Institution
Deutsche Telekom
Company•Welwyn Garden City, United Kingdom•
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Terminal (electronics). The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.
Topics: Telecommunications network, Terminal (electronics), The Internet, Radio access network, Network packet
Papers published on a yearly basis
Papers
More filters
•
07 Jun 2002TL;DR: In this paper, a mobile telephone equipped with a laser transmitter-receiver and a lens for focussing the emitted radiation is used to measure the propagation time of a received laser beam and calculate the associated distance.
Abstract: In addition to the modules required for telecommunication, the mobile telephone includes a laser transmitter-receiver with a laser source, and a lens for focussing the emitted radiation. Measurement data from an evaluation unit are supplied to a unit for transmitting the data via a mobile radio network (12) to a remote station, e.g. a personal computer (10). The evaluation unit measures the propagation time of a received laser beam (7), and calculates the associated distance.
16 citations
••
20 Sep 2010TL;DR: A novel spectrum-survey system, called Sybot (Spectrum survey robot), that guides network engineers to efficiently monitor the spectrum condition of WiFi networks and automatically determines several key survey parameters, such as site-specific measurement time and space granularities.
Abstract: Information on site-specific spectrum characteristics is essential to evaluate and improve the performance of wireless networks. However, it is usually very costly to obtain accurate spectrum-condition information in heterogeneous wireless environments. This paper presents a novel spectrum-survey system, called Sybot (Spectrum survey robot), that guides network engineers to efficiently monitor the spectrum condition (e.g., RSS) of WiFi networks. Sybot effectively controls mobility and employs three disparate monitoring techniques - complete, selective, and diagnostic - that help produce and maintain an accurate spectrum-condition map for challenging indoor WiFi networks. By adaptively triggering the most suitable of the three techniques, Sybot captures spatio-temporal changes in spectrum condition. Moreover, based on the monitoring results, Sybot automatically determines several key survey parameters, such as site-specific measurement time and space granularities. Sybot has been prototyped with a commodity IEEE 802.11 router and Linux OS, and experimentally evaluated, demonstrating its ability to generate accurate spectrum-condition maps while reducing the measurement effort (space, time) by more than 56%.
16 citations
••
26 Mar 2008TL;DR: The middleware is described, which is capable of scalably and reliably handling concurrent events generated by different types of M2M devices, such as RFID tags, Zigbee sensors, and location tracking tags.
Abstract: The emergence of machine-to-machine (M2M) technologies as a business opportunity is based on the observation that there are many more machines and objects in the world than people and that an everyday object has more value when it is networked. In this paper, we describe an M2M middleware that we have developed for a facility management application. Facility management is a time and labour-intensive service industry, which can greatly benefit from the use of M2M technologies for automating business processes. The need to manage diverse facilities motivates several requirements, such as predictive maintenance, inventory management, access control, location tracking, and remote monitoring, for which an M2M solution would be useful. Our middleware includes software modules for interfacing with intelligent devices that are deployed in customer facilities to sense real-world conditions and control physical devices; communication modules for relaying data from the devices in the customer premises to a centralized data center; and service modules that analyze the data and trigger business events. We also present performance results of our middleware using our testbed and show that our middleware is capable of scalably and reliably handling concurrent events generated by different types of M2M devices, such as RFID tags, Zigbee sensors, and location tracking tags.
16 citations
••
05 Jun 2011TL;DR: This paper adapt and apply statistical measures such as conversation state probabilities to recordings made during a three-party conferencing quality test, which was designed to evaluate the perceived quality under various speech transmission properties.
Abstract: This paper investigates interactivity in multi-party conferencing. To this aim the state model often used to descibe two-party telephone conversations is redefined for more than two interlocutors. We adapt and apply statistical measures such as conversation state probabilities to recordings made during a three-party conferencing quality test, which was designed to evaluate the perceived quality under various speech transmission properties. In a second step, we associate the different observed degrees of interactivity to the quality test ratings. Results give a first insight into the co-dependence of transmission properties, the interlocutors' communication behavior and their integral quality judgment.
15 citations
••
27 Jun 2011TL;DR: This paper investigates the problem of optimal distribution of content-based signatures of malware to minimize the number of infected nodes, and provides an encounter-based distributed algorithm based on Metropolis sampler that achieves the optimal solution, and performs efficiently in realistic environments.
Abstract: As malware attacks become more frequent in mobile networks, deploying an efficient defense system to protect against infection and to help the infected nodes to recover is important to contain serious spreading and outbreaks. The technical challenges are that mobile devices are heterogeneous in terms of operating systems, and the malware can infect the targeted system in any opportunistic fashion via local and global connectivity, while the to-be-deployed defense system on the other hand would be usually resource limited. In this paper, we investigate the problem of optimal distribution of content-based signatures of malware to minimize the number of infected nodes, which can help to detect the corresponding malware and to disable further propagation. We model the defense system with realistic assumptions addressing all the above challenges, which have not been addressed in previous analytical work. Based on the proposed framework of optimizing the system welfare utility through the signature allocation, we provide an encounter-based distributed algorithm based on Metropolis sampler. Through extensive simulations with both synthetic and real mobility traces, we show that the distributed algorithm achieves the optimal solution, and performs efficiently in realistic environments.
15 citations
Authors
Showing all 3475 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jörg Müller | 67 | 407 | 15282 |
Anja Feldmann | 67 | 340 | 17422 |
Yuval Elovici | 62 | 544 | 14451 |
Lior Rokach | 55 | 357 | 19989 |
Pan Hui | 52 | 468 | 17724 |
Hartmut G. Roskos | 50 | 434 | 9643 |
Wolfgang Haase | 50 | 624 | 11634 |
Shlomi Dolev | 48 | 516 | 10435 |
Jean-Pierre Seifert | 45 | 298 | 7516 |
Stefan Schmid | 45 | 561 | 9088 |
Fabian Schneider | 44 | 164 | 7437 |
Karsten Buse | 43 | 394 | 7774 |
Tansu Alpcan | 43 | 293 | 7840 |
Florian Metze | 42 | 318 | 7148 |
Christian Bauckhage | 42 | 285 | 8313 |