H04L67/566

COMPRESSED MEASUREMENT FEEDBACK USING AN ENCODER NEURAL NETWORK

Methods, systems, and devices for wireless communications are described. A user equipment (UE) may perform a measurement operation to attain multiple measurements to report to a base station. The measurements may correspond to a first number of bits if reported. The UE may compress the measurements using an encoder neural network (NN) to obtain an encoder output indicating the measurements. This encoder output may include a second number of bits that is less than the first number of bits. The UE may report the encoder output to the base station in this compressed form. At the base station, the encoder output may be decompressed according to a decoder NN. Once the base station decompresses the encoder output, the UE and base station may communicate according to the measurements determined from the decompression. In some cases, the base station may perform load redistribution based on the measurements.

SYSTEMS AND METHODS FOR GENERATING DYNAMIC CONVERSATIONAL RESPONSES BASED ON HISTORICAL AND DYNAMICALLY UPDATED INFORMATION
20220335222 · 2022-10-20 · ·

Methods and systems disclosed herein collect user data in real-time and organize them (e.g., using collaborative filtering) into groups (e.g., clusters). The system then determines statistical distributions of observed real-time intents (e.g., based on actual selections made by users) for each group. The system then merges this distribution with existing model predictions (e.g., a model trained on historical training data) to balance between historical and dynamically updated information.

CLICKABLE ACCESS POINT
20230071088 · 2023-03-09 ·

Systems and methods herein describe receiving a target location from a computing device, using a machine learning model: determining a first access point and a second access point associated with the target location, causing presentation of the first access point as a first selectable user interface element and the second access point as a second selectable user interface within a graphical user interface on the computing device, receiving a first selection of the first selectable user interface element from the computing device; and in response to receiving the first selection, and initiating a trip request based on the refined map coordinates of the first access point.

SEAMLESS CONNECTIVITY BETWEEN NETWORK FUNCTIONS DEPLOYED ON EDGE AND IN THE CLOUD

Methods are provided for a first proxy service obtaining a request originating from a source network function for a destination network function. These functions are each one of a cloud network function deployed in a cloud network and an edge network function deployed in an on-premises network. The methods further involve providing the request to the destination network function when the request is received from a second proxy service or to the second proxy service when the request is received from the source network function such that the second proxy service provides the request to the destination network function. The first proxy service and the second proxy service are each one of a cloud proxy service deployed in the cloud and configured to communicate with the cloud network function and an edge proxy service deployed at the edge and configured to communicate with the edge network function.

SEAMLESS CONNECTIVITY BETWEEN NETWORK FUNCTIONS DEPLOYED ON EDGE AND IN THE CLOUD

Methods are provided for a first proxy service obtaining a request originating from a source network function for a destination network function. These functions are each one of a cloud network function deployed in a cloud network and an edge network function deployed in an on-premises network. The methods further involve providing the request to the destination network function when the request is received from a second proxy service or to the second proxy service when the request is received from the source network function such that the second proxy service provides the request to the destination network function. The first proxy service and the second proxy service are each one of a cloud proxy service deployed in the cloud and configured to communicate with the cloud network function and an edge proxy service deployed at the edge and configured to communicate with the edge network function.

Wireless transmission in shared wireless medium environments
11601504 · 2023-03-07 · ·

Support of coexistence of wireless transmission equipment in shared wireless medium environments is disclosed, which is applicable to various types of wireless transmission equipment. For instance, a wireless power transmission system (WPTS) delivers power to wireless power receiver clients via transmission of wireless power signals using one or more frequencies and/or channels within shared wireless medium environments in which other wireless equipment is operating, such as access points and stations in wireless local area networks (WLANs). The WPTS is configured to co-exist with the operations of the other wireless equipment within the shared wireless medium environment by adapting its transmission operations to utilize frequencies or channels that do not interfere with other equipment and/or implementing co-channel and shared channels operations under which access to channels is implemented using standardized WLAN protocols such as PHY and MAC protocols used for 802.11 (Wi-Fi™) networks.

TECHNIQUES FOR UTILIZING DIRECTED ACYCLIC GRAPHS FOR DEPLOYMENT INSTRUCTIONS

Techniques are disclosed for utilizing directed acyclic graphs for deployment instructions. A computer-implemented method can include various operations. Instructions may be executed by a computing device to perform parses of configuration data associated with a deployment. The computing device may cause a first directed acyclic graph (DAG) to be generated, the first DAG being utilized for deploying a first resource based on the parses. A second DAG may be generated for deploying execution targets based on the parses, the second DAG specifying dependencies between execution targets of the deployment. The computing device may generate a linked list data structure based on the parses and may deploy the computing system by traversal of the linked list data structure.

TECHNIQUES FOR UTILIZING DIRECTED ACYCLIC GRAPHS FOR DEPLOYMENT INSTRUCTIONS

Techniques are disclosed for utilizing directed acyclic graphs for deployment instructions. A computer-implemented method can include various operations. Instructions may be executed by a computing device to perform parses of configuration data associated with a deployment. The computing device may cause a first directed acyclic graph (DAG) to be generated, the first DAG being utilized for deploying a first resource based on the parses. A second DAG may be generated for deploying execution targets based on the parses, the second DAG specifying dependencies between execution targets of the deployment. The computing device may generate a linked list data structure based on the parses and may deploy the computing system by traversal of the linked list data structure.

Detecting safe internet resources
11632378 · 2023-04-18 · ·

In some implementations, a method includes receiving, by a malware detection system, a request for a certification user interface element for a file to be served in an Internet resource, wherein the file is a file that has previously been classified as not containing malware by the malware detection system, and wherein the certification user interface element certifies that the file has been classified by the malware detection system as not containing malware, determining, based on the request, that the file is available for download from an Internet resource, and storing data that identifies the Internet resource as a location where a malware-free file is available for download.

Detecting safe internet resources
11632378 · 2023-04-18 · ·

In some implementations, a method includes receiving, by a malware detection system, a request for a certification user interface element for a file to be served in an Internet resource, wherein the file is a file that has previously been classified as not containing malware by the malware detection system, and wherein the certification user interface element certifies that the file has been classified by the malware detection system as not containing malware, determining, based on the request, that the file is available for download from an Internet resource, and storing data that identifies the Internet resource as a location where a malware-free file is available for download.