scispace - formally typeset
Search or ask a question
Institution

Deutsche Telekom

CompanyWelwyn Garden City, United Kingdom
About: Deutsche Telekom is a company organization based out in Welwyn Garden City, United Kingdom. It is known for research contribution in the topics: Telecommunications network & Signal. The organization has 3473 authors who have published 5208 publications receiving 65429 citations. The organization is also known as: DTAG & German Telecom.


Papers
More filters
Proceedings ArticleDOI
24 Sep 2010
TL;DR: This work investigates the target-set selection problem for information delivery in the emerging Mobile Social Networks (MoSoNets), and proposes three algorithms, called Greedy, Heuristic, and Random, to exploit opportunistic communications to facilitate the information dissemination and thus reduce the amount of cellular traffic.
Abstract: Due to the increasing popularity of various applications for smartphones, 3G networks are currently overloaded by mobile data traffic. Offloading cellular traffic through opportunistic communications is a promising solution to partially solve this problem, because there is no monetary cost for it. As a case study, we investigate the target-set selection problem for information delivery in the emerging Mobile Social Networks (MoSoNets). We propose to exploit opportunistic communications to facilitate the information dissemination and thus reduce the amount of cellular traffic. In particular, we study how to select the target set with only k users, such that we can minimize the cellular data traffic.In this scenario, initially the content service providers deliver information over cellular networks to only users in the target set. Then through opportunistic communications, target-users will further propagate the information among all the subscribed users. Finally, service providers will send the information to users who fail to receive it before the delivery deadline (i.e., delay-tolerance threshold). We propose three algorithms, called Greedy, Heuristic, and Random, for this problem and evaluate their performance through an extensive trace-driven simulation study. The simulation results verify the efficiency of these algorithms for both synthetic and real-world mobility traces. For example, the Heuristic algorithm can offload cellular traffic by up to 73.66% for a real-world mobility trace.

292 citations

Journal ArticleDOI
07 Jan 2010
TL;DR: This paper presents OpenRoads, an open-source platform for innovation in mobile networks that enables researchers to innovate using their own production networks, through providing an wireless extension OpenFlow.
Abstract: We present OpenRoads, an open-source platform for innovation in mobile networks. OpenRoads enable researchers to innovate using their own production networks, through providing an wireless extension OpenFlow. Therefore, you can think of OpenRoads as "OpenFlow Wireless".The OpenRoads' architecture consists of three layers: flow, slicing and controller. These layers provide flexible control, virtualization and high-level abstraction. This allows researchers to implement wildly different algorithms and run them concurrently in one network. OpenRoads also incorporates multiple wireless technologies, specifically WiFi and WiMAX. We have deployed OpenRoads, and used it as our production network. Our goal here is for those to deploy OpenRoads and build their own experiments on it.

291 citations

Proceedings ArticleDOI
26 May 2008
TL;DR: An efficient distributed algorithm is presented to construct multiple disjoint barriers in a large sensor network to cover a long boundary area of an irregular shape on long strip areas of irregular shape without any constraint on crossing paths.
Abstract: Constructing sensor barriers to detect intruders crossing a randomly-deployed sensor network is an important problem. Early results have shown how to construct sensor barriers to detect intruders moving along restricted crossing paths in rectangular areas. We present a complete solution to this problem for sensors that are distributed according to a Poisson point process. In particular, we present an efficient distributed algorithm to construct sensor barriers on long strip areas of irregular shape without any constraint on crossing paths. Our approach is as follows: We first show that in a rectangular area of width w and length l with w = Ω(log l), if the sensor density reaches a certain value, then there exist, with high probability, multiple disjoint sensor barriers across the entire length of the area such that intruders cannot cross the area undetected. On the other hand, if w = o(log l), then with high probability there is a crossing path not covered by any sensor regardless of the sensor density. We then devise, based on this result, an efficient distributed algorithm to construct multiple disjoint barriers in a large sensor network to cover a long boundary area of an irregular shape. Our algorithm approximates the area by dividing it into horizontal rectangular segments interleaved by vertical thin strips. Each segment and vertical strip independently computes the barriers in its own area. Constructing "horizontal" barriers in each segment connected by "vertical" barriers in neighboring vertical strips, we achieve continuous barrier coverage for the whole region. Our approach significantly reduces delay, communication overhead, and computation costs compared to centralized approaches. Finally, we implement our algorithm and carry out a number of experiments to demonstrate the effectiveness of constructing barrier coverage.

285 citations

Journal ArticleDOI
TL;DR: In this article, the authors developed a multiple-item measure of industrial customer satisfaction and assessed its psychometric properties, and analyzed the influence of the identified dimensions of customer satisfaction on overall satisfaction.

279 citations

Proceedings ArticleDOI
Andreas Czylwik1
04 May 1997
TL;DR: The aim of the paper is to compare multicarrier and single carrier modulation schemes for radio communication systems and the fast Fourier transform (FFT) and its inverse are utilized.
Abstract: The aim of the paper is to compare multicarrier and single carrier modulation schemes for radio communication systems. In both cases the fast Fourier transform (FFT) and its inverse are utilized. In the case of OFDM (orthogonal frequency division multiplexing), the inverse FFT transforms the complex amplitudes of the individual subcarriers at the transmitter into the time domain. At the receiver the inverse operation is carried out. In the case of single carrier modulation, the FFT and its inverse are used at the input and output of the frequency domain equalizer in the receiver. Different single carrier and multicarrier transmission systems are simulated with time-variant transfer functions measured with a wideband channel sounder. In the case of OFDM, the individual subcarriers are modulated with fixed and adaptive signal alphabets. Furthermore, a frequency-independent as well as the optimum power distribution are used.

271 citations


Authors

Showing all 3475 results

NameH-indexPapersCitations
Jörg Müller6740715282
Anja Feldmann6734017422
Yuval Elovici6254414451
Lior Rokach5535719989
Pan Hui5246817724
Hartmut G. Roskos504349643
Wolfgang Haase5062411634
Shlomi Dolev4851610435
Jean-Pierre Seifert452987516
Stefan Schmid455619088
Fabian Schneider441647437
Karsten Buse433947774
Tansu Alpcan432937840
Florian Metze423187148
Christian Bauckhage422858313
Network Information
Related Institutions (5)
Nokia
28.3K papers, 695.7K citations

90% related

Ericsson
35.3K papers, 584.5K citations

89% related

Alcatel-Lucent
53.3K papers, 1.4M citations

87% related

Fujitsu
75K papers, 827.5K citations

85% related

Bell Labs
59.8K papers, 3.1M citations

84% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20227
202139
202061
201984
201897