Institution
Alcatel-Lucent
Stuttgart, Germany•
About: Alcatel-Lucent is a based out in Stuttgart, Germany. It is known for research contribution in the topics: Signal & Network packet. The organization has 37003 authors who have published 53332 publications receiving 1430547 citations. The organization is also known as: Alcatel-Lucent S.A. & Alcatel.
Papers published on a yearly basis
Papers
More filters
••
13 Nov 1997TL;DR: IES/sup 3/ (pronounced "ice cube"), a fast Integral Equation Solver for three-dimensional problems with arbitrary kernels is presented, which is substantially more efficient than existing multipole-based approaches.
Abstract: Integral equation techniques are often used to extract models of integrated circuit structures. This extraction involves solving a dense system of linear equations, and using direct solution methods is prohibitive for large problems. In this paper, we present IES/sup 3/ (pronounced "ice cube"), a fast Integral Equation Solver for three-dimensional problems with arbitrary kernels. Extraction methods based on IES/sup 3/ are substantially more efficient than existing multipole-based approaches.
212 citations
••
TL;DR: The holographic recording and recovery of high-capacity (480-kbit) digital data pages in these media are reported, further illustrating their data-storage capabilities.
Abstract: A general strategy for fabricating thick, optically flat photopolymer recording media with high dynamic range (M/#) that exhibit low levels of recording-induced Bragg detuning for holographic data storage is presented. In particular, media with M/# values as high as 42 in 1-mm-thick formats are obtained. We believe that these results are the first demonstration of a holographic storage medium with a dynamic range of this magnitude. In addition, we report the holographic recording and recovery of high-capacity (480-kbit) digital data pages in these media, further illustrating their data-storage capabilities.
211 citations
••
TL;DR: This paper considers the problem of secret communication over a two-receiver multiple-input multiple-output (MIMO) Gaussian broadcast channel and shows that under a matrix power constraint, both messages can be simultaneously transmitted at their respective maximal secrecy rates.
Abstract: This paper considers the problem of secret communication over a two-receiver multiple-input multiple-output (MIMO) Gaussian broadcast channel. The transmitter has two independent messages, each of which is intended for one of the receivers but needs to be kept asymptotically perfectly secret from the other. It is shown that, surprisingly, under a matrix power constraint, both messages can be simultaneously transmitted at their respective maximal secrecy rates. To prove this result, the MIMO Gaussian wiretap channel is revisited and a new characterization of its secrecy capacity is provided via a new coding scheme that uses artificial noise (an additive prefix channel) and random binning.
211 citations
•
21 Apr 1999TL;DR: In this paper, a service provider access server (e.g., router) performs basic network address translation (NAT) and network address port translation (NAPT) for private networks.
Abstract: A system and method provides network address translation as an external service for private networks. Given the fact that local office networks (i.e., stub networks) are typically assigned only one globally unique IP address (or a small set of addresses), the invention presents a novel service provider access server (e.g., router) which performs basic network address translation (NAT) and network address port translation (NAPT) for such networks. The system allows NAT and NAPT features to be removed from stub network routers, thereby significantly reducing the cost of Internet infrastructure to individual companies and organizations. NAT features on service provider's access servers provide the ability for multiple hosts in disparate private (unregistered) networks to utilize the services of a service provider, using a single global address for each private network and allow private networks to avoid renumbering with access to each new service provider.
211 citations
•
08 Jun 1994TL;DR: In this article, the authors present a system for detecting intrusions and suspect users in a computer installation, and a security system incorporating such a facility that makes use of surveillance data relating to the operation of the installation.
Abstract: A facility for detecting intrusions and suspect users in a computer installation, and a security system incorporating such a facility that makes use of surveillance data relating to the operation of the installation. The facility includes elements for modelling the computer installation, its users, and their respective behavior with the help of a semantic network; elements for comparing the modellized behavior of the system and of its users relative to modellized normal behavior; elements for interpreting observed anomalies in terms of intrusions and of intrusion hypothesis; elements for interpreting observed intrusion hypotheses and intrusions in order to indicate them and enable restraint actions to be prepared. Elements are provided to evaluate the degree of suspicion of users. The elements co-operate with one another for the purpose of providing information.
211 citations
Authors
Showing all 37011 results
Name | H-index | Papers | Citations |
---|---|---|---|
George M. Whitesides | 240 | 1739 | 269833 |
Yoshua Bengio | 202 | 1033 | 420313 |
John A. Rogers | 177 | 1341 | 127390 |
Zhenan Bao | 169 | 865 | 106571 |
Thomas S. Huang | 146 | 1299 | 101564 |
Federico Capasso | 134 | 1189 | 76957 |
Robert S. Brown | 130 | 1243 | 65822 |
Christos Faloutsos | 127 | 789 | 77746 |
Robert J. Cava | 125 | 1042 | 71819 |
Ramamoorthy Ramesh | 122 | 649 | 67418 |
Yann LeCun | 121 | 369 | 171211 |
Kamil Ugurbil | 120 | 536 | 59053 |
Don Towsley | 119 | 883 | 56671 |
Steven P. DenBaars | 118 | 1366 | 60343 |
Robert E. Tarjan | 114 | 400 | 67305 |