Charles Robert Kalmanek - Short Hills NJ Partho Pratim Mishra - Summit NJ Mani B. Srivastava - Los Angeles CA
Assignee:
AT&T Corp. - New York NY
International Classification:
H04L 1256
US Classification:
370328
Abstract:
A virtual circuit rerouting method and apparatus provide for rerouting virtual circuits in an ATM-based network having mobile devices. Included are protocols for ensuring hand-off of the mobile device from a first basestation to a second basestation, identification of a rebuild switch and connection of the mobile device to the rebuild switch prior to data being transferred from the mobile device to the network. The rerouting method minimizes loss of data by ensuring that the mobile device is incapable of transferring data to the network before the virtual circuit rerouting procedure is completed. The method includes an aggregate registration request, or 3-phase handshake, and a "Connect Confirm" command. The virtual circuit rerouting protocols are further adapted to operate on most common virtual circuit rerouting strategies, including rebuild, partial rebuild and extension with loop removal.
Adaptive Scheduling Priorities Based On Battery Power Level In Wireless Access Protocols
Prathima Agrawal - New Providence NJ Krishna M. Sivalingam - Greensboro NC Mani Bhushan Srivastava - Los Angeles CA
Assignee:
AT & T Corp - New York NY
International Classification:
G08C 1700 H04Q 700
US Classification:
370311
Abstract:
A method adapts scheduling priorities in a wireless communications system to conserve battery power in mobile terminals operating within the system. A base station, within the system, receives battery power level information and other setup information from mobile terminals operating within the service area of the base station during call setup procedures. Based on the battery power level information and other setup information, the base station adapts scheduling priorities for the mobile terminals to expedite wireless transmissions from those mobile terminals reporting low battery power levels.
Method For Call Establishment And Rerouting In Mobile Computing Networks
Partho P. Mishra - Murray Hill NJ Mani B. Srivastava - Chatham NJ
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 1256 H04B 726
US Classification:
370329
Abstract:
A method for supporting end to end VC oriented service between mobile hosts. Included are protocols designed for a micro-cellular wireless environment in which mobile hosts make frequent transitions between cells. A VC rerouting procedure minimizes the effect of frequent hand-offs by extending routes and triggering a route rebuild only when performance as seen by an application degrades below a certain level. VC establishment and rerouting protocols assume the existence of separate signaling protocols for the wired and the wireless network, respectively. This minimizes the changes required to the signaling infrastructure used in the wired network while allowing the signaling in the wireless network to be customized for the unique requirements of that particular environment.
Wireless Adapter Architecture For Mobile Computing
Prathima Agrawal - New Providence NJ Mark Robert Cravatts - Berkeley Heights NJ John Andrew Trotter - Chatham NJ Mani Bhushan Srivastava - Chatham NJ
Assignee:
Lucent Technologies, Inc. - Murray Hill NJ
International Classification:
H04B 130 H04L 516
US Classification:
375220
Abstract:
A adapter for wireless networking provides for reconfigerable media access control and data packet formats. The flexible adapter comprises a modem interface for controlling an RF modem for transmitting data signals to and receiving data signals from another RF modem; a media access control circuit; and a computer system interface circuit. The computer system interface circuit provides an interface between a host computer system, the modem interface circuit and the media access control circuit.
Medium Access Control And Air Interface Subsystem For An Indoor Wireless Atm Network
Eoin Hyden - Madison NJ Mani Bhushan Srivastava - Chatham NJ John Andrew Trotter - Chatham NJ Prathima Agrawal - New Providence NJ Paul Krzyzanowski - Fanwood NJ
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 1256
US Classification:
370329
Abstract:
A system for delivering packetized data in a network dynamically assigns a unique address to a mobile unit, allocates bandwidth within a wireless link by a token scheme and provides forward error correction for the packet. The system wirelessly transports the packets between a base station and an end point which is responsive to a link cell for linking the base station and the end point. The link cell contains a header and a body. The header in turn contains a forward error correction code, a radioport id and a token. The forward error correction code provides error detection and error correction that relies solely on a one-way communication of data bits from a sender to a receiver. The radioport id is a logical id assigned such that each radio-port in a vicinity has a unique id. The token enables the wireless transportation over a selected channel of the packets between the base station and the end point.
Value-Based Information Flow Tracking In Software Packages
- New Brunswick NJ, US - Los Angeles CA, US Mani Srivastava - Sherman Oaks CA, US Moustafa Alzantot - Los Angeles CA, US
International Classification:
G06F 21/62 G06F 21/52 G06F 21/55
Abstract:
A computer-implemented method, computer system, and computer program product are directed to improving computer security of a device using value based information flow tracking. Embodiments automatically capture raw data values from a data source of the device and store in memory the captured raw data values in a collection of sensitive data. Embodiments determine whether computed values of functions of a data flow are included in the collection of sensitive data. Based upon the determining, embodiments prevent values of the collection of sensitive data from being transmitted from a sink of the device. Embodiments may determine whether string representations of computed operand and return values of numerical or arithmetic operations of the functions of the data flow are included in the collection of sensitive data.
Youtube
Rapidsoft Systems Communication by Manny sriv...
Hello All....
Category:
People & Blogs
Uploaded:
03 Dec, 2010
Duration:
40s
neelmani srivastava , NMS aka james bond , te...
neelmani sir ..........the james bond............... the first giving...
Category:
People & Blogs
Uploaded:
06 May, 2009
Duration:
7m 29s
neeLmani KAAND
neelmani's left leg..... bidaak gaya....lol
Category:
Comedy
Uploaded:
20 Oct, 2007
Duration:
46s
Bachchans have a blast!
Jalsa was lit up with a million lights and kandeels put up on trees as...
Category:
Entertainment
Uploaded:
09 Nov, 2010
Duration:
1m 6s
Mani Srivastava- Sensing Infrastructures for ...
2014 MPE Workshop on Data-aware Energy Use September 29 - October 1, 2...
Duration:
29m 45s
Mani Srivastava -- Secure Collection of Sensi...
Mani Srivastava, Ph.D. speaks to the mHealth Training Institute 2015 o...
Duration:
29m 22s
Neel Mani Srivastava joins Unacademy | Unacad...
The right preparation needs the right guidance. Having mentored more t...
Duration:
37s
JEE 2023 - How to Score 85+ in Physics | Nee...
In this session, Educator Neel Mani Srivastava will be discussing the ...