scispace - formally typeset
Search or ask a question
Institution

Deutsche Telekom

CompanyWelwyn Garden City, United Kingdom
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Signal. The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.


Papers
More filters
Proceedings ArticleDOI
22 Jan 2010
TL;DR: The proposed method allows digital imitation of a broad number of instruments while still being able to sense musical hits and relative plectrum gestures, and provides a framework for extending interaction space with music applications beyond physical boundaries of small mobile devices, and to 3D space around the device.
Abstract: Playing musical instruments such as chordophones, percussions and keyboard types accompany with harmonic interaction of player's hand with the instruments. In this work, we present a novel approach that enables the user to imitate the music playing gestures around mobile devices. In our approach, touch-less gestures, which change magnetic field around the device, are employed for interaction. The activity of playing an instrument can be transparently pursued by moving a tiny magnet in hand around new generation of mobile phones equipped with embedded digital compass (magnetic sensor). The phonation intentions of the user can be simulated on the mobile device by capturing the gestural pattern using magnetic sensor. The proposed method allows digital imitation of a broad number of instruments while still being able to sense musical hits and relative plectrum gestures. It provides a framework for extending interaction space with music applications beyond physical boundaries of small mobile devices, and to 3D space around the device. This can allow for a more natural, comfortable and flexible interaction. We present several mobile music applications developed based on the proposed method for Apple iPhone 3GS.

26 citations

Proceedings ArticleDOI
10 Jun 2012
TL;DR: AnonyFlow, an in-network anonymization service designed to efficiently and seamlessly provide privacy to users as they communicate with other endpoints and services, is introduced and an OpenFlow-based prototype of AnonyFlow is designed that achieves endpoint anonymity without compromising on throughput or latency.
Abstract: User privacy on the Internet has been an increasing concern in recent years. With the proliferation and sophistication of information services, data mining, and search engines, a simple network address may be used to reveal a great deal of information about a user, including location, identity, and behavior. Existing approaches to privacy, however, make unacceptable tradeoffs between performance and anonymity. For example, Tor [5] attempts to provide strong anonymity by withholding trust from third-party relays. We believe an acceptable level of privacy can be provided to most users, with noticeably lower latency and throughput impact, by working with the network provider. In this paper, we introduce AnonyFlow, an in-network anonymization service designed to efficiently and seamlessly provide privacy to users as they communicate with other endpoints and services. We design, implement, and evaluate an OpenFlow-based prototype of AnonyFlow that achieves endpoint anonymity without compromising on throughput or latency.

26 citations

Proceedings ArticleDOI
16 Jul 2006
TL;DR: Packet streams transferred over the Internet are used to analyze the long-term and short-term trends in reordering and reorder density is used to capture comprehensively and concisely the nature of reordering present in a stream.
Abstract: End-to-end reordering of packets on Internet is investigated. Packet streams transferred over the Internet are used to analyze the long-term and short-term trends in reordering. Reorder density (RD) is used to capture comprehensively and concisely the nature of reordering present in a stream. Simpler metrics are derived from RD for monitoring of long-term reordering trends. Reorder entropy characterizes the reordering in a stream using a single value, reflecting the fraction of packets displaced as well as the magnitude displacements. The mean displacement of packets, defined with respect to late packets, early packets or all the packets, together with the percentage of packets that are displaced can also be used for this purpose. The pros and cons of each of these for monitoring long-term trends in reordering are addressed. The measurements presented indicate that for some end-to-end links the packet reordering shows clear daily and weekly trends

26 citations

Journal ArticleDOI
25 Feb 2021
TL;DR: In this paper, the role of edge computing in 5G for autonomous navigation is evaluated with a vision-based navigation algorithm, and three computation modes are compared: onboard, fully offloaded to the edge, and partially offloaded.
Abstract: Small drones that navigate using cameras may be limited in their speed and agility by low onboard computing power. We evaluate the role of edge computing in 5G for such autonomous navigation. The offloading of image processing tasks to an edge server is studied with a vision-based navigation algorithm. Three computation modes are compared: onboard, fully offloaded to the edge, and partially offloaded. Partial offloading is expected to pose lower demands on the communication network in terms of transfer rate than full offloading but requires some onboard processing. Our results on the computation time help select the most suitable mode for image processing, i.e., whether and what to offload, based on the network conditions.

26 citations

Patent
31 Jul 1995
TL;DR: In this paper, the authors describe a smart card for access to a global system for mobile communication,GSM, which has an embedded integrated circuit that has a micro controller and an EEPROM memory.
Abstract: The smart card is provide for access to a global system for mobile communication ,GSM. The card has an embedded integrated circuit that has a micro controller and an EEPROM memory. The circuit has identification data and authentication data in coded form that is independent of the terminal used for reading. Removal of the card during the operation terminates the cycle.

26 citations


Authors

Showing all 3475 results

NameH-indexPapersCitations
Jörg Müller6740715282
Anja Feldmann6734017422
Yuval Elovici6254414451
Lior Rokach5535719989
Pan Hui5246817724
Hartmut G. Roskos504349643
Wolfgang Haase5062411634
Shlomi Dolev4851610435
Jean-Pierre Seifert452987516
Stefan Schmid455619088
Fabian Schneider441647437
Karsten Buse433947774
Tansu Alpcan432937840
Florian Metze423187148
Christian Bauckhage422858313
Network Information
Related Institutions (5)
Nokia
28.3K papers, 695.7K citations

90% related

Ericsson
35.3K papers, 584.5K citations

89% related

Alcatel-Lucent
53.3K papers, 1.4M citations

87% related

Fujitsu
75K papers, 827.5K citations

85% related

Bell Labs
59.8K papers, 3.1M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20227
202139
202061
201984
201897