scispace - formally typeset
Search or ask a question
Institution

NTT DoCoMo

About: NTT DoCoMo is a based out in . It is known for research contribution in the topics: Base station & Mobile station. The organization has 4032 authors who have published 8655 publications receiving 160533 citations.


Papers
More filters
Patent
21 Apr 2011
TL;DR: In this article, the authors proposed a PHICH resource allocation for a response signal of retransmission in response to a signal in which a plurality of layers are space-multiplexed in an uplink, and the base station apparatus further can support the next generation mobile communication system.
Abstract: This invention is directed to provision of a base station apparatus, a mobile terminal apparatus and a communication control method. The base station apparatus can appropriately allocate a resource of a response signal of retransmission in response to a signal in which a plurality of layers are space-multiplexed in an uplink, and the base station apparatus further can support the next generation mobile communication system. The base station apparatus receives, from a mobile terminal apparatus (10), a signal in which a plurality of layers are space-multiplexed in an uplink; generates an ACK/NACK of HARQ for the signal received in each layer of the uplink; and uses an offset value, which has fixedly been specified between the base station apparatus and the mobile terminal apparatus (10) for each layer of the uplink, to allocate, to PHICH resource, the ACK/NACK of HARQ of a transport block related to each layer.

93 citations

Patent
02 Nov 2000
TL;DR: In this article, a timeslot selection method for uplink and downlink timeslot assignment is presented. And a time-slot assignment method for a service class included in a QoS request is provided, in which assignment is carried out according to a service classes included in the request.
Abstract: A timeslot selection method is provided The timeslot selection method includes the steps of: obtaining a propagation loss; receiving an occupation state and an interference amount of an uplink timeslot; obtaining a desired wave power from the propagation loss; obtaining a ratio between the desired wave power and the propagation loss for the uplink timeslot in which the occupation state is idle; and selecting the transmitting timeslot by using the ratio In addition, a timeslot assignment method in which there are a plurality of TDD boundaries each of which is a boundary between at least an uplink timeslot and at least a downlink timeslot in a frame is provided Furthermore, a timeslot assignment method is provided, in which assignment is carried out according to a service class included in a QoS request

93 citations

Journal ArticleDOI
TL;DR: This work provides a parameterized linear power model which covers the individual aspects of a BS which are relevant for a power consumption analysis, especially the transmission bandwidth and the number of radio chains.
Abstract: Power models are needed to assess the power consumption of cellular base stations (BSs) on an abstract level. Currently available models are either too simplified to cover necessary aspects or overly complex. We provide a parameterized linear power model which covers the individual aspects of a BS which are relevant for a power consumption analysis, especially the transmission bandwidth and the number of radio chains. Details reflecting the underlying architecture are abstracted in favor of simplicity and applicability. We identify current power-saving techniques of cellular networks for which this model can be used. Furthermore, the parameter set of typical commercial BSs is provided and compared to the underlying complex model. The complex model is well approximated while only using a fraction of the input parameters.

92 citations

Book ChapterDOI
07 Jun 2005
TL;DR: This work shows here a two-server protocol for the important password-only setting (in which the user need remember only a password, and not the servers' public keys), and is the first provably-secure two- server protocol (in any setting) with a proof of security in the standard model.
Abstract: Typical protocols for password-based authentication assume a single server which stores all the information (e.g.), the password necessary to authenticate a user. Unfortunately, an inherent limitation of this approach (assuming low-entropy passwords are used) is that the user's password is exposed if this server is ever compromised. To address this issue, a number of schemes have been proposed in which a user's password information is shared among multiple servers, and these servers cooperate in a threshold manner when the user wants to authenticate. We show here a two-server protocol for this task assuming public parameters available to everyone in the system (as well as the adversary). Ours is the first provably-secure two-server protocol for the important password-only setting (in which the user need remember only a password, and not the servers' public keys), and is the first two-server protocol (in any setting) with a proof of security in the standard model.

92 citations

Patent
19 Aug 2008
TL;DR: In this article, a system, method and apparatus for media streaming is presented, which comprises one or more media servers to serve media content and a plurality of peers communicably coupled to other peers of the plurality.
Abstract: A system, method and apparatus are disclosed herein for media streaming. In one embodiment, the system comprises one or more media servers to serve media content and a plurality of peers communicably coupled to one or more other peers of the plurality of peers and at least one of the one or more media servers to receive segments of media content, where at least one of peers allocates a set of resources for serving the segments of media content including cache memory to store the segments and media files and uplink bandwidth to send the segments of media content to the one or more peers to which the one peer is communicably coupled. The system also includes a first control server to track media content demand and the allocated resources of the plurality of peers to determine which peer should cache which segment of the media file and to return peer location information specifying the one or more peer locations from which each peer is to receive each segment of each media content requested. The control server is operable to send the location information to each peer. In one embodiment, the one control server is also operable to calculate a utility of each caching option and enforce it by sending triggers to the peers to initiate the caching at those peers.

92 citations


Authors

Showing all 4032 results

NameH-indexPapersCitations
Amit P. Sheth10175342655
Harald Haas8575034927
Giuseppe Caire8282540344
Craig Gentry7522239327
Raj Jain6442430018
Karl Aberer6355417392
Fumiyuki Adachi54101015344
Ismail Guvenc5245113893
Frank Piessens5239110381
Wolfgang Kellerer495029383
Yoshihisa Kishiyama4837911831
Ravi Jain481607467
Josef A. Nossek4862310377
Tadao Nagatsuma4743011117
Christian Bettstetter4620411051
Network Information
Related Institutions (5)
Ericsson
35.3K papers, 584.5K citations

93% related

Nokia
28.3K papers, 695.7K citations

92% related

Qualcomm
38.4K papers, 804.6K citations

88% related

Cisco Systems, Inc.
18.9K papers, 471.2K citations

86% related

Nippon Telegraph and Telephone
22.3K papers, 430.4K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202164
2020143
2019240
2018269
2017193
2016173