scispace - formally typeset
Search or ask a question
Institution

Huawei

CompanyShenzhen, China
About: Huawei is a company organization based out in Shenzhen, China. It is known for research contribution in the topics: Terminal (electronics) & Signal. The organization has 41417 authors who have published 44698 publications receiving 343496 citations. The organization is also known as: Huawei Technologies & Huawei Technologies Co., Ltd..


Papers
More filters
Journal ArticleDOI
Bo Zeng1, Zhaosheng Teng1, Yulian Cai2, Siyu Guo1, Baiyuan Qing 
TL;DR: An approach for power system harmonic phasor analysis under asynchronous sampling is proposed, based on smoothing sampled data by windowing the signal with the four-term fifth derivative Nuttall (FFDN) window, and then calculating harmonicphasors in the frequency domain with an improved fast Fourier transform (IFFT) algorithm.
Abstract: An approach for power system harmonic phasor analysis under asynchronous sampling is proposed in this paper. It is based on smoothing sampled data by windowing the signal with the four-term fifth derivative Nuttall (FFDN) window, and then calculating harmonic phasors in the frequency domain with an improved fast Fourier transform (IFFT) algorithm. The applicable rectification formulas of the IFFT are obtained by using the polynomial curve fitting, dramatically reducing the computation load. The FFDN window can effectively inhibit the spectral leakage and the picket fence effect can be modified by the IFFT algorithm under asynchronous sampling, and the overall algorithm can easily be implemented in embedded systems. The effectiveness of the proposed method was analyzed by means of simulations and practical experiments for multifrequency signals with the fluctuation of the fundamental frequency and with the presence of white noise and interharmonics.

79 citations

Patent
Xin Xiong1, Yinghui Yu1
19 Jun 2012
TL;DR: In this paper, the authors present a wireless broadband communication method, device, and system, capable of improving the bandwidth and capacity for mobile broadband communication and reducing the cost, by using a dedicated synchronization signal Preamble sent by a user equipment (UE) in an idle state through a first message.
Abstract: Embodiments of the present invention provide a wireless broadband communication method, device, and system, capable of improving the bandwidth and capacity for mobile broadband communication and reducing the cost. The method provided by the embodiment of the present invention comprises: a small cell receiving a dedicated synchronization signal Preamble sent by a user equipment (UE) in an idle state through a first message, the dedicated Preamble being distributed when the UE accesses a network for the first time; the small cell querying, according to the dedicated Preamble, whether a first signaling radio bearer SRB1 and/or a second signaling radio bearer SRB2 of the UE is stored; if yes, the small cell replying to the UE in a second message indication information indicating that the SRB1 and/or the SRB2 between the small cell and the UE does not need to be re-established or modified; and receiving an uplink radio resource control (RRC) message sent by the UE through a dedicated control channel (DCCH).

79 citations

Proceedings ArticleDOI
David Bernstein1, Deepak Vij1
30 Nov 2010
TL;DR: This paper builds on the technology foundation emerging for the Intercloud and specifically delves into details of Intercloud security considerations such as Trust Model, Identity and Access Management, governance considerations and so on.
Abstract: Cloud computing is a new design pattern for large, distributed data centers. Service providers offering applications including search, email, and social networks have pioneered this specific to their application. Recently they have expanded offerings to include compute-related capabilities such as virtual machines, storage, and complete operating system services. The cloud computing design yields breakthroughs in geographical distribution, resource utilization efficiency, and infrastructure automation. These “public clouds” have been replicated by IT vendors for corporations to build “private clouds” of their own. Public and private clouds offer their end consumers a “pay as you go” model - a powerful shift for computing, towards a utility model like the electricity system, the telephone system, or more recently the Internet. However, unlike those utilities, clouds cannot yet federate and interoperate. Such federation is called the “Intercloud”. Building the Intercloud is more than technical protocols. Ablueprint for an Intercloud economy must bearchitected with a technically sound foundation and topology. As part of the overall Intercloud Topology, this paper builds on the technology foundation emerging for the Intercloud and specifically delves into details of Intercloud security considerations such as Trust Model, Identity and Access Management, governance considerations and so on.

79 citations

Patent
Qifei Wang1
12 Dec 2012
TL;DR: In this paper, an application software installation method and an application installation apparatus are used to solve problems of operation complexity and high implementation difficulty in an existing installation process of application software, which includes mounting mirror data of a virtual machine, and mapping the mirror data as one virtual disk in a local file system.
Abstract: An application software installation method and an application software installation apparatus are used to solve problems of operation complexity and high implementation difficulty in an existing installation process of application software. The method includes: mounting mirror data of a virtual machine, and mapping the mirror data as one virtual disk in a local file system; updating a registry file in a virtual disk according to registry change record data in an application software package; and updating a file structure in the virtual disk according to the file change record data and the file in the application software package, thereby implementing installation of the application software in the virtual machine. In the process of installing the application software, a user of the virtual machine does not need to perform complex operations, thereby reducing software installation difficulty.

79 citations

Journal ArticleDOI
TL;DR: A unified "bi-level" learning model for complete multi-source data, and a model for incomplete data that avoids imputing missing data and offers superior performance is presented and generalizes to other applications with block-wise missing data sources.

79 citations


Authors

Showing all 41483 results

NameH-indexPapersCitations
Yu Huang136149289209
Xiaoou Tang13255394555
Xiaogang Wang12845273740
Shaobin Wang12687252463
Qiang Yang112111771540
Wei Lu111197361911
Xuemin Shen106122144959
Li Chen105173255996
Lajos Hanzo101204054380
Luca Benini101145347862
Lei Liu98204151163
Tao Wang97272055280
Mohamed-Slim Alouini96178862290
Qi Tian96103041010
Merouane Debbah9665241140
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

90% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Hewlett-Packard
59.8K papers, 1.4M citations

87% related

Microsoft
86.9K papers, 4.1M citations

87% related

Intel
68.8K papers, 1.6M citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202319
202266
20212,069
20203,277
20194,570
20184,476