scispace - formally typeset
Search or ask a question

Showing papers by "Deutsche Telekom published in 2003"


Journal ArticleDOI
P. List1, A. Joch, Jani Lainema2, G. Bjontegaard, Marta Karczewicz2 
TL;DR: The adaptive deblocking filter used in the H.264/MPEG-4 AVC video coding standard performs simple operations to detect and analyze artifacts on coded block boundaries and attenuates those by applying a selected filter.
Abstract: This paper describes the adaptive deblocking filter used in the H.264/MPEG-4 AVC video coding standard. The filter performs simple operations to detect and analyze artifacts on coded block boundaries and attenuates those by applying a selected filter.

884 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigate empirically the impact of such measures on patenting activity at the firm level and find that firms in publicly sponsored R&D consortia exhibit a higher propensity to patent than firms in non-sponsored networks.
Abstract: The stimulation of co-operations has become very popular in R&D policies in recent years. This paper describes the history of R&D funding in Germany with a focus on the development of measures encouraging collaborative R&D activities among firms and public research institutions. We investigate empirically the impact of such measures on patenting activity at the firm level. The microeconometric results show that collaborating firms are more likely to patent than others. Within the group of collaborating firms, participants in publicly sponsored R&D consortia exhibit a higher propensity to patent than firms in non-sponsored networks.

65 citations


Proceedings ArticleDOI
19 May 2003
TL;DR: A baseline environmental impact profile across the full life cycle of the UMTS (Universal Mobile Telecommunication System) and its predecessor, the GSM (Global System for Mobile Communication) is presented.
Abstract: Telecommunication providers and telecommunication manufacturers are getting ready to implement the third generation (3G) mobile telecommunication systems known as UMTS (Universal Mobile Telecommunication System) in Europe. Next to the technical problems involved, no statement regarding the sustainability of the UMTS can yet be made. In a joint effort Motorola, Swisscom, Deutsche Telekom and ESU-services have carried out an evaluation of the environmental sustainability of the UMTS mobile communication system in Switzerland by means of a life cycle assessment (LCA). A baseline environmental impact profile across the full life cycle of the UMTS mobile communication system and its predecessor, the GSM (Global System for Mobile Communication) is presented. The baseline assessment was a necessary first step to evaluate the environmental impacts of the mobile communication systems use and growth and thus permitting the evaluation of its environmental sustainability. The analysis showed that the manufacturing of electronic components, the life time of the appliances and energy consumption are key parameters influencing the environmental profile most. From this baseline, necessary environmental improvement strategies on the technical level, such as design for environment for products (e.g. cellular phone and base stations) and LCA improvement assessments (e.g. combined devices) are developed so as to show ways towards sustainable mobile communication.

53 citations


Journal ArticleDOI
TL;DR: In this article, the authors proposed a non-monotonic optimal dismissal policy for a manager who stays in office for a long time and has learned much about his subordinates, but the tradeoff arises that with a new manager effort is larger but the quality of task allocation is worse since information is lost.

47 citations


Proceedings ArticleDOI
14 Jul 2003
TL;DR: In this article, PMD measurements that were carried out in the installed fiber plant of Deutsche Telekom, which consists solely of G.652 fiber, are presented, and the data indicate that no direct correlation of the first-order PMD coefficient value with the rollout of the PMD specification by the fiber and cable manufacturers is feasible.
Abstract: In this paper, PMD measurements that were carried out in the installed fiber plant of Deutsche Telekom, which consists solely of G.652 fiber, are presented. The measurements are performed all over Germany during the last three years on nearly 10,000 fiber sections whereby these fiber cables were installed from 1985 to 2001. It should be noted that pre-1994 cables PMD was not yet specified by cable manufacturers and PMD specification were only added around 1995. Fibers with lowest PMD were identified and reserved for high capacity transmission. The data indicate that no direct correlation of the first-order PMD coefficient value with the rollout of the PMD specification by the fiber and cable manufacturers is feasible. Even for cables which were installed during 1985 till 1991 a reasonable number of fibers is suitable for 40 Gbit/s transmission. For 10 Gbit/s selected fibers are used, thus PMD does not impose any limitations and therefore avoiding expensive exchange of fibers.

29 citations


Patent
19 Feb 2003
TL;DR: In this article, an information and communication system arranged in a vehicle permitting vehicle passengers to access locally held information and/or to use external applications and services includes a server, and a plurality of access points are distributed in the vehicle and connected to the server.
Abstract: An information and communication system arranged in a vehicle permitting vehicle passengers to access locally held information and/or to use external applications and services includes a server. At least one transmitting and receiving unit connected to the server is provided and has access to at least one radio network. A plurality of access points are distributed in the vehicle and connected to the server. The passengers access applications or information or communicate with external partners or services via the system. The data exchange between the devices of the users and the system takes place with high bandwidth via the access points.

22 citations


Patent
21 Feb 2003
TL;DR: In this paper, a method for temporal synchronisation of at least two measuring computers (28, 36, 46) cooperating over a telecommunication network (10) such as internet, intranet or similar in which a highly accurate timestamp is required for each measurement process is described.
Abstract: The invention relates to a method for temporal synchronisation of at least two measuring computers (28, 36, 46), cooperating over a telecommunication network (10) such as internet, intranet or similar in which a highly accurate timestamp is required for each measurement process. The invention is characterised in that each measuring computer (28, 36, 46) is provided with several time sources with varying accuracy for reading off the timestamp from a time source and the selection of the time source by the measuring computer (28, 36, 46) is carried out depending on the accuracy of the time source.

18 citations


Patent
14 Aug 2003
TL;DR: In this article, a method for notification and ordering of electronic messages, especially voicemail and text messages to a phone, is presented, in a first step, messages received by the message receiving system are analyzed with voicemail messages first being converted into text.
Abstract: Method for notification and ordering of electronic messages, especially voicemail and text messages to a phone. According to the method, in a first step, messages received by the message receiving system are analyzed with voicemail messages first being converted into text. In a second step the messages are prioritized based on the analysis. Finally the messages are provided to the user based on the priority criteria. The invention also relates to software and a computer system for implementation of the inventive method.

15 citations


Patent
13 Jun 2003
TL;DR: In this paper, a real-time analysis of the data flow from and to the subscriber terminal is carried out in a device of a network node of the mobile communications network during which data with contents defined beforehand by the subscriber or by a network operator/provider are identified and processed.
Abstract: A method and device is provided for making available security functions during the transmission of data from and to a subscriber terminal of a mobile communications network. A real-time analysis of the data flow from and to the subscriber terminal is carried out in a device of a network node of the mobile communications network during which data with contents defined beforehand by the subscriber or by a network operator/provider are identified and processed. This results in protecting the terminal and subscriber's devices connected thereto from external attacks.

12 citations


Patent
Hetzer Dirk1
20 Feb 2003
TL;DR: In this paper, a method for guaranteeing the service quality of Internet applications, when network resources are being used in an optimum manner, is presented, where the communications requirements at the IP access network are captured and stored as a user profile.
Abstract: Method for guaranteeing the service quality of Internet applications, when network resources are being used in an optimum manner. Accordingly for Internet applications, the communications requirements at the IP access network are captured and stored as a user profile. When an Internet application is activated the available network resources are compares with the stored user profile and control data determined.

12 citations


Patent
Hetzer Dirk1
06 Mar 2003
TL;DR: In this paper, a method for instant messaging among groups of IP based terminals in which personalized information is transmitted over an interactive network server (INS) and a GSM, GPRS or UMTS network is presented.
Abstract: Method for implementation of instant messaging amongst groups of IP based terminals in which personalized information is transmitted over an interactive network server (INS) and a GSM, GPRS or UMTS network. At the same time group information is structured so that it can be sent over a DAB/DVB playout center, whereby the transmission of multicast information to the terminals via separate DVB-T or DAB data channels. The multicast information is received by the terminals that have DVD or DAB receivers and whereby the information is processed using mark-up language. An Independent claim is made for an arrangement for transmission of multicast information to mobile terminals.

Book ChapterDOI
TL;DR: Starting from traffic pattern of video traces available on the Internet characterized by their marginal distribution and autocorrelation function, the resource requirements for bandwidth and buffer space of single and multiplexed video streams are investigated.
Abstract: Video transmissions represent broadband applications which are often combined with strict real time constraints e.g. for conferencing. MPEG coding is used for data compression thus reducing the bandwidth requirement on account of a higher traffic variability and a higher impact of packet loss and error events after decoding. Starting from traffic pattern of video traces available on the Internet characterized by their marginal distribution and autocorrelation function we investigate the resource requirements for bandwidth and buffer space of single and multiplexed video streams.

Patent
05 Aug 2003
TL;DR: In this paper, a digital admission is provided, where part of the information is transferred via wireless data communication of the equipment into a communications network such as a telephone network and or the Internet.
Abstract: The method involves acquiring information from a picture or a sequence of pictures on mobile equipment such as a camera. A digital admission is provided, where part of the information is transferred via wireless data communication of the equipment into a communications network such as a telephone network and or the Internet. The information is accessible over the network to a computer where it can be interpreted. An independent claim is included for a system.

Patent
17 Apr 2003
TL;DR: In this paper, a verfahren und ein Sicherheitsetikett zur Aufbringung geheimzuhaltender Informationen auf Tragern, wie Guthabenkarten, Kundenkarte, or dergleichen, liegt die Aufgabe zugrunde, eine Losung anzubieten, die es gestattet, diese Informationen so aufzubringen, dass sie in hohem Mase vor unbemerkter Ken
Abstract: Die Erfindung betrifft ein Verfahren und ein Sicherheitsetikett zur Aufbringung geheimzuhaltender Informationen auf Tragern, wie Guthabenkarten, Kundenkarten oder dergleichen. Ihr liegt die Aufgabe zugrunde, eine Losung anzubieten, die es gestattet, diese Informationen so aufzubringen, dass sie in hohem Mase vor unbemerkter Kenntnisnahme durch Manipulationen Unberechtigter geschutzt und fur den zu ihrer Nutzung autorisierten Verwender in einfacher Weise zuganglich sind. DOLLAR A Gemas der vorgeschlagenen Losung werden die geheimzuhaltenden Informationen auf dem jeweiligen Trager mittels eines Sicherheitsetiketts aufgebracht, bei dem die Informationen, wie bekannt, durch das Abrubbeln mindestens einer Deckschicht sichtbar werden. Abweichend vom Stand der Technik dient jedoch dabei das Sicherheitsetikett nicht lediglich zur Abdeckung der Information auf dem Trager, sondern vielmehr wird die geheime Information mit dem Sicherheitsetikett als dessen Bestandteil auf den Trager aufgebracht.

Patent
19 Dec 2003
TL;DR: In this paper, an appliance for detecting erroneous text messages, especially SMS messages created by a vocal expression, is provided, comprising a device (80) for producing a text message from at least one original vocal expression.
Abstract: The invention relates to an appliance for detecting erroneous text messages, especially erroneous SMS messages, created by a vocal expression. The invention also relates to a communication system and a communication emitter comprising an appliance for detecting erroneous text messages. The aim of the invention is to take measures to enable erroneous text messages, created by a vocal expression, to be automatically detected, whereby a user's attention can be directed towards an erroneous text message, where necessary. To this end, an appliance for detecting erroneous text messages, especially SMS messages created by a vocal expression, is provided, said appliance comprising a device (80) for producing a text message from at least one original vocal expression, a device (70) which is associated with the production device (80) and is used to convert a created text message into a vocal expression, and a comparison device (190) which is associated with the conversion device (70) and is used to compare an original vocal expression with a vocal expression produced by a conversion device (70).

Patent
13 Nov 2003
TL;DR: In this paper, a PIN-based method for securing a system against unauthorized access is presented. But the method requires the user to input a value that is compared with a stored input code in order to provide access to a system.
Abstract: Method for securing a system against unauthorized access, whereby an input device is used to input a value that is compared with a stored input code in order to provide access to a system. Following input of the code, e.g. a PIN, a further control question is asked via a system output unit, e.g. the monitor. The question includes information for providing the answer and the user must input the correct answer before access is granted. The invention also relates to a system for implementing the method that comprises a computer with a chip card reader. The information displayed in the additional control question changes each time an identification chip card is inserted in the reader.

Patent
02 Jul 2003
TL;DR: In this article, a method for coding and decoding digital data stored or transmitted according to the pixels method for transmitting prioritized pixels is proposed, where the content of the information to the coded or decoded consists of individual pixel groups.
Abstract: A method for coding and decoding digital data stored or transmitted according to the pixels method for transmitting prioritized pixels. The content of the information to the coded or decoded consists of individual pixel groups. Each pixel group comprises a place value, at least one pixel value and a priority value assigned thereto. At least one key which makes possible to code or decode the place value and/or the pixel value or values of the pixel group is used. The most varied needs can be taken into consideration during the coding in terms of used keys and coded parts of information, for example the place values and/or the pixel group values.

Patent
19 Dec 2003
TL;DR: In this article, a method for desensitizing a crystal exhibiting non-linear optical properties, in particular a lithium niobate or lithium tantalate crystal against damage of exposure to light action (optical damages), was proposed.
Abstract: The invention relates to a method for desensitizing a crystal exhibiting non-linear optical properties, in particular a lithium niobate or lithium tantalate crystal against damage of exposure to light action (optical damages). The similar type damages are caused by refraction index modifications induced by light. The dark conductivity of the crystal is increased by doping with extrinsic ions.

Patent
16 Sep 2003
TL;DR: In this paper, the authors present a method for protecting an electronic transaction that is carried out using a transaction identification means (12) that includes a radio frequency identifier (RFID) tag.
Abstract: Method for protecting an electronic transaction that is carried out using a transaction identification means (12) that includes a radio frequency identifier (RFID) tag. During an electronic transaction the read-only tag is read and at least one further security characteristic of the transaction identification means is read and evaluated. An independent claim is made for a device for protecting an electronic transaction.

Patent
17 Feb 2003
TL;DR: In this paper, the authors proposed a data exchange method for data exchange via a wireless connection whereby a user with one or more portable terminals is located within a network, with a terminal making an automatic connection to the network for data transmission.
Abstract: Data exchange method for data exchange via a wireless connection whereby a user with one or more portable terminals is located within a network, with a terminal making an automatic connection to the network for data exchange. A data transfer channel is automatically assigned for data exchange by a network administrator based on the type of mobile terminal and the type, especially the amount, of data to be transferred. The invention also relates to a corresponding administrator for implementation of the inventive method.

Patent
16 Apr 2003
TL;DR: In this paper, the authors proposed a licensing inquiry for any random subjacent licensing system is sent via a mobile telephone and the licensing inquiry is personalized as a result, and independent claims are also included for a service device linked to a digital rights management (DRM) system like a medium-playing device.
Abstract: A playing license for a medium is tied to a mobile telephone's subscriber identity module (SIM) card. A licensing inquiry for any random subjacent licensing system is sent via a mobile telephone. The licensing inquiry is personalized as a result. The licensing system requires a once-off license tied to the device from the subjacent licensing system and supplies it as a medium-playing license. Independent claims are also included for the following: (a) A service device linked to a digital rights management (DRM) system like a medium-playing device; (b) and for a mobile communications terminal/mobile telephone with a subscriber identity module (SIM) for use with a DRM system; (c) and for software for a mobile communications terminal/mobile telephone with a subscriber identity module (SIM) for use with a DRM system; (d) and for a network component in a mobile network with its mobile communications terminals to send out licensing encoding requests for service devices with a DRM system.

Patent
Heinrich Wenz1
23 Sep 2003
TL;DR: In this paper, an independent claim is made for a device, especially an IP gateway for linking packet and switched telecommunications networks, which is a method for transmission of voice over Internet telephone conversations (VoIP).
Abstract: Method for transmission of voice over Internet telephone conversations (VoIP) using an IP gateway to link a packet IP network to a convention (PSTN) telephone network. The first time a connection is made to a particular terminal in a PSTN network the gateway determines if tunneling of IP packets over the network is possible. If so, communication is henceforth via IP packets. If IP tunneling is not possible the gateway acts as an information converter for converting information between different protocols and tunnels as necessary. An independent claim is made for a device, especially an IP gateway for linking packet and switched telecommunications networks.

Book ChapterDOI
01 Jan 2003
TL;DR: This work investigates optimization algorithms that compute a LSP design for a given traffic matrix with regard to the following goals: minimize the maximum link utilization corresponding to the considered path design and minimize the length of paths without affecting the first goal.
Abstract: Multiprotocol label switching (MPLS) has been developed by the IETF in order to support traffic engineering for a balanced and higher network-wide utilization of resources as a main objective. Meanwhile MPLS has been extended towards a generalized common control plane (GMPLS) for resource provisioning including optical networks. Traffic demands for each source to destination pair can be directed through a MPLS network on predefined paths (LSP: label switched path), whereas routing in IP networks is based on the shortest path first principle and does not allow to establish direct control of the load balance with a per flow or per demand granularity. We investigate optimization algorithms that compute a LSP design for a given traffic matrix with regard to the following goals: (i) Minimize the maximum link utilization corresponding to the considered path design and (ii) minimize the length of paths without affecting the first goal (i).

Patent
24 Jan 2003
TL;DR: In this article, the authors present a method and a system for providing information and communication in vehicles, where the vehicle occupant access to locally held information and/or the use of external applications and services by means of a arranged in the vehicle information-and communication system is enabled.
Abstract: Die Erfindung betrifft ein Verfahren und ein System fur die Informationsbereitstellung und die Kommunikation in Fahrzeugen. The invention relates to a method and a system for providing information and communication in vehicles. Ihr liegt die Aufgabe zugrunde, ein Verfahren anzugeben und ein System zu schaffen, durch welche elektronische Gerate, wie Laptops oder PDAs, mit sich fuhrende Fahrzeuginsassen mit einer hohen Datenrate und kostengunstig auf ein umfangreiches Informationsangebot zugreifen, externe Dienste nutzen oder in einen Datenaustausch mit externen Kommunikationspartnern treten konnen. It is the object of providing a method and to create a system use by which electronic devices, such as laptops or PDAs, with which leading vehicle occupants with a high data rate and low cost access to a wide range of information, external services or external to a data exchange with can contact communication partners. Zur Losung der Aufgabe wird den Fahrzeuginsassen der Zugriff auf lokal gehaltene Informationen und/oder die Nutzung externer Anwendungen und Dienste vermittels eines im Fahrzeug angeordneten Informations- und Kommunikationssystems ermoglicht. To solve the problem the vehicle occupant access to locally held information and / or the use of external applications and services by means of a arranged in the vehicle information and communication system is enabled. Das System umfasst einen Server mindestens eine mit ihm verbundene uber einen Zugang zu mindestens einem Funknetz verfugende Sende- und Empfangseinheit sowie mehrere mit dem Server verbundene, im Fahrzeug verteilt angeordnete Access Points, wobei die Nutzer ausschlieslich uber das System auf Anwendungen bzw. Informationen zugreifen oder mit externen Partnern bzw. Diensten kommunizieren. The system includes a server at least one connected to it via an access to at least one radio network operative transceiver unit and several associated with the server, distributed in the vehicle arranged access points, the user access only through the system to applications and information, or communicate with external partners and services. Der Datenaustausch zwischen den Geraten der Nutzer und dem System erfolgt breitbandig uber die Access Points. The exchange of data between the devices of the user and the system takes over the broadband access points.

Patent
Vollmer Torsten1
06 Nov 2003
TL;DR: In this article, a method for controlling access to information stored on, or functions provided by, a technical device, especially a chip card, mobile phone or similar, is presented.
Abstract: Method for controlling access to information stored on, or functions provided by, a technical device, especially a chip card, mobile phone or similar. Accordingly a first access step involves entry of a first secret access code or PIN, while a second step involves entry of a second secret access code or PIN. The second code can only be entered after successful entry of the first PIN. The first code provides access to a first level of information or functions, while the second code provides access to a second level of information or functions. A hierarchical arrangement of PINs can be created. The invention also relates to a corresponding device and software for method implementation.

Patent
10 Jan 2003
TL;DR: Verfahren zum Betrieb eines Telekommunikationsnetzes im Fall einer zeitweiligen starken Belastung (Ausnahmefall), insbesondere in the case of zumindest einen Teil der Bevolkerung betreffenden Gefahrensituation, wobei das Netz uber eine Vielzahl von Anschlussen verfugt, an die Endgerate, beispielsweise Telephone, Computer oder F
Abstract: Verfahren zum Betrieb eines Telekommunikationsnetzes im Fall einer zeitweiligen starken Belastung (Ausnahmefall), insbesondere im Fall einer zumindest einen Teil der Bevolkerung betreffenden Gefahrensituation, wobei das Netz uber eine Vielzahl von Anschlussen verfugt, an die Endgerate, beispielsweise Telephone, Computer oder Faxgerate, anschliesbar sind, wobei die Anschlusse jeweils uber individuelle Netzkennungen anwahlbar sind, wobei ein zentraler Computer (Server) zur Organisation der Verbindungen in das Netz eingebunden ist, wobei im Ausnahmefall eine Gruppe von Anschlussen definiert wird, wobei die Anschlusse der Gruppe fur eingehende und ausgehende Anrufe blockiert werden, wobei die zu den Anschlussen fuhrenden Leitungen uber den Server umgeleitet werden und wobei der Server die diesen Anschlussen zuzuordnenden Anrufe zentral organisiert.

Patent
05 Feb 2003
TL;DR: In this article, a method for the transmission of measured data from a measuring computer (28, 36, 46) to a control computer (50) in a measuring system, whereby the measuring computer and the control computer are connected to each other by means of a telecommunication network (10), such as internet, intranet or similar.
Abstract: The invention relates to a method for the transmission of measured data from a measuring computer (28, 36, 46) to a control computer (50) in a measuring system, whereby the measuring computer (28, 36, 46) and the control computer (50) are connected to each other by means of a telecommunication network (10), such as internet, intranet or similar. The invention is characterised in that, in order to reduce the amount of measured data, the above is collated into characteristic parameters over a time period and said characteristic parameters are transmitted from the measuring computer (28, 36, 46) to the control computer (50) instead of the data collated to give said characteristic parameters.

Book ChapterDOI
01 Jan 2003
TL;DR: In this article, the authors focus on the role of Convenience and komfortable Nutzung netzubergreifender Dienste uber unterschiedliche Endgerate.
Abstract: Die weiterhin fortschreitende Entwicklung der Telekommunikations- und IT-Welt hat in den letzten Jahren eine enorme Vielfalt an Technologien, Endgeraten und Diensten hervorgebracht. Die sich neu entwickelnden Kommunikationsmoglichkeiten gehen mit dem Trend einher, dass die Komplexitat zunimmt und damit die Beherrschbarkeit der Produkte immer schwieriger wird, so dass wir uns von der Vision „any application, anywhere, anytime, on any device“ eher entfernen als dass wir uns ihr nahern. In diesem Beitrag wird gezeigt, was Anwender von Applikationen, Diensten und Technologien erwarten konnen, welche Rolle Netz- und Dienstekonvergenz einnehmen und wie sowohl der heute erreichte Reifegrad von Fest- und Mobilfunknetzen als auch neue Technologien wie etwa Bluetooth/WLAN und Security/Authentifizierung entscheidende Katalysatoren fur erfolgreiche Konvergenzprodukte sind. Ein wesentliches Thema der Netzevolution der nachsten Jahre heist damit Integration, in deren Fokus die Konvergenz von Netztechnologien, Diensten und Endgeraten steht. Es wird die These aufgestellt, dass Convenience—die bequeme und komfortable Nutzung netzubergreifender Dienste uber unterschiedliche Endgerate — als wesentlicher Innovations- und Wachstumsmotor in den Vordergrund rucken und fur die nachsten Jahre die Rolle der Killerapplikation ubernehmen wird.

Patent
Klur Dieter1
06 Mar 2003
TL;DR: A mobile telecommunications unit with cable connection has a security unit with analogue and digital interfaces (6, 7, 8) in the removable battery and a switch to select operation with or without security as discussed by the authors.
Abstract: A mobile telecommunications unit (1) with cable connection (10) has a security unit with analogue and digital interfaces (6, 7, 8) in the removable battery (2) and a switch to select operation with or without security.

Patent
Schmidt Peter1
27 Mar 2003
TL;DR: In this article, a test plug with two test plugs with plug tongues and electrically separate plug contact surfaces on both sides connected together via a switch was used to test asymmetric digital subscriber line or ADSL devices.
Abstract: The device has two test plugs with plug tongues and electrically separate plug contact surfaces on both sides connected together via a switch After plugging the corresponding connections are newly associated after operating the switching device so that a test modem connected to the switch is connected to the ADSL device to be tested and the direct connection from the user to the telephone exchange is ideally not interrupted AN Independent claim is also included for the following: a method of testing asymmetrical digital subscriber line or ADSL devices