scispace - formally typeset
Search or ask a question

Showing papers by "Nokia published in 2000"


Journal ArticleDOI
Donald G. York1, Jennifer Adelman2, John E. Anderson2, Scott F. Anderson3  +148 moreInstitutions (29)
TL;DR: The Sloan Digital Sky Survey (SDSS) as discussed by the authors provides the data to support detailed investigations of the distribution of luminous and non-luminous matter in the universe: a photometrically and astrometrically calibrated digital imaging survey of π sr above about Galactic latitude 30° in five broad optical bands to a depth of g' ~ 23 mag.
Abstract: The Sloan Digital Sky Survey (SDSS) will provide the data to support detailed investigations of the distribution of luminous and nonluminous matter in the universe: a photometrically and astrometrically calibrated digital imaging survey of π sr above about Galactic latitude 30° in five broad optical bands to a depth of g' ~ 23 mag, and a spectroscopic survey of the approximately 106 brightest galaxies and 105 brightest quasars found in the photometric object catalog produced by the imaging survey. This paper summarizes the observational parameters and data products of the SDSS and serves as an introduction to extensive technical on-line documentation.

9,835 citations


Proceedings ArticleDOI
06 Sep 2000
TL;DR: A linear decoding based on iterative interference cancellation between parts of the code approaches the maximal likelihood decoding performance.
Abstract: We propose a full rate space-time block code for 3+ Tx antennas. The code is chosen to minimize the non-orthonormality that arises from increasing the rate above the maximum allowed by orthogonality. A linear decoding based on iterative interference cancellation between parts of the code approaches the maximal likelihood decoding performance.

578 citations


Journal ArticleDOI
N. Asokan1, Victor Shoup2, Michael Waidner2
TL;DR: In this paper, the authors present a protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does.
Abstract: We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does. The obvious application is where the signatures represent items of value, for example, an electronic check or airline ticket. The protocol can also be adapted to exchange encrypted data. It relies on a trusted third party, but is "optimistic," in that the third party is only needed in cases where one player crashes or attempts to cheat. A key feature of our protocol is that a player can always force a timely and fair termination, without the cooperation of the other player, even in a completely asynchronous network. A specialization of our protocol can be used for contract signing; this specialization is not only more efficient, but also has the important property that the third party can be held accountable for its actions: if it ever cheats, this can be detected and proven.

497 citations


Patent
Seppo Helle1
06 Jul 2000
TL;DR: In this paper, a method and apparatus for controlling a mobile phone when it has been lost or stolen in order to prevent its use except to help the owner find it is presented.
Abstract: A method and apparatus is provided for controlling a mobile phone when it has been lost or stolen in order to prevent its use except to help the owner find it. Controlling the phone remotely may be implemented via a known Short Messaging System, for example. The security features provided are as follows: (1) Displaying contact information (phone number) of the owner on screen when the mobile phone can not start up normally, for example, due to an incorrect security code entry; (2) Setting the mobile phone in a secure state where it can only be used to call one number (Emergency calls are of course always possible.); and (3) Commanding the mobile phone to send information about its location and usage via SMS to a given number.

471 citations


Journal ArticleDOI
TL;DR: This paper considers a problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and they do not share any other prior electronic context, and how can they set up a secure session among their computers?

451 citations


Journal ArticleDOI
15 Mar 2000
TL;DR: In this article, the explanatory power and information contents of several remote sensing data sources on the retrieval of stem volume, basal area, and mean height, utilizing the following data: Landsat TM, Spot PAN and XS, ERS-1/2 PRI and SLC, airborne data from imaging spectrometer AISA, radar-derived forest canopy profiles (obtained with HUTSCAT), and aerial photographs.
Abstract: Recent advances in developing new airborne instruments and space-borne missions and in SAR technology, especially in interferometry and coherence estimation, have roused questions: can such new SAR data be utilized in operational forest inventory? What is the accuracy of different satellite data for forest inventory? This paper verifies the explanatory power and information contents of several remote sensing data sources on the retrieval of stem volume, basal area, and mean height, utilizing the following data: Landsat TM, Spot PAN and XS, ERS-1/2 PRI and SLC (coherence estimation), airborne data from imaging spectrometer AISA, radar-derived forest canopy profiles (obtained with HUTSCAT), and aerial photographs. Ground truth data included three different sets ranging from conventional forest inventory data to intensive field checking where one man-day was spent for assessing one stand. Multivariate and neural network methods were applied in data analysis. The results suggested that (1) radar-derived stand profiles obtained with 100 m spacing was the most accurate data source in this comparison and was of equivalent accuracy with conventional forest inventory for mean height and stem volume estimation, (2) aerial photographs (scale 1 : 20,000) gave comparable results with the imaging spectrometer AISA, (3) the satellite images used for the estimation in the decreasing explanation power were Spot XS, Spot PAN, Landsat TM, ERS SAR coherence, JERS SAR intensity images (PRI); and ERS SAR intensity images (PRI). It appears that optical images still include more information for forest inventory than radar images, (4) from all satellite radar methods, the coherence technique seemed to be superior to other methods.

406 citations


Proceedings ArticleDOI
01 Apr 2000
TL;DR: A model for predicting expert text entry rates for several input methods on a 12-key mobile phone keypad is presented, which includes a movement component based on Fitts' law and a linguistic componentbased on digraph, or letter-pair, probabilities.
Abstract: We present a model for predicting expert text entry rates for several input methods on a 12-key mobile phone keypad. The model includes a movement component based on Fitts' law and a linguistic component based on digraph, or letter-pair, probabilities. Predictions are provided for one-handed thumb and two-handed index finger input. For the traditional multi-press method or the lesser-used two-key method, predicted expert rates vary from about 21 to 27 words per minute (wpm). The relatively new T9 method works with a disambiguating algorithm and inputs each character with a single key press. Predicted expert rates vary from 41 wpm for one-handed thumb input to 46 wpm for two-handed index finger input. These figures are degraded somewhat depending on the user's strategy in coping with less-than-perfect disambiguation. Analyses of these strategies are presented.

374 citations


Patent
Stephen Williams1
21 Feb 2000
TL;DR: In this paper, a processor runs a predictive editor program for generating an output containing a word matching a received string of ambiguous key strokes, and an editor application is controlled by the processor for editing a text based on the predictive editor's interpretation of key strokes received from the editor application.
Abstract: A communication terminal having a display; a keypad having a plurality of keys associated with several letters each; and a processor controlling the display in accordance with the operation of the keypad. The processor runs a predictive editor program for generating an output containing a word matching a received string of ambiguous key strokes. Furthermore an editor application is controlled by the processor for editing a text based on the predictive editor program's interpretation of key strokes received from the editor application. The editor application stores a list of matching words received from the predictive editor program, at least a part of the text string is displayed in the display. The keypad includes at least one softkey whose functionality is displayed in the display and controlled by the processor. When the editor program runs out of possible word matches to the received key stroke string, the processor changes the functionality of the at least one softkey to a short cut to another editor application for inputting word based upon unambiguous key strokes.

342 citations


Journal ArticleDOI
TL;DR: How emerging technology may blur the network-centric distinction between NAS and SAN is about how the decreasing specialization of SAN protocols promises SAN-like devices on Ethernet network hardware.
Abstract: SAN with Fibre Channel network hardware that has a greater effect on a user’s purchasing decisions. This article is about how emerging technology may blur the network-centric distinction between NAS and SAN. For example, the decreasing specialization of SAN protocols promises SAN-like devices on Ethernet network hardware. Alternatively, the increasing specialization of NAS systems may embed much of the file system into storage devices. For users, it is increasingly worthwhile to investigate networked storage core and emerging technologies. Today, bits stored online on magnetic disks are so inexpensive that users are finding new, previously unaffordable, uses for storage. At Dataquest’s Storage2000 conference last June in Orlando, Fla., IBM reported that online disk storage is now significantly cheaper than paper or film, the dominant traditional information storage media. Not surprisingly, users are adding storage capacity at about 100% per year. Moreover, the rapid growth of e-commerce, with its huge global customer base and easy-to-use, online transactions, has introduced new market requirements, including bursty, unpredictable spurts in capacity, that demand vendors minimize the time from a user’s order to installation of new storage. In our increasingly Internet-dependent business and computing environment, network storage is the computer. NETWORK ATTACHED STORAGE ARCHITECTURE

338 citations


Patent
Ari Hottinen1, Risto Wichman1
11 Feb 2000
TL;DR: In this article, the authors proposed a transmit diversity method for a wireless communication system comprising a transmitting element and at least one receiver, wherein a transmission signal is transmitted from the transmitting element to the at least receiver in accordance with a weight information determined in response to a feedback information, and is fed back using multiplexed feedback signals.
Abstract: The invention relates to a transmit diversity method for a wireless communication system comprising a transmitting element and at least one receiver, wherein a transmission signal is transmitted from the transmitting element to the at least one receiver in accordance with a weight information determined in response to a feedback information. The feedback information is derived from the response at the at least one receiver to the transmission signal, and is fed back using multiplexed feedback signals. Multiple feedback signal quantization constellations and/or constellation specific feedback subchannels can be used for channel probing, such that the total feedback resolution and robustness can be enhanced, while maintaining low signaling capacity of the feedback channel.

309 citations


Journal ArticleDOI
TL;DR: IP over WDM has been envisioned as the winning combination due to the ability of the IP to be the common revenue-generating convergence sublayer and WDM as a bandwidth-rich transport sublayer.
Abstract: Expanding Internet-based services are driving the need for evermore bandwidth in the network backbone These needs will grow further as new real-time multimedia applications become more feasible and pervasive Currently, there is no other technology on the horizon that can effectively meet such a demand for bandwidth in the transport infrastructure other than WDM technology This technology enables incremental and quick provisioning up to and beyond two orders of magnitude of today's fiber bandwidth levels This precludes the need to deploy additional cabling and having to contend with right-of-way issues, a key advantage Hence, it is only natural that over time optical/WDM technology will migrate closer to the end users, from core to regional, metropolitan, and ultimately access networks At present, WDM deployment is mostly point-to-point and uses SONET/SDH as the standard layer for interfacing to the higher layers of the protocol stack However, large-scale efforts are underway to develop standards and products that will eliminate one or more of these intermediate layers (eg, SONET/SDH, ATM) and run IP directly over the WDM layer IP over WDM has been envisioned as the winning combination due to the ability of the IP to be the common revenue-generating convergence sublayer and WDM as a bandwidth-rich transport sublayer Various important concerns still need to be addressed regarding IP-WDM integration These include lightpath routing coupled with tighter interworkings with IP routing and resource management protocols, survivability provisioning, framing/monitoring solutions, and others

Patent
Jussi Rissanen1
14 Dec 2000
TL;DR: In this paper, an electronic couponing technique includes transferring coupon information, which may include a coupon ID (identification) to a first portable terminal and storing same therein The portable terminal displays a representation of the transferred coupon information on a display thereof The stored coupon information may also be transferred from the portable terminal to another terminal for redemption.
Abstract: An electronic couponing technique includes transferring coupon information, which may include a coupon ID (identification) to a first portable terminal and storing same therein The portable terminal displays a representation of the transferred coupon information on a display thereof The stored coupon information may be transferred from the portable terminal to another terminal for redemption The stored coupon information may also be transferred from the portable terminal to another portable terminal Various schemes may be used to transfer the coupon information including a Bluetooth low-range radio link or an optical bar code scanner scanning an optical bar code or an infrared link or a wireless link from the portable terminal The Internet or wireless LAN (Local Area Network) may also be used in transferring the coupon information to and from the various terminals

Journal ArticleDOI
TL;DR: The analysis of three low-complexity channel estimators, based on the discrete Fourier transform (DFT), for orthogonal frequency-division multiplexing (OFDM) systems shows that this type of estimators may experience an irreducible error floor at high SNRs.
Abstract: In this paper we analyze the performance of three low-complexity channel estimators, based on the discrete Fourier transform (DFT), for orthogonal frequency-division multiplexing (OFDM) systems. Estimators of this type have been analyzed for discrete-time channels, and we extend this analysis to continuous-time channels. We present analytical expressions for their mean-squared error (MSE) and evaluate their complexity vs. symbol-error rate (SER) for 16-QAM. The analysis shows that this type of estimators may experience an irreducible error floor at high SNRs. However, in one of the three estimators the error floor can be eliminated while the complexity stays low and the performance is maximized.

Patent
Lioudmila Blants1
14 Sep 2000
TL;DR: In this article, the authors present a system for providing personal calendar services, which includes a mobile terminal including a display, a processor, and a communication system, including communications between the mobile terminal and the at least one calendaring and scheduling server.
Abstract: The invention is a system (10) and method for providing personal calendar services. A system providing calendar services in accordance with the invention includes a mobile terminal (12) including a display (14), a processor (34) which controls providing a display on the display of a calendar of a user of the mobile terminal including scheduled calendar user services which are provided to the user of the mobile terminal by at least one user service provider and have associated therewith a scheduled time and at least one location at which the user service is provided to the user; at least one calendaring and scheduling server (20) providing the mobile terminal with a schedule of the scheduled calendar user services which is maintained by the at least one calendaring and scheduling server and which is displayed by the display under control of the calendar software client, each calendaring and scheduling server executing software, which is responsive to a physical location stored therein to schedule at least one scheduled calendar user service for the user of the mobile terminal; and a communication system (16) providing communications between the mobile terminal and the at least one calendaring and scheduling server and between the at least one calendaring and scheduling server and the at least one service provider.

Patent
Arto Astala1, Tapio Mansikkaniemi1
20 Nov 2000
TL;DR: In this article, a method of and apparatus for dragging and dropping items displayed on a touch screen is described, where the item is dragged with reduced pressure to a second location at which the touch screen was touched with a pressure greater than a second predetermined pressure for a time duration greater than the first predetermined time period.
Abstract: A method of and apparatus for dragging and dropping items displayed on a touch screen. In one embodiment, the item on the touch screen is touched with a pressure greater than a first predetermined pressure for a first predetermined period of time. The pressure on the item is then reduced, and the item is dragged with the reduced pressure to a second location at which the touch screen is touched with a pressure greater than a second predetermined pressure for a time duration greater than a second predetermined time period. In another embodiment, the item on the touch screen is touched with a pressure greater than a predetermined pressure for a first predetermined period of time, and then the touch screen is touched at a second location with a pressure greater than the predetermined pressure for a second predetermined period of time, less than the first predetermined period of time.

Patent
Jan Haestrup1
18 Feb 2000
TL;DR: A communication terminal has a display; a keypad having a plurality of keys associated with several letters each; processor means controlling the display means in accordance with the operation of the keypad; and a predictive editor program for generating an output containing words matching a received string of ambiguous key strokes as discussed by the authors.
Abstract: A communication terminal having a display; a keypad having a plurality of keys associated with several letters each; processor means controlling the display means in accordance with the operation of the keypad The communication terminal has a predictive editor program for generating an output containing words matching a received string of ambiguous key strokes Furthermore the communication terminal has on editor application controlled by the processor means for editing a text based on the predictive editor programs interpretation of key strokes The editor application comprises means for storing string of entered words, means for storing a sequence of key stokes, said sequence is updated upon the occurrence of a new key stroke, and being used as input to the predictive editor program, means for storing a list of matching words received from said predictive editor program The processor means combines the text string and one word from the list of matching words for displaying in the display of at least a part of said text string and one word from the list of matching words, said one word from the list of matching words is marked in comparison to the remaining part of the text string and added to the text string upon acknowledgement by the user The terminal comprises means for acknowledging a word suggested by said predictive editor program, and said acknowledging means includes a key on the keypad indicating that a word suggested by said predictive editor program is a part of a compound word, said editor application fixes the suggested word as an acknowledged part of the compound word, resets said sequence of key strokes serving as input for said predictive editor program in order to determine another part of the compound word independently of the acknowlegded part of the compound word

Proceedings ArticleDOI
23 Sep 2000
TL;DR: This paper details many of the changes that were necessary during the development of the implementation of the Ad hoc On-Demand Distance Vector routing protocol in the Linux operating system.
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in ad hoc mobile networks. Because of the difficulty of testing an ad hoc routing protocol in a real-world environment, a simulation was first created so that the protocol design could be tested in a variety of scenarios. Once simulation of the protocol was nearly complete, the simulation was used as the basis for an implementation in the Linux operating system. In the course of converting the simulation into an implementation, certain modifications were needed in AODV and the Linux kernel due to both simplifications made in the simulation of AODV and to incompatibilities of the Linux kernel and the IP-layer to routing in a mobile environment. This paper details many of the changes that were necessary during the development of the implementation.

Patent
Pekko Orava1, Ari Vaisanen1
26 May 2000
TL;DR: In this paper, a multi-transceiver mobile terminal with a first switching unit (SW 1 ) and a second switching unit(SW 2 ) is considered, in which the first transceiver port (P 1 ) is coupled to either the first and second antenna ports (P A 1 ) through the first or second switching units (SW 2 ), respectively.
Abstract: Antenna switching circuitry in a multi-transceiver mobile terminal 10 , which features a first switching unit (SW 1 ) which controllably couples a first transceiver port (P 1 ) to either a first antenna port (P A1 ) or a second antenna port (P A2 ); and a second switching unit (SW 2 ) which controllably couples the second antenna port (P A2 ) to either the first transceiver port (P 1 ), through the first switching unit (SW 1 ), or to an input/output port (P I/O ) of a second transceiver ( 12 ). According to this scheme, the second antenna port is coupled to the input/output port of the second transceiver ( 12 ) in a mode in which the second transceiver ( 12 ) is operational, the first transceiver port (P 1 ) being decoupled from the second antenna port at this time, wherein the first transceiver port is coupled to the first antenna port and the input/output port of the second transceiver ( 12 ) is decoupled from the second antenna port, when the first transceiver is in a transmit mode, and wherein the first transceiver port is coupled to either of the first and second antenna ports, when the first transceiver ( 11 ) is in a receiving mode and the input/output port of the second transceiver ( 12 ) is decoupled from the second antenna port.

Patent
Christian Kraft1
08 Dec 2000
TL;DR: In this article, a message exchange session between wireless communication terminals via a wireless network is initiated from one of the terminals by forwarding a message text to said at least one other communication terminal.
Abstract: A message exchange session between wireless communication terminals via a wireless network is initiated from one of the terminals. The user of the initiating terminal invites at least one other communication terminal to participate in the message exchange session. This is done by forwarding a message text to said at least one other communication terminal. The user of the other terminal responds to received message by inputting a message text for replying to the received message. Then the responding terminal automatically adds the inputted reply message text to the received message text, whereby the aggregate message text includes the message exchange session history, and the aggregate message text is then transmitted to the other communication terminals being party to the message exchange session.

Patent
Mika Kivimaki1
TL;DR: A speech-generating computer apparatus for generating speech from electronic forms, a method of controlling a computer and a computer-readable media containing program code embodying an application program for performing the method of generating speech as mentioned in this paper.
Abstract: A speech-generating computer apparatus for generating speech from electronic forms, a method of controlling a computer and a computer-readable media containing program code embodying an application program for performing a method of generating speech. The computer has a speech-generating function and at least one screen reader program. The at least one screen reader program generates human perceptible speech with the speech-generating function. The computer determines if a particular screen reader program is active and initializes an object in a format of a particular screen reader program that is active.

Journal ArticleDOI
TL;DR: In this paper, the authors derived head tissue equivalent dielectric parameters that enable the utilization of one generic homogeneous head for testing compliance for the entire user group, i.e., granting no underestimation, but also not greatly overestimating the actual maximum user exposure.
Abstract: The requirements for testing compliance of cellular phones with electromagnetic safety limits demand evaluation of the maximum exposure that may occur in the user group under normal operational conditions. Under these conditions, the tissues of the ear region are most exposed, the tissue composition of which is complex and varies considerably from user to user. The objective of this paper is to derive head tissue equivalent dielectric parameters that enable the utilization of one generic homogeneous head for testing compliance for the entire user group, i.e., granting no underestimation, but also not greatly overestimating the actual maximum user exposure. As a primary study, a simple analytical model of an infinite half-space layered tissue model exposed to a plane wave was utilized to investigate the impact of impedance matching standing waves, etc. On the spatial-peak specific absorption rate. The tissue layers were varied in composition and thickness, representing the anatomical variation of the exposed head region covering the user group including adults and children ( 90% percentile). Based on the worst-case tissue layer compositions with respect to absorption at each frequency, head tissue equivalent dielectric parameters for homogeneous modeling were derived, which result in the same spatial-peak absorption. The validity of this approach for near-field exposures was demonstrated by replacing the plane wave by different near-field sources (dipoles and generic phones) and the layered structure with magnetic-resonance-image-based nonhomogeneous human head models.

Patent
21 Nov 2000
TL;DR: In this paper, the authors propose a challenge/response procedure for authentication during a communication handover event in a radio communications system such as IEEE 082.11 or HIPERLAN, where the existing security association between a mobile terminal and a wireless communication network is maintained.
Abstract: An existing security association is re-established when a communication handover event occurs in a radio communications system such as IEEE 082.11 or a HIPERLAN wherein the existing security association between a mobile terminal and a wireless communication network is maintained when the communication handover occurs within the network. Authentication during a handover event is achieved by a challenge/response procedure. In accordance with the challenge/response procedure each member of a communication pair that is made up of a new access point and the mobile terminal that is experiencing a handover to the new access point sends a challenge to the other member of the communication pair. Each member of the communication pair then calculates a response to its received challenge, and these responses are sent back to the other member of the communication pair. Each member of the communication pair then compares its received response to a correct response. When these comparisons are correct, payload communication begins between the second access point and the mobile terminal.

Book
15 Jan 2000
TL;DR: This book offers a solutions-oriented, case-study approach covering the entire development lifecycle, based on advanced work done by three of Europes leading technology companies and their academic partners.
Abstract: Software development organizations are now discovering the efficiencies that can be achieved by architecting entire software product families together. In Software Architecture for Product Families, experts from one of the worlds most advanced software domain engineering projects share in-depth insights about the techniques that work -and those that dont. The book offers a solutions-oriented, case-study approach covering the entire development lifecycle, based on advanced work done by three of Europes leading technology companies and their academic partners. Discover the challenges that drive companies to consider architecting product families, and the new problems they encounter in doing so. Master concepts and terms that can be used to describe the architecture of a product family; then learn how to assess that architecture, and transform it into working applications. The authors also present chapter-length, realworld case studies of domain engineering projects at Nokia, Philips, and ABB.

Patent
Heikki Rautila1
05 Jul 2000
TL;DR: In this paper, a multi-player game system using a mobile telephone and a game unit is presented, which links multiple users having game units with mobile phones using a low power radio link.
Abstract: A multi-player game system using a mobile telephone and a game unit is disclosed. The present invention links multiple users having game units with mobile phones using a low power radio link. The present invention includes at least one mobile phone having a first transceiver for providing connections to a cellular network and a second transceiver for providing short-haul connectivity, and a plurality of game units for interfacing with a plurality of players, each of the game units having a third transceiver for providing short-haul connectivity, wherein the mobile phones and the game units are linked by the second and third transceivers therein to enable a game to be played on the game units by the plurality of players. In at least one of the mobile phones, the second transceiver is a short range wireless transceiver. At least one mobile phone is used to download a game to the game units and the game units include a group selection interface for choosing players to include in a gaming group. The mobile phones may be linked to a base station, a game server and a network interconnecting the base station and the game server, wherein the game server provides a game across the network and base station to the mobile phones for play on the game units.

Patent
19 Jun 2000
TL;DR: In this paper, a system is provided that includes a cellular network, a public switched telephone network (PSTN) and a mobile IP-telephony network (MIPTN).
Abstract: According to an embodiment of the present invention, a system is provided that includes a cellular network, a Public Switched Telephone Network (PSTN) and a mobile IP-telephony network (MIPTN). Both the cellular network and the MIPTN include a Home Function and one or more visited Functions. MIPTN subscribers can roam within the MIPTN. Also, a Gateway Function interfaces the PSTN and the MIPTN to allow roaming between the cellular network and the MIPTN. The Gateway Function performs a dynamic mapping function between PSTN/cellular addresses (e.g., in E.164 format) and MIPTN addresses (e.g., IP addresses) to allow registration and call delivery for subscribers roaming between the cellular network and the MIPTN. A similar type of Gateway Function also allows Short Message Service (SMS) messages to be delivered over the MIPTN as well.

Patent
Juha Lehikoinen1, Riku Suomela1
20 Dec 2000
TL;DR: In this paper, a method and system for obtaining location-dependent services information by using a mobile station is presented, where the mobile station includes a services access key which, when selected, will transmit a query to the beacon requesting location-based services.
Abstract: In a mobile communication system, a method and system for obtaining location-dependent services information by using a mobile station. An information beacon containing services information pertaining to the location of the beacon is disposed in an environment. The beacon is capable of communicating with the mobile station when the mobile station is located within the operating range of the beacon. The mobile station includes a services access key which, when selected while the mobile station is within the operating range of the beacon, will transmit a query to the beacon requesting location-based services. In response to the query, location-based services information will be transmitted to the mobile station.

Patent
Martin Zilliacus1, Heikki Rautila1
05 Jul 2000
TL;DR: In this article, the authors propose a method and apparatus for playing games between the clients of entities at different locations by linking multiple players together through a network using the users' mobile phones.
Abstract: A method and apparatus for playing games between the clients of entities at different locations by linking multiple players together through a network using the users' mobile phones. The method includes connecting a plurality of mobile phones together through a network for playing a game, setting up a game scenario for each of the plurality of mobile phones and transmitting game signals between the plurality mobile phones across the network. At least two of the plurality of mobile phones are remotely located. The mobile phones connect to the network through a base station. A connection from a mobile phone to the network through a base station is a low power radio frequency connection. The interactive game may be interrupted when a mobile phone receives a call. The interactive game is interrupted only for the mobile phone receiving the call.

Patent
09 Jun 2000
TL;DR: In this paper, the authors present a communication system consisting of an information source (20), a position transceiver (14), disposed at a broadcast location (16), coupled to the information source, and a database (26), communicating with the network, storing information which is transmitted to the second transceiver associated with the identification information.
Abstract: The invention is a communication system (10) and a method of communication. The communication system includes an information source (20); a position transceiver (14) disposed at a broadcast location (16) and coupled to the information source, the position transceiver broadcasting information from the information source within a broadcast area (18) where the position transceiver is located, the information including identification information relating to the information source; a mobile terminal (12) within the broadcast area comprising first and second transceivers (44 and 46), the first transceiver communicating with the position transceiver; a network (42) communicating with the second transceiver; and a database (26), communicating with the network, storing information which is transmitted to the second transceiver associated with the identification information in response to the database receiving at least the identification information by transmission of the network from the mobile terminal to the database.

Proceedings ArticleDOI
15 May 2000
TL;DR: In this article, a simple method is derived for estimating the downlink capacity and required base station transmission power in a WCDMA system based on a downlink pole equation which is mostly similar with the well known CDMA uplink pole equation.
Abstract: A simple method is derived for estimating the downlink capacity and required base station transmission power in a WCDMA system. This is based on a downlink pole equation which is mostly similar with the well known CDMA uplink pole equation. It is shown that the total downlink transmission power is composed of two terms. The first term is equal to what would be needed in the absence of interference and the second one shows the increase due to multiple access interference which is inversely proportional to 1-/spl eta//sub DL/ where /spl eta//sub DL/ is called the downlink loading. The method can be used in radio network dimensioning where extensive simulations can not be run. Usage of the method is demonstrated by some examples.

Patent
07 Dec 2000
TL;DR: In this paper, the calendar display includes calendar items retrieved from both a local storage element and from a network-based calendar database, and the calendar items stored locally are exportable to the network database.
Abstract: Calendar display apparatus, and an associated method, displays the calendar display at a mobile terminal operable in a radio communication system. The calendar display includes calendar items retrieved from both a local storage element and from a network-based calendar database. The calendar items are displayed simultaneously. And, calendar items stored locally are exportable to the network database. Analogously, calendar items stored at the network database are downloadable to the mobile station to be stored thereat.