Institution
NTT DoCoMo
About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.
Topics: Base station, Mobile station, Transmission (telecommunications), Base station identity code, Terminal (electronics)
Papers published on a yearly basis
Papers
More filters
•
27 May 2003TL;DR: In this article, a relay router multicasts a router advertisement to access routers forming respective cells into which a target mobile terminal might move, and then the mobile terminal transmits delay information of a delay to be added to each path in multicasting by the relay router.
Abstract: The object is to prevent occurrence of packet loss in Cellular IP and a drop of TCP throughput due to duplication of packets. On the occasion of relaying a packet from correspondent, a relay router multicasts a router advertisement to access routers forming respective cells into which a target mobile terminal might move. The mobile terminal receives the router advertisements from the neighbor access routers, calculates a difference between reception times of the packets from the respective access routers, and specifies a relay router to perform multicasting. Then the mobile terminal transmits delay information of a delay to be added to each path in multicasting by the relay router, to the relay router thus specified. The relay router adds the delay to each path in multicasting on the basis of the delay information.
47 citations
••
03 Jun 2007TL;DR: This paper tries to provide some insights into currently available reasoning approaches and aims at identifying requirements to make future benchmarks more useful for application developers.
Abstract: This work is motivated by experiences in the course of developing an ontology-based application within a real-world setting. We found out that current benchmarks are not well suited to provide helpful hints for users who seek for an appropriate reasoning system able to deal with expressive terminological descriptions, large volumes of assertional data, and frequent updates in a sound and complete way. This paper tries to provide some insights into currently available reasoning approaches and aims at identifying requirements to make future benchmarks more useful for application developers.
47 citations
•
25 Apr 1995TL;DR: In this paper, the authors proposed a transmission power control method in CDMA, which is capable of increasing the capacity in terms of the number of subscribers by reducing transmission power by achieving highly accurate TC during a soft handoff.
Abstract: A transmission power control method in CDMA, which is capable of increasing the capacity in terms of the number of subscribes by reducing transmission power by achieving highly accurate transmission power control during a soft handoff. A mobile station (PS1) determines its transmission power during the soft handoff by comparing a transmission power control bit from the old base station (BS1) with that from a new base station (BS2), and by selecting the transmission power control bit that indicates lower transmission power of the mobile station (PS1). In addition, the mobile station (PS1) determines the transmission power control bit for the base stations (BS1,BS2) by comparing the received SIR from the old base station (BS1) with that from the new base station (BS2), and by selecting the greater received SIR. This make it possible to reduce the transmission power, and increase the capacity in terms of the number of subscribers.
47 citations
•
02 Mar 2009TL;DR: In this paper, a femtocell increases efficiency and coverage of a macrocellular network operating in a co-channel manner within the macrocell spectrum by selecting subcarriers for its mobile station using both the subcarrier allocation map received from the macrocells and a spectrum sensing operation.
Abstract: A femtocell increases efficiency and coverage of a macrocellular network operating in a co-channel manner within the macrocell spectrum by selecting subcarriers for its mobile station using both the subcarrier allocation map received from the macrocell and a spectrum sensing operation. Interference is avoided by selecting only subcarriers not allocated by the macrocell and subcarriers allocated to users not nearby to the femtocell. Interference is eliminated from the received signals using co-channel interference avoidance techniques. Selection of subcarriers for femtocell use may take into consideration inter-carrier interference detected.
47 citations
••
07 Nov 2005TL;DR: A new technique for the design of PAKE protocols that does not fall into any of the Diffie-Hellman or RSA paradigms, and which is based on a different assumption.
Abstract: Existing techniques for designing efficient password authenticated key exchange (PAKE) protocols all can be viewed as variations of a small number of fundamental paradigms, and all are based on either the Diffie-Hellman or RSA assumptions. In this paper we propose a new technique for the design of PAKE protocols that does not fall into any of those paradigms, and which is based on a different assumption. In our technique, the server uses the password to construct a multiplicative group with a (hidden) smooth order subgroup, where the group order depends on the password. The client uses its knowledge of the password to generate a root extraction problem instance in the server's group and a discrete logarithm problem instance in the (smooth order) subgroup. If the server constructed its group correctly based on the password, the server can use its knowledge of the group order to solve the root extraction problem, and can solve the discrete logarithm problem by leveraging the smoothness of the hidden subgroup.The resulting scheme is provably secure (in the random oracle model) under the "decision subgroup assumption." The scheme can be efficiently instantiated using composite modulus groups, in which case the client and server each perform the equivalent of a small number of modular exponentiations, and the security reduces to a simple variant of the "Φ-hiding" assumption. We provide preliminary implementation results of this instantiation.
47 citations
Authors
Showing all 4032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Amit P. Sheth | 101 | 753 | 42655 |
Harald Haas | 85 | 750 | 34927 |
Giuseppe Caire | 82 | 825 | 40344 |
Craig Gentry | 75 | 222 | 39327 |
Raj Jain | 64 | 424 | 30018 |
Karl Aberer | 63 | 554 | 17392 |
Fumiyuki Adachi | 54 | 1010 | 15344 |
Ismail Guvenc | 52 | 451 | 13893 |
Frank Piessens | 52 | 391 | 10381 |
Wolfgang Kellerer | 49 | 502 | 9383 |
Yoshihisa Kishiyama | 48 | 379 | 11831 |
Ravi Jain | 48 | 160 | 7467 |
Josef A. Nossek | 48 | 623 | 10377 |
Tadao Nagatsuma | 47 | 430 | 11117 |
Christian Bettstetter | 46 | 204 | 11051 |