scispace - formally typeset
Search or ask a question
Institution

NEC

CompanyTokyo, Japan
About: NEC is a company organization based out in Tokyo, Japan. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 33269 authors who have published 57670 publications receiving 835952 citations. The organization is also known as: NEC Corporation & NEC Electronics Corporation.


Papers
More filters
Patent
Takahiro Nobukiyo1, Kojiro Hamabe1
29 Jul 2003
TL;DR: In this article, a best-cell amendment method is disclosed for amending hysteresis margins according to the degree of congestion, where a radio network controller (RNC) compares the average value P(k) of transmission power of a downlink shared channel PDSCH of cell k and a first threshold value P_threshold1, to measure the congestion.
Abstract: A best-cell amendment method is disclosed for amending hysteresis margins according to the degree of congestion. A radio network controller (RNC) compares the average value P(k) of transmission power of a downlink shared channel PDSCH of cell k and a first threshold value P_threshold1 to measure the degree of congestion. If the RNC determines that the degree of congestion in cell k is high, it sets a small hysteresis margin hm_a, and if RNC determines that the degree of congestion in cell k is low, it sets a large hysteresis margin hm_b.

95 citations

Patent
Masayuki Nakae1
08 Feb 2008
TL;DR: In this article, each domain is provided with an access right management device which creates a resource sharing policy and performs processing for resource-sharing policy negotiation between a plurality of domain administrators.
Abstract: Each domain is provided with an access right management device which creates a resource-sharing policy and performs processing for resource-sharing policy negotiation between a plurality of domain administrators. An access right management device that has created a resource-sharing policy identifies, for each policy unit included in the resource-sharing policy, an access right management device that is a negotiating partner to negotiate with about the policy unit in question. The access right management device generates negotiation information including an identification name of the identified negotiating-partner access right management device and the policy unit in question and sends the negotiation information to the negotiating-partner access right management device. Only when all policy units are agreed on by respective identified negotiating-partner access right management devices, the resource-sharing policy is set on shared resources.

95 citations

Patent
Hidehito Kubo1
25 Oct 1996
TL;DR: In this paper, a method of scheduling a job in a clustered computer system having a plurality of clusters and a global storage, stores an inputted job in the job queue allocated in the global storage and selects a job to be executed.
Abstract: A computer system and method of scheduling a job in a clustered computer system having a plurality of clusters and a global storage, stores an inputted job in a job queue allocated in the global storage, selects a job to be executed, and executes the selected job in a cluster. The job selection is activated by one of a job completion, a job arrival, and a measurement completion. Upon the job selection, if the resource utilization is low, then a new job is requested. However, if the resource utilization is high, then a new job is not requested.

95 citations

Patent
25 Aug 1999
TL;DR: In this paper, a method for inserting a digital signature into digital data is presented and the method includes the steps of: assigning predetermined bits of the digital data for receiving the digital signature; signing digital data excluding the predetermined bits resulting in the digital signatures; and inserting digital signatures into the digital bits for subsequent authentication of digital data.
Abstract: A method for inserting a digital signature into digital data is provided. The digital data has bits and the method includes the steps of: assigning predetermined bits of the digital data for receiving the digital signature; signing the digital data excluding the predetermined bits resulting in the digital signature; and inserting the digital signature into the predetermined bits of the digital data for subsequent authentication of the digital data. Also provided is a method for authenticating digital data having the embedded digital signature in the predetermined bits of the digital data including the steps of: extracting the digital signature from the predetermined bits; decrypting the digital signature from the digital data resulting in a first hash; applying a known one-way hashing function used by an encoder of the digital data to the digital data excluding the predetermined bits resulting in a second hash; and comparing the first hash to the second hash wherein if the first hash matches the second hash the digital data is authentic. In a preferred version of the methods of the present invention, the method further includes the step of inserting associated data into the digital data prior to the signing step such that the digital signature authenticates both the associated data as well as the digital data. Preferably, the associated data is inserted into the bits of the digital data excluding the predetermined bits.

95 citations

Patent
Yamashita Chikara1
18 Sep 1995
TL;DR: In this article, the via holes are used to mount a metal plate on the base film sheet or to support another semiconductor chip by forming ball bumps on or in the via hole.
Abstract: In a semiconductor device which has a base film sheet to support a semiconductor chip in a center region of the base film sheet, a plurality of via holes are formed within a peripheral region of the base film sheet. The via holes may be used to mount a metal plate on the base film sheet or to support another semiconductor chip, by forming ball bumps on or in the via holes. A circuit board may be attached to the base film sheet by the use of the bumps or pins extended through the via holes.

95 citations


Authors

Showing all 33297 results

NameH-indexPapersCitations
Pulickel M. Ajayan1761223136241
Xiaodong Wang1351573117552
S. Shankar Sastry12285886155
Sumio Iijima106633101834
Thomas W. Ebbesen9930570789
Kishor S. Trivedi9569836816
Sharad Malik9561537258
Shigeo Ohno9130328104
Adrian Perrig8937453367
Jan M. Rabaey8152536523
C. Lee Giles8053625636
Edward A. Lee7846234620
Otto Zhou7432218968
Katsumi Kaneko7458128619
Guido Groeseneken73107426977
Network Information
Related Institutions (5)
Bell Labs
59.8K papers, 3.1M citations

92% related

Hitachi
101.4K papers, 1.4M citations

92% related

Samsung
163.6K papers, 2M citations

91% related

IBM
253.9K papers, 7.4M citations

91% related

Intel
68.8K papers, 1.6M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20238
202220
2021234
2020518
2019952
20181,088