scispace - formally typeset
Search or ask a question
Institution

NEC

CompanyTokyo, Japan
About: NEC is a company organization based out in Tokyo, Japan. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 33269 authors who have published 57670 publications receiving 835952 citations. The organization is also known as: NEC Corporation & NEC Electronics Corporation.


Papers
More filters
Journal ArticleDOI
Yasuhiro Aoki1
TL;DR: In this article, the bit error rate performance of fiber Raman amplifiers both as booster amplifiers and as detection preamplifiers is studied in intensity modulation/direct detection optical communication systems.
Abstract: Bit error rate performances of fiber Raman amplifiers both as booster amplifiers and as detection preamplifiers are studied in intensity modulation/direct detection optical communication systems. It is theoretically shown that, in the booster amplifier application, receiver sensitivity degradation due to amplification can be made less than 0.2 dB for signal-to-noise power ratio larger than 20 dB, and thus an allowable transmission line loss can be increased approximately by the value of Raman gain. For detection preamplifier use, receiver sensitivities in the Raman preamplifier system are numerically calculated in terms of minimum detectable signal power at 100-Mbit/s and 2-Gbit/s bit rates. In both bit rates, it is shown that, for a Raman gain greater than 20 dB, minimum detectable signal power can be improved by more than 15 dB over the conventional detection level without Raman amplification. Preliminary experiments are carried out using a 1.32- mu m Nd:YAG laser and a 1.4- mu m laser diode as pump and signal light sources, respectively. The experimental results are in good agreement with theoretical estimations. >

131 citations

Proceedings ArticleDOI
22 May 2017
TL;DR: This paper designs cache-efficient shuffling techniques for implementing cut-and-choose protocols on multiplication triples without randomly permuting large arrays (which is very slow due to continual cache misses), and provides a combinatorial analysis of the techniques, bounding the cheating probability of the adversary.
Abstract: Secure multiparty computation enables a set of parties to securely carry out a joint computation of their private inputs without revealing anything but the output. In the past few years, the efficiency of secure computation protocols has increased in leaps and bounds. However, when considering the case of security in the presence of malicious adversaries (who may arbitrarily deviate from the protocol specification), we are still very far from achieving high efficiency. In this paper, we consider the specific case of three parties and an honest majority. We provide general techniques for improving efficiency of cut-and-choose protocols on multiplication triples and utilize them to significantly improve the recently published protocol of Furukawa et al. (ePrint 2016/944). We reduce the bandwidth of their protocol down from 10 bits per AND gate to 7 bits per AND gate, and show how to improve some computationally expensive parts of their protocol. Most notably, we design cache-efficient shuffling techniques for implementing cut-and-choose without randomly permuting large arrays (which is very slow due to continual cache misses). We provide a combinatorial analysis of our techniques, bounding the cheating probability of the adversary. Our implementation achieves a rate of approximately 1.15 billion AND gates per second on a cluster of three 20-core machines with a 10Gbps network. Thus, we can securely compute 212,000 AES encryptions per second (which is hundreds of times faster than previous work for this setting). Our results demonstrate that high-throughput secure computation for malicious adversaries is possible.

131 citations

Patent
03 Jan 2001
TL;DR: In this article, a multi-layer class identifying communication apparatus, including an input interface connected to input communication lines; a switch circuit; and an output interfaces connected to output communication lines, is presented.
Abstract: A multi-layer class identifying communication apparatus, includes an input interface connected to input communication lines; a switch circuit; and an output interface connected to output communication lines. The input interface comprises an allocating section which determines a class identifier indicative of one of classes to which an IP packet belongs, from header data of the IP packet received through one of the input communication lines, and allocates an IP-QOS (Internet-Protocol-Quality-of-Service) code to the IP packet. The switch circuit selects one of the output communication lines based on a destination address of the IP packet, such that the IP packet is outputted from the output interface to the selected output communication output interface.

131 citations

Journal ArticleDOI
TL;DR: In this article, a water-based slurry was used to prepare PTMA composite electrodes, enabling successful production of homogeneous electrodes, which improved the utilization of active material and enabled the battery to obtain specific capacities almost equal to the theoretical value.

131 citations

Patent
Norio Ohashi1
23 May 2002
TL;DR: In this paper, a write request is formulated with a message and auxiliary information as to the position and state of affairs of the object, and transmitted to a server finder using the position information of the request.
Abstract: When a message source user desires to advertise an object such as an event or a sight-seeing resort on an electronic board, a write request is formulated with a message and auxiliary information as to the position and state of affairs of the object, and transmitted to a server finder. Using the position information of the request, the server finder selects one of a number of message board servers for retransmission of the request. On receiving the write request, the selected server maps the contents of this request in a database. When a message recipient user desires to read a message, a read request is formulated with auxiliary information of a desired object and transmitted to the server finder, which retransmits it to one of the servers corresponding to its position information. On receiving the read request the selected server searches its database for messages having likeness to the auxiliary information of the request.

130 citations


Authors

Showing all 33297 results

NameH-indexPapersCitations
Pulickel M. Ajayan1761223136241
Xiaodong Wang1351573117552
S. Shankar Sastry12285886155
Sumio Iijima106633101834
Thomas W. Ebbesen9930570789
Kishor S. Trivedi9569836816
Sharad Malik9561537258
Shigeo Ohno9130328104
Adrian Perrig8937453367
Jan M. Rabaey8152536523
C. Lee Giles8053625636
Edward A. Lee7846234620
Otto Zhou7432218968
Katsumi Kaneko7458128619
Guido Groeseneken73107426977
Network Information
Related Institutions (5)
Bell Labs
59.8K papers, 3.1M citations

92% related

Hitachi
101.4K papers, 1.4M citations

92% related

Samsung
163.6K papers, 2M citations

91% related

IBM
253.9K papers, 7.4M citations

91% related

Intel
68.8K papers, 1.6M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20238
202220
2021234
2020518
2019952
20181,088