scispace - formally typeset
Search or ask a question
Institution

Deutsche Telekom

CompanyWelwyn Garden City, United Kingdom
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Signal. The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.


Papers
More filters
Proceedings ArticleDOI
06 May 2012
TL;DR: This paper presents an iterative algorithm to solve the joint optimization problem with an objective of maximizing the network sum rate and simultaneously guaranteeing the individual user quality-of-service.
Abstract: Heterogeneous cellular networks (HetNets), where low-power base-stations are overlaid with conventional macro base-stations, is a promising technique to improve coverage and capacity of the macro-only networks. To realize the potential benefits of HetNets, it is crucial to jointly optimize the user association, channel assignment, beamforming and power control to ensure that the inter- and intra-cell interference will not overwhelm the cell-splitting gains. This paper presents an iterative algorithm to solve the joint optimization problem with an objective of maximizing the network sum rate and simultaneously guaranteeing the individual user quality-of-service. The proposed algorithm is built on the so-called convex-concave procedure, and the feasibility issue is handled by L1-norm heuristic. Numerical results demonstrate the large gains over currently used methods for cellular networks.

68 citations

Proceedings ArticleDOI
01 Sep 2014
TL;DR: This position paper presents a high-level concept and architecture to enable service chaining using Software Defined Networking (SDN), specifically OpenFlow in a telecommunication environment and discusses required functionalities, challenges, and testbed aspects to implement and test such an approach.
Abstract: Network service chaining allows composing services out of multiple service functions. Traditional network service functions include, e.g., firewalls, TCP optimizers, web proxies, or higher layer applications. Network service chaining requires flexible service function deployment models. Related work facilitating service chaining include, e.g., the network service header proposal discussed at the IETF or the complementary work on network function virtualization (NFV) at ETSI. This position paper presents a high-level concept and architecture to enable service chaining using Software Defined Networking (SDN), specifically OpenFlow in a telecommunication environment. The paper discusses required functionalities, challenges, and testbed aspects to implement and test such an approach. Finally, the set of implemented service functions and management interfaces are highlighted to demonstrate the approach as a proof of concept for a selection of relevant use cases.

67 citations

Patent
Lena Chekina1, Bracha Shapira1, Dudu Mimran1, Yuval Elovici1, Christoph Peylo1 
15 Oct 2013
TL;DR: In this article, the authors proposed a system for protecting mobile devices in cellular networks from unauthorized harmful applications and for protecting cellular network infrastructure from targeted or benign overloads, which consists of mobile cellular devices and a cellular network infrastructures.
Abstract: The invention is a system for protecting mobile devices in cellular networks from unauthorized harmful applications and for protecting cellular network infrastructure from targeted or benign overloads. The system comprises mobile cellular devices and a cellular network infrastructure. Some of the mobile devices comprise an application manager, which is adapted to manage the aggregation and learning processes, and a detection manager, which is adapted to analyze network behavior and detect deviations. The application manager and the detection manager are adapted to monitor the applications running on a device, learn the patterns of mobile applications network behavior and detect meaningful deviations from the application's observed normal behavior. The cellular network infrastructure comprises a services module, a logic module, and a database access unit adapted for aggregation and analysis of an application's network traffic patterns for numerous users.

67 citations

Journal ArticleDOI
TL;DR: A way to avoid this restriction in public key cryptography is proposed by implementing secret key decryption and signature generation by computation of the gcd of two polynomials.
Abstract: Permutation polynomials over Zn form the basis of the RSA and Dickson public key schemes. Previously, however, only those permutation polynomials whose inverse permutation polynomial was easy to evaluate have been used in cryptography. The authors propose a way to avoid this restriction in public key cryptography by implementing secret key decryption and signature generation by computation of the gcd of two polynomials. This allows the implementation of new classes of public key scheme.

67 citations


Authors

Showing all 3475 results

NameH-indexPapersCitations
Jörg Müller6740715282
Anja Feldmann6734017422
Yuval Elovici6254414451
Lior Rokach5535719989
Pan Hui5246817724
Hartmut G. Roskos504349643
Wolfgang Haase5062411634
Shlomi Dolev4851610435
Jean-Pierre Seifert452987516
Stefan Schmid455619088
Fabian Schneider441647437
Karsten Buse433947774
Tansu Alpcan432937840
Florian Metze423187148
Christian Bauckhage422858313
Network Information
Related Institutions (5)
Nokia
28.3K papers, 695.7K citations

90% related

Ericsson
35.3K papers, 584.5K citations

89% related

Alcatel-Lucent
53.3K papers, 1.4M citations

87% related

Fujitsu
75K papers, 827.5K citations

85% related

Bell Labs
59.8K papers, 3.1M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20227
202139
202061
201984
201897