Institution
Motorola
Company•Schaumburg, Illinois, United States•
About: Motorola is a company organization based out in Schaumburg, Illinois, United States. It is known for research contribution in the topics: Signal & Communications system. The organization has 27298 authors who have published 38274 publications receiving 968710 citations. The organization is also known as: Motorola, Inc. & Galvin Manufacturing Corporation.
Papers published on a yearly basis
Papers
More filters
•
11 Sep 1995TL;DR: The entry polling (EP) method (900) of the present invention primarily incorporates two types of polling: contention based and standard polling as mentioned in this paper, which allows multi-priority users to compete for access into the standard polling scheme.
Abstract: The entry polling (EP) method (900) of the present invention primarily incorporates two types of polling: contention based and standard polling. The present invention provides several advantages over present polling approaches. EP slots allow multi-priority users to compete for access into the standard polling scheme. The reservation channel is efficiently used by dynamically adjusting the frequency of contention slots based on system dynamics and dynamically changing the number of contention minislots for each service category within a contention slot with the case of sending only one minislot per slot. The channel is assigned primarily to active users. Pipeline polling is also incorporated, thus providing full use of the upstream channel. Since the local state information is provided by the user, the central controller may allow multiple variable length packets to be sent.
187 citations
•
03 Sep 1985TL;DR: In this paper, an improved method of doppler searching in a digital GPS receiver is described, where an N-point fourier transform is performed on samples of a down converted GPS signal representing the entire range of Doppler-shifted GPS carrier frequencies.
Abstract: An improved method of doppler searching in a digital GPS receiver is described. According to the principles of the present invention, an N-point fourier transform is performed on samples of a down converted GPS signal representing the entire range of Doppler-shifted GPS carrier frequencies. The magnitude of the square of each of the output samples is calculated to produce N power quantities, corresponding to N search frequencies. The power quantities for each of the N search frequencies are then summed to produce N quantities proportional to average power. The maximum of the N-power quantities indicates the presence of the corresponding GPS signal.
186 citations
•
23 Apr 1992TL;DR: An integrated circuit chip carrier assembly, comprising a semiconductor device (10) having interconnection pads (14) disposed on an active surface (12) of the device, is described in this article, where the device is attached by means of electrically conducting bumps (26) to a circuitry pattern (18) on a first side of a circuit carrying substrate.
Abstract: An integrated circuit chip carrier assembly, comprising a semiconductor device (10) having interconnection pads (14) disposed on an active surface (12) of the device The device (10) is attached by means of electrically conducting bumps (26) to a circuitry pattern (18) on a first side of a circuit carrying substrate (16) The substrate is typically an aramid reinforced organic resin, such as epoxy The circuitry (18, 20) is electrically connected by conductive through-holes (22) to an array of solder pads on a second side of the substrate Some or all of the through-holes (22) are covered by the device The overall length and width of the circuit carrying substrate (16) are each a maximum of about 015 inches greater than the equivalent dimensions of the device (10), creating a carrier that is only slightly larger than the semiconductor device itself
186 citations
••
24 Sep 2006TL;DR: This paper addresses the problem of determining the next set of releases in the course of software evolution as a series of feature subset selection problems to which search based software engineering can be applied.
Abstract: This paper addresses the problem of determining the next set of releases in the course of software evolution. It formulates both ranking and selection of candidate software components as a series of feature subset selection problems to which search based software engineering can be applied. The approach is automated using greedy and simulated annealing algorithms and evaluated using a set of software components from the component base of a large telecommunications organisation. The results are compared to those obtained by a panel of (human) experts. The results show that the two automated approaches convincingly outperform the expert judgment approach.
186 citations
•
23 Apr 1994
TL;DR: In this paper, an efficient real-time authentication method and apparatus are provided for maintaining secure packet data communications through an encryption process by utilizing a packetized message encryption key (502) and a unique packet number (504) as encryption variables.
Abstract: Radio frequency based cellular telecommunication systems often require both subscriber units (100) and communication units (130) of a fixed network communication system to maintain secret data which may be used to verify authenticity as well as provide encrypting variables for message encryption processes. An efficient real-time authentication method and apparatus are provided which use a single message (210) to provide authentication and communication link setup information. Further, an authentication method and apparatus are provided which uses instant-specific information such as a time of day, radio frequency carrier frequency, a time slot number, a radio port number, access manager identifier, a radio port control unit identifier, or a base site controller identifier to enhance the reliability of the authentication process. Furthermore, a method and apparatus are provided for maintaining secure packet data communications through an encryption process by utilizing a packetized message encryption key (502) and a unique packet number (504) as encryption variables.
186 citations
Authors
Showing all 27298 results
Name | H-index | Papers | Citations |
---|---|---|---|
Georgios B. Giannakis | 137 | 1321 | 73517 |
Yonggang Huang | 136 | 797 | 69290 |
Chenming Hu | 119 | 1296 | 57264 |
Theodore S. Rappaport | 112 | 490 | 68853 |
Chang Ming Li | 97 | 896 | 42888 |
John Kim | 90 | 406 | 41986 |
James W. Hicks | 89 | 406 | 51636 |
David Blaauw | 87 | 750 | 29855 |
Mark Harman | 83 | 506 | 29118 |
Philippe Renaud | 77 | 773 | 26868 |
Aggelos K. Katsaggelos | 76 | 946 | 26196 |
Min Zhao | 71 | 547 | 24549 |
Weidong Shi | 70 | 528 | 16368 |
David Pearce | 70 | 342 | 25680 |
Douglas L. Jones | 70 | 512 | 21596 |