scispace - formally typeset
Search or ask a question
Author

Charles Calvin Byers

Other affiliations: Bell Labs, Alcatel-Lucent, AT&T
Bio: Charles Calvin Byers is an academic researcher from Cisco Systems, Inc.. The author has contributed to research in topics: Line card & Broadband networks. The author has an hindex of 30, co-authored 135 publications receiving 2662 citations. Previous affiliations of Charles Calvin Byers include Bell Labs & Alcatel-Lucent.


Papers
More filters
Journal ArticleDOI
TL;DR: Some of the more important architectural requirements for critical Internet of Things networks in the context of exemplary use cases are discussed, and how fog computing techniques can help fulfill them.
Abstract: Fog computing is an architecture that extends the traditionally centralized functions of cloud computing to the edge and into close proximity to the things in an Internet of Things network. Fog computing brings many advantages, including enhanced performance, better efficiency, network bandwidth savings, improved security, and resiliency. This article discusses some of the more important architectural requirements for critical Internet of Things networks in the context of exemplary use cases, and how fog computing techniques can help fulfill them.

171 citations

Patent
02 Dec 1999
TL;DR: In this paper, a method and system for simultaneously controlling a plurality of automatic speech recognition (ASR) systems within the working volume of a room, or for controlling multiple devices as a single unified ASR system is presented.
Abstract: A method and system for simultaneously controlling a plurality of automatic speech recognition (ASR) systems within the working volume of a room, or for controlling multiple devices as a single unified ASR system. Multiple microphones feed a signal processing system which determines or estimates both a user's location and a user's orientation within a room as the user issues voice commands, and further determines the microphone providing the best signal. Diversity noise cancellation may be further applied to the microphone signals. Based on the apparent direction the user is facing, the system may then enable one of the ASR systems for voice command recognition and/or execution of voice commands. The invention reduces the number of false command executions and improves the performance, accuracy, and ease of use of voice control.

148 citations

Patent
12 Oct 1999
TL;DR: The priority and security encoding system for electronic mail messages functions to ascribe a message characterization code to the electronic mail message that enables the router as well as the destination message server to more efficiently process the e-mail message, based upon the message characterization codes.
Abstract: The priority and security encoding system for electronic mail messages functions to ascribe a message characterization code to the electronic mail message that enables the router as well as the destination message server to more efficiently process the electronic mail message, based upon the message characterization code. The message characterization code is assigned by the message originator, or the message server that serves the message originator, to identify the nature of the electronic mail message. The message characterization code can be defined to denote any one or more message related factors, such as: message content, identification of the message originator, identification of the message recipient, or other message processing factors. The message characterizing code is used by the message routers, network nodes, and destination message server to prioritize the processing of electronic mail messages and optionally provide subscriber defined alternate routing of certain classes of messages. This message characterizing code can also be used to automatically initiate various electronic message security measures to safeguard the most sensitive classes of messages, without the need for subscriber intervention.

142 citations

Patent
20 Jun 2000
TL;DR: In this article, a method for determining the security level associated with transmissions in a telecommunications network includes means for alerting parties of the security status of the transmission, when a route interconnecting the parties includes an insecure link, an alert is provided so that the parties are aware of the insecure nature of the call before communications begin.
Abstract: A method for determining the security level associated with transmissions in a telecommunications network includes means for alerting parties of the security status of the transmission. When a route interconnecting the parties includes an insecure link, an alert is provided so that the parties are aware of the insecure nature of the call before communications begin. Alternatively, the parties may elect to decline or alter content of the communications to preserve integrity.

121 citations

Patent
25 Feb 2015
TL;DR: In this article, a controller instructs an unmanned aerial vehicle (UAV) docked to a landing perch to perform a pre-flight test operation of a preflight test routine.
Abstract: In one embodiment, a controller instructs an unmanned aerial vehicle (UAV) docked to a landing perch to perform a pre-flight test operation of a pre-flight test routine. The controller receives sensor data associated with the pre-flight test operation from one or more force sensors of the landing perch, in response to the UAV performing the pre-flight test operation. The controller determines whether the sensor data associated with the pre-flight test operation is within an acceptable range. The controller causes the UAV to launch from the landing perch based in part on a determination that UAV has passed the pre-flight test routine.

114 citations


Cited by
More filters
Patent
30 Oct 2007
TL;DR: In this paper, a media order entry captures complete user profile information for a user, which is utilized by the system throughout the media experience for routing, billing, monitoring, reporting and other media control functions.
Abstract: Telephone calls, data and other multimedia information is routed through a hybrid network which includes transfer of information across the internet. A media order entry captures complete user profile information for a user. This profile information is utilized by the system throughout the media experience for routing, billing, monitoring, reporting and other media control functions. Users can manage more aspects of a network than previously possible, and control network activities from a central site. The hybrid network also contains logic for responding to requests for quality of service and reserving the resources to provide the requested services.

1,297 citations

Journal ArticleDOI
TL;DR: It is shown how scheduling algorithms exploiting asynchronous variations of channel quality can be used to maximize the channel capacity and maximize the number of users that can be supported with the desired QoS.
Abstract: We propose an efficient way to support quality of service of multiple real-time data users sharing a wireless channel. We show how scheduling algorithms exploiting asynchronous variations of channel quality can be used to maximize the channel capacity (i.e., maximize the number of users that can be supported with the desired QoS).

1,272 citations

Patent
22 Nov 1999
TL;DR: In this article, the authors describe a system and method for communicating voice and data over a packet-switched network that is adapted to coexist and communicate with a legacy PSTN.
Abstract: The present invention describes a system and method for communicating voice and data over a packet-switched network that is adapted to coexist and communicate with a legacy PSTN. The system permits packet switching of voice calls and data calls through a data network from and to any of a LEC, a customer facility or a direct IP connection on the data network. The system includes soft switch sites, gateway sites, a data network, a provisioning component, a network event component and a network management component. The system interfaces with customer facilities (e.g., a PBX), carrier facilities (e.g., a LEC) and legacy signaling networks (e.g., SS7) to handle calls between any combination of on-network and off-network callers. The soft switch sites provide the core call processing for the voice network architecture. The soft switch sites manage the gateway sites in a preferred embodiment, using a protocol such as the Internet Protocol Device Control (IPDC) protocol to request the set-up and tear-down of calls. The gateway sites originate and terminate calls between calling parties and called parties through the data network. The gateway sites include network access devices to provide access to network resources. The data network connects one or more of the soft switch sites to one or more of the gateway sites. The provisioning and network event component collects call events recorded at the soft switch sites. The network management component includes a network operations center (NOC) for centralized network management.

1,024 citations

Patent
29 Oct 1999
TL;DR: In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.
Abstract: A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.

786 citations

Journal ArticleDOI
TL;DR: This paper provides a tutorial on fog computing and its related computing paradigms, including their similarities and differences, and provides a taxonomy of research topics in fog computing.

783 citations