Institution
NTT DoCoMo
About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.
Topics: Base station, Mobile station, Transmission (telecommunications), Base station identity code, Terminal (electronics)
Papers published on a yearly basis
Papers
More filters
•
09 May 2011TL;DR: In this article, a communication terminal transmits request information for requesting a setting input screen, and an information processing device recognizes character information contained in the request information, and, by referring to history information, identifies location information corresponding to character information similar to the recognized character information.
Abstract: In an information-providing system according to an embodiment of the present invention, when a communication terminal transmits request information for requesting a setting input screen, an information-processing device recognizes character information contained in the request information, and, by referring to history information, identifies location information corresponding to character information similar to the recognized character information The location information identified by the information-processing device is received by the communication terminal, and this information is reflected on a setting input screen displayed on the communication terminal As a result, when setting of a location where acquisition of notification information is desired is made using the communication terminal, a location in accordance with past history is displayed on the setting input screen, and thus, the user does not have to perform input for specifying a location, such input tending to be cumbersome, and effort and time can be reduced
139 citations
••
TL;DR: In this paper, the authors proposed a technique to convert a large class of existing honest-verifier zero-knowledge protocols into ones with stronger properties in the common reference string model, such as non-malleability and universal composability.
Abstract: Recently there has been an interest in zero-knowledge protocols with stronger properties, such as concurrency, simulation soundness, non-malleability, and universal composability. In this paper we show a novel technique to convert a large class of existing honest-verifier zero-knowledge protocols into ones with these stronger properties in the common reference string model. More precisely, our technique utilizes a signature scheme existentially unforgeable against adaptive chosen-message attacks, and transforms any Σ-protocol (which is honest-verifier zero-knowledge) into a simulation sound concurrent zero-knowledge protocol. We also introduce Ω-protocols, a variant of Σ-protocols for which our technique further achieves the properties of non-malleability and/or universal composability. In addition to its conceptual simplicity, a main advantage of this new technique over previous ones is that it avoids the Cook-Levin theorem, which tends to be rather inefficient. Indeed, our technique allows for very efficient instantiation based on the security of some efficient signature schemes and standard number-theoretic assumptions. For instance, one instantiation of our technique yields a universally composable zero-knowledge protocol under the Strong RSA assumption, incurring an overhead of a small constant number of exponentiations, plus the generation of two signatures.
139 citations
•
08 Nov 2006TL;DR: In this article, a static analysis of a script program based on a first safety policy is proposed to detect unsafe behavior of the scrip program and prevent execution of the program if a violation of the safety policy would occur when the script program is executed.
Abstract: A method and apparatus is disclosed herein for detecting and preventing unsafe behavior of script programs In one embodiment, a method comprises performing static analysis of a script program based on a first safety policy to detect unsafe behavior of the scrip program and preventing execution of the script program if a violation of the safety policy would occur when the script program is executed
138 citations
•
03 Jun 2005TL;DR: In this article, an adaptive precompensator based on the exact inverse of the Volterra model is presented, which adjusts the pre compensator parameters to minimize the instantaneous error between the input and the compensated output of the loudspeaker.
Abstract: To compensate for the distortions of the electro-acoustic conversion in small loudspeakers, the signal is passed through a predistortion filter placed between the audio signal source and the loudspeaker. Volterra based predistortion filters are generally used to compensate for loudspeaker nonlinear distortions. At high playback levels, Volterra preinverse may not improve the perceptual quality. An adaptive precompensator based on the exact inverse of the Volterra model is presented. The technique adjusts the precompensator parameters to minimize the instantaneous error between the input and the compensated output of the loudspeaker. The exact inverse has superior performance at high playback levels resulting in higher perceptual quality.
137 citations
•
15 Dec 2000TL;DR: In this article, the authors present a method and system for implementing migration of an application among heterogeneous devices by examining the application running on a source device and the hardware configuration of the target device by selecting at least one component from each set that fits to run on the target devices.
Abstract: The present invention provides a method and system for implementing migration of an application among heterogeneous devices. An application consists of sets of one or more component. The application running on a source device and the hardware configuration of the target device are examined to port the application to the target device by selecting at least one component from each set that fits to run on the target device. The running state of the application that exits on the source device is captured and sent to the target device. The target device loads the ported application and instantiates it, using the captured running state of the application.
136 citations
Authors
Showing all 4032 results
Name | H-index | Papers | Citations |
---|---|---|---|
Amit P. Sheth | 101 | 753 | 42655 |
Harald Haas | 85 | 750 | 34927 |
Giuseppe Caire | 82 | 825 | 40344 |
Craig Gentry | 75 | 222 | 39327 |
Raj Jain | 64 | 424 | 30018 |
Karl Aberer | 63 | 554 | 17392 |
Fumiyuki Adachi | 54 | 1010 | 15344 |
Ismail Guvenc | 52 | 451 | 13893 |
Frank Piessens | 52 | 391 | 10381 |
Wolfgang Kellerer | 49 | 502 | 9383 |
Yoshihisa Kishiyama | 48 | 379 | 11831 |
Ravi Jain | 48 | 160 | 7467 |
Josef A. Nossek | 48 | 623 | 10377 |
Tadao Nagatsuma | 47 | 430 | 11117 |
Christian Bettstetter | 46 | 204 | 11051 |