scispace - formally typeset
Search or ask a question
Institution

Aruba Networks

About: Aruba Networks is a based out in . It is known for research contribution in the topics: Networking hardware & Wireless network. The organization has 321 authors who have published 391 publications receiving 3915 citations. The organization is also known as: Aruba Networks, Inc..


Papers
More filters
Patent
27 Feb 2015
TL;DR: In this article, the authors describe systems, methods and computer program products for controlling operation of wireless beacons such as Bluetooth Low Energy beacons, such that signals can be exchanged between or repeated by beacons in order to allow for signals received at one beacon to reach another beacon without requiring further central interaction.
Abstract: Described herein are systems, methods and computer program products for controlling operation of wireless beacons, such as Bluetooth Low Energy beacons. Multiple beacons may be controlled centrally or may work together in a cooperative fashion such that signals can be exchanged between or repeated by beacons in order to allow for signals received at one beacon to reach another beacon without requiring further central interaction. Power settings of beacons may be altered to change power consumption or to change a detectable range of the beacons.

199 citations

Patent
25 Apr 2014
Abstract: A system and method is described that computes an estimated current location for a client device based on both the detected current location and the predicted current location of the client device. By utilizing the predicted current location, the system and method may account for and compensate for anomalies and inaccuracies in the detected current location. Accordingly, the system and method provides a more accurate estimation for the current location of the client device based on examination of heuristics and a priori environmental data. In particular, the system and method compensates for detected locations that are impossible or improbable based on previous locations of the client device, the layout of the environment in which the client device is traversing, data describing the user of the client device, and/or data describing the client device.

139 citations

Patent
01 Feb 2013
TL;DR: In this paper, a method comprises advertising services, which are provided by different basic service sets, each basic service set having the same service set identifier (SSID) and then one of the basic sets is selected.
Abstract: According to one embodiment of the invention, a method comprises advertising services. The services are provided by different basic service sets, each basic service set having the same service set identifier (SSID). Thereafter, one of the basic service sets is selected.

122 citations

Patent
18 Jun 2015
TL;DR: In this paper, the authors proposed a collaborative and adaptive threat intelligence approach where one or more local models are trained with at least the received data, where the local models were related to security.
Abstract: Collaborative and adaptive threat intelligence. Data collected on a first customer network is received. One or more local models are trained with at least the received data, where the one or more local models are related to security. An amount of data to transmit to a centralized controller is determined based at least on a result of the training one or more local models and the determined amount of data is transmitted to the centralized controller. Result data is received from the centralized controller that is a result of one or more global models trained on the centralized controller using data collected on multiple customer networks including the first customer network. The one or more local models are adjusted using the received result data and the one or more adjusted local models are trained.

99 citations

Patent
20 Aug 2013
TL;DR: In this paper, a user application, without operating system kernel access, performs the operations of identifying a set of applications that a user has permission to access, receiving a request to a access a particular application, and causing execution of the particular application.
Abstract: A method includes a particular user application, without operating system kernel access, performing the operations of: identifying a set of applications that a user has permission to access, receiving a request to a access a particular application of the set of applications, and causing execution of the particular application.

91 citations


Authors
Network Information
Related Institutions (5)
Mitsubishi Electric Research Laboratories
3.8K papers, 131.6K citations

81% related

T-Mobile US, Inc.
1K papers, 10.7K citations

80% related

Institut Eurécom
3.7K papers, 113K citations

80% related

Xiaomi
3.2K papers, 12.1K citations

79% related

Indraprastha Institute of Information Technology
3K papers, 33.2K citations

79% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20202
20198
201827
201713
201617
201545