scispace - formally typeset
Search or ask a question

Showing papers by "Motorola published in 2006"


Journal ArticleDOI
TL;DR: This paper proposes some new feature extractors based on maximum margin criterion (MMC) and establishes a new linear feature extractor that does not suffer from the small sample size problem, which is known to cause serious stability problems for LDA.
Abstract: In pattern recognition, feature extraction techniques are widely employed to reduce the dimensionality of data and to enhance the discriminatory information. Principal component analysis (PCA) and linear discriminant analysis (LDA) are the two most popular linear dimensionality reduction methods. However, PCA is not very effective for the extraction of the most discriminant features, and LDA is not stable due to the small sample size problem . In this paper, we propose some new (linear and nonlinear) feature extractors based on maximum margin criterion (MMC). Geometrically, feature extractors based on MMC maximize the (average) margin between classes after dimensionality reduction. It is shown that MMC can represent class separability better than PCA. As a connection to LDA, we may also derive LDA from MMC by incorporating some constraints. By using some other constraints, we establish a new linear feature extractor that does not suffer from the small sample size problem, which is known to cause serious stability problems for LDA. The kernelized (nonlinear) counterpart of this linear feature extractor is also established in the paper. Our extensive experiments demonstrate that the new feature extractors are effective, stable, and efficient.

838 citations


Patent
29 Jun 2006
TL;DR: In this paper, a method and apparatus for pilot signal transmission is described, where the set of occupied pilot block sub-carriers at least changes at least once in a burst.
Abstract: A method and apparatus for pilot signal transmission is disclosed herein. In particular, a pilot transmission scheme is utilized where pilot sub-carrier bandwidth differs from data sub-carrier bandwidth. Because some user's data sub-carriers will no longer have the user's pilot sub-carriers adjacent to them, the set, or pattern of sub-carriers used by the pilot blocks changes at least once in a burst. Changing the pilot block pattern (the set of occupied pilot block sub-carriers) at least once in the burst serves to increase the frequency proximity of occupied data sub-carriers to occupied pilot sub-carriers in the burst.

377 citations


Patent
27 Mar 2006
TL;DR: In this paper, radio frames are divided into a plurality of subframes, and data is transmitted over the radio frames within the radio subframes by having a frame duration selected from two or more possible frame durations.
Abstract: During operation radio frames are divided into a plurality of subframes. Data is transmitted over the radio frames within a plurality of subframes, and having a frame duration selected from two or more possible frame durations.

373 citations


Patent
29 Dec 2006
TL;DR: In this paper, a method for head pose estimation is proposed, where the average motion vectors over time (all past frames of video) are combined to determine an accumulated average motion vector, estimating the orientation of a user's head in the video frame based on the accumulated average vector, and outputting at least one parameter indicating the estimated orientation.
Abstract: A method for head pose estimation may include receiving block motion vectors for a frame of video from a block motion estimator, selecting at least one block for analysis, determining an average motion vector for the at least one selected block, combining the average motion vectors over time (all past frames of video) to determine an accumulated average motion vector, estimating the orientation of a user's head in the video frame based on the accumulated average motion vector, and outputting at least one parameter indicative of the estimated orientation.

263 citations


Proceedings ArticleDOI
23 Jan 2006
TL;DR: This paper proposes an enhanced collaborative filtering solution that uses location as a key criterion for generating recommendations, and describes preliminary results that indicate the utility of such an approach.
Abstract: Internet-based recommender systems have traditionally employed collaborative filtering techniques to deliver relevant "digital" results to users. In the mobile Internet however, recommendations typically involve "physical" entities (e.g., restaurants), requiring additional user effort for fulfillment. Thus, in addition to the inherent requirements of high scalability and low latency, we must also take into account a "convenience" metric in making recommendations. In this paper, we propose an enhanced collaborative filtering solution that uses location as a key criterion for generating recommendations. We frame the discussion in the context of our "restaurant recommender" system, and describe preliminary results that indicate the utility of such an approach. We conclude with a look at open issues in this space, and motivate a future discussion on the business impact and implications of mining the data in such systems.

238 citations


Patent
10 Jul 2006
TL;DR: In this article, a wireless communication terminal (200) that communicates on a plurality of sub-carriers divided into multiple frequency bands, where each frequency band includes at least one subcarrier, successively generates channel quality indicator (CQI) measurement information reports based on CQI measurements.
Abstract: A wireless communication terminal (200) that communicates on a plurality of sub-carriers divided into a plurality of frequency bands, wherein each frequency band includes at least one sub-carrier. The terminal successively generates channel quality indicator (CQI) measurement information reports based on CQI measurements, wherein each report includes non-differential channel quality indicator measurement information for at least one of the frequency bands and differential channel quality indicator measurement information for all other frequency bands.

236 citations


Journal ArticleDOI
TL;DR: In this article, specific absorption rates (SAR) determined computationally in the specific anthropomorphic mannequin (SAM) and anatomically correct models of the human head when exposed to a mobile phone model are compared as part of a study organized by IEEE Standards Coordinating Committee 34, Sub-Committee 2, and Working Group 2.
Abstract: The specific absorption rates (SAR) determined computationally in the specific anthropomorphic mannequin (SAM) and anatomically correct models of the human head when exposed to a mobile phone model are compared as part of a study organized by IEEE Standards Coordinating Committee 34, Sub-Committee 2, and Working Group 2, and carried out by an international task force comprising 14 government, academic, and industrial research institutions. The detailed study protocol defined the computational head and mobile phone models. The participants used different finite-difference time-domain software and independently positioned the mobile phone and head models in accordance with the protocol. The results show that when the pinna SAR is calculated separately from the head SAR, SAM produced a higher SAR in the head than the anatomically correct head models. Also the larger (adult) head produced a statistically significant higher peak SAR for both the 1- and 10-g averages than did the smaller (child) head for all conditions of frequency and position.

207 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated the effect of overcharging of Li-ion cells in terms of thermal stability, overcharge performance, and cell thickness and a.c. impedance.

202 citations


Patent
Kevin L. Baum1
24 Jan 2006
TL;DR: In this article, a family of methods for interference averaging in multicarrier systems, such as orthogonal frequency division multiplexing (OFDM) systems, are presented. But the methods can provide interference averaging only in situations where an interfering co-channel is either partially or fully loaded.
Abstract: A family of methods for interference averaging in multicarrier systems, such as orthogonal frequency division multiplexing (OFDM) systems. The methods can provide interference averaging in situations where an interfering co-channel is either partially or fully loaded. For partially loaded systems, subcarrier puncturing, frequency domain repetition, time domain repetition, and hybrid time-frequency repetition schemes are provided. For systems using adaptive modulation/coding rates, lower rates and transmit power can be selected in order to perform interference averaging in time-spread and frequency-spread OFDM schemes. In systems with downlink power control, frequency domain mixing can be used to perform interference averaging.

196 citations


Proceedings ArticleDOI
31 Oct 2006
TL;DR: Both analytical and simulation results are presented to study the impact of several key parameters and optimization techniques on the code dissemination mechanism of Melete, a system that enables reliable storage and execution of concurrent applications on a single sensor node.
Abstract: It is vital to support concurrent applications sharing a wireless sensor network in order to reduce the deployment and administrative costs, thus increasing the usability and efficiency of the network. We describe Melete 1 , a system that supports concurrent applications with efficiency, reliability, flexibility, programmability, and scalability. Our work is based on the Mate virtual machine [1] with significant modifications and enhancements. Melete enables reliable storage and execution of concurrent applications on a single sensor node. Dynamic grouping is used for flexible, on-the-fly deployment of applications based on contemporary status of the sensor nodes. The grouping procedure itself is programmed with the TinyScript language. A group-keyed code dissemination mechanism is also developed for reliable and efficient code distribution among sensor nodes. Both analytical and simulation results are presented to study the impact of several key parameters and optimization techniques on the code dissemination mechanism. Simulation results indicate satisfactory scalability of our techniques to both application code size and node density. The usefulness and effectiveness of Melete is also validated by empirical study.

195 citations


01 Jan 2006
TL;DR: It is shown that deployment of non-trivial single server PIR protocols on real hardware of the recent past would have been orders of magnitude less time-efficient than trivially transferring the entire database.
Abstract: We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real hardware of the recent past would have been orders of magnitude less time-efficient than trivially transferring the entire database. We stress that these results are beyond existing knowledge of mere “impracticality” under unfavorable assumptions. They rather reflect an inherent limitation with respect to modern hardware, likely the result of a communication-cost centric protocol design. We argue that this is likely to hold on non-specialized traditional hardware in the foreseeable future. We validate our reasoning in an experimental setup on modern off-the-shelf hardware. Ultimately, we hope our results will stimulate practical designs.

Proceedings ArticleDOI
24 Sep 2006
TL;DR: This paper addresses the problem of determining the next set of releases in the course of software evolution as a series of feature subset selection problems to which search based software engineering can be applied.
Abstract: This paper addresses the problem of determining the next set of releases in the course of software evolution. It formulates both ranking and selection of candidate software components as a series of feature subset selection problems to which search based software engineering can be applied. The approach is automated using greedy and simulated annealing algorithms and evaluated using a set of software components from the component base of a large telecommunications organisation. The results are compared to those obtained by a panel of (human) experts. The results show that the two automated approaches convincingly outperform the expert judgment approach.

Journal ArticleDOI
TL;DR: It is proposed to use security analysis techniques to maintain desirable security properties while delegating administrative privileges in RBAC, and it is shown that two classes of problems in the family can be reduced to similar analysis in the RT[↞∩] role-based trust-management language, thereby establishing an interesting relationship between RBAC and the RT framework.
Abstract: The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the use of delegation is an effective approach. While the use of delegation greatly enhances flexibility and scalability, it may reduce the control that an organization has over its resources, thereby diminishing a major advantage RBAC has over discretionary access control (DAC). We propose to use security analysis techniques to maintain desirable security properties while delegating administrative privileges. We give a precise definition of a family of security analysis problems in RBAC, which is more general than safety analysis that is studied in the literature. We show that two classes of problems in the family can be reduced to similar analysis in the RT[L∩] role-based trust-management language, thereby establishing an interesting relationship between RBAC and the RT framework. The reduction gives efficient algorithms for answering most kinds of queries in these two classes and establishes the complexity bounds for the intractable cases.

Patent
21 Feb 2006
TL;DR: In this paper, a method and apparatus for adapting a help menu on a user interface, utilizing an input method such as a speech recognition system, for increased efficiency is presented on the user interface including an optional menu item to reinstate any previously removed items.
Abstract: A method and apparatus for adapting a help menu on a user interface, utilizing an input method such as a speech recognition system, for increased efficiency. A list of menu items is presented on the user interface including an optional menu item to reinstate any previously removed menu items. A user selects an item from the menu, such as a help menu, which can then be removed from the list of menu items in accordance with predetermined criteria. The criteria can include how many times the menu item has been accessed and when. In this way, help menu items that are familiar to a user are removed to provide an abbreviated help menu which is more efficient and less frustrating to a user, particularly in a busy and distracting environment such as a vehicle.

Proceedings ArticleDOI
22 Mar 2006
TL;DR: This work considers scheduling and resource allocation for the downlink of a OFDM-based wireless network, and gives optimal and sub-optimal algorithms for its solution.
Abstract: We consider scheduling and resource allocation for the downlink of a OFDM-based wireless network. During each time-slot the scheduling and resource allocation problem involves selecting a subset of users for transmission, determining the assignment of available subcarriers to selected users, and for each subcarrier determining the transmission power and the coding and modulation scheme used. We address this in the context of a utility-based scheduling and resource allocation scheme presented in earlier papers. Scheduling and resource allocation is determined by solving an optimization problem, which is convex for a reasonable model of the feasible rates. By exploiting the structure of this problem, we give optimal and sub-optimal algorithms for its solution. We provide simulation results comparing different algorithms and parameter settings.

Journal ArticleDOI
TL;DR: The proposed method uses nonparametric estimation of Renyi's entropy to train the extractor by maximizing an approximation of the mutual information between the class labels and the output of the feature extractor.
Abstract: A classification system typically consists of both a feature extractor (preprocessor) and a classifier. These two components can be trained either independently or simultaneously. The former option has an implementation advantage since the extractor need only be trained once for use with any classifier, whereas the latter has an advantage since it can be used to minimize classification error directly. Certain criteria, such as minimum classification error, are better suited for simultaneous training, whereas other criteria, such as mutual information, are amenable for training the feature extractor either independently or simultaneously. Herein, an information-theoretic criterion is introduced and is evaluated for training the extractor independently of the classifier. The proposed method uses nonparametric estimation of Renyi's entropy to train the extractor by maximizing an approximation of the mutual information between the class labels and the output of the feature extractor. The evaluations show that the proposed method, even though it uses independent training, performs at least as well as three feature extraction methods that train the extractor and classifier simultaneously

01 Jan 2006
TL;DR: FOCALE, a semantically rich architecture for orchestrating the behavior of heterogeneous and distributed computing resources, is introduced and applied to Beyond 3G Networks as a case study.
Abstract: Network resources will always be heterogeneous, and thus have different functionalities and programming models. This can be solved through the combination of information models and knowledge engineering, which together can be used to discover and program semantically similar functionality for heterogeneous devices regardless of the data and language used by each device. This paper introduces FOCALE, a semantically rich architecture for orchestrating the behavior of heterogeneous and distributed computing resources. We apply the FOCALE architecture to Beyond 3G Networks as a case study.

Journal ArticleDOI
TL;DR: An analytical model is built to derive an average delay estimate for the traffic of different priorities in the unsaturated 802.11e WLAN, showing that the QoS requirements of the real-time traffic can be satisfied if the input traffic is properly regulated.
Abstract: In the emerging IEEE 802.11e MAC protocol, the enhanced distributed channel access (EDCA) is proposed to support prioritized QoS; however, it cannot guarantee strict QoS required by real-time services such as voice and video without proper network control mechanisms. To overcome this deficiency, we first build an analytical model to derive an average delay estimate for the traffic of different priorities in the unsaturated 802.11e WLAN, showing that the QoS requirements of the real-time traffic can be satisfied if the input traffic is properly regulated. Then, we propose two effective call admission control schemes and a rate control scheme that relies on the average delay estimates and the channel busyness ratio, an index that can accurately represent the network status. The key idea is, when accepting a new real-time flow, the admission control algorithm considers its effect on the channel utilization and the delay experienced by existing real-time flows, ensuring that the channel is not overloaded and the delay requirements are not violated. At the same time, the rate control algorithm allows the best effort traffic to fully use the residual bandwidth left by the real-time traffic, thereby achieving high channel utilization

Patent
23 Dec 2006
TL;DR: In this paper, a user profile is created by recording a plurality of inferred or estimated emotional states of the user, which can include a time sequence of emotional states, stimulus contexts for such states, and a temporal relationship between the emotional state and the stimulus context.
Abstract: A method (50) of altering content provided to a user includes the steps of creating (60) a user profile based on past physiological measurements of the user, monitoring (74) at least one current physiological measurement of the user, and altering (82) the content provided to the user based on the user profile and the at least one current physiological measurement. The user profile can be created by recording a plurality of inferred or estimated emotional states (64) of the user which can include a time sequence of emotional states, stimulus contexts for such states, and a temporal relationship between the emotional state and the stimulus context. The content can be altered in response to the user profile and measured physiological state by altering at least one among an audio volume, a video sequence, a sound effect, a video effect, a difficulty level, a sequence of media presentation.

Patent
28 Apr 2006
TL;DR: In this paper, a method and apparatus for establishing internet protocol (IP) communication with a node in an aggregation of one or more mobile networks each having a name server is provided.
Abstract: A method and apparatus are provided for establishing internet protocol (IP) communication with a node in an aggregation of one or more mobile networks each having a name server. The method includes multicasting ( 105 ) at least one message to the mobile networks indicating a name resolution of at least one mobile network in the aggregation, and determining ( 110 ) an IP address of the node from the name resolution(s) indicated by the multicasted message(s). The name resolution is based on a domain name of the name server of a corresponding mobile network in the aggregation.

Patent
06 Jun 2006
TL;DR: In this article, a mobile device can support a plurality of electronic payment applications such as credit and/or debit applications, and the data structure corresponding to the priority list is configured such that the end user of the mobile device has management access rights to at least some of the applications.
Abstract: A mobile device as disclosed herein can support a plurality of electronic payment applications such as credit and/or debit applications. During a payment transaction, the mobile device communicates a priority list of the electronic payment applications to a point of sale terminal, which then selects one of the applications for completion of the payment transaction, where the selection is governed by the priority list. The data structure corresponding to the priority list is configured such that the end user of the mobile device has management access rights to at least some of the electronic payment applications. Such end user management access rights can be used to modify the relative priority of the electronic payment applications.

Patent
18 Dec 2006
TL;DR: In this article, a muting method for mobile telephones is proposed. The method can include a step of selecting a multifunction selector of a headset during a communication session. But it is not clear how to select the best mode for each mode.
Abstract: One aspect of the present invention can include a muting method for mobile telephones. The method can include a step of selecting a multifunction selector of a headset during a communication session. A mute toggle request can result that is conveyed to a mobile communication handset. Software within the handset can toggle a mute state for the communication session. In one embodiment, the multifunction selector can be a multifunction selector of a wireless headset. This selector can be overloaded to accept and terminate calls and/or to increase and decrease volume. In one configuration, the multifunction selector can be a laminate switching mechanism, which accepts a swiping and tapping input. For example, swiping a finger along the mechanism in one direction can increase volume, in another direction can decrease volume, and double tapping the mechanism can toggle a mute state.

Patent
14 Dec 2006
TL;DR: In this article, a solution for automatically activating different audio transducers of a mobile communication device based upon an orientation of the device is presented, which can automatically determine an orientation for the device, based upon a detected direction of a speech emitting source and/or based upon one or more sensors, such as a tilt sensor and an accelerometer.
Abstract: A solution for automatically activating different audio transducers of a mobile communication device based upon an orientation of the device. In the solution, a series of speaker/microphone assemblies can be positioned on the device, such as positioned near an earpiece and positioned near a mouthpiece. Different speaker/microphone assemblies can also be positioned on the front of the device and on the back of the device. The solution can automatically determine an orientation for the device, based upon a detected direction of a speech emitting source and/or based upon one or more sensors, such as a tilt sensor and an accelerometer. For example, when a device is in an upside down orientation, an earpiece microphone and a mouthpiece speaker can be activated. In another example, an otherwise deactivated rear facing speaker can be activated when the device is oriented in a rear facing orientation.

Patent
31 Aug 2006
TL;DR: In this paper, a wearable display device, sensors for detecting a context of use of the wearable display devices using at least a vision sensor and a motion sensor, and a processor coupled to the sensors and the wearable device.
Abstract: A method (90) and system (30) of presenting and positioning information on a user interface (56) includes a wearable display device, sensors (32) for detecting a context of use of the wearable display device using at least a vision sensor and a motion sensor, and a processor (42 or 50) coupled to the sensors and the wearable display device. The processor can analyze (93) a user's background view for areas suited for display of information in an analysis, and unobtrusively present (94) information within the user's field of view on the wearable display based on the context of use and the analysis. The processor can also determine (95) the type of information to unobtrusively present based on the context. The processor can optionally detect (92) the context of use by analyzing or recognizing a tool or an instrument used by a user of the wearable display.

Journal ArticleDOI
TL;DR: Two novel error concealment techniques are proposed for video transmission over noisy channels to compensate a lost macroblock in intra-coded frames, in which no useful temporal information is available, and a dynamic mode-weighted error concealments method for replenishing missing pixels in alost macroblock of inter- coded frames.
Abstract: Two novel error concealment techniques are proposed for video transmission over noisy channels in this work. First, we present a spatial error concealment method to compensate a lost macroblock in intra-coded frames, in which no useful temporal information is available. Based on selective directional interpolation, our method can recover both smooth and edge areas efficiently. Second, we examine a dynamic mode-weighted error concealment method for replenishing missing pixels in a lost macroblock of inter-coded frames. Our method adopts a decoder-based error tracking model and combines several concealment modes adaptively to minimize the mean square error of each pixel. The method is capable of concealing lost packets as well as reducing the error propagation effect. Extensive simulations have been performed to demonstrate the performance of the proposed methods in error-prone environments

Patent
27 Jun 2006
TL;DR: A processor to coprocessor (14, 16) interface as mentioned in this paper utilizes compiler generatable software type function call and return, instruction execute, and variable load and store interface instructions, which allow selective memory address preincrementation.
Abstract: A processor (12) to coprocessor (14) interface supporting multiple coprocessors (14, 16) utilizes compiler generatable software type function call and return, instruction execute, and variable load and store interface instructions. Data is moved between the processor (12) and coprocessor (14) on a bi-directional shared bus (28) either implicitly through register snooping and broadcast, or explicitly through function call and return and variable load and store interface instructions. The load and store interface instructions allow selective memory address preincrementation. The bi-directional bus (28) is potentially driven both ways on each clock cycle. The interface separates interface instruction decode and execution. Pipelined operation is provided by indicating decoded instruction discard by negating a decode signal before an execute signal is asserted.

Patent
Zhijun Cai1, Robert M. Harrison1
05 Jan 2006
TL;DR: In this article, a communication system provides, via a single, serving Node B, scheduling information required by a user equipment (UE) to determine a start time for each Node B of multiple Node Bs with respect to a multicast, by each node B of the multiple node Bs, of soft combinable MBMS data.
Abstract: A communication system provides, via a single, serving Node B, scheduling information required by a user equipment (UE) to determine a start time for each Node B of multiple Node Bs with respect to a multicast, by each Node B of the multiple Node Bs, of soft combinable MBMS data. The UE may then use the scheduling information to synchronize a soft combining of the MBMS data received by the UE via each of the multiple Node Bs, even when the multicasts via the multiple Node Bs are not synchronized. However, while the multicasts of frames of data associated with an MBMS service by different Node Bs need not be synchronized, synchronized multicasts are preferable for soft combining. Therefore, the communication system further provides for a synchronization by a network controller of the multicasts of the soft combinable MBMS data by the multiple Node Bs.

Journal ArticleDOI
TL;DR: A systematic investigation of several linear (Wiener filter, LMS adaptive filters, gamma filter, subspace Wiener filters) and nonlinear models applied to datasets from two experiments in monkeys performing motor tasks (reaching for food and target hitting).
Abstract: The field of brain–machine interfaces requires the estimation of a mapping from spike trains collected in motor cortex areas to the hand kinematics of the behaving animal. This paper presents a systematic investigation of several linear (Wiener filter, LMS adaptive filters, gamma filter, subspace Wiener filters) and nonlinear models (time-delay neural network and local linear switching models) applied to datasets from two experiments in monkeys performing motor tasks (reaching for food and target hitting). Ensembles of 100–200 cortical neurons were simultaneously recorded in these experiments, and even larger neuronal samples are anticipated in the future. Due to the large size of the models (thousands of parameters), the major issue studied was the generalization performance. Every parameter of the models (not only the weights) was selected optimally using signal processing and machine learning techniques. The models were also compared statistically with respect to the Wiener filter as the baseline. Each of the optimization procedures produced improvements over that baseline for either one of the two datasets or both.

Patent
02 Sep 2006
TL;DR: In this article, a method for suppressing receiver audio regeneration was proposed, which includes the steps of receiving a communication signal (502), at a Radio Frequency (RF) unit (102), demodulating the communication signal to an audio signal (504), monitoring a volume level of the audio signal, and shifting the pitch of audio signal when the volume level reaches a predetermined threshold.
Abstract: The invention concerns a method (500) and system (100) for suppressing receiver audio regeneration. The method (500) includes the steps of receiving a communication signal (502), at a Radio Frequency (RF) unit (102), demodulating the communication signal to an audio signal (504), monitoring a volume level of the audio signal (506), and shifting the pitch of the audio signal when the volume level reaches a predetermined threshold (508), and playing the pitch-shifted audio signal out of a speaker to produce a pitch-shifted acoustic signal (510). The method can shift the pitch of the audio signal to produce a pitch-shifted acoustic signal with signal properties suppressing regeneration of the acoustic signal onto the audio signal at the RF unit. The amount of pitch-shifting can be a function of the volume level.

Patent
29 Dec 2006
TL;DR: In this article, a secure controller can generate message using a hardware interrupt to a mobile host based on secure applet state transition monitoring by setting up the events flag such as a Transaction Completion Flag (TCF) (372) into an Events Status Register (232) to identify a status of a secure contactless transactions.
Abstract: A system (211) and method (300) for reliable monitoring of secure application execution events is provided. The system can include a Near Field Communication (NFC) modem (140) for communicating transaction events of a secure contactless transaction (358) with a NFC reader (170), a secure controller (200) for monitoring state transitions caused by the transaction events, and a mobile host communicatively coupled to the secure controller for receiving hardware event notifications of the state transitions. The secure controller can generate message using a hardware interrupt to a mobile host based on secure applet state transition monitoring by setting up the events flag such as a Transaction Completion Flag (TCF) (372) into an Events Status Register (232) to identify a status of a secure contactless transactions