Institution
Nokia
Company•Espoo, Finland•
About: Nokia is a company organization based out in Espoo, Finland. It is known for research contribution in the topics: Signal & Mobile station. The organization has 16625 authors who have published 28347 publications receiving 695725 citations. The organization is also known as: Nokia Oyj & Oy Nokia Ab.
Papers published on a yearly basis
Papers
More filters
•
14 Jan 1997
TL;DR: In this article, a packet radio system consisting of packet radio support nodes (SGSN) connected to the mobile communication network, as well as gateway support nodes for providing an interconnection to an external packet data network is implemented.
Abstract: In a digital mobile communication system, a packet radio system has been implemented by employing the radio interface of the mobile communication network. The packet radio system comprises packet radio support nodes (SGSN) connected to the mobile communication network, as well as gateway support nodes for providing an inter-connection to an external packet data network (15). The support nodes (SGSN, GGSN) are connected to an intra-operator packet switched backbone network (13). The serving support nodes and the gateway support nodes collect charging information on usage of the radio interface and the data network (15), respectively. The system is further provided with a billing gateway support node (BGGSN) connected to the internal backbone network (BGGSN) to receive user-specific charging information collected by the other support nodes, and to forward the charging information to a charging system.
138 citations
•
19 May 2009TL;DR: In this article, an apparatus for automatically assigning content information may include a processor, which is configured to receive content information, and identify the usage type and the sub-usage type of the content information.
Abstract: An apparatus for automatically assigning content information may include a processor. The processor may be configured to receive content information, and identify the usage type and the sub-usage type of the content information. The content information may comprise an indicator for a usage type and a sub-usage type. The processor may be further configured to automatically assign the received content information to the at least one user contact based onthe sub-usage type, and to perform a specified function, based ona usage type. Associated methods and computer program products may also be provided. Another method, apparatus, and computer program productfor providing content information may also be provided.
138 citations
•
14 Mar 2002TL;DR: In this paper, a channel map is created and maintained at each mobile station of the ad hoc network, and any of the mobile stations is selectable to form a DFS owner that defines the channel frequency to be used upon which to define a communication channel for communications in the network.
Abstract: An assembly, and an associated method, for an ad hoc network, such as an independent basic service set defined in an IEEE 802.11 protocol specification. A channel map is created and maintained at each mobile station of the ad hoc network. The channel map is populated with channel characteristic indicia of channel frequencies that might be available upon which to be used in the ad hoc network to effectuate communications between the mobile stations. Information related to the channel map created and maintained at each of the mobile stations is exchanged, and any of the mobile stations is selectable to form a DFS owner that defines the channel frequency to be used upon which to define a communication channel for communications in the network.
138 citations
••
TL;DR: The proposed approach using LPB/C texture features was able to correctly differentiate epithelium from stroma according to texture and illustrates the capability of automated segmentation of epithelial and stromal tissue in TMAs based on texture features and an SVM classifier.
Abstract: The aim of the study was to assess whether texture analysis is feasible for automated identification of epithelium and stroma in digitized tumor tissue microarrays (TMAs). Texture analysis based on local binary patterns (LBP) has previously been used successfully in applications such as face recognition and industrial machine vision. TMAs with tissue samples from 643 patients with colorectal cancer were digitized using a whole slide scanner and areas representing epithelium and stroma were annotated in the images. Well-defined images of epithelium (n = 41) and stroma (n = 39) were used for training a support vector machine (SVM) classifier with LBP texture features and a contrast measure C (LBP/C) as input. We optimized the classifier on a validation set (n = 576) and then assessed its performance on an independent test set of images (n = 720). Finally, the performance of the LBP/C classifier was evaluated against classifiers based on Haralick texture features and Gabor filtered images. The proposed approach using LPB/C texture features was able to correctly differentiate epithelium from stroma according to texture: the agreement between the classifier and the human observer was 97 per cent (kappa value = 0.934, P < 0.0001) and the accuracy (area under the ROC curve) of the LBP/C classifier was 0.995 (CI95% 0.991-0.998). The accuracy of the corresponding classifiers based on Haralick features and Gabor-filter images were 0.976 and 0.981 respectively. The method illustrates the capability of automated segmentation of epithelial and stromal tissue in TMAs based on texture features and an SVM classifier. Applications include tissue specific assessment of gene and protein expression, as well as computerized analysis of the tumor microenvironment. The virtual slide(s) for this article can be found here: http://www.diagnosticpathology.diagnomx.eu/vs/4123422336534537
138 citations
•
30 Jul 1996TL;DR: In this article, a mobile telephone network in which user identify module (UIM) locking is activated automatically by the network via signalling over the base station to mobile telephone common air interface.
Abstract: A mobile telephone network in which user identify module (UIM) locking is activated automatically by the network via signalling over the base station to mobile telephone common air interface. The telephone network periodically or regularly queries the Internal Mobile Equipment Identity (IMEI) of the mobile telephone being used by subscribers on the system. If the IMEI of a mobile telephone is found on a 'stolen list' the network may then command the mobile station to activate UIM locking by messaging to and from the mobile telephone over the air interface to activate the UIM locking function using a transmitted bit pattern.
138 citations
Authors
Showing all 16635 results
Name | H-index | Papers | Citations |
---|---|---|---|
Federico Capasso | 134 | 1189 | 76957 |
Andreas Richter | 110 | 769 | 48262 |
Shunpei Yamazaki | 109 | 3476 | 66579 |
Jinsong Huang | 105 | 290 | 49042 |
Marc Pollefeys | 98 | 601 | 36463 |
Merouane Debbah | 96 | 652 | 41140 |
Benjamin J. Eggleton | 92 | 1195 | 34486 |
Jérôme Faist | 91 | 970 | 37221 |
Jean-Pierre Hubaux | 90 | 415 | 35837 |
Bernd Girod | 87 | 604 | 32298 |
Howard E. Katz | 87 | 475 | 27991 |
J.J. Garcia-Luna-Aceves | 86 | 602 | 25151 |
Ramesh Raskar | 86 | 670 | 30675 |
Ananth Dodabalapur | 85 | 394 | 27246 |
Stephen A. Spector | 85 | 424 | 41705 |