scispace - formally typeset
Search or ask a question
Institution

NTT DoCoMo

About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.


Papers
More filters
Patent
09 May 2011
TL;DR: In this article, a communication terminal transmits request information for requesting a setting input screen, and an information processing device recognizes character information contained in the request information, and, by referring to history information, identifies location information corresponding to character information similar to the recognized character information.
Abstract: In an information-providing system according to an embodiment of the present invention, when a communication terminal transmits request information for requesting a setting input screen, an information-processing device recognizes character information contained in the request information, and, by referring to history information, identifies location information corresponding to character information similar to the recognized character information The location information identified by the information-processing device is received by the communication terminal, and this information is reflected on a setting input screen displayed on the communication terminal As a result, when setting of a location where acquisition of notification information is desired is made using the communication terminal, a location in accordance with past history is displayed on the setting input screen, and thus, the user does not have to perform input for specifying a location, such input tending to be cumbersome, and effort and time can be reduced

139 citations

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a technique to convert a large class of existing honest-verifier zero-knowledge protocols into ones with stronger properties in the common reference string model, such as non-malleability and universal composability.
Abstract: Recently there has been an interest in zero-knowledge protocols with stronger properties, such as concurrency, simulation soundness, non-malleability, and universal composability. In this paper we show a novel technique to convert a large class of existing honest-verifier zero-knowledge protocols into ones with these stronger properties in the common reference string model. More precisely, our technique utilizes a signature scheme existentially unforgeable against adaptive chosen-message attacks, and transforms any Σ-protocol (which is honest-verifier zero-knowledge) into a simulation sound concurrent zero-knowledge protocol. We also introduce Ω-protocols, a variant of Σ-protocols for which our technique further achieves the properties of non-malleability and/or universal composability. In addition to its conceptual simplicity, a main advantage of this new technique over previous ones is that it avoids the Cook-Levin theorem, which tends to be rather inefficient. Indeed, our technique allows for very efficient instantiation based on the security of some efficient signature schemes and standard number-theoretic assumptions. For instance, one instantiation of our technique yields a universally composable zero-knowledge protocol under the Strong RSA assumption, incurring an overhead of a small constant number of exponentiations, plus the generation of two signatures.

139 citations

Patent
Ajay Chander1, Dachuan Yu1
08 Nov 2006
TL;DR: In this article, a static analysis of a script program based on a first safety policy is proposed to detect unsafe behavior of the scrip program and prevent execution of the program if a violation of the safety policy would occur when the script program is executed.
Abstract: A method and apparatus is disclosed herein for detecting and preventing unsafe behavior of script programs In one embodiment, a method comprises performing static analysis of a script program based on a first safety policy to detect unsafe behavior of the scrip program and preventing execution of the script program if a violation of the safety policy would occur when the script program is executed

138 citations

Patent
Khosrow Lashkari1
03 Jun 2005
TL;DR: In this article, an adaptive precompensator based on the exact inverse of the Volterra model is presented, which adjusts the pre compensator parameters to minimize the instantaneous error between the input and the compensated output of the loudspeaker.
Abstract: To compensate for the distortions of the electro-acoustic conversion in small loudspeakers, the signal is passed through a predistortion filter placed between the audio signal source and the loudspeaker. Volterra based predistortion filters are generally used to compensate for loudspeaker nonlinear distortions. At high playback levels, Volterra preinverse may not improve the perceptual quality. An adaptive precompensator based on the exact inverse of the Volterra model is presented. The technique adjusts the precompensator parameters to minimize the instantaneous error between the input and the compensated output of the loudspeaker. The exact inverse has superior performance at high playback levels resulting in higher perceptual quality.

137 citations

Patent
Hao-Hua Chu1, Shoji Kurakake1
15 Dec 2000
TL;DR: In this article, the authors present a method and system for implementing migration of an application among heterogeneous devices by examining the application running on a source device and the hardware configuration of the target device by selecting at least one component from each set that fits to run on the target devices.
Abstract: The present invention provides a method and system for implementing migration of an application among heterogeneous devices. An application consists of sets of one or more component. The application running on a source device and the hardware configuration of the target device are examined to port the application to the target device by selecting at least one component from each set that fits to run on the target device. The running state of the application that exits on the source device is captured and sent to the target device. The target device loads the ported application and instantiates it, using the captured running state of the application.

136 citations


Authors

Showing all 4032 results

NameH-indexPapersCitations
Amit P. Sheth10175342655
Harald Haas8575034927
Giuseppe Caire8282540344
Craig Gentry7522239327
Raj Jain6442430018
Karl Aberer6355417392
Fumiyuki Adachi54101015344
Ismail Guvenc5245113893
Frank Piessens5239110381
Wolfgang Kellerer495029383
Yoshihisa Kishiyama4837911831
Ravi Jain481607467
Josef A. Nossek4862310377
Tadao Nagatsuma4743011117
Christian Bettstetter4620411051
Network Information
Related Institutions (5)
Ericsson
35.3K papers, 584.5K citations

93% related

Nokia
28.3K papers, 695.7K citations

92% related

Qualcomm
38.4K papers, 804.6K citations

88% related

Cisco Systems, Inc.
18.9K papers, 471.2K citations

86% related

Nippon Telegraph and Telephone
22.3K papers, 430.4K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202164
2020143
2019240
2018269
2017193
2016173