Institution
Motorola
Company•Schaumburg, Illinois, United States•
About: Motorola is a company organization based out in Schaumburg, Illinois, United States. It is known for research contribution in the topics: Signal & Communications system. The organization has 27298 authors who have published 38274 publications receiving 968710 citations. The organization is also known as: Motorola, Inc. & Galvin Manufacturing Corporation.
Papers published on a yearly basis
Papers
More filters
••
27 Oct 2008
TL;DR: A first practical system -- orders of magnitude faster than existing implementations -- that can execute over several queries per second on 1Tbyte+ databases with full computational privacy and correctness is built.
Abstract: We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable to establish any correlation between successive accesses, or even to distinguish between a read and a write. Moreover, the client is provided with strong correctness assurances for its operations -- illicit provider behavior does not go undetected. We built a first practical system -- orders of magnitude faster than existing implementations -- that can execute over several queries per second on 1Tbyte+ databases with full computational privacy and correctness.
281 citations
•
29 Oct 2001TL;DR: In this paper, the authors proposed a system, method and network for multicast distribution of presence information to a plurality of communication devices, where each multicast address identifies a group of multicast devices among the plurality of devices, and the multicast messages include presence information about the group of devices.
Abstract: The present invention is a system, method and network ( 110 ) for multicast distribution of presence information to a plurality of communication devices ( 102, 104, 106, 108 ). A contact list ( 122, 124, 126, 128 ), associated with each communication device, identifies one or more of the other communication devices. The network provides one or more multicast addresses based on the contact lists of the communication devices to the plurality of communication devices. The network also sends multicast messages identified by the one or more multicast addresses to the plurality of communication devices. Each multicast address identifies a group of multicast devices among the plurality of communication devices, and the multicast messages include presence information about the group of multicast devices. A portion of the plurality of communication devices receives the multicast messages identified by the one or more multicast addresses and extracts the presence information about the group of multicast devices from the multicast messages.
281 citations
••
04 Sep 1996TL;DR: This paper presents a feedback network architecture capable of coping with convolutive mixtures, and derives the adaptation equations for the adaptive filters in the network by maximizing the information transferred through the network.
Abstract: Blind separation of independent sources from their convolutive mixtures is a problem in many real world multi-sensor applications. In this paper we present a solution to this problem based on the information maximization principle, which was proposed by Bell and Sejnowski (1995) for the case of blind separation of instantaneous mixtures. We present a feedback network architecture capable of coping with convolutive mixtures, and we derive the adaptation equations for the adaptive filters in the network by maximizing the information transferred through the network. Examples using speech signals are presented to illustrate the algorithm.
281 citations
•
21 Dec 2009TL;DR: In this paper, a method for interpreting at least two consecutive gestures is presented, where a sensing assembly having at least one photoreceiver and a plurality of phototransmitters is provided.
Abstract: A method for interpreting at least two consecutive gestures includes providing a sensing assembly having at least one photoreceiver and a plurality of phototransmitters, wherein each phototransmitter is positioned to emit infrared light away from the electronic device about a corresponding central transmission axis, wherein each central transmission axis is oriented in a different direction with respect to the others, and controlling emission of infrared light by each of the phototransmitters during each of a plurality of time periods. During each of the plurality of phototransmitters and for each of the plurality of time periods, a corresponding measured signal is generated which is indicative of a respective amount of infrared light which originated from that phototransmitter during that time period and was reflected by the external object prior to being received by a photoreceiver. The measured signals are evaluated to identity a first gesture, and the electronic device is controlled in response to identification of the first gesture according to a first mode of operation. A parameter of a second gesture is also determined, and the electronic device is controlled in response to the determined parameter of the second gesture according to a second mode of operation.
280 citations
••
TL;DR: This study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies.
Abstract: Intrusion detection complements prevention mechanisms, such as firewalls, cryptography, and authentication, to capture intrusions into an information system while they are acting on the information system. Our study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies. The multivariate quality control technique is based on Hotelling's T/sup 2/ test that detects both counterrelationship anomalies and mean-shift anomalies. The performance of the Hotelling's T/sup 2/ test is examined on two sets of computer audit data: a small data set and a large multiday data set. Both data sets contain sessions of normal and intrusive activities. For the small data set, the Hotelling's T/sup 2/ test signals all the intrusion sessions and produces no false alarms for the normal sessions. For the large data set, the Hotelling's T/sup 2/ test signals 92 percent of the intrusion sessions while producing no false alarms for the normal sessions. The performance of the Hotelling's T/sup 2/ test is also compared with the performance of a more scalable multivariate technique-a chi-squared distance test.
279 citations
Authors
Showing all 27298 results
Name | H-index | Papers | Citations |
---|---|---|---|
Georgios B. Giannakis | 137 | 1321 | 73517 |
Yonggang Huang | 136 | 797 | 69290 |
Chenming Hu | 119 | 1296 | 57264 |
Theodore S. Rappaport | 112 | 490 | 68853 |
Chang Ming Li | 97 | 896 | 42888 |
John Kim | 90 | 406 | 41986 |
James W. Hicks | 89 | 406 | 51636 |
David Blaauw | 87 | 750 | 29855 |
Mark Harman | 83 | 506 | 29118 |
Philippe Renaud | 77 | 773 | 26868 |
Aggelos K. Katsaggelos | 76 | 946 | 26196 |
Min Zhao | 71 | 547 | 24549 |
Weidong Shi | 70 | 528 | 16368 |
David Pearce | 70 | 342 | 25680 |
Douglas L. Jones | 70 | 512 | 21596 |