Disclosed herein is a method that enables a radio access network (RAN) to page more mobile stations concurrently. By reducing the size of the individual page record, more page records can fit within a general page message (GPM), and thus more mobile stations can receive page messages. One method of reducing the size of an individual page record is to reduce the size of the terminal IDs that page records carry. Currently, terminal IDs are globally unique, but they can be shortened if replaced with locally unique IDs. These locally unique IDs are unique for only mobile stations in a given paging area, unique for only mobile stations assigned to a given paging channel time slot, and/or unique for only mobile stations in a subgroup of mobile stations assigned to a given paging channel time slot. The number of mobile stations in any of these groups is smaller than the number of mobile stations in the global network. Therefore, the length of a terminal ID that is unique for only mobile stations in one of these groups can be shorter than a globally unique identifier.
Method For Increasing The Number Of Concurrent Page Records Sent To Mobile Stations
Disclosed herein is a method that enables a radio access network (RAN) to page more mobile stations concurrently. By reducing the size of the individual page record, more page records can fit within a general page message (GPM), and thus more mobile stations can receive page messages. One method of reducing the size of an individual page record is to reduce the size of the terminal IDs that page records carry. Currently, terminal IDs are globally unique, but they can be shortened if replaced with locally unique IDs. These locally unique IDs are unique for only mobile stations in a given paging area, unique for only mobile stations assigned to a given paging channel time slot, and/or unique for only mobile stations in a subgroup of mobile stations assigned to a given paging channel time slot. The number of mobile stations in any of these groups is smaller than the number of mobile stations in the global network. Therefore, the length of a terminal ID that is unique for only mobile stations in one of these groups can be shorter than a globally unique identifier.
Access Control Configurations For Inter-Processor Communications
Methods, systems, and devices for access control configurations for inter-processor communications are described to support reconfiguration of a dynamic access control configuration at a device. For example, additional configuration fields may be added to existing access control rules of the device, where these additional fields may be configured by a processor sending information to a receiving processor, via a shared memory resource or region of the device. The additional fields may include a read-only value which may specify a processor which has exclusive write permission for a memory region of the share memory. This value may indicate the sending processor of the memory region, and the value may be set by access control hardware when the additional field is changed. Other processors of the device may be prevented from writing to the memory region.
Virtualization Techniques With Real-Time Constraints
- San Diego CA, US Liang Cai - San Diego CA, US Can Acar - San Diego CA, US
International Classification:
G06F 21/44 G06F 9/50
Abstract:
Techniques for managing resources on computing device are provided. An example processor according to these techniques includes a resource management module (RMM) configured to be executed by the processor as an only privileged application on the processor such that the RMM has exclusive control over the allocation of memory resources utilized by the other applications executed by the processor and assignment of access permissions to the memory resources. The RMM is configured to manage the memory resources used by other applications executed by the processor, to group applications into logical compartments, and to enforce separation between the compartments such that resources associated with one compartment are inaccessible to another compartment. The processor may include a memory protection unit (MPU) configured to provide memory protection for memory utilized by the processor, and the RMM can be configured to dynamically configure the MPU regions to enforce separation between compartments.
Detecting Voice-Based Attacks Against Smart Speakers
- San Diego CA, US Arvind KRISHNASWAMY - San Jose CA, US Liang CAI - San Diego CA, US Nabanita SEN - Cupertino CA, US Jyotsna KRISHNASWAMY - Chandler AZ, US Kenneth CHEN - San Diego CA, US
International Classification:
G10L 15/22 G10L 17/06 G01R 31/00
Abstract:
Techniques for operating a voice-activated computing device are provided. These techniques can be used to prevent voice-based attacks on such devices. An example method according to these techniques includes receiving audio content comprising a voice command, monitoring electromagnetic (EM) emissions using an EM detector of the voice-activated computing device, determining whether the audio content comprising the voice command was generated electronically or was issued by a human user based on the EM emissions detected while receiving the audio content comprising the voice command, and preventing the voice command from being executed by the voice-activated computing device responsive to determining that the voice command was generated electronically.
Behavior-Based Distracting Application Detection On Vehicles
Techniques for operating a computer system for a vehicle are provided. An example method according to these techniques includes observing usage of at least one component of the computer system by an application to generate an application usage log for the application, deriving behavior vectors from the application usage log, determining whether the application is a distracting application by comparing the behavior vectors to one or more application safety rules, and limiting execution of the application responsive to determining that the application is a distracting application and based on status information associated with the vehicle.
Apparatuses And Methods For Secure Display On Secondary Display Device
One feature pertains to a computing device that includes an input interface, a communication interface, and a processing circuit that is adapted to receive a request from an application to authorize an action and generate a dynamic access code associated with the action. The processing circuit also transmits a message to a secondary display device that includes information data associated with the action and the dynamic access code for display on a display of the secondary display device. The processing circuit authorizes the action received from the application if the dynamic access code is entered into the input interface. Multiple, unique dynamic codes may also be associated with different actions the application may make requests for, which are also transmitted to the secondary display device for display.
Qualcomm
Senior Engineer
Uc Davis 2007 - Sep 2012
Phd
Ebay Jun 2010 - Sep 2010
Intern
Sprint Application Technology Lab Jun 2008 - Sep 2008
Intern
Shanghai Pudong Development Bank Mar 2005 - Aug 2007
Senior It Specialist
Education:
University of California, Davis 2007 - 2012
Doctorates, Doctor of Philosophy, Computer Science
Jennifer Lemay, Cynthia Miller, Antone Tj, Heather Medeiros, Donald Sumner, Steven Albin, Josephine Chapman, Michael Montecalvo, Erin Stone, Kellie Dipalma, Chris Foley
Googleplus
Liang Cai
About:
阿弥陀佛
Bragging Rights:
马上要跳巢了,回家工作。
Liang Cai
Education:
Washington University in St. Louis - Accounting, Renmin University of China - Finance
Liang Cai
Liang Cai
Liang Cai
Liang Cai
Liang Cai
Liang Cai
Youtube
Beancurd Sheet Salad, Simple beancurd recipe....
Duration:
4m 14s
Chinese Salad? Check out Liang Cai
Call it Chinese salad, or don't. Let's enter the world of Chinese cold...
Duration:
8m 17s
Lettuce Stem Salad Chinese Style. Chinese Lia...
... ... ... #LettuceSalad #... ...
Duration:
3m 12s
Three-Sliver Salad - Northern Chinese Liangba...
Liangban sansi is a great cold salad that you can find throughout nort...
Duration:
4m 49s
How to Make Dandelion Salad, Best Liang Cai R...
... ... dandelion... ...
Duration:
6m 18s
Dry Tofu Salad VEGETARIAN () LIANG CAI
Chinese sliced dry tofu salad (... is a quick and healthy vegetarian ...