Patent
Multifactorial optimization system and method
TLDR
In this paper, the authors propose a method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent, providing a synthetic economic value to a first set of agents at the a high level of the hierarchy, allocating portions of the synthetic economy value by the first sets of agents to a second subset of agents, at respectively different hierarchal ranks than the first set, and conducting an auction amongst agents using the synthetic economic values as the currency.Abstract:
A method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent; providing a synthetic economic value to a first set of agents at the a high level of the hierarchy; allocating portions of the synthetic economic value by the first set of agents to a second set of agents at respectively different hierarchal rank than the first set of agents; and conducting an auction amongst agents using the synthetic economic value as the currency. A method for allocation among agents, comprising assigning a wealth generation function for generating future wealth to each of a plurality of agents, communicating subjective market information between agents, and transferring wealth generated by the secure wealth generation function between agents in consideration of a market transaction. The method may further comprise the step of transferring at least a portion of the wealth generation function between agents.read more
Citations
More filters
Patent
Digital information infrastructure and method
Ron M. Redlich,Martin A. Nemzow +1 more
TL;DR: In this article, a distributed distributed computer system processes data having select content represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated data and scarcity designated data, each with respective access controls thereat.
Patent
Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore
TL;DR: In this article, an enhanced interface for facilitating human input of a desired control sequence in a programmable device by employing specialized visual feedback is presented. But this interface is not suitable for the use of a video cassette recorder.
Patent
Digital information infrastructure and method for security designated data and with granular data stores
Ron M. Redlich,Martin A. Nemzow +1 more
TL;DR: In this paper, a distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and granular data, each with respective access controls thereat.
Patent
Network architecture, methods, and devices for a wireless communications network
Stefan Parkvall,Janne Peisa,Gunnar Mildh,Robert Baldemair,Stefan Wager,Jonas Kronander,Karl Werner,Richard Abrahamsson,Ismet Aktas,Peter Alriksson,Junaid Ansari,Ashraf Shehzad Ali,Henrik Asplund,Fredrik Athley,Håkan Axelsson,Joakim Axmon,Johan Axnäs,Kumar Balachandran,Gunnar Bark,Jan-Erik Berg,Andreas Bergström,Håkan Björkegren,Nadia Brahmi,Cagatay Capar,Anders Carlsson,Andreas Cedergren,Mikael Coldrey,Icaro L. J. da Silva,Erik Dahlman,Ali El Essaili,Ulrika Engström,Mårten Ericson,Erik Eriksson,Mikael Fallgren,Fan Rui,Gabor Fodor,Pål Frenger,Jonas Fridén,Jonas Fröberg Olsson,Anders Furuskär,Johan Furuskog,Virgile Garcia,Ather Gattami,Fredrik Gunnarsson,Ulf Gustavsson,Bo Hagerman,Fredrik Harrysson,Ning He,Martin Hessler,Kimmo Hiltunen,Song-Nam Hong,Dennis Hui,Jörg Huschke,Tim Irnich,Sven Jacobsson,Niklas Jaldén,Simon Järmyr,Zhiyuan Jiang,Martin Johansson,Niklas Johansson,Du Ho Kang,Eleftherios Karipidis,Patrik Karlsson,Ali S. Khayrallah,Caner Kilinc,Göran N. Klang,Sara Landström,Christina Larsson,Gen Li,Lars Lindbom,Robert Lindgren,Bengt Lindoff,Fredrik Lindqvist,Liu Jinhua,Thorsten Lohmar,Qianxi Lu,Lars Manholm,Ivana Maric,Jonas Medbo,Qingyu Miao,Reza Moosavi,Walter Müller,Elena Myhre,Karl Norrman,Bengt-Erik Olsson,Torgny Palenius,Sven Petersson,Jose Luis Pradas,Mikael Prytz,Olav Queseth,Pradeepa Ramachandra,Edgar Ramos,Andres Reial,Thomas Rimhagen,Emil Ringh,Patrik Rugeland,Johan Rune,Joachim Sachs,Henrik Sahlin,Vidit Saxena,Nima Seifi,Yngve Selén,Eliane Semaan,Sachin Sharma,Shi Cong,Johan Sköld,Magnus Stattin,Anders Stjernman,Dennis Sundman,Lars Sundström,Miurel Isabel Tercero Vargas,Claes Tidestav,Sibel Tombaz,Johan Torsner,Hugo Tullberg,Jari Vikberg,Peter von Wrycza,Thomas Walldeen,Pontus Wallentin,Wang Hai,Ke Wang Helmersson,Wang Jianfeng,Yi-Pin Eric Wang,Niclas Wiberg,Wittenmark Emma,Osman Nuri Can Yilmaz,Ali A. Zaidi,Zhang Zhan,Zhang Zhang,Zheng Yanli +129 more
TL;DR: In this article, the uplink access configuration index is used to identify an uplink AP from among a predetermined plurality of AP configurations, and then the AP is transmitted to the wireless communications network according to the identified AP.
Patent
Methods and systems for a mobile, broadband, routable internet
Scott Y. Seidel,Peter Atwal +1 more
TL;DR: In this article, improved capabilities are described for a mobile broadband routable internet (MBRI) providing for carrier-grade, networked, broadband, IP-routable communication among a plurality of mobile devices.
References
More filters
Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Untraceable electronic mail, return addresses, and digital pseudonyms
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Book ChapterDOI
Blind Signatures for Untraceable Payments
TL;DR: Automation of the way the authors pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers.