Institution
Motorola
Company•Schaumburg, Illinois, United States•
About: Motorola is a company organization based out in Schaumburg, Illinois, United States. It is known for research contribution in the topics: Signal & Communications system. The organization has 27298 authors who have published 38274 publications receiving 968710 citations. The organization is also known as: Motorola, Inc. & Galvin Manufacturing Corporation.
Papers published on a yearly basis
Papers
More filters
•
08 Aug 1991TL;DR: In this paper, a method of handling a charge authorization in a cordless phone (12) is provided wherein a memory (53) in the corded phone is credited (634) by a value representing a purchased amount prior to a usage of the phone.
Abstract: A method of handling a charge authorization in a cordless phone (12) is provided wherein a memory (53) in the cordless phone (12) is credited (634) by a value representing a purchased amount prior to a usage of the cordless phone (12). The usage of the cordless phone is allowed (420) depending on that value which is debited (522) during the usage of the cordless phone.
163 citations
•
07 Dec 1990
TL;DR: In this paper, an enciphering and call sequencing method and apparatus are provided which can decrease unauthorized detection of these proprietary ID's and permit efficient roaming by allowing authentication variables for multiple calls to be sent from the "home" system to the "visted" system and stored by the 'visted' system for use with subsequent calls.
Abstract: Radio frequency based cellular telecommuication systems often require a subscriber (10) to maintain a proprietary identifier (19) or serial number (18) which is transmitted to a fixed network communication unit (20) to verify the authenticity of the subscriber (10). An enciphering and call sequencing method and apparatus are provided which can decrease unauthorized detection of these proprietary ID's (18, 19). This method and apparatus permit efficient roaming by allowing authentication variables for multiple calls to be sent from the "home" system (20) to the "visted" system and stored by the "visted" system for use with subsequent calls. Further, a method and apparatus are provided which force the authenticating mobile (10) to use information that only it has available to itself. Furthermore, a method and apparatus are provided which allow continued encryption integrity during handoffs by maintaining a record of pseudo random events between a subscriber unit (10) and any radio communication unit (20) and using that record as an encryption variable.
163 citations
•
26 Nov 1996TL;DR: In this paper, the first device receives video information from a video device via the video compressor and executes the computer program to determine a priority between transmission frame rate and resolution per frame.
Abstract: A communication system (100) employs a method and apparatus for communicating video information therein. A first communication device (e.g., 101) preferably includes a video compressor (203), a memory device (205) containing a computer program, and a modem (207). The first device receives video information from a video device (116) via the video compressor and executes the computer program to determine a priority between transmission frame rate and resolution per frame. When transmission frame rate is of higher priority, the first device transmits the video information at a first transmission frame rate via the modem to a second communication device (e.g., 102). When resolution per frame is of higher priority, the first device transmits the video information at a second transmission frame rate that is less than the first rate. The second device, upon receiving the video information, may display (113) the information or process the information for retransmission (e.g., when the second device is a video control server (104)).
163 citations
••
TL;DR: The inspiration for the model is to enhance existing empirical models for indoor propagation prediction by incorporating additional phenomena suggested by electromagnetic techniques such as the uniform theory of diffraction (UTD), but still retain the straightforwardness of the empirical approach.
Abstract: In this paper, a new empirical model for indoor propagation prediction is presented. The inspiration for our model is to enhance existing empirical models for indoor propagation prediction by incorporating additional phenomena suggested by electromagnetic techniques such as the uniform theory of diffraction (UTD), but still retain the straightforwardness of the empirical approach. The advantage is that computation time for indoor propagation prediction is low without greatly compromising prediction accuracy. Comparisons of our predicted results to measurements indicate that improvements in accuracy over conventional empirical models are achieved.
163 citations
••
08 Jul 2003TL;DR: This work presents a formalism for reasoning about truncated paths, and analyzes its characteristics.
Abstract: We consider the problem of reasoning with linear temporal logic on truncated paths. A truncated path is a path that is finite, but not necessarily maximal. Truncated paths arise naturally in several areas, among which are incomplete verification methods (such as simulation or bounded model checking) and hardware resets. We present a formalism for reasoning about truncated paths, and analyze its characteristics.
163 citations
Authors
Showing all 27298 results
Name | H-index | Papers | Citations |
---|---|---|---|
Georgios B. Giannakis | 137 | 1321 | 73517 |
Yonggang Huang | 136 | 797 | 69290 |
Chenming Hu | 119 | 1296 | 57264 |
Theodore S. Rappaport | 112 | 490 | 68853 |
Chang Ming Li | 97 | 896 | 42888 |
John Kim | 90 | 406 | 41986 |
James W. Hicks | 89 | 406 | 51636 |
David Blaauw | 87 | 750 | 29855 |
Mark Harman | 83 | 506 | 29118 |
Philippe Renaud | 77 | 773 | 26868 |
Aggelos K. Katsaggelos | 76 | 946 | 26196 |
Min Zhao | 71 | 547 | 24549 |
Weidong Shi | 70 | 528 | 16368 |
David Pearce | 70 | 342 | 25680 |
Douglas L. Jones | 70 | 512 | 21596 |