Institution
Deutsche Telekom
Company•Welwyn Garden City, United Kingdom•
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Signal. The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.
Topics: Telecommunications network, Signal, Terminal (electronics), The Internet, Transmission (telecommunications)
Papers published on a yearly basis
Papers
More filters
•
08 Jun 1996TL;DR: In this paper, the authors proposed a scheme to authenticate subscribers to one or several exchanges of a digital communications network, in particular an ISDN network, as described in the first claim, and a device for authenticating subscribers according to claims 6 and 8.
Abstract: A process is disclosed to authenticate subscribers to one or several exchanges of a digital communications network, in particular an ISDN network, as described in the first claim, as well as a device for authenticating subscribers according to claims 6 and 8. Since the lines of communication between the subscriber connections and the exchanges are not protected, there is a danger of intrusion or eavesdropping by unauthorised persons. The object of the invention is therefore to make misuse of the exchange by unauthorised persons difficult or even impossible. For that purpose, a device for authenticating subscribers to one or several exchanges of a digital communications network has at least one subscriber network termination to which at least one data terminal may be connected. The invention is characterised in that at least one first authentication module is provided for each subscriber and can receive a first identification carrier, and in that at least one second authentication module that can receive a second identification carrier is provided at the exchange. Alternatively, a supplementary system is connected between the network terminations associated with the exchange and the exchange itself. The supplementary system contains at least one second authentication module that can receive a second identification carrier. The authentication modules can code and/or decode information by means of an individual, subscriber-specific code, in order to authenticate it unilaterally and/or bilaterally, and can exchange information with each other.
13 citations
••
09 Dec 2008TL;DR: This paper demonstrates that EGOIST'S neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization, and uses a multiplayer peer-to-peer game to demonstrate the value of EGOist to end-user applications.
Abstract: A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. In this paper, we unify these two thrusts by using insights gleaned from novel, realistic theoretic models in the design of EGOIST -- a distributed overlay routing system that we implemented, deployed, and evaluated on PlanetLab. Using extensive measurements of paths between nodes, we demonstrate that EGOIST'S neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, we demonstrate that EGOIST is competitive with an optimal, but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overhead. Finally, we use a multiplayer peer-to-peer game to demonstrate the value of EGOIST to end-user applications.
13 citations
•
03 Dec 2007TL;DR: In this article, a method and device for classifying at least two languages in an automatic dialogue system, which processes digitized speech input, is provided for classification at least 2 languages in automatic dialogue systems.
Abstract: A method and device are provided for classifying at least two languages in an automatic dialogue system, which processes digitized speech input. At least one speech recognition method and at least one language identification method are used on the digitized speech input in order, by logical evaluation of the results of the method, to identify the language of the speech input.
13 citations
•
04 Sep 2015TL;DR: In this article, a container for mailing a package or a small parcel to be sent or to be received, which container can be fastened to a door of a property, in particular without structural intervention, includes a base element, a lid element by which a mailing can be placed into the container or be removed from the container, and foldable side walls, by which the base element and the lid element are connected to each other.
Abstract: A container for mailing a package or a small parcel to be sent or to be received, which container can be fastened to a door of a property, in particular without structural intervention, includes a base element, a lid element by which a mailing can be placed into the container or be removed from the container, and foldable side walls, by which the base element and the lid element are connected to each other. The lid element and the base element are movable against one another, at least in a vertical direction, by folding or at least partially unfolding the foldable side walls. The foldable side walls form a textile tube vertically extending between the base element and the lid element in the unfolded state, the textile tube defining an interior space with an at least substantially horizontal rectangular cross section.
13 citations
•
03 Apr 2002
TL;DR: In this article, a method for determining intensity parameters of background noises in speech pauses can be found based on the frequency distribution of the intensity values for short signal segments using the method disclosed in the invention.
Abstract: Known methods for determining intensity parameters are based on the evaluation of short signal segments and their direct allocation to speech pauses or speech activity In order to distinguish speech from speech pauses, intensity thresholds are often used When the undisturbed source signal is used to mark speech pauses, a variably occurring time lag between source voice signal and disturbed voice signal often impedes exact transfer of the marking Intensity parameters of background noises in speech pauses can be determined from the frequency distribution of the intensity values for short signal segments using the method disclosed in the invention In order to assign intensity values, the fraction of speech pauses in the entire signal is calculated from the undisturbed source signal and defined as frequency threshold Intensity values below the frequency threshold are assigned to the speech pauses The arithmetic mean value of said intensity value is determined as intensity parameter for the background noise in the speech pauses Percentile parameters for background noises in speech pauses can also be calculated with the inventive method
13 citations
Authors
Showing all 3475 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jörg Müller | 67 | 407 | 15282 |
Anja Feldmann | 67 | 340 | 17422 |
Yuval Elovici | 62 | 544 | 14451 |
Lior Rokach | 55 | 357 | 19989 |
Pan Hui | 52 | 468 | 17724 |
Hartmut G. Roskos | 50 | 434 | 9643 |
Wolfgang Haase | 50 | 624 | 11634 |
Shlomi Dolev | 48 | 516 | 10435 |
Jean-Pierre Seifert | 45 | 298 | 7516 |
Stefan Schmid | 45 | 561 | 9088 |
Fabian Schneider | 44 | 164 | 7437 |
Karsten Buse | 43 | 394 | 7774 |
Tansu Alpcan | 43 | 293 | 7840 |
Florian Metze | 42 | 318 | 7148 |
Christian Bauckhage | 42 | 285 | 8313 |