Institution
Panasonic
Company•Kadoma, Ôsaka, Japan•
About: Panasonic is a company organization based out in Kadoma, Ôsaka, Japan. It is known for research contribution in the topics: Signal & Layer (electronics). The organization has 49129 authors who have published 71118 publications receiving 942756 citations. The organization is also known as: Panasonikku Kabushiki-gaisha & Panasonic.
Papers published on a yearly basis
Papers
More filters
•
26 Aug 2003TL;DR: In this article, an authentication system providing a safety authentication process of electronic values with the use of mobile terminals which do not have a tamper-resistant function is presented. But the authentication system is not suitable for mobile terminals.
Abstract: An authentication system providing a safety authentication process of electronic values with the use of mobile terminals which do not have a tamper-resistant function. The electronic value including encrypted value authentication information (F(VPW)), wherein an authentication information (VPW) corresponding to an electronic value specified by a user is acquired by the hash calculation, is stored in user's mobile terminal. In the user authentication process; authentication apparatus generates a random number R and transmits it to mobile terminal, mobile terminal generates value authentication information (F(VPW′)) from authentication information (VPW′) corresponding to electronic value input by user, further executes a hash calculation on data wherein value authentication information (F(VPW′)) and the random number R are concatenated, generates authentication information (F(VPW′)∥R), transmits it to the authentication apparatus with the electronic value, authentication apparatus decrypts the received electronic value, extracts the value authentication information (F(VPW)) from the electronic value, executes the hash calculation on data wherein value authentication information (F(VPW)) and the random number R are concatenated, generates the authentication information (F(VPW)∥R), and collates the received authentication information (F(VPW′)∥R) with the authentication information (F(VPW)∥R), so that the user is authenticated.
135 citations
•
[...]
TL;DR: In this article, a controller executes local generation and local consumption pathways of: supplying power from a solar cell to an appliance, and charging a storage cell with power that remains after subtracting power consumed by the appliance from the solar cell power.
Abstract: A controller executes local generation and local consumption pathways of: supplying power from a solar cell to an appliance, and charging a storage cell with power that remains after subtracting power consumed by the appliance from the solar cell power. In the absence of excess power, the storage cell and solar cell supply power. Power supply from a commercial electrical grid covers a power shortage that remains after subtracting solar cell power and storage cell power from the power consumed by the appliance. The controller also executes a second excess power selling mode pathway wherein excess power flows into the commercial electrical grid, and an assist mode wherein all solar cell power flows into the commercial electrical grid, and storage cell power flows to the appliance.
135 citations
•
28 Jul 1999TL;DR: In this paper, the authors propose a multi-media file system for conmmunicating information between a client and a network storage device over a network. But the file system is not suitable for multi-modal applications.
Abstract: A multi-media file system for conmmunicating information between a multi-media client and a network storage device over a network. The file system includes a cluster that comprises one cluster manager and at least one file manager with each network storage device. The cluster manager is located on a client, includes an admission controller for controlling the admission of a request from a client for a file operation upon a selected file. A network bandwidth request from the admission controller is responded to by a network status determiner included in the cluster manager. The network status determiner determines the available network bandwidth. Each file manager is located on one of the clients. The file managers manage file maintenance procedures of corresponding files located on the network storage device. Each file manager includes a disk status determiner for determining the available disk bandwidth. The disk status determiner responds to a request from the admission controller.
135 citations
•
14 Feb 2008TL;DR: In this paper, a semiconductor memory device includes: a transistor formed in a substrate, a capacitor formed above one of source/drain regions of the transistor, a bit line formed above the substrate and extending in the gate length direction of the transistors, a first conductive plug connecting one of the source/drains regions and the capacitor, a second connective plug connected to the other source/rain region that is not connected to firstconductive plug, and a third conductive Plug formed on the second conductive plugs and connected to bit line.
Abstract: A semiconductor memory device includes: a transistor formed in a substrate; a capacitor formed above one of source/drain regions of the transistor; a bit line formed above the substrate and extending in the gate length direction of the transistor; a first conductive plug connecting one of the source/drain regions and the capacitor; a second conductive plug connected to the other source/drain region that is not connected to the first conductive plug; and a third conductive plug formed on the second conductive plug and connected to the bit line. The central axis of the third conductive plug is displaced from the central axis of the second conductive plug in the gate width direction of the transistor.
135 citations
•
23 Jun 2010TL;DR: In this paper, the authors present a data exchange processing apparatus that includes a cryptographic engine unit performing cryptographic processing and verification processing, a stream control unit outputting content while processing cryptographic processing of the content using the cryptographic engine units, and an unauthorized device list update unit verifying the list of unauthorized devices.
Abstract: The data exchange processing apparatus pertaining to the present invention includes a cryptographic engine unit performing cryptographic processing and verification processing, a stream control unit outputting content while performing cryptographic processing of the content using the cryptographic engine unit, an unauthorized device list update unit verifying an unauthorized device list using the cryptographic engine unit, and a state management unit outputting a permission notification to the unauthorized device list update unit when detecting a low load section of the content according to metadata of the content and processing position of the stream control unit, the low load section being a section in which processing load on the cryptographic engine unit is lower than in other sections. The unauthorized device list update unit, when receiving the permission notification from the state management unit, causes the cryptographic engine unit to execute verification processing of the unauthorized device list.
135 citations
Authors
Showing all 49132 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yang Yang | 171 | 2644 | 153049 |
Hideo Hosono | 128 | 1549 | 100279 |
Shuicheng Yan | 123 | 810 | 66192 |
Akira Yamamoto | 117 | 1999 | 74961 |
Adam Heller | 111 | 381 | 41063 |
Tadashi Kokubo | 104 | 557 | 49042 |
Masatoshi Kudo | 100 | 1324 | 53482 |
Héctor D. Abruña | 98 | 585 | 38995 |
Duong Nguyen | 98 | 674 | 47332 |
Henning Sirringhaus | 96 | 467 | 50846 |
Chao Yang Wang | 95 | 307 | 26857 |
George G. Malliaras | 94 | 382 | 28533 |
Masaki Takata | 90 | 594 | 28478 |
Darrell G. Schlom | 88 | 641 | 41470 |
Thomas A. Moore | 87 | 437 | 30666 |