2014 Song et al.
20140257868 September 11, 2014 Hayward et al.
20140258110 September 11, 2014 Davis et al.
20140258356 September 11, 2014 Zeng et al.
20140272907 September 18, 2014 Raniere
20140274263 September 18, 2014 Fine et al.
20140274264 September 18, 2014 Fine et al.
20140274265 September 18, 2014 Fine et al.
20140274266 September 18, 2014 Fine et al.
20140274267 September 18, 2014 Fine
20140274268 September 18, 2014 Marshall et al.
20140274269 September 18, 2014 Fine et al.
20140274270 September 18, 2014 Fine et al.
20140274271 September 18, 2014 Fine
20140274272 September 18, 2014 Tung et al.
20140274325 September 18, 2014 Fine et al.
20140274326 September 18, 2014 Fine et al.
20140274327 September 18, 2014 Fine et al.
20140274328 September 18, 2014 Fine et al.
20140274329 September 18, 2014 Fine et al.
20140274330 September 18, 2014 Selby et al.
20140274331 September 18, 2014 Fine et al.
20140274333 September 18, 2014 Fine
20140274334 September 18, 2014 Fine et al.
20140274335 September 18, 2014 Fine et al.
20140274336 September 18, 2014 Tung et al.
20140274337 September 18, 2014 Fine et al.
20140274338 September 18, 2014 Fine
20140274339 September 18, 2014 Fine et al.
20140274340 September 18, 2014 Fine et al.
20140274352 September 18, 2014 Marshall et al.
20140274365 September 18, 2014 Riahei et al.
20140279148 September 18, 2014 Hyde et al.
20140280972 September 18, 2014 Calippe et al.
20140302905 October 9, 2014 Fine et al.
20140304041 October 9, 2014 Nielsen et al.
20140344015 November 20, 2014 Puertolas-Montanes et al.
20140349692 November 27, 2014 Zhou et al.
20140362697 December 11, 2014 Desnoyer
20140379506 December 25, 2014 Marshall et al.
20150006349 January 1, 2015 Eddy et al.
20150006350 January 1, 2015 Prasad et al.
20150026072 January 22, 2015 Zhou et al.
20150033026 January 29, 2015 Roelse et al.
20150073907 March 12, 2015 Purves et al.
20150081444 March 19, 2015 Hoffberg
20150088674 March 26, 2015 Flurscheim et al.
20150089353 March 26, 2015 Folkening
20150097531 April 9, 2015 Powell et al.
20150102940 April 16, 2015 Keech et al.
20150111591 April 23, 2015 Hoffberg
20150116162 April 30, 2015 Caimi et al.
20150120392 April 30, 2015 Gharachorloo et al.
20150120551 April 30, 2015 Jung et al.
20150149242 May 28, 2015 Nielsen et al.
20150170112 June 18, 2015 DeCastro
20150170470 June 18, 2015 Fine et al.
20150170471 June 18, 2015 Fine
20150193717 July 9, 2015 Nielsen et al.
20150199875 July 16, 2015 Fine et al.
20150204559 July 23, 2015 Hoffberg et al.
20150206389 July 23, 2015 Fine et al.
20150211919 July 30, 2015 Julian et al.
20150212973 July 30, 2015 Tang et al.
20150220892 August 6, 2015 Allen
20150220928 August 6, 2015 Allen
20150223539 August 13, 2015 Marco
20150223892 August 13, 2015 Miller et al.
20150244690 August 27, 2015 Mossbarger
20150256556 September 10, 2015 Kaminsky
20150269570 September 24, 2015 Phan et al.
20150269624 September 24, 2015 Cheng et al.
20150307634 October 29, 2015 Belalcazar Otalora
20150330645 November 19, 2015 Speranzon et al.
20150332202 November 19, 2015 Nielsen et al.
20150332283 November 19, 2015 Witchey
20150332554 November 19, 2015 Fine et al.
20150339607 November 26, 2015 Nielsen et al.
20150356523 December 10, 2015 Madden
20150363769 December 17, 2015 Ronca et al.
20150379408 December 31, 2015 Kapoor et al.
20160025500 January 28, 2016 Hoffberg
20160027229 January 28, 2016 Spanos et al.
20160028552 January 28, 2016 Spanos et al.
20160034530 February 4, 2016 Nguyen et al.
20160045841 February 18, 2016 Kaplan et al.
20160054563 February 25, 2016 Fujimura et al.
20160063378 March 3, 2016 Park et al.
20160071368 March 10, 2016 Fine et al.
20160071372 March 10, 2016 Fine et al.
20160078219 March 17, 2016 Hernan
20160085955 March 24, 2016 Lerner
20160098898 April 7, 2016 Fine et al.
20160103902 April 14, 2016 Moser et al.
20160112281 April 21, 2016 Mason
20160140653 May 19, 2016 McKenzie
20160155079 June 2, 2016 Nielsen et al.
20160162873 June 9, 2016 Zhou et al.
20160164672 June 9, 2016 Karighattam et al.
20160177521 June 23, 2016 Laugwitz et al.
20160201168 July 14, 2016 Shishido et al.
20160203477 July 14, 2016 Yang et al.
20160203522 July 14, 2016 Shiffert et al.
20160217436 July 28, 2016 Brama
20160218879 July 28, 2016 Ferrin
20160224949 August 4, 2016 Thomas et al.
20160224951 August 4, 2016 Hoffberg
20160225107 August 4, 2016 Nielsen et al.
20160232537 August 11, 2016 Nonez et al.
20160232746 August 11, 2016 Fine et al.
20160247351 August 25, 2016 Fine et al.
20160254910 September 1, 2016 Finlow-Bates
20160259937 September 8, 2016 Ford et al.
20160260091 September 8, 2016 Tobias
20160260095 September 8, 2016 Ford
20160260171 September 8, 2016 Ford et al.
20160261404 September 8, 2016 Ford et al.
20160261685 September 8, 2016 Chen et al.
20160261690 September 8, 2016 Ford
20160275753 September 22, 2016 Fine et al.
20160292672 October 6, 2016 Fay et al.
20160300223 October 13, 2016 Grey et al.
20160300234 October 13, 2016 Moss-Pultz et al.
20160301531 October 13, 2016 Finlow-Bates
20160306982 October 20, 2016 Seger et al.
20160330034 November 10, 2016 Back et al.
20160342977 November 24, 2016 Lam
20160358253 December 8, 2016 Liao et al.
20160358267 December 8, 2016 Arjomand et al.
20160364708 December 15, 2016 Rice
20160379205 December 29, 2016 Margadoudakis
20160379212 December 29, 2016 Bowman et al.
20160379312 December 29, 2016 Arjomand et al.
20170005804 January 5, 2017 Zinder
20170031676 February 2, 2017 Cecchetti et al.
20170032614 February 2, 2017 Fine et al.
20170034197 February 2, 2017 Daniel et al.
20170046670 February 16, 2017 Arjomand et al.
20170046689 February 16, 2017 Lohe et al.
20170048209 February 16, 2017 Lohe et al.
20170048234 February 16, 2017 Lohe et al.
20170048235 February 16, 2017 Lohe et al.
20170054611 February 23, 2017 Tiell
20170063551 March 2, 2017 Quinn et al.
20170083907 March 23, 2017 McDonough et al.
20170085545 March 23, 2017 Lohe et al.
20170085555 March 23, 2017 Bisikalo et al.
20170091397 March 30, 2017 Shah
20170091756 March 30, 2017 Stern et al.
20170098346 April 6, 2017 Fine et al.
20170102307 April 13, 2017 Eberhardt et al.
20170103355 April 13, 2017 Eberhardt
20170103458 April 13, 2017 Pierce et al.
20170103472 April 13, 2017 Shah
20170103608 April 13, 2017 Fine et al.
20170104345 April 13, 2017 Wenzel et al.
20170109735 April 20, 2017 Sheng et al.
20170116693 April 27, 2017 Rae et al.
20170124556 May 4, 2017 Seger
20170124647 May 4, 2017 Pierce et al.
20170126684 May 4, 2017 Armknecht et al.
20170126702 May 4, 2017 Krishnamurthy
20170132619 May 11, 2017 Miller et al.
20170132620 May 11, 2017 Miller et al.
20170132621 May 11, 2017 Miller et al.
20170132625 May 11, 2017 Kennedy
20170132626 May 11, 2017 Kennedy
20170132931 May 11, 2017 Hoffberg
20170134280 May 11, 2017 Davis
20170140321 May 18, 2017 Nielsen et al.
20170145193 May 25, 2017 Belalcazar Otalora
20170148016 May 25, 2017 Davis
20170148265 May 25, 2017 Fine et al.
20170178128 June 22, 2017 Fourez et al.
20170180134 June 22, 2017 King
20170185981 June 29, 2017 Emmerson
20170188197 June 29, 2017 Finlow-Bates
20170200147 July 13, 2017 Ansari
20170206382 July 20, 2017 Rodriguez De Castro et al.
20170206512 July 20, 2017 Hoffberg
20170206532 July 20, 2017 Choi
20170206603 July 20, 2017 Al-Masoud
20170206604 July 20, 2017 Al-Masoud
20170207059 July 20, 2017 Trevor et al.
20170207917 July 20, 2017 Davis
20170213289 July 27, 2017 Doney
20170221032 August 3, 2017 Mazed
20170221052 August 3, 2017 Sheng et al.
20170228704 August 10, 2017 Zhou et al.
20170228731 August 10, 2017 Sheng et al.
20170228822 August 10, 2017 Creighton et al.
20170230189 August 10, 2017 Toll et al.
20170230242 August 10, 2017 Hammer et al.
20170232300 August 17, 2017 Tran et al.
20170236094 August 17, 2017 Shah
20170236121 August 17, 2017 Lyons et al.
20170237554 August 17, 2017 Jacobs et al.
20170237569 August 17, 2017 Vandervort
20170237570 August 17, 2017 Vandervort
20170237766 August 17, 2017 Mattson et al.
20170237770 August 17, 2017 Meriac
20170242729 August 24, 2017 Chen et al.
20170243208 August 24, 2017 Kurian et al.
20170243213 August 24, 2017 Castinado et al.
20170243214 August 24, 2017 Johnsrud et al.
20170243222 August 24, 2017 Balasubramanian
20170243286 August 24, 2017 Castinado et al.
20170243287 August 24, 2017 Johnsrud et al.
20170244707 August 24, 2017 Johnsrud et al.
20170244709 August 24, 2017 Jhingran et al.
20170249482 August 31, 2017 Takaai et al.
20170249606 August 31, 2017 Pirooz
20170255917 September 7, 2017 Singh et al.
20170262833 September 14, 2017 Xing
20170278026 September 28, 2017 Nielsen et al.
20170278186 September 28, 2017 Creighton et al.
20170285720 October 5, 2017 Shah
20170286717 October 5, 2017 Khi et al.
20170286934 October 5, 2017 Poreh et al.
20170293669 October 12, 2017 Madhavan et al.
20170293747 October 12, 2017 Naqvi
20170295023 October 12, 2017 Madhavan et al.
20170300627 October 19, 2017 Giordano et al.
20170318008 November 2, 2017 Mead
20170323294 November 9, 2017 Rohlfing et al.
20170323392 November 9, 2017 Kasper et al.
20170324711 November 9, 2017 Feeney et al.
20170327035 November 16, 2017 Keiser
20170330174 November 16, 2017 Demarinis et al.
20170330250 November 16, 2017 Arjomand et al.
20170331803 November 16, 2017 Parello et al.
20170338947 November 23, 2017 Ateniese et al.
20170338957 November 23, 2017 Ateniese et al.
20170344435 November 30, 2017 Davis
20170344580 November 30, 2017 King
20170344987 November 30, 2017 Davis
20170346693 November 30, 2017 Dix et al.
20170346804 November 30, 2017 Beecham
20170346830 November 30, 2017 Goldfarb et al.
20170352033 December 7, 2017 Buckman et al.
20170352116 December 7, 2017 Pierce et al.
20170352219 December 7, 2017 Spanos et al.
20170357966 December 14, 2017 Chandrasekhar et al.
20170359288 December 14, 2017 Golan
20170359374 December 14, 2017 Smith et al.
20170364450 December 21, 2017 Struttmann
20170364698 December 21, 2017 Goldfarb et al.
20170364699 December 21, 2017 Goldfarb et al.
20170364700 December 21, 2017 Goldfarb et al.
20170364701 December 21, 2017 Struttmann
20170364702 December 21, 2017 Goldfarb et al.
20170366353 December 21, 2017 Struttmann
20170366395 December 21, 2017 Goldfarb et al.
20170366416 December 21, 2017 Beecham et al.
20170366547 December 21, 2017 Goldfarb et al.
20170372308 December 28, 2017 Metnick et al.
20170372391 December 28, 2017 Metnick et al.
20170372392 December 28, 2017 Metnick et al.
20170374049 December 28, 2017 Ateniese et al.
20180006831 January 4, 2018 Toll et al.
20180013567 January 11, 2018 Davis
20180018723 January 18, 2018 Nagla et al.
20180019867 January 18, 2018 Davis
20180019921 January 18, 2018 Davis
20180020324 January 18, 2018 Beauford
20180025166 January 25, 2018 Daniel et al.
20180025365 January 25, 2018 Wilkinson et al.
20180025435 January 25, 2018 Karame et al.
20180025442 January 25, 2018 Isaacson et al.
20180032273 February 1, 2018 Ateniese et al.
20180039667 February 8, 2018 Pierce et al.
20180039982 February 8, 2018 Metnick et al.
20180039993 February 8, 2018 Rossi et al.
20180040007 February 8, 2018 Lane et al.
20180040040 February 8, 2018 Barski et al.
20180040041 February 8, 2018 Metnick
20180046889 February 15, 2018 Kapinos et al.
20180048469 February 15, 2018 Ateniese et al.
20180049043 February 15, 2018 Hoffberg
20180053182 February 22, 2018 Mokhasi
20180068358 March 8, 2018 Hoffberg
20180075527 March 15, 2018 Nagla et al.
20180076957 March 15, 2018 Watanabe et al.
20180077134 March 15, 2018 Beecham
20180078843 March 22, 2018 Tran et al.
20180082043 March 22, 2018 Witchey et al.
20180082216 March 22, 2018 Northrup
20180082255 March 22, 2018 Rosati et al.
20180082256 March 22, 2018 Tummuru et al.
20180082296 March 22, 2018 Brashers
20180084042 March 22, 2018 Finlow-Bates
20180088928 March 29, 2018 Smith et al.
20180089041 March 29, 2018 Smith et al.
20180089436 March 29, 2018 Smith et al.
20180089465 March 29, 2018 Winstrom et al.
20180089625 March 29, 2018 Rosati et al.
20180089667 March 29, 2018 McGregor et al.
20180089678 March 29, 2018 Metnick et al.
20180089683 March 29, 2018 Setty et al.
20180089684 March 29, 2018 McGregor et al.
20180089685 March 29, 2018 McGregor et al.
20180089729 March 29, 2018 Metnick et al.
20180089758 March 29, 2018 Stradling et al.
20180089760 March 29, 2018 Stradling et al.
20180089761 March 29, 2018 Stradling et al.
20180091316 March 29, 2018 Stradling et al.
20180096163 April 5, 2018 Jacques de Kadt et al.
20180096563 April 5, 2018 Fine et al.
20180101684 April 12, 2018 Murphy et al.
20180101848 April 12, 2018 Castagna et al.
20180102013 April 12, 2018 Spanos et al.
20180103042 April 12, 2018 Castagna et al.
20180108024 April 19, 2018 Greco et al.
20180109541 April 19, 2018 Gleichauf
20180113752 April 26, 2018 Derbakova et al.
20180115413 April 26, 2018 King
20180115425 April 26, 2018 Dechu et al.
20180117446 May 3, 2018 Tran et al.
20180117447 May 3, 2018 Tran et al.
20180121673 May 3, 2018 Goldfarb et al.
20180121918 May 3, 2018 Higgins
20180122031 May 3, 2018 Chabanne et al.
20180123882 May 3, 2018 Anderson et al.
20180129700 May 10, 2018 Naccache et al.
20180131511 May 10, 2018 Taylor et al.
20180137306 May 17, 2018 Brady et al.
20180137503 May 17, 2018 High et al.
20180139042 May 17, 2018 Binning et al.
20180139103 May 17, 2018 Guo et al.
20180139186 May 17, 2018 Castagna
20180144156 May 24, 2018 Marin
20180144292 May 24, 2018 Mattingly et al.
20180145836 May 24, 2018 Saur et al.
20180146338 May 24, 2018 Finlow-Bates
20180146339 May 24, 2018 Finlow-Bates
20180150440 May 31, 2018 Keuffer et al.
20180150488 May 31, 2018 Runchey
20180150865 May 31, 2018 Arora
20180157481 June 7, 2018 Zessin et al.
20180157688 June 7, 2018 Zessin et al.
20180157999 June 7, 2018 Arora
20180158051 June 7, 2018 Arora
20180158058 June 7, 2018 Kogure
20180158278 June 7, 2018 Dabrowski
20180160270 June 7, 2018 Finlow-Bates
20180165720 June 14, 2018 Barkeloo
20180165781 June 14, 2018 Rodriguez et al.
20180166062 June 14, 2018 Hoffberg
20180167217 June 14, 2018 Brady et al.
20180173747 June 21, 2018 Baird
20180173906 June 21, 2018 Rodriguez et al.
20180174122 June 21, 2018 Mattingly et al.
20180174188 June 21, 2018 Wilkinson et al.
20180176017 June 21, 2018 Rodriguez et al.
20180181759 June 28, 2018 Smith et al.
20180181904 June 28, 2018 Wilkinson et al.
20180181909 June 28, 2018 Wilkinson et al.
20180181953 June 28, 2018 Lacoss-Arnold et al.
20180181964 June 28, 2018 Zagarese et al.
20180183587 June 28, 2018 Won et al.
20180183600 June 28, 2018 Davis
20180189312 July 5, 2018 Alas et al.
20180189730 July 5, 2018 Wilkinson et al.
20180191503 July 5, 2018 Alwar et al.
20180192131 July 5, 2018 Epstein et al.
20180198632 July 12, 2018 Gajek et al.
20180198794 July 12, 2018 Huh et al.
20180204191 July 19, 2018 Wilson et al.
20180204192 July 19, 2018 Whaley et al.
20180204213 July 19, 2018 Zappier et al.
20180204259 July 19, 2018 McGregor et al.
20180204260 July 19, 2018 McGregor et al.
20180205537 July 19, 2018 Wilson et al.
20180205552 July 19, 2018 Struttmann et al.
20180205555 July 19, 2018 Watanabe et al.
20180205558 July 19, 2018 Ferrin
20180211252 July 26, 2018 Lintner et al.
20180211316 July 26, 2018 Lintner et al.
20180211322 July 26, 2018 Lintner et al.
20180211487 July 26, 2018 Fine et al.
20180212783 July 26, 2018 King
20180212970 July 26, 2018 Chen et al.
20180216946 August 2, 2018 Gueye
20180218003 August 2, 2018 Banga et al.
20180218364 August 2, 2018 Cantrell et al.
20180218454 August 2, 2018 Simon et al.
20180219676 August 2, 2018 Mattingly et al.
20180220278 August 2, 2018 Tal et al.
20180225366 August 9, 2018 Mallard
20180225611 August 9, 2018 Daniel et al.
20180227128 August 9, 2018 Church et al.
20180232731 August 16, 2018 Liu
20180234239 August 16, 2018 Hasegawa et al.
20180240165 August 23, 2018 Kilpatrick
20180240639 August 23, 2018 Trevor et al.
20180241573 August 23, 2018 Ramathal et al.
20180247191 August 30, 2018 Katz et al.
20180247320 August 30, 2018 Gauld
20180248685 August 30, 2018 O'Brien
20180248701 August 30, 2018 Johnson et al.
20180248880 August 30, 2018 Sardesai et al.
20180253464 September 6, 2018 Kohli et al.
20180253691 September 6, 2018 High et al.
20180253702 September 6, 2018 Dowding
20180254887 September 6, 2018 Ateniese et al.
20180257306 September 13, 2018 Mattingly et al.
20180260811 September 13, 2018 Bergner et al.
20180260879 September 13, 2018 Bergner et al.
20180260921 September 13, 2018 Wagstaff
20180262335 September 13, 2018 Bergner et al.
20180264347 September 20, 2018 Tran et al.
20180267539 September 20, 2018 Shih
20180267789 September 20, 2018 Mandal et al.
20180268436 September 20, 2018 Sprague et al.
20180276597 September 27, 2018 Fuller et al.
20180276600 September 27, 2018 Fuller et al.
20180276626 September 27, 2018 Laiben
20180276663 September 27, 2018 Arora
20180278596 September 27, 2018 Ateniese et al.
20180285217 October 4, 2018 Smith et al.
20180285412 October 4, 2018 Zhuang
20180285838 October 4, 2018 Franaszek et al.
20180285840 October 4, 2018 Hasan
20180285879 October 4, 2018 Gadnis et al.
20180285983 October 4, 2018 Franaszek et al.
20180285996 October 4, 2018 Ma
20180287790 October 4, 2018 Everett et al.
20180287805 October 4, 2018 Ramathal et al.
20180287915 October 4, 2018 Smith et al.
20180293547 October 11, 2018 Randhawa
20180293553 October 11, 2018 Dembo et al.
20180293556 October 11, 2018 Hyun et al.
20180293557 October 11, 2018 Kim et al.
20180294955 October 11, 2018 Rhie et al.
20180294956 October 11, 2018 O'Brien et al.
20180294957 October 11, 2018 O'Brien et al.
20180295546 October 11, 2018 Crawford
20180300382 October 18, 2018 Madisetti et al.
20180300495 October 18, 2018 Gagel et al.
20180302222 October 18, 2018 Agrawal et al.
20180302390 October 18, 2018 Beecham
20180307854 October 25, 2018 Bernau et al.
20180307857 October 25, 2018 Beecham et al.
20180307868 October 25, 2018 Rettaroli et al.
20180308078 October 25, 2018 Emmerson
20180308161 October 25, 2018 Sekimura et al.
20180314809 November 1, 2018 Mintz et al.
20180315047 November 1, 2018 Kennedy et al.
20180315055 November 1, 2018 Pickover et al.
20180315145 November 1, 2018 Darnell et al.
20180315309 November 1, 2018 Becker
20180322561 November 8, 2018 Arora
20180322597 November 8, 2018 Sher
20180323964 November 8, 2018 Watanabe et al.
20180326291 November 15, 2018 Tran et al.
20180328612 November 15, 2018 Sinha et al.
20180329944 November 15, 2018 Horii et al.
20180329945 November 15, 2018 Horii et al.
20180331835 November 15, 2018 Jackson
20180336552 November 22, 2018 Bohli et al.
20180337769 November 22, 2018 Gleichauf
20180337879 November 22, 2018 Golan
20180341861 November 29, 2018 Katz et al.
20180343266 November 29, 2018 Lotter et al.
20180343305 November 29, 2018 Lotter et al.
20180343306 November 29, 2018 Lotter et al.
20180343307 November 29, 2018 Lotter et al.
20180343339 November 29, 2018 Lotter et al.
20180349867 December 6, 2018 Trieflinger
20180349879 December 6, 2018 High et al.
20180349896 December 6, 2018 Arora et al.
20180349968 December 6, 2018 O'Brien et al.
20180352268 December 6, 2018 O'Hanlon et al.
20180356236 December 13, 2018 Lawrenson et al.
20180357603 December 13, 2018 Wilkinson et al.
20180365691 December 20, 2018 Sanders et al.
20180373776 December 27, 2018 Madisetti et al.
20180373983 December 27, 2018 Katz et al.
20180373984 December 27, 2018 Katz et al.
20180374037 December 27, 2018 Nazzari et al.
20180374094 December 27, 2018 Kohli
20180374173 December 27, 2018 Chen et al.
20190004789 January 3, 2019 Mills
20190005566 January 3, 2019 Black
20190007198 January 3, 2019 Neumann et al.
20190007199 January 3, 2019 Davis
20190007484 January 3, 2019 Chen et al.
20190012249 January 10, 2019 Mercuri et al.
20190012595 January 10, 2019 Beser et al.
20190012623 January 10, 2019 Habuchi et al.
20190012695 January 10, 2019 Bishnoi et al.
20190013932 January 10, 2019 Maino et al.
20190013933 January 10, 2019 Mercuri et al.
20190013934 January 10, 2019 Mercuri et al.
20190013948 January 10, 2019 Mercuri et al.
20190016419 January 17, 2019 Sheldon-Coulson et al.
20190018887 January 17, 2019 Madisetti et al.
20190018888 January 17, 2019 Madisetti et al.
20190018975 January 17, 2019 Goldfarb et al.
20190025817 January 24, 2019 Mattingly et al.
20190025818 January 24, 2019 Mattingly et al.
20190026146 January 24, 2019 Peffers et al.
20190028275 January 24, 2019 Davis
20190028276 January 24, 2019 Pierce et al.
20190028280 January 24, 2019 Zinder
20190034903 January 31, 2019 Arora
20190034926 January 31, 2019 Davis
20190035208 January 31, 2019 Simons et al.
20190035209 January 31, 2019 Simons et al.
20190036702 January 31, 2019 Kano et al.
20190036712 January 31, 2019 Qiu
20190042407 February 7, 2019 Gao et al.
20190044735 February 7, 2019 Dupont
20190044736 February 7, 2019 Vandervort
20190050831 February 14, 2019 Kikinis
20190054030 February 21, 2019 Hill et al.
20190057115 February 21, 2019 Liu et al.
20190057379 February 21, 2019 Chalakudi et al.
20190057454 February 21, 2019 Komenda et al.
20190058590 February 21, 2019 Watanabe et al.
20190058593 February 21, 2019 Polcha et al.
20190058599 February 21, 2019 Takada Chino et al.
20190058604 February 21, 2019 Toll et al.
20190058709 February 21, 2019 Kempf et al.
20190065093 February 28, 2019 Karr et al.
20190065709 February 28, 2019 Salomon
20190065764 February 28, 2019 Wood et al.
20190065788 February 28, 2019 Vijayasankar et al.
20190066119 February 28, 2019 Sengupta et al.
20190073146 March 7, 2019 Ateniese et al.
20190073152 March 7, 2019 Nagle et al.
20190073645 March 7, 2019 Dazin
20190073646 March 7, 2019 Wright et al.
20190074962 March 7, 2019 Ateniese et al.
20190074966 March 7, 2019 Finlow-Bates
20190075022 March 7, 2019 Anderson et al.
20190075160 March 7, 2019 Finlow-Bates
20190080118 March 14, 2019 Brady et al.
20190080407 March 14, 2019 Molinari et al.
20190080411 March 14, 2019 Pierce et al.
20190097806 March 28, 2019 Vann et al.
20190097807 March 28, 2019 Mahanta et al.
20190097813 March 28, 2019 King
20190098013 March 28, 2019 Wilkinson
20190101896 April 4, 2019 Cantrell et al.
20190102409 April 4, 2019 Shi et al.
20190102423 April 4, 2019 Little et al.
20190102839 April 4, 2019 Kim et al.
20190104102 April 4, 2019 Khan et al.
20190104196 April 4, 2019 Li et al.
Foreign Patent Documents
1580501 May 2001 AU
1997036815 May 2001 AU
1997036816 May 2001 AU
1997036840 May 2001 AU
2003289583 February 2005 AU
2008311930 November 2012 AU
2008311749 January 2013 AU
2705191 May 2009 CA
2716727 May 2009 CA
101283526 October 2008 CN
101305526 November 2008 CN
101828307 September 2010 CN
102036269 April 2011 CN
102075898 May 2011 CN
102123505 July 2011 CN
102710508 October 2012 CN
102844605 December 2012 CN
102954796 March 2013 CN
102982274 March 2013 CN
103954269 July 2014 CN
104023277 September 2014 CN
104050551 September 2014 CN
104961088 October 2015 CN
105205013 December 2015 CN
107306409 October 2017 CN
0128672 December 1984 EP
0399822 November 1990 EP
0421409 April 1991 EP
0565314 October 1993 EP
0715247 June 1996 EP
0913757 May 1999 EP
0952741 October 1999 EP
1054336 November 2000 EP
1285380 February 2003 EP
1325594 July 2003 EP
1646112 April 2006 EP
1895456 March 2008 EP
2107518 October 2009 EP
2215550 August 2010 EP
2476082 August 2013 EP
2257875 January 2014 EP
2848487 March 2015 EP
2989851 December 2016 EP
3005174 February 2017 EP
3257171 December 2017 EP
3242729 July 2018 EP
3417642 December 2018 EP
2550765 January 2019 EP
2907582 April 2008 FR
2905763 December 2008 FR
2264796 September 1993 GB
2366401 March 2002 GB
2418267 March 2006 GB
2498924 August 2013 GB
2001019496 January 2001 JP
2002342684 November 2002 JP
2005539296 December 2005 JP
3979400 September 2007 JP
4245059 March 2009 JP
4947145 June 2012 JP
2012160004 August 2012 JP
5140121 February 2013 JP
5181184 April 2013 JP
5228366 July 2013 JP
5516577 June 2014 JP
5682610 March 2015 JP
5734299 June 2015 JP
6015086 October 2016 JP
6426477 November 2018 JP
20050007348 January 2005 KR
100653087 November 2006 KR
100924683 November 2009 KR
100962399 June 2010 KR
101036693 May 2011 KR
101179919 September 2012 KR
101288970 July 2013 KR
101379255 March 2014 KR
101422213 July 2014 KR
20150092933 August 2015 KR
20170004054 January 2017 KR
101703163 February 2017 KR
2161819 January 2001 RU
0017642 January 2017 RU
WO9002382 March 1990 WO
WO9222870 December 1992 WO
WO9301550 January 1993 WO
WO9403859 February 1994 WO
WO9406103 March 1994 WO
WO9419912 September 1994 WO
WO9627155 September 1996 WO
WO9634356 October 1996 WO
WO9737315 October 1997 WO
WO9743761 November 1997 WO
WO9809144 March 1998 WO
WO9809209 March 1998 WO
WO9810381 March 1998 WO
WO9837481 August 1998 WO
WO9845768 October 1998 WO
WO9901815 January 1999 WO
WO9924928 May 1999 WO
WO9927476 June 1999 WO
WO9948296 September 1999 WO
WO0077539 December 2000 WO
WO0108063 February 2001 WO
WO0108072 February 2001 WO
WO0110076 February 2001 WO
WO0154335 July 2001 WO
WO0207031 January 2002 WO
WO0291100 November 2002 WO
WO02091100 November 2002 WO
WO2004018158 March 2004 WO
WO2005114106 December 2005 WO
WO2006027557 March 2006 WO
WO2006029297 March 2006 WO
WO2006039803 April 2006 WO
WO2006047879 May 2006 WO
WO2006096612 September 2006 WO
WO2007044383 June 2007 WO
WO2008109641 September 2008 WO
WO2007067930 October 2008 WO
WO2008142682 November 2008 WO
WO2009067252 May 2009 WO
WO2009067254 May 2009 WO
WO2009082717 July 2009 WO
WO2009114161 September 2009 WO
WO2009126785 October 2009 WO
WO2009146132 December 2009 WO
WO2009148641 December 2009 WO
WO2010024929 March 2010 WO
WO2010027308 March 2010 WO
WO2010028315 March 2010 WO
WO2010075408 July 2010 WO
WO2010090617 August 2010 WO
WO2010143182 December 2010 WO
WO2011010462 January 2011 WO
WO2011048531 April 2011 WO
WO2011085252 July 2011 WO
WO2011141371 November 2011 WO
WO2011153155 December 2011 WO
WO2012072651 June 2012 WO
WO2013073020 May 2013 WO
WO2015030731 March 2015 WO
WO2016011582 January 2016 WO
WO2016176684 November 2016 WO
WO2017147331 August 2017 WO
WO2017200948 November 2017 WO
Other references
  • US 6,009,171 A, 12/1999, Ciarcia et al. (withdrawn)
  • US 10,243,938 B2, 03/2019, Ateniese et al. (withdrawn)
Patent History
Patent number: RE49334
Type: Grant
Filed: Apr 4, 2019
Date of Patent: Dec 13, 2022
Assignee: Hoffberg Family Trust 2 (Wilmington, DE)
Inventor: Steven M. Hoffberg (West Harrison, NY)
Primary Examiner: Dennis G Bonshock
Application Number: 16/375,507
Classifications
Current U.S. Class: Inventory Management (705/28)
International Classification: H04W 16/28 (20090101); G06Q 10/06 (20120101); G06Q 10/10 (20120101); G06Q 20/06 (20120101); G06Q 20/22 (20120101); G06Q 20/40 (20120101); G06Q 30/02 (20120101); G06Q 30/08 (20120101); G06Q 40/00 (20120101); G06Q 40/04 (20120101); G06Q 50/18 (20120101); H04W 64/00 (20090101); H04W 72/08 (20090101); H04W 84/18 (20090101);