scispace - formally typeset
Search or ask a question

Showing papers by "Deutsche Telekom published in 2004"


Journal ArticleDOI
TL;DR: This paper provides an overview of the new tools, features and complexity of H.264/AVC.
Abstract: H.264/AVC, the result of the collaboration between the ISO/IEC Moving Picture Experts Group and the ITU-T Video Coding Experts Group, is the latest standard for video coding. The goals of this standardization effort were enhanced compression efficiency, network friendly video representation for interactive (video telephony) and non-interactive applications (broadcast, streaming, storage, video on demand). H.264/AVC provides gains in compression efficiency of up to 50% over a wide range of bit rates and video resolutions compared to previous standards. Compared to previous standards, the decoder complexity is about four times that of MPEG-2 and two times that of MPEG-4 Visual Simple Profile. This paper provides an overview of the new tools, features and complexity of H.264/AVC.

1,013 citations


Journal ArticleDOI
TL;DR: The results show that significant resource savings can be achieved by using end-to-end dynamic lightpath allocation, but at the expense of high delay, and the impact of nonuniform traffic demands.
Abstract: This paper investigates the challenges for developing the current local area network (LAN)-based Ethernet protocol into a technology for future network architectures that is capable of satisfying dynamic traffic demands with hard service guarantees using high-bit-rate channels (80...100 Gb/s). The objective is to combine high-speed optical transmission and physical interfaces (PHY) with a medium access control (MAC) protocol, designed to meet the service guarantees in future metropolitan-area networks (MANs). Ethernet is an ideal candidate for the extension into the MAN as it allows seamless compatibility with the majority of existing LANs. The proposed extension of the MAC protocol focuses on backward compatibility as well as on the exploitation of the wavelength domain for routing of variable traffic demands. The high bit rates envisaged will easily exhaust the capacity of a single optical fiber in the C band and will require network algorithms optimizing the reuse of wavelength resources. To investigate this, four different static and dynamic optical architectures were studied that potentially offer advantages over current link-based designs. Both analytical and numerical modeling techniques were applied to quantify and compare the network performance for all architectures in terms of achievable throughput, delay, and the number of required wavelengths and to investigate the impact of nonuniform traffic demands. The results show that significant resource savings can be achieved by using end-to-end dynamic lightpath allocation, but at the expense of high delay.

74 citations


Patent
04 Nov 2004
TL;DR: In this paper, an image pick-up sensor is suspended on a number of micromechanical actuators, which are controlled so that the image pickup sensor ir mechanically moved to counter the shake and stabilize the image.
Abstract: An image pick-up sensor is suspended on a number of micromechanical actuators. Based on detected changes in the time sequence of the image data, which indicate shake, control signals are generated to control the actuators. The actuators are controlled so that the image pick-up sensor ir mechanically moved to counter the shake and stabilize the image.

37 citations


Journal ArticleDOI
TL;DR: A life cycle model for IT application systems is introduced and the results of a survey of the life cycle costs of 30IT application systems are presented, showing the central importance of recurring costs for production and further development.
Abstract: IT management focuses on planning and developing new IT solutions. The importance of production (operation, support, maintenance) and further development of existing solutions is often neglected, although these tasks are responsible for the majority of today’s IT costs. The paper introduces a life cycle model for IT application systems and presents the results of a survey of the life cycle costs of 30 IT application systems. Within the survey, the distribution of costs over the application life cycle was recorded and evaluated. The results show the central importance of recurring costs for production and further development. For a production time of 5 years these costs amounted to 79% of all life cycle costs, whereas only 21% of the costs were incurred during the planning and initial development stages.

21 citations


Book ChapterDOI
01 Jan 2004
TL;DR: In this paper, a very interesting application of nonlinear optical effects is the nonlinear phase conjugation (NPC) which will be discussed in this chapter, under particular circumstances, it is possible to compensate optical distortions with NPC and optical pulses in a fiber can be regenerated.
Abstract: A very fascinating application of nonlinear optical effects is the nonlinear phase conjugation (NPC) which will be discussed in this Chapter. Under particular circumstances, it is possible to compensate optical distortions with NPC and optical pulses in a fiber can be regenerated. Therefore, in the range of optical telecommunications the NPC, can be exploited for the compensation of group velocity dispersion [193] as well as nonlinear effects like SPM [194] or Raman scattering [195].

18 citations


Patent
02 Sep 2004
TL;DR: In this article, a method and system for operating a push-to-talk communication between a PoC-group consisting of at least of one member of a first communication network and another PoC group consisting of a poC application server in a second communication network is presented.
Abstract: A method and system for operating a push-to-talk communication between a PoC-group consisting of at least of one member of a first communication network and a PoC-group consisting of at least of one member of a second communication network, using a PoC application server in each communication network. Members of the PoC-group of the first network operator are connected with the members of the PoC-group of the second network operator, and the PoC application servers are synchronized to each other.

14 citations


Patent
12 Feb 2004
TL;DR: In this paper, a method for externally controlling and managing a wireless local area network subscriber assigned to at least one WLAN assigned to a WLAN is described. But the method is not suitable for wireless networks where the user needs to be connected to the TCP/IP network via an interface device.
Abstract: A method for externally controlling and managing a wireless local area network subscriber assigned to at least one wireless local area network includes requesting a service using the subscriber, checking an authorization of the subscriber to access the TCP/IP network, and establishing a connection via the TCP/IP network to the subscriber if the subscriber has the authorization to access the TCP/IP network. Signaling and/or information data are managed using a control and managing device connected to the public TCP/IP network via an interface device.

11 citations


Patent
17 Jun 2004
TL;DR: In this article, the authors present a method which is novel and improved in relation to the prior art, by means of which an extremely flexible hands-free functionality can be guaranteed for telecommunication terminals, in particular, mobile telecommunication devices generally having a very limited read-only memory capacity.
Abstract: The invention relates to hands-free communication by using a telecommunication terminal. An aim of the invention is to provide a method which is novel and improved in relation to the prior art, by means of which method an extremely flexible hands-free functionality can be guaranteed for telecommunication terminals, in particular, mobile telecommunication terminals generally having a very limited read-only memory capacity. Said invention relates to at least one program for the execution of a speech-processing algorithm for a hands-free communication by using a telecommunication terminal, in particular, a mobile telecommunication terminal (100), said program being at least temporarily loaded by a service server (400) into the telecommunication terminal (100) and implemented for application at least for the duration of a communication connection.

10 citations


Patent
17 May 2004
TL;DR: In this paper, a method for controlling data connections in a data network comprising a plurality of data network nodes is proposed, in which the quality of a first data connection is evaluated on the basis of the adaptations of at least one coding used for the first connection.
Abstract: The invention relates to a method for controlling data connections in a data network comprising a plurality of data network nodes, whereby the quality of a first data connection is evaluated on the basis of the adaptations of at least one coding used for the first data connection, and a second data connection is established according to the evaluation and used as a replacement for the first data connection.

9 citations


Patent
17 Sep 2004
TL;DR: In this paper, the authors proposed a method and system for determining an optimal throughput of a communications channel in a highly mobile wireless environment, which includes selecting power control measures, determining a throughput of the communications channel for each of the selected power control measure using a throughput model of the channel and the selected PCC measure, wherein the throughput model is based on a probability of a packet error averaged over a packet fade.
Abstract: A method and system for determining an optimal throughput of a communications channel in a highly mobile wireless environment, which includes selecting power control measures, determining a throughput of the communications channel for each of the selected power control measures using a throughput model of the communications channel and the selected power control measure, wherein the throughput model is based on a probability of a packet error averaged over a packet fade, and wherein the probability of the packet error averaged over the packet fade is a function of the selected power control measure, and determining the optimal throughput as a maximum one of the throughputs determined for each of the selected power control measures.

8 citations


Patent
03 Jun 2004
TL;DR: In this paper, the system has detecting units e.g. optical sensors, determining an occupied condition of vehicle parking spaces (4, 4`) in a parkway, and displays that display information for guiding a driver are provided.
Abstract: The system has detecting units e.g. optical sensors, determining an occupied condition of vehicle parking spaces (4, 4`) in a parkway. Displays (1, 1`) that display information for guiding a driver are provided. A control unit separately adds the parking spaces that are recognized vacant for each driving direction at a crossway with an assigned display, and the sums are displayed on the displays with the visualized driving direction.

Patent
28 Sep 2004
TL;DR: In this article, a call jump establishes a jump from a call of a traditional telephone carrier established with audio signals, when it is determined that -video should be added to the call, a packetized network is connected.
Abstract: A call jump establishes a jump from a call of a traditional telephone carrier established with audio signals. When it is determined that -video should be added to the call, a packetized network is connected. The audio and video are transmitted over the packetized network. There is provided standard telephone equipment. A video enabled device is capable of rerouting the audio selectively to either the traditional telephone carrier or the packetized network. A packetizer packetizes the audio signals from the standard telephone equipment and the video.

Patent
Michael Fehse1
23 Sep 2004
TL;DR: In this article, the authors present a method and communications system for managing and supplying data in a communications environment, which may have a data management device, several application servers that may communicate with the central data-management device via different communications protocols, and storage devices based on FC (Fiber Channel) and IP (Internet Protocol) technology.
Abstract: A method and communications system for managing and supplying data in a communications environment, which may have a data-management device, several application servers that may communicate with the central data-management device via different communications protocols, and storage devices based on FC (Fiber Channel) and IP (Internet Protocol) technology. To provide the entire range of storage devices of different technologies to application servers that use different communications protocols, an application server may request data, which may be distributed among several storage devices of different technologies, using a specific communications protocol for an application to be carried out. The requested data are fetched out of at least one storage device, independently of the utilized communications protocol of the application server, and may be transmitted via the data-management device to the application server requesting the data, for further use, using its communications protocol.

Posted Content
TL;DR: In this paper, the impact of public innovation subsidies on private innovation expenditure is analyzed and it is shown that the hypothesis of complete crowding-out effects between public and private funds can be rejected.
Abstract: This paper analyses the impact of public innovation subsidies on private innovation expenditure. In the empirical economic literature there is still no common support for the hypothesis of either a complementary or a substitutive relationship between public funding and private investment. We investigate whether firms of the German service sector increase their innovation effort when participating in public policy schemes. Cross-sectional data at the firm level are used to estimate the effect of subsidisation. Applying a non-parametric matching approach we find evidence that the hypothesis of complete crowding-out effects between public and private funds can be rejected.

Patent
10 Mar 2004
TL;DR: In this paper, a method for generating and/or expanding a vocabulary database of a voice recognition system includes acoustically training the voice recognition systems using a computer-based audio module.
Abstract: A method for generating and/or expanding a vocabulary database of a voice recognition system includes acoustically training the voice recognition system using a computer-based audio module.

Proceedings ArticleDOI
13 Jun 2004
TL;DR: The effect of traffic engineering is investigated in order to allow for higher throughput of traffic in the network by balancing the load on the links by using network-wide optimization of paths for traffic flows.
Abstract: We investigate the effect of traffic engineering in order to allow for higher throughput of traffic in the network by balancing the load on the links. A network-wide optimization of paths for traffic flows can be used to maximize the amount of delivered traffic in a predefined topology. Based on previously developed optimization algorithms, we compare traffic engineering to pure shortest path first routing during a continuous process of expanding the link capacities to cope with increasing Internet traffic. We consider case studies and bounds on the efficiency of traffic engineering.

Patent
Bernhard Feiten1
15 Nov 2004
TL;DR: In this article, the authors propose a scalable encoding method for audio and video transmission, where the bit stream is depacketized into a base bit stream and a defined number of enhancement bit streams.
Abstract: Strong fluctuations of the transmission capacity may frequently occur in the transmission of audio/video signals in modern telecommunication networks. Occasionally, even breaks in transmission may occur. To improve playback, an exemplary method is provided, which may be used in GSM networks and future UMTS networks as well as for the fixed network. In scalable encoding methods for audio and video transmission, the bit stream is depacketized into a base bit stream and a defined number of enhancement bit streams. The exemplary method provides that the base bit stream, which may ensure a fully adequate playback, is transmitted with priority. Enhancement bit streams are transmitted only to the extent allowed by the available transmission bit rate in the network. The prioritized transmission of the base bit stream allows for playback to start quickly. For bridging breaks in the transmission, the base bit stream is stored in a buffer.

DOI
G. Hasslinger1
31 Aug 2004
TL;DR: In this paper, a general and comprehensive picture of the effect of traffic characteristics and control mechanisms on quality of service (QoS) is given, which combines capabilities for network monitoring, planning and traffic engineering with full support of differentiated and integrated services as main QoS concepts introduced by the Internet engineering task force (IETF).
Abstract: Quality of service (QoS) aspects in telecommunication networks interrelate requirements of users and applications with network architectures supporting relevant transmission properties. New challenges arise in multiservice platforms with increasing variety of service demands, which comes together with a higher variability in traffic profiles. We try to give a general and comprehensive picture of the effect of traffic characteristics and control mechanisms on quality of service (QoS). Broadband access platforms are considered from source traffic profiles to QoS aware dimensioning for aggregated traffic in the IP backbone. Networks based on multiprotocol label switching (MPLS) are included, which combine capabilities for network monitoring, planning and traffic engineering with full support of differentiated and integrated services as main QoS concepts introduced by the Internet engineering task force (IETF).

Patent
30 Dec 2004
TL;DR: In this paper, a verwendung eines kostenpflichtigen E-mail-and/oder SMS-Verfahrens is discussed, i.e., Vermeidung von unerwunschten E-Mails and SMS and zur Zahlung beim E-Commerce durch die Verwendingung of e-Mail and/or SMSVerfhrens.
Abstract: Die Erfindung betrifft ein Verfahren zur Vermeidung von unerwunschten E-Mails und SMS und zur Zahlung beim E-Commerce durch die Verwendung eines kostenpflichtigen E-Mail- und/oder SMS-Verfahrens. Ein solches Verfahren kann von einem Diensteanbieter angeboten werden, der Empfangerdaten, ein Empfangerverzeichnis, ein Abrechnungssystem und Filterfunktionen realisiert.

Patent
Eva Saar1
16 Dec 2004
TL;DR: In this paper, a method for sending personalized e-mails in which individual sections, e.g. greeting rows, text rows or attachments, can be selected for sending to different recipients of the e-mail is presented.
Abstract: Method for sending personalized e-mails in which individual sections, e.g. greeting rows, text rows or attachments, can be selected for sending to different recipients of the e-mail. Accordingly the sender marks particular row positions in the e-mail that correspond to sections that can be selected using a selection tool for incorporation in an e-mail to a particular recipient. The invention also relates to a corresponding tool for carrying out the inventive method.

Patent
30 Sep 2004
TL;DR: In this article, a method for the treatment of a crystal, such as a lithium niobate crystal or lithium tantalate crystal, having nonlinear optical properties, was proposed, where foreign atoms which bring about specific absorption of radiated light were transformed into a lower valent state by means of oxidation.
Abstract: A method for the treatment of a crystal, such as a lithium niobate crystal or lithium tantalate crystal, having nonlinear optical properties. The crystal comprises foreign atoms which bring about specific absorption of radiated light. The foreign atoms are transformed into a lower valent state by means of oxidation. Electrons, which are released during oxidation, are discharged from the crystal with the aid of an external power source.

Book ChapterDOI
01 Jan 2004
TL;DR: In this paper, the authors handel zukunftsorientiert: The Deutsche Telekom hat sich in Zeiten des globalen Wandels zum Ziel gesetzt, „Employer of Choice“ zu sein Stehen heute die Zeichen noch auf Personalabbau, so wird es angesichts eines sich schon jetzt abzeichnenden and in den nachsten zehn Jahren aus Grunden der demografischen Veranderung
Abstract: Wir handeln zukunftsorientiert: Die Deutsche Telekom hat sich in Zeiten des globalen Wandels zum Ziel gesetzt, „Employer of Choice“ zu sein Stehen heute die Zeichen noch auf Personalabbau, so wird es angesichts eines sich schon jetzt abzeichnenden und in den nachsten zehn Jahren aus Grunden der demografischen Veranderung der Bevolkerung verstarkt auftretenden Fach- und Fuhrungskraftemangels notwendig werden, Leistungstrager(innen) im Unternehmen zu halten und neu zu gewinnen Dazu kann Chancengleichheit und Diversity beitragen Chancengleichheit von Frauen und Mannern besteht fur uns heute nicht nur aus Frauenforderung Unsere Schwerpunkte „Diversity“ und „Work and Life Balance“ sprechen Frauen und Manner aus allen Kulturen — also alle Beschaftigten — gleichermasen an Gleichwohl sollen Frauen nach wie vor dort gefordert werden, wo sie unterreprasentiert sind, und das sind noch immer die Fuhrungspositionen sowie die technischen Bereiche Wir wollen die Potenziale gut ausgebildeter Frauen und Manner fur unser Unternehmen nutzen und erhalten Dafur attraktive Rahmenbedingungen — zB eine bessere Vereinbarkeit von Privat- und Berufsleben — fur unsere Beschaftigten zu schaffen, ist eines der Ziele unserer fortschrittlichen Chancengleichheitsarbeit

Patent
Jürgen Meyer1
02 Dec 2004
TL;DR: In this article, a mobile phone (1) access control system operation procedure connects to a speech dialogue system (2) in the network to identify the subscriber by identification and then sends a periodically repeated DTMF (Dual Tone Multiple Frequency) sequence that the access system acoustic coupler converts to data for speech dialogue to compare with the mobile phone system and authorize access.
Abstract: A mobile phone (1) access control system operation procedure connects to a speech dialogue system (2) in the network to identify the subscriber by identification and then sends a periodically repeated DTMF (Dual Tone Multiple Frequency) sequence that the access system acoustic coupler converts to data for the access system (3) speech dialogue to compare with the mobile phone system and authorize access.

Book ChapterDOI
TL;DR: In this paper, the authors investigated Wiener-Hopf factorization as an efficient approach for discrete time semi-Markovian server systems and computed a numerical solution of the steady state workload distribution in extension of an algorithm by Grassmann and Jain.
Abstract: The computation of workload distributions of service systems in telecommunication networks is essential for determining quality of service (QoS) parameters for various types of data transfer traffic. We discuss the relation of QoS demands from the end-to-end perspective of users to possible QoS degradation by network elements e.g. when overload situations are encountered. Modeling and analysis approaches of performance measures in multi service networks are also summarized with regard to the representation of usual traffic pattern being observed in the Internet. Depending on the model, there are different ways to determine workload distributions. We investigate Wiener-Hopf factorization as an efficient approach for discrete time semi-Markovian server systems. A numerical solution of the steady state workload distribution is computed in extension of an algorithm by Grassmann and Jain. After a verification step the guaranteed workload distribution can be computed using interval arithmetic. A C++ tool for this modeling approach using C-XSC is presented as well as examples of the evaluation.

Patent
04 Feb 2004
TL;DR: In this article, a method and system for exchanging data using a wireless connection according to which a user with one or more portable terminals is located in the transmission and receiving area of at least one network and the terminal or terminals log on automatically to the network in order to establish a connection.
Abstract: A method and system for exchanging data using a wireless connection according to which a user with one or more portable terminals is located in the transmission and receiving area of at least one network and the terminal or terminals log on automatically to the network in order to establish a connection. A transmission channel for the data exchange is made available for the respective connection that has been established. The transmission channel is automatically adapted for the data exchange to the type of terminal and the type, for example, quantity, of data to be transmitted, by an administrator that is allocated to the network.

Patent
Jörg Schwenk1
01 Apr 2004
TL;DR: In this paper, a method for providing an encrypted/encoded IP-based group service to several subscribers involves assigning an IP-group address, transmitting at least a first safety data file (EMM) (Entitlement management message), receiving the EMM at the subscribers (41,42,53,62) and loading the parameter in to the security module.
Abstract: A method for providing an encrypted/encoded IP-based group service to several subscribers involves assigning an IP-group address to several subscribers (41,42,53,62), transmitting at least a first safety data file (EMM) (Entitlement management message), receiving the EMM at the subscribers (41,42,53,62) and loading the parameter in to the security module. A second safety data file (ECM) (Entitlement control message) is sent at given times by using the IP-group address (Adr), and the second safety data file is received at the subscribers, followed by verification of the parameters received in the second safety data file. With agreement of the parameters the first cryptographic key is outputted from the security modules (46,47,53,65) to the subscribers (41,42,53,62) and IP-useful data encoded with the first cryptographic key is transmitted and the encrypted IP-useful data is decoded with the aid of the first cryptographic key outputted from the respective security module (46,47,53,65).

Patent
07 Dec 2004
TL;DR: In this article, a model-based audio and video system for representing a virtual image is presented, which involves obtaining a parameter to control a model from selected animation samples, another parameter is obtained from video information of a person, and a third parameter is formed according to a preset control parameter.
Abstract: The method involves obtaining a parameter to control a model from selected animation samples. Another parameter is obtained from video information of a person. Third parameter controls a model of a speech signal that corresponds to language expressions of the person. The parameters are formed according to a preset control parameter. An animated model is represented on a display device in dependence of the control parameter. An independent claim is also included for a model based audio and video system for implementing the method for representing a virtual image.

Patent
Eva Saar1
01 Jun 2004
TL;DR: In this paper, the sub-codes are generated and allocated to first and subsequent authorized parties and an event (E) to be encoded is defined by using responses to the two subcodes and before the SC are generated.
Abstract: First (TSx1) and second (TSy1) sub-codes (SC) are generated and allocated to first and subsequent authorized parties An event (E) to be encoded is defined by using responses to the two SC and before the SC are generated The second SC can be encoded before further sub-codes (TSz3,TSz4) are assigned to it There are optional routines for decoding and restructuring the SC Independent claims are also included for the following: (a) A device for making available sub-codes in an event encoded by visual cryptography; (b) and for a printed product with sections that have sub-codes for an event encoded by visual cryptography; (c) and for an implementation software product with program code stored on computer-readable data media for carrying out the method of the present invention

Patent
17 Jun 2004
TL;DR: In this article, the storage system on the server is provided with a locker-type characteristic by establishing folders comprising a specific file for the safety requirements related to the data and the lockers are distinguished by their specific function and are only displayed to the user when the safety requirement are met.
Abstract: In a method for use in a data storage system which applies high safety requirements for the storage of data on a server in a telecommunications network and for the retrieval of the files by the local computers linked with the server via the network, the applicant is provided with a user certificate and public and secret keys, preferably on a chip card. Once the server is dialed up via the Internet, a client program is forwarded to the user which controls authentication of the user and the transmission of additional safety-relevant features of proof such as biometrical systems, geographical positioning, time-dependent data, network and computer data, etc., to the server. The storage system on the server is provided with a locker-type characteristic by establishing folders comprising a specific file for the safety requirements related thereto. The lockers are distinguished by their specific function and are only displayed to the user when the safety requirements are met. This locker system thus also has virtual character.

Patent
Jörg Schwenk1
22 Apr 2004
TL;DR: In this article, the authors proposed a method to protect log files with a data processing system against prohibited changes by generating a second entry for an entry in the log file, where each entry has an associated function value, especially a digital signature, determined at least from the information and the entry.
Abstract: The method involves protecting log files with a data processing system against prohibited changes by generating a second entry for an entry in the log file. The data processing system has a security module that provides, especially continuous, information for each entry in the log file and whereby each entry has an associated function value, especially a digital signature, determined at least from the information and the entry.