scispace - formally typeset
Search or ask a question
Institution

Orange S.A.

CompanyParis, France
About: Orange S.A. is a company organization based out in Paris, France. It is known for research contribution in the topics: Terminal (electronics) & Signal. The organization has 6735 authors who have published 9190 publications receiving 156440 citations. The organization is also known as: Orange SA & France Télécom.


Papers
More filters
Patent
28 Apr 1995
TL;DR: In this article, a semiconductor opto-electronic device including at least one electronic function component and a mode transformer associated with the optical function component is described. And the mode transformer is preferably etched in the shape of an hourglass.
Abstract: A semiconductor opto-electronic device including at least one electronic function component (62), at least one optical function component (60) and a mode transformer associated with the optical function component. At least some layers of semiconductor material constituting the electronic function component also form optical layers in the mode transformer zone and, at least in the mode transformer zone, these semiconductor material layers are non-absorbent at the operating wavelength. The mode transformer is preferably etched in the shape of an hourglass.

35 citations

Patent
Adrian Duda1
09 Jun 2011
TL;DR: In this article, the authors propose to change traffic distribution by taking account of calculated target load reduction values in a radiocommunication network, depending on an excess value between a current load of the given primary node and a primary node load threshold.
Abstract: A radiocommunication network includes a core network including primary and secondary nodes and a radio access network including radio controllers. Each primary node connects at least one secondary node, and each secondary node connects at least one radio controller via respective links. In relation to a given primary node, at least one entity in the radiocommunication network calculates respective target load reduction values for the links connecting the given primary node and secondary nodes, depending on an excess value between a current load of the given primary node and a primary node load threshold, and calculates respective target load reduction values for the links connecting said secondary nodes connected to the given primary node and radio controllers, depending on calculated target load reduction values. Actions are taken for changing traffic distribution by taking account of calculated target load reduction values.

35 citations

Journal ArticleDOI
TL;DR: This paper addresses the issue of advanced equalization methods for space-time communications over multiple-input multiple-output block fading channel with intersymbol interference with a different point of view, and separate time equalization from space equalization, thus introducing a higher degree of freedom in the overall space- time equalizer design.
Abstract: This paper addresses the issue of advanced equalization methods for space-time communications over multiple-input multiple-output block fading channel with intersymbol interference. Instead of resorting to conventional multiuser detection techniques (based on the straightforward analogy between antennas and users), we adopt a different point of view, and separate time equalization from space equalization, thus introducing a higher degree of freedom in the overall space-time equalizer design. Time-domain equalization relies on minimum mean-square error criterion and operates on multidimensional modulation symbols, whose individual components can be detected in accordance with another criterion. In particular, when the optimum maximum a posteriori criterion is chosen, substantial performance gains over conventional space-time turbo equalization have been observed for different transmission scenarios, at the price of an increased, albeit manageable, computational complexity.

35 citations

Book ChapterDOI
02 Jul 2007
TL;DR: A new hash function MQ-HASH is described that depends for its security on the difficulty of solving randomly drawn systems of multivariate equations over a finite field and offers an intriguing companion proposal to the provably collision-free hash function VSH.
Abstract: Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function MQ-HASH that depends for its security on the difficulty of solving randomly drawn systems of multivariate equations over a finite field. While provably achieving pre-image resistance for a hash function based on multivariate equations is relatively easy, naive constructions using multivariate equations are susceptible to collision attacks. In this paper, therefore, we describe a mechanism--also using multivariate quadratic polynomials--yielding the collision-free property we seek while retaining provable pre-image resistance. Therefore, MQ-HASH offers an intriguing companion proposal to the provably collision-free hash function VSH.

35 citations

Journal ArticleDOI
01 Jan 2006
TL;DR: A comparative analysis of Internet navigation traces (URLs versus keywords) to characterize individual or group-of-users' behavior when accessing the Web is presented and proposed models based on the study of accesses redundancy seen as global static parameters and from the angle of time evolution are studied.
Abstract: With an ever-increasing emphasis on human activity (idea exchange, shopping, gaming, etc.) being mediated through the data network, the understanding of Internet users' behavior has become a rising challenge. Research dealing with the analysis and modeling of Internet user behavior can be roughly split in to two main approaches. The first is based on sociocognitive observation of users' practices in a standardized context. The second approach focuses on the analysis of productions and the traces of users' activity. This paper relates to the latter approach and presents a comparative analysis of Internet navigation traces (URLs versus keywords) to characterize individual or group-of-users' behavior when accessing the Web. The proposed models are based on the study of accesses redundancy seen as global static parameters and from the angle of time evolution. We also study the use of these models, in particular, to categorize a population of users in communities of interests. This study enables us to draw some conclusions on the compared performances of the two kinds of trace exploitation, as raw information, as well as the self-similar properties of the models.

35 citations


Authors

Showing all 6762 results

NameH-indexPapersCitations
Patrick O. Brown183755200985
Martin Vetterli10576157825
Samy Bengio9539056904
Aristide Lemaître7571222029
Ifor D. W. Samuel7460523151
Mischa Dohler6835519614
Isabelle Sagnes6775318178
Jean-Jacques Quisquater6533518234
David Pointcheval6429819538
Emmanuel Dupoux6326714315
David Gesbert6345624569
Yonghui Li6269715441
Sergei K. Turitsyn6172214063
Joseph Zyss6143417888
Jean-Michel Gérard5842114896
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

92% related

Fujitsu
75K papers, 827.5K citations

90% related

Bell Labs
59.8K papers, 3.1M citations

89% related

NEC
57.6K papers, 835.9K citations

89% related

Hewlett-Packard
59.8K papers, 1.4M citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20238
20225
20215
20205
201915
201814