scispace - formally typeset
Search or ask a question
Institution

Deutsche Telekom

CompanyWelwyn Garden City, United Kingdom
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Terminal (electronics). The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.


Papers
More filters
Patent
07 Jun 2002
TL;DR: In this paper, a mobile telephone equipped with a laser transmitter-receiver and a lens for focussing the emitted radiation is used to measure the propagation time of a received laser beam and calculate the associated distance.
Abstract: In addition to the modules required for telecommunication, the mobile telephone includes a laser transmitter-receiver with a laser source, and a lens for focussing the emitted radiation. Measurement data from an evaluation unit are supplied to a unit for transmitting the data via a mobile radio network (12) to a remote station, e.g. a personal computer (10). The evaluation unit measures the propagation time of a received laser beam (7), and calculates the associated distance.

16 citations

Proceedings ArticleDOI
20 Sep 2010
TL;DR: A novel spectrum-survey system, called Sybot (Spectrum survey robot), that guides network engineers to efficiently monitor the spectrum condition of WiFi networks and automatically determines several key survey parameters, such as site-specific measurement time and space granularities.
Abstract: Information on site-specific spectrum characteristics is essential to evaluate and improve the performance of wireless networks. However, it is usually very costly to obtain accurate spectrum-condition information in heterogeneous wireless environments. This paper presents a novel spectrum-survey system, called Sybot (Spectrum survey robot), that guides network engineers to efficiently monitor the spectrum condition (e.g., RSS) of WiFi networks. Sybot effectively controls mobility and employs three disparate monitoring techniques - complete, selective, and diagnostic - that help produce and maintain an accurate spectrum-condition map for challenging indoor WiFi networks. By adaptively triggering the most suitable of the three techniques, Sybot captures spatio-temporal changes in spectrum condition. Moreover, based on the monitoring results, Sybot automatically determines several key survey parameters, such as site-specific measurement time and space granularities. Sybot has been prototyped with a commodity IEEE 802.11 router and Linux OS, and experimentally evaluated, demonstrating its ability to generate accurate spectrum-condition maps while reducing the measurement effort (space, time) by more than 56%.

16 citations

Book ChapterDOI
26 Mar 2008
TL;DR: The middleware is described, which is capable of scalably and reliably handling concurrent events generated by different types of M2M devices, such as RFID tags, Zigbee sensors, and location tracking tags.
Abstract: The emergence of machine-to-machine (M2M) technologies as a business opportunity is based on the observation that there are many more machines and objects in the world than people and that an everyday object has more value when it is networked. In this paper, we describe an M2M middleware that we have developed for a facility management application. Facility management is a time and labour-intensive service industry, which can greatly benefit from the use of M2M technologies for automating business processes. The need to manage diverse facilities motivates several requirements, such as predictive maintenance, inventory management, access control, location tracking, and remote monitoring, for which an M2M solution would be useful. Our middleware includes software modules for interfacing with intelligent devices that are deployed in customer facilities to sense real-world conditions and control physical devices; communication modules for relaying data from the devices in the customer premises to a centralized data center; and service modules that analyze the data and trigger business events. We also present performance results of our middleware using our testbed and show that our middleware is capable of scalably and reliably handling concurrent events generated by different types of M2M devices, such as RFID tags, Zigbee sensors, and location tracking tags.

16 citations

Proceedings ArticleDOI
05 Jun 2011
TL;DR: This paper adapt and apply statistical measures such as conversation state probabilities to recordings made during a three-party conferencing quality test, which was designed to evaluate the perceived quality under various speech transmission properties.
Abstract: This paper investigates interactivity in multi-party conferencing. To this aim the state model often used to descibe two-party telephone conversations is redefined for more than two interlocutors. We adapt and apply statistical measures such as conversation state probabilities to recordings made during a three-party conferencing quality test, which was designed to evaluate the perceived quality under various speech transmission properties. In a second step, we associate the different observed degrees of interactivity to the quality test ratings. Results give a first insight into the co-dependence of transmission properties, the interlocutors' communication behavior and their integral quality judgment.

15 citations

Proceedings ArticleDOI
Yong Li1, Pan Hui2, Depeng Jin1, Li Su1, Lieguang Zeng1 
27 Jun 2011
TL;DR: This paper investigates the problem of optimal distribution of content-based signatures of malware to minimize the number of infected nodes, and provides an encounter-based distributed algorithm based on Metropolis sampler that achieves the optimal solution, and performs efficiently in realistic environments.
Abstract: As malware attacks become more frequent in mobile networks, deploying an efficient defense system to protect against infection and to help the infected nodes to recover is important to contain serious spreading and outbreaks. The technical challenges are that mobile devices are heterogeneous in terms of operating systems, and the malware can infect the targeted system in any opportunistic fashion via local and global connectivity, while the to-be-deployed defense system on the other hand would be usually resource limited. In this paper, we investigate the problem of optimal distribution of content-based signatures of malware to minimize the number of infected nodes, which can help to detect the corresponding malware and to disable further propagation. We model the defense system with realistic assumptions addressing all the above challenges, which have not been addressed in previous analytical work. Based on the proposed framework of optimizing the system welfare utility through the signature allocation, we provide an encounter-based distributed algorithm based on Metropolis sampler. Through extensive simulations with both synthetic and real mobility traces, we show that the distributed algorithm achieves the optimal solution, and performs efficiently in realistic environments.

15 citations


Authors

Showing all 3475 results

NameH-indexPapersCitations
Jörg Müller6740715282
Anja Feldmann6734017422
Yuval Elovici6254414451
Lior Rokach5535719989
Pan Hui5246817724
Hartmut G. Roskos504349643
Wolfgang Haase5062411634
Shlomi Dolev4851610435
Jean-Pierre Seifert452987516
Stefan Schmid455619088
Fabian Schneider441647437
Karsten Buse433947774
Tansu Alpcan432937840
Florian Metze423187148
Christian Bauckhage422858313
Network Information
Related Institutions (5)
Nokia
28.3K papers, 695.7K citations

90% related

Ericsson
35.3K papers, 584.5K citations

89% related

Alcatel-Lucent
53.3K papers, 1.4M citations

87% related

Fujitsu
75K papers, 827.5K citations

85% related

Bell Labs
59.8K papers, 3.1M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20227
202139
202061
201984
201897