scispace - formally typeset
Search or ask a question
Institution

NEC

CompanyTokyo, Japan
About: NEC is a company organization based out in Tokyo, Japan. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 33269 authors who have published 57670 publications receiving 835952 citations. The organization is also known as: NEC Corporation & NEC Electronics Corporation.


Papers
More filters
Patent
Yoichi Miyasaka1, Shogo Matsubara1
30 Aug 1990
TL;DR: In this article, a film capacitors in accordance with the present invention include a silicon electrode (22), a first electrode layer (24), a dielectric layer (26) consisting of an oxide ferroelectric substance such as BaTiO₃ and a third electrode layer(27) formed on top of it.
Abstract: This film capacitors in accordance with the present invention include a silicon electrode (22), a first electrode layer (24) consisting of either one of titanium, titanium silicide, titanium nitride, tantalum, molybdenum, tungsten, tantalum silicide, molybdenum silicide, tungsten silicide, alloys thereof and compounds thereby, formed on the silicon electrode, a second electrode layer (25) formed on it consisting of platinum, palladium or rhodium, a dielectric layer (26) formed on it consisting of an oxide ferroelectric substance such as BaTiO₃ and a third electrode layer (27) formed on top of it. As the first electrode layer, use may also be made of rhenium oxide, osmium oxide, rhodium oxide or iridium oxide.

144 citations

Journal ArticleDOI
TL;DR: The proposed transceiver is based on the local-oscillator (LO) phase-shifting architecture, and it achieves quasi-continuous phase tuning with less than 0.2-dB radio frequency (RF) gain variation and 0.3°C phase error.
Abstract: This paper presents a 28-GHz CMOS four-element phased-array transceiver chip for the fifth-generation mobile network (5G) new radio (NR). The proposed transceiver is based on the local-oscillator (LO) phase-shifting architecture, and it achieves quasi-continuous phase tuning with less than 0.2-dB radio frequency (RF) gain variation and 0.3°C phase error. Accurate beam control with suppressed sidelobe level during beam steering could be supported by this work. At 28 GHz, a single-element transmitter-mode output ${{\mathrm {P}}_{\mathrm {1\,dB}}}$ of 15.7 dBm and a receiver-mode noise figure (NF) of 4.1 dB are achieved. The eight-element transceiver modules developed in this work are capable of scanning the beam from −50° to +50° with less than −9-dB sidelobe level. A saturated equivalent isotropic radiated power (EIRP) of 39.8 dBm is achieved at 0° scan. In a 5-m over-the-air measurement, the proposed module demonstrates the first 512 quadrature amplitude modulation (QAM) constellation in the 28-GHz band. A data stream of 6.4 Gb/s in 256-QAM could be supported within a beam angle of ±50°. The achieved maximum data rate is 15 Gb/s in 64-QAM. The proposed transceiver chip consumes 1.2 W/chip in transmitter mode and 0.59 W/chip in receiver mode.

144 citations

Proceedings ArticleDOI
01 Feb 2019
TL;DR: NODOZE generates alert dependency graphs that are two orders of magnitude smaller than those generated by traditional tools without sacrificing the vital information needed for the investigation, and decreases the volume of false alarms by 84%, saving analysts’ more than 90 hours of investigation time per week.
Abstract: Large enterprises are increasingly relying on threat detection softwares (e.g., Intrusion Detection Systems) to allow them to spot suspicious activities. These softwares generate alerts which must be investigated by cyber analysts to figure out if they are true attacks. Unfortunately, in practice, there are more alerts than cyber analysts can properly investigate. This leads to a “threat alert fatigue” or information overload problem where cyber analysts miss true attack alerts in the noise of false alarms. In this paper, we present NoDoze to combat this challenge using contextual and historical information of generated threat alert in an enterprise. NoDoze first generates a causal dependency graph of an alert event. Then, it assigns an anomaly score to each event in the dependency graph based on the frequency with which related events have happened before in the enterprise. NoDoze then propagates those scores along the edges of the graph using a novel network diffusion algorithm and generates a subgraph with an aggregate anomaly score which is used to triage alerts. Evaluation on our dataset of 364 threat alerts shows that NoDoze decreases the volume of false alarms by 86%, saving more than 90 hours of analysts’ time, which was required to investigate those false alarms. Furthermore, NoDoze generated dependency graphs of true alerts are 2 orders of magnitude smaller than those generated by traditional tools without sacrificing the vital information needed for the investigation. Our system has a low average runtime overhead and can be deployed with any threat detection software.

144 citations

Proceedings ArticleDOI
01 Jan 2016
TL;DR: This paper develops an availability model of a virtualized system using a two-level hierarchical approach in which fault trees are used in the upper level and homogeneous continuous time Markov chains are used to represent sub-models in lower level.
Abstract: Availability is one of the key requirements for modern networked system. Availability of a virtualized system can be modelled and analyzed using stochastic models. In our previous work, availability of a virtualized system was modeled using a hierarchical model to incorporate the detailed behavior of virtual machines (VMs)' failure and recovery with respect to the system behavior. In particular, a truncated continuous time Markov chain model was used for VM mode. In this paper, we propose to construct a stochastic reward nets (SRN) to model and analyze the availability of a virtualized system. Further, we study the effect on the availability when restrictions on the guard functions are relaxed. We use a virtualized data center (VDC) using three hosts with a multiple number of VMs on each hosting servers, and we incorporate (i) failure and recovery of hosting servers and VMs, (ii) VM high availability (HA) and (iii) VM live migration (LM). The VDCs with/without using VM HA and LM are compared in terms of capacity oriented availability (i.e., number of available VMs).

144 citations

Journal ArticleDOI
TL;DR: It is demonstrated that a scheme of quantum teleportation where a receiver has multiple output ports and obtains the teleported state by merely selecting one of the N ports according to the outcome of the sender's measurement is possible by showing an explicit protocol where N pairs of maximally entangled qubits are employed.
Abstract: We consider a scheme of quantum teleportation where a receiver has multiple (N) output ports and obtains the teleported state by merely selecting one of the N ports according to the outcome of the sender's measurement. We demonstrate that such teleportation is possible by showing an explicit protocol where N pairs of maximally entangled qubits are employed. The optimal measurement performed by a sender is the square-root measurement, and a perfect teleportation fidelity is asymptotically achieved for a large N limit. Such asymptotic teleportation can be utilized as a universal programmable processor.

144 citations


Authors

Showing all 33297 results

NameH-indexPapersCitations
Pulickel M. Ajayan1761223136241
Xiaodong Wang1351573117552
S. Shankar Sastry12285886155
Sumio Iijima106633101834
Thomas W. Ebbesen9930570789
Kishor S. Trivedi9569836816
Sharad Malik9561537258
Shigeo Ohno9130328104
Adrian Perrig8937453367
Jan M. Rabaey8152536523
C. Lee Giles8053625636
Edward A. Lee7846234620
Otto Zhou7432218968
Katsumi Kaneko7458128619
Guido Groeseneken73107426977
Network Information
Related Institutions (5)
Bell Labs
59.8K papers, 3.1M citations

92% related

Hitachi
101.4K papers, 1.4M citations

92% related

Samsung
163.6K papers, 2M citations

91% related

IBM
253.9K papers, 7.4M citations

91% related

Intel
68.8K papers, 1.6M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20238
202220
2021234
2020518
2019952
20181,088