Match Document Document Title
US20160182594 ADAPTIVE STREAMING  
Adaptively streaming media encoded at variable bit rates and/or optimizing the presentation thereof according perceivable capabilities of a client or other device interfacing the media with a user...
US20160182593 METHODS, DEVICES, AND COMPUTER PROGRAMS FOR IMPROVING CODING OF MEDIA PRESENTATION DESCRIPTION DATA  
The invention relates to improving coding of media presentation description data. Requesting streamed timed media data associated with a media item, organized into temporal media segments, the...
US20160182592 Publish/Subscribe Mashups For Social Networks  
Described herein is a mashing technology that facilitates mashup creation over a plurality of publish/subscribe social network data stream. These mashing techniques that are tailored to managing...
US20160182591 AUTOMATED COMPRESSION OF DATA  
The application relates to a system comprising at least two processing nodes (1), wherein the nodes (1) comprise an execution environment (2) and a processing component (3), wherein each execution...
US20160182590 SYSTEM AND METHOD FOR MODIFYING A STREAMING MEDIA SERVICE FOR A MOBILE RADIO DEVICE  
The present disclosure relates to a method performed in a network server of a service provider providing a service comprising media streaming. The method comprises receiving a detection message...
US20160182589 METHOD AND SYSTEM FOR RENDERING DIGITAL CONTENT ACROSS MULTIPLE CLIENT DEVICES  
A method and a system for rendering digital content across multiple client devices are provided. Digital content is downloaded to a first client device from a network accessible library. As the...
US20160182588 DYNAMIC WORKLOAD BALANCING FOR REAL-TIME STREAM DATA ANALYTICS  
Router threads read real-time stream data as that data is received at processing nodes along a processing path for the data. The data is initially parsed into workloads. Each router thread...
US20160182587 In-Band Quality Data  
A method of transmitting data in a media stream in accordance with a media streaming protocol includes generating data of a first type associated with a first type identifier in accordance with...
US20160182586 METHOD AND APPARATUS FOR MEDIA STREAM TRANSMISSION, AND USER EQUIPMENT  
The present invention discloses a method and an apparatus for media stream transmission, and user equipment. According to the method and the apparatus for media stream transmission, and the user...
US20160182585 Media playback redirected to a networked renderer  
A single stream receiver is preselected from a global list residing on a client computing device hosting a content casting application. Once a user launches a content casting application and...
US20160182584 Replacing Media Item  
An example implementation involves a playback device receiving, from a control device, data indicating an addition of a first media item to a queue that is playable by the playback device. This...
US20160182583 GENERATING AN AUTOMATED MULTIMEDIA FEED BASED ON VIRTUAL IT INFRASTRUCTURE USERS NEEDS/INTEREST  
Techniques for generating multimedia feed based on virtual IT infrastructure user's needs in a virtual datacenter are described. In one example embodiment, a request to dynamically render...
US20160182582 Sequential Pre-fetch in a Cached Network Environment  
An origin-edge node architecture is provided herein where the edge node caches next fragments of media content while fulfilling current media content requests, thereby allowing new requests for...
US20160182581 NETWORK PROXY FOR ENERGY EFFICIENT VIDEO STREAMING ON MOBILE DEVICES  
Examples of systems and methods for network proxy server for energy efficient video streaming on mobile devices are generally described herein. A proxy server to deliver video content may include...
US20160182580 OFFLINE VIRTUAL PARTICIPATION IN AN ONLINE CONFERENCE MEETING  
Systems, methods, and non-transitory computer-readable storage media for allowing an invitee to record a presentation prior to an online conference meeting. For example, invitations to an upcoming...
US20160182579 METHOD OF ESTABLISHING AND MANAGING MESSAGING SESSIONS BASED ON USER POSITIONS IN A COLLABORATION SPACE AND A COLLABORATION SYSTEM EMPLOYING SAME  
A computerized method and system of managing a collaboration space having a plurality of users collaborating therein, the method comprising: establishing a plurality of messaging sessions, said...
US20160182578 DYNAMIC PROFILE SHARING USING EXPIRING TOKENS  
Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a destination location. An expiring token...
US20160182577 CONTENT SELECTION  
One or more systems and/or techniques for generating a content item from content within a content area are described herein. A first boundary and a second boundary may be defined for a content...
US20160182576 Electronic Meetings with Known Participants but Anonymous Comments  
Computer-readable media embodying instructions executable by a computer to perform functions having corresponding methods comprise: joining a user of the computer to an electronic meeting; causing...
US20160182575 SYSTEM AND METHOD TO CUSTOMIZE A MULTIPOINT CONTROL UNIT  
Various disclosed embodiments include methods and systems for constructing a multipoint control unit (MCU). The method includes generating an abstract multipoint control unit (MCU) process at an...
US20160182574 METHOD AND APPARATUS FOR SUPPORTING FACILITY CONTROL OF TERMINAL  
A method and an apparatus for supporting facility control of a terminal are provided. The method includes a sensor device receiving facility-related information from a remote control device of a...
US20160182573 LOCAL SESSION LOOPBACK PROTOCOL  
A method for efficient utilization of available bandwidth over a data connection between a client computer and a server computer. An echo component on both the sending and receiving side of the...
US20160182572 METHOD, DEVICE, AND SYSTEM FOR IMPLEMENTING PROMPTING AND COLLECTING USER INFORMATION  
The present invention discloses a method, a device, and a system for implementing prompting and collecting user information, and belongs to the field of computer networks. The method includes:...
US20160182571 Lawful Interception and Security for Proximity Service  
Lawful interception and security for proximity service There are provided measures for lawful interception and security for proximity service. Such measures could include performing control in...
US20160182570 SYSTEM AND METHOD FOR IMPLEMENTING DATA MIGRATION WHILE PRESERVING SECURITY POLICIES OF A SOURCE FILER  
A data migration system in which security policies of a source file system are preserved, in an environment in which clients actively issue communications for the source filer while data is...
US20160182569 Real-Time Module Protection  
Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt,...
US20160182568 METHOD AND SYSTEM FOR PORTING GATEWAY FUNCTIONALITY ASSOCIATED WITH A USER FROM A FIRST GATEWAY TO ONE OR MORE OTHER GATEWAYS  
A broadband gateway, which enables communication with a plurality of devices, handles at least one physical layer connection to at least one corresponding network access service provider. The...
US20160182567 Techniques to Deliver Security and Network Policies to a Virtual Network Function  
Examples may include techniques to securely provision, configure, and de-provision virtual network functions for a software defined network or a cloud infrastructure elements. A policy for a...
US20160182566 INCIDENT RESPONSE TOOL USING A DATA EXCHANGE LAYER SYSTEM  
This disclosure describes systems, methods, and computer-readable media related to an incident response tool using data exchange layer. In some embodiments, a data collector may be generated by an...
US20160182565 LOCATION-BASED NETWORK SECURITY  
Methods and systems for a location-aware network security device are provided. According to one embodiment, a resource access request is received at a network security device of a protected...
US20160182564 DOMAIN NAME HIJACK PROTECTION  
A domain name registering entity (such as a domain registry, registrar, or reseller) or an independent proxy registration service may offer a domain name hijack protection to their actual or...
US20160182563 EMBEDDED SCRIPT SECURITY USING SCRIPT SIGNATURE VALIDATION  
A technique allows a client computer with a web browser to receive a web page having active content in response to transmitting a request for content. The active content includes a signature and a...
US20160182562 TIME BASED AUTHENTICATION CODES  
Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive a request for the change key from a registrant...
US20160182561 ROUTE MONITORING SYSTEM FOR A COMMUNICATION NETWORK  
A route monitoring system disclosed herein includes a computing system executing a route monitoring service coupled to a communication network. The route monitoring service receives a route...
US20160182560 SYSTEMS AND METHODS FOR PROTECTING AN ONLINE SERVICE AGAINST A NETWORK-BASED ATTACK  
Techniques for protecting an online service against network-based attacks are described. In some cases, protection is performed by way of a scalable protection service comprising a dynamically...
US20160182559 POLICY-BASED NETWORK SECURITY  
A method includes, responsive to detecting network activity indicative of a threat, selecting a threat mitigation scheme corresponding to a set of response actions. The method also include...
US20160182558 Auto-tuning program analysis tools using machine learning  
Machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. Using either user-supplied or system-generated annotation of...
US20160182557 MULTI-DIMENSIONAL GEOMETRY FOR ENHANCEMENT OF SIMULATIONS OF NETWORK DEVICES  
A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The computer-implemented method includes receiving an input...
US20160182556 SECURITY RISK SCORE DETERMINATION FOR FRAUD DETECTION AND REPUTATION IMPROVEMENT  
A technique allows a system to determine online user activity for a user associated with a user client device. The online user activity includes private content, publicly available content and...
US20160182555 MULTI-DIMENSIONAL GEOMETRY FOR ENHANCEMENT OF SIMULATIONS OF NETWORK DEVICES  
A computer-implemented method for using multi-dimensional geometry in simulations of packet flows through network devices, is provided. The computer-implemented method includes receiving an input...
US20160182554 METHODS, SYSTEMS, AND DEVICES FOR DETECTING AND ISOLATING DEVICE POSING SECURITY THREAT  
Methods and systems are disclosed for detecting a security threat. The methods and systems comprise detecting that a first device is coupled with the first I/O interface, responsive to the...
US20160182553 Auto-tuning program analysis tools based on user feedback  
User-guided machine learning (ML) significantly reduces false alarms generated by an automated analysis tool performing static security analysis. User interactivity involves initial review and...
US20160182552 Modeling and Outlier Detection in Threat Management System Data  
Methods, systems, and computer-readable media for identifying potential threats on a network based on anomalous behavior in communication between endpoints are provided. Traffic data for a network...
US20160182551 Automated Security Analytics Platform with Multi-Level Representation Conversion for Space Efficiency and Incremental Persistence  
Active memory for managing network telemetry information, or other types of information stored as objects, has objects partially-serialized to allow greater amounts of information to store in a...
US20160182550 DETERMINING A REPUTATION FOR A PROCESS  
Particular embodiments described herein provide for an electronic device that can be configured to identify a process running on the electronic device, assign a reputation to the process if the...
US20160182549 PROCESS SECURITY VALIDATION  
Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first idle state based at least in part on...
US20160182548 Apparatus and Method for Detecting Location of Wireless Device to Prevent Relay Attack  
A passive entry passive start (PEPS) method for preventing relay attack includes detecting a distance of a wireless device to a vehicle based on a time of flight of an ultra-wideband (UWB) signal...
US20160182547 REAL-TIME NETWORK ATTACK DETECTION AND MITIGATION INFRASTRUCTURE  
The invention features systems and methods for detecting and mitigating network attacks in a Voice-Over-IP (VoIP) network. A server is configured to receive information related to a mitigation...
US20160182546 Identifying Possible Security Threats Using Event Group Summaries  
A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating...
US20160182545 METHODS, SYSTEMS, AND MEDIA FOR MASQUERADE ATTACK DETECTION BY MONITORING COMPUTER USER BEHAVIOR  
Methods, systems, and media for masquerade attack detection by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting masquerade attacks is...