scispace - formally typeset
Search or ask a question
Institution

Huawei

CompanyShenzhen, China
About: Huawei is a company organization based out in Shenzhen, China. It is known for research contribution in the topics: Terminal (electronics) & Node (networking). The organization has 41417 authors who have published 44698 publications receiving 343496 citations. The organization is also known as: Huawei Technologies & Huawei Technologies Co., Ltd..


Papers
More filters
Journal ArticleDOI
17 Jul 2019
TL;DR: In this article, the authors adopt a Bayesian approach, viewing the observed graph as a realization from a parametric family of random graphs, and target inference of the joint posterior of the random graph parameters and the node (or graph) labels.
Abstract: Recently, techniques for applying convolutional neural networks to graph-structured data have emerged. Graph convolutional neural networks (GCNNs) have been used to address node and graph classification and matrix completion. Although the performance has been impressive, the current implementations have limited capability to incorporate uncertainty in the graph structure. Almost all GCNNs process a graph as though it is a ground-truth depiction of the relationship between nodes, but often the graphs employed in applications are themselves derived from noisy data or modelling assumptions. Spurious edges may be included; other edges may be missing between nodes that have very strong relationships. In this paper we adopt a Bayesian approach, viewing the observed graph as a realization from a parametric family of random graphs. We then target inference of the joint posterior of the random graph parameters and the node (or graph) labels. We present the Bayesian GCNN framework and develop an iterative learning procedure for the case of assortative mixed-membership stochastic block models. We present the results of experiments that demonstrate that the Bayesian formulation can provide better performance when there are very few labels available during the training process.

112 citations

Journal ArticleDOI
TL;DR: In this article, an overhead-aware resource allocation framework for wireless networks where reconfigurable intelligent surfaces are used to improve the communication performance is proposed and incorporated in the expressions of the system rate and energy efficiency.
Abstract: Reconfigurable intelligent surfaces have emerged as a promising technology for future wireless networks. Given that a large number of reflecting elements is typically used and that the surface has no signal processing capabilities, a major challenge is to cope with the overhead that is required to estimate the channel state information and to report the optimized phase shifts to the surface. This issue has not been addressed by previous works, which do not explicitly consider the overhead during the resource allocation phase. This work aims at filling this gap, by developing an overhead-aware resource allocation framework for wireless networks where reconfigurable intelligent surfaces are used to improve the communication performance. An overhead model is proposed and incorporated in the expressions of the system rate and energy efficiency, which are then optimized with respect to the phase shifts of the reconfigurable intelligent surface, the transmit and receive filters, the power and bandwidth used for the communication and feedback phases. The bi-objective maximization of the rate and energy efficiency is investigated, too. The proposed framework characterizes the trade-off between optimized radio resource allocation policies and the related overhead in networks with reconfigurable intelligent surfaces.

112 citations

Patent
Jinwen Di1, Feng Chen, Zhipeng Hou, Shibi Huang, Shiyong Tan 
19 Aug 2009
TL;DR: In this paper, a method, system and device for implementing security control for the user session in the Policy Charging Control (PCC) architecture is described. But the method is not described.
Abstract: A method, system and device for implementing security control are provided. The method for implementing security control includes: receiving, by the Policy and Charging Enforcement Function (PCEF) entity, security control policy information from the Policy Control and Charging Rules Function (PCRF) entity; and executing, by the PCEF entity, user security control according to the security control policy information. The provided method, system, and device may provide security control for the user session in the Policy Charging Control (PCC) architecture.

112 citations

Patent
Guangrui Zhu1, Weijie Liu1
15 Dec 2011
TL;DR: In this paper, the authors present a method for unlocking touch-screen cell phones and a touch screen cell phone. The method essentially comprises: displaying one or more application icons generated according to a preset policy on the screen locking interface when locking the screen of the touch screen phone; and directly entering the application interface corresponding to the selected icon after selecting one application icon for unlocking the screen.
Abstract: Disclosed are a method for unlocking touch-screen cell phones and a touch-screen cell phone. The method essentially comprises: displaying one or more application icons generated according to a preset policy on the screen locking interface when locking the screen of the touch-screen cell phone; and directly entering the application interface corresponding to the selected icon after selecting one application icon for unlocking the screen. Using the present invention, icons of a plurality of applications selected by the user are displayed on the locked screen when locking the screen of a touch-screen cell phone, thus enabling the user to personally define the unlocking interface and quickly arrive at the application interface desired by the user after the user unlocks the screen.

112 citations

Proceedings ArticleDOI
01 Oct 2019
TL;DR: This work proposes a new approach to 3D object detection and pose estimation which provides not only a better explanation for pose ambiguity, but also a higher accuracy in terms of pose estimation.
Abstract: 3D object detection and pose estimation from a single image are two inherently ambiguous problems. Oftentimes, objects appear similar from different viewpoints due to shape symmetries, occlusion and repetitive textures. This ambiguity in both detection and pose estimation means that an object instance can be perfectly described by several different poses and even classes. In this work we propose to explicitly deal with these ambiguities. For each object instance we predict multiple 6D pose outcomes to estimate the specific pose distribution generated by symmetries and repetitive textures. The distribution collapses to a single outcome when the visual appearance uniquely identifies just one valid pose. We show the benefits of our approach which provides not only a better explanation for pose ambiguity, but also a higher accuracy in terms of pose estimation.

112 citations


Authors

Showing all 41483 results

NameH-indexPapersCitations
Yu Huang136149289209
Xiaoou Tang13255394555
Xiaogang Wang12845273740
Shaobin Wang12687252463
Qiang Yang112111771540
Wei Lu111197361911
Xuemin Shen106122144959
Li Chen105173255996
Lajos Hanzo101204054380
Luca Benini101145347862
Lei Liu98204151163
Tao Wang97272055280
Mohamed-Slim Alouini96178862290
Qi Tian96103041010
Merouane Debbah9665241140
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

90% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Hewlett-Packard
59.8K papers, 1.4M citations

87% related

Microsoft
86.9K papers, 4.1M citations

87% related

Intel
68.8K papers, 1.6M citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202319
202266
20212,069
20203,277
20194,570
20184,476