scispace - formally typeset
Search or ask a question
Institution

Motorola

CompanySchaumburg, Illinois, United States
About: Motorola is a company organization based out in Schaumburg, Illinois, United States. It is known for research contribution in the topics: Signal & Communications system. The organization has 27298 authors who have published 38274 publications receiving 968710 citations. The organization is also known as: Motorola, Inc. & Galvin Manufacturing Corporation.


Papers
More filters
Proceedings ArticleDOI
27 Oct 2008
TL;DR: A first practical system -- orders of magnitude faster than existing implementations -- that can execute over several queries per second on 1Tbyte+ databases with full computational privacy and correctness is built.
Abstract: We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable to establish any correlation between successive accesses, or even to distinguish between a read and a write. Moreover, the client is provided with strong correctness assurances for its operations -- illicit provider behavior does not go undetected. We built a first practical system -- orders of magnitude faster than existing implementations -- that can execute over several queries per second on 1Tbyte+ databases with full computational privacy and correctness.

281 citations

Patent
James E. Mathis1
29 Oct 2001
TL;DR: In this paper, the authors proposed a system, method and network for multicast distribution of presence information to a plurality of communication devices, where each multicast address identifies a group of multicast devices among the plurality of devices, and the multicast messages include presence information about the group of devices.
Abstract: The present invention is a system, method and network ( 110 ) for multicast distribution of presence information to a plurality of communication devices ( 102, 104, 106, 108 ). A contact list ( 122, 124, 126, 128 ), associated with each communication device, identifies one or more of the other communication devices. The network provides one or more multicast addresses based on the contact lists of the communication devices to the plurality of communication devices. The network also sends multicast messages identified by the one or more multicast addresses to the plurality of communication devices. Each multicast address identifies a group of multicast devices among the plurality of communication devices, and the multicast messages include presence information about the group of multicast devices. A portion of the plurality of communication devices receives the multicast messages identified by the one or more multicast addresses and extracts the presence information about the group of multicast devices from the multicast messages.

281 citations

Proceedings ArticleDOI
Kari Torkkola1
04 Sep 1996
TL;DR: This paper presents a feedback network architecture capable of coping with convolutive mixtures, and derives the adaptation equations for the adaptive filters in the network by maximizing the information transferred through the network.
Abstract: Blind separation of independent sources from their convolutive mixtures is a problem in many real world multi-sensor applications. In this paper we present a solution to this problem based on the information maximization principle, which was proposed by Bell and Sejnowski (1995) for the case of blind separation of instantaneous mixtures. We present a feedback network architecture capable of coping with convolutive mixtures, and we derive the adaptation equations for the adaptive filters in the network by maximizing the information transferred through the network. Examples using speech signals are presented to illustrate the algorithm.

281 citations

Patent
21 Dec 2009
TL;DR: In this paper, a method for interpreting at least two consecutive gestures is presented, where a sensing assembly having at least one photoreceiver and a plurality of phototransmitters is provided.
Abstract: A method for interpreting at least two consecutive gestures includes providing a sensing assembly having at least one photoreceiver and a plurality of phototransmitters, wherein each phototransmitter is positioned to emit infrared light away from the electronic device about a corresponding central transmission axis, wherein each central transmission axis is oriented in a different direction with respect to the others, and controlling emission of infrared light by each of the phototransmitters during each of a plurality of time periods. During each of the plurality of phototransmitters and for each of the plurality of time periods, a corresponding measured signal is generated which is indicative of a respective amount of infrared light which originated from that phototransmitter during that time period and was reflected by the external object prior to being received by a photoreceiver. The measured signals are evaluated to identity a first gesture, and the electronic device is controlled in response to identification of the first gesture according to a first mode of operation. A parameter of a second gesture is also determined, and the electronic device is controlled in response to the determined parameter of the second gesture according to a second mode of operation.

280 citations

Journal ArticleDOI
TL;DR: This study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies.
Abstract: Intrusion detection complements prevention mechanisms, such as firewalls, cryptography, and authentication, to capture intrusions into an information system while they are acting on the information system. Our study investigates a multivariate quality control technique to detect intrusions by building a long-term profile of normal activities in information systems (norm profile) and using the norm profile to detect anomalies. The multivariate quality control technique is based on Hotelling's T/sup 2/ test that detects both counterrelationship anomalies and mean-shift anomalies. The performance of the Hotelling's T/sup 2/ test is examined on two sets of computer audit data: a small data set and a large multiday data set. Both data sets contain sessions of normal and intrusive activities. For the small data set, the Hotelling's T/sup 2/ test signals all the intrusion sessions and produces no false alarms for the normal sessions. For the large data set, the Hotelling's T/sup 2/ test signals 92 percent of the intrusion sessions while producing no false alarms for the normal sessions. The performance of the Hotelling's T/sup 2/ test is also compared with the performance of a more scalable multivariate technique-a chi-squared distance test.

279 citations


Authors

Showing all 27298 results

NameH-indexPapersCitations
Georgios B. Giannakis137132173517
Yonggang Huang13679769290
Chenming Hu119129657264
Theodore S. Rappaport11249068853
Chang Ming Li9789642888
John Kim9040641986
James W. Hicks8940651636
David Blaauw8775029855
Mark Harman8350629118
Philippe Renaud7777326868
Aggelos K. Katsaggelos7694626196
Min Zhao7154724549
Weidong Shi7052816368
David Pearce7034225680
Douglas L. Jones7051221596
Network Information
Related Institutions (5)
Intel
68.8K papers, 1.6M citations

93% related

Samsung
163.6K papers, 2M citations

91% related

Hewlett-Packard
59.8K papers, 1.4M citations

89% related

IBM
253.9K papers, 7.4M citations

89% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20232
20229
202129
2020131
2019134
2018144