scispace - formally typeset
Search or ask a question
Institution

NTT DoCoMo

About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.


Papers
More filters
Patent
Igarashi Ken1, Watanabe Yugo1
27 May 2003
TL;DR: In this article, a relay router multicasts a router advertisement to access routers forming respective cells into which a target mobile terminal might move, and then the mobile terminal transmits delay information of a delay to be added to each path in multicasting by the relay router.
Abstract: The object is to prevent occurrence of packet loss in Cellular IP and a drop of TCP throughput due to duplication of packets. On the occasion of relaying a packet from correspondent, a relay router multicasts a router advertisement to access routers forming respective cells into which a target mobile terminal might move. The mobile terminal receives the router advertisements from the neighbor access routers, calculates a difference between reception times of the packets from the respective access routers, and specifies a relay router to perform multicasting. Then the mobile terminal transmits delay information of a delay to be added to each path in multicasting by the relay router, to the relay router thus specified. The relay router adds the delay to each path in multicasting on the basis of the delay information.

47 citations

Book ChapterDOI
03 Jun 2007
TL;DR: This paper tries to provide some insights into currently available reasoning approaches and aims at identifying requirements to make future benchmarks more useful for application developers.
Abstract: This work is motivated by experiences in the course of developing an ontology-based application within a real-world setting. We found out that current benchmarks are not well suited to provide helpful hints for users who seek for an appropriate reasoning system able to deal with expressive terminological descriptions, large volumes of assertional data, and frequent updates in a sound and complete way. This paper tries to provide some insights into currently available reasoning approaches and aims at identifying requirements to make future benchmarks more useful for application developers.

47 citations

Patent
Tomohiro Dohi1, Koji Ohno1, Mamoru Sawahashi1, Akihiro Higashi1, Narumi Umeda1 
25 Apr 1995
TL;DR: In this paper, the authors proposed a transmission power control method in CDMA, which is capable of increasing the capacity in terms of the number of subscribers by reducing transmission power by achieving highly accurate TC during a soft handoff.
Abstract: A transmission power control method in CDMA, which is capable of increasing the capacity in terms of the number of subscribes by reducing transmission power by achieving highly accurate transmission power control during a soft handoff. A mobile station (PS1) determines its transmission power during the soft handoff by comparing a transmission power control bit from the old base station (BS1) with that from a new base station (BS2), and by selecting the transmission power control bit that indicates lower transmission power of the mobile station (PS1). In addition, the mobile station (PS1) determines the transmission power control bit for the base stations (BS1,BS2) by comparing the received SIR from the old base station (BS1) with that from the new base station (BS2), and by selecting the greater received SIR. This make it possible to reduce the transmission power, and increase the capacity in terms of the number of subscribers.

47 citations

Patent
02 Mar 2009
TL;DR: In this paper, a femtocell increases efficiency and coverage of a macrocellular network operating in a co-channel manner within the macrocell spectrum by selecting subcarriers for its mobile station using both the subcarrier allocation map received from the macrocells and a spectrum sensing operation.
Abstract: A femtocell increases efficiency and coverage of a macrocellular network operating in a co-channel manner within the macrocell spectrum by selecting subcarriers for its mobile station using both the subcarrier allocation map received from the macrocell and a spectrum sensing operation. Interference is avoided by selecting only subcarriers not allocated by the macrocell and subcarriers allocated to users not nearby to the femtocell. Interference is eliminated from the received signals using co-channel interference avoidance techniques. Selection of subcarriers for femtocell use may take into consideration inter-carrier interference detected.

47 citations

Proceedings ArticleDOI
07 Nov 2005
TL;DR: A new technique for the design of PAKE protocols that does not fall into any of the Diffie-Hellman or RSA paradigms, and which is based on a different assumption.
Abstract: Existing techniques for designing efficient password authenticated key exchange (PAKE) protocols all can be viewed as variations of a small number of fundamental paradigms, and all are based on either the Diffie-Hellman or RSA assumptions. In this paper we propose a new technique for the design of PAKE protocols that does not fall into any of those paradigms, and which is based on a different assumption. In our technique, the server uses the password to construct a multiplicative group with a (hidden) smooth order subgroup, where the group order depends on the password. The client uses its knowledge of the password to generate a root extraction problem instance in the server's group and a discrete logarithm problem instance in the (smooth order) subgroup. If the server constructed its group correctly based on the password, the server can use its knowledge of the group order to solve the root extraction problem, and can solve the discrete logarithm problem by leveraging the smoothness of the hidden subgroup.The resulting scheme is provably secure (in the random oracle model) under the "decision subgroup assumption." The scheme can be efficiently instantiated using composite modulus groups, in which case the client and server each perform the equivalent of a small number of modular exponentiations, and the security reduces to a simple variant of the "Φ-hiding" assumption. We provide preliminary implementation results of this instantiation.

47 citations


Authors

Showing all 4032 results

NameH-indexPapersCitations
Amit P. Sheth10175342655
Harald Haas8575034927
Giuseppe Caire8282540344
Craig Gentry7522239327
Raj Jain6442430018
Karl Aberer6355417392
Fumiyuki Adachi54101015344
Ismail Guvenc5245113893
Frank Piessens5239110381
Wolfgang Kellerer495029383
Yoshihisa Kishiyama4837911831
Ravi Jain481607467
Josef A. Nossek4862310377
Tadao Nagatsuma4743011117
Christian Bettstetter4620411051
Network Information
Related Institutions (5)
Ericsson
35.3K papers, 584.5K citations

93% related

Nokia
28.3K papers, 695.7K citations

92% related

Qualcomm
38.4K papers, 804.6K citations

88% related

Cisco Systems, Inc.
18.9K papers, 471.2K citations

86% related

Nippon Telegraph and Telephone
22.3K papers, 430.4K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202164
2020143
2019240
2018269
2017193
2016173