scispace - formally typeset
Search or ask a question
Institution

Qualcomm

CompanyFarnborough, United Kingdom
About: Qualcomm is a company organization based out in Farnborough, United Kingdom. It is known for research contribution in the topics: Wireless & Signal. The organization has 19408 authors who have published 38405 publications receiving 804693 citations. The organization is also known as: Qualcomm Incorporated & Qualcomm, Inc..


Papers
More filters
Journal ArticleDOI
TL;DR: Energy-efficiency improvements in core networks obtained as a result of work carried out by the GreenTouch consortium over a five-year period are discussed and an experimental demonstration that illustrates the feasibility of energy-efficient content distribution in IP/WDM networks is implemented.
Abstract: In this paper, we discuss energy-efficiency improvements in core networks obtained as a result of work carried out by the GreenTouch consortium over a five-year period A number of techniques that yield substantial energy savings in core networks were introduced, including (i) the use of improved network components with lower power consumption, (ii) putting idle components into sleep mode, (iii) optically bypassing intermediate routers, (iv) the use of mixed line rates, (v) placing resources for protection into a low power state when idle, (vi) optimization of the network physical topology, and (vii) the optimization of distributed clouds for content distribution and network equipment virtualization These techniques are recommended as the main energy-efficiency improvement measures for 2020 core networks A mixed integer linear programming optimization model combining all the aforementioned techniques was built to minimize energy consumption in the core network We consider group 1 nations' traffic and place this traffic on a US continental network represented by the AT&T network topology The projections of the 2020 equipment power consumption are based on two scenarios: a business as usual (BAU) scenario and a GreenTouch (GT) (ie, BAU + GT) scenario The results show that the 2020 BAU scenario improves the network energy efficiency by a factor of 423 x compared with the 2010 network as a result of the reduction in the network equipment power consumption Considering the 2020 BAU + GT network, the network equipment improvements alone reduce network power by a factor of 20 x compared with the 2010 network Including of all the BAU + GT energy-efficiency techniques yields a total energy efficiency improvement of 315× We have also implemented an experimental demonstration that illustrates the feasibility of energy-efficient content distribution in IP/WDM networks

156 citations

Book ChapterDOI
15 Aug 2004
TL;DR: In this paper, it was shown that all functions of degree d satisfy a common, function-independent linear combination that may be used in the pre-computation step of the fast algebraic attack.
Abstract: Recently proposed algebraic attacks [2,6] and fast algebraic attacks [1,5] have provided the best analyses against some deployed LFSR-based ciphers. The process complexity is exponential in the degree of the equations. Fast algebraic attacks were introduced [5] as a way of reducing run-time complexity by reducing the degree of the system of equations. Previous reports on fast algebraic attacks [1,5] have underestimated the complexity of substituting the keystream into the system of equations, which in some cases dominates the attack. We also show how the Fast Fourier Transform (FFT) [4] can be applied to decrease the complexity of the substitution step. Finally, it is shown that all functions of degree d satisfy a common, function-independent linear combination that may be used in the pre-computation step of the fast algebraic attack. An explicit factorization of the corresponding characteristic polynomial yields the fastest known method for performing the pre-computation step.

156 citations

Journal ArticleDOI
Ji Zhu1, K.J.R. Liu1
TL;DR: This paper proposes a pricing-based collusion-resistant dynamic spectrum allocation approach to optimize overall spectrum efficiency, while not only keeping the participating incentives of the selfish users but also combating possible user collusion.
Abstract: In order to fully utilize scarce spectrum resources, dynamic spectrum allocation becomes a promising approach to increase the spectrum efficiency for wireless networks. However, the collusion among selfish network users may seriously deteriorate the efficiency of dynamic spectrum sharing. The network users' behaviors and dynamics need to be taken into consideration for efficient and robust spectrum allocation. In this paper, we model the spectrum allocation in wireless networks with multiple selfish legacy spectrum holders and unlicensed users as multi-stage dynamic games. In order to combat user collusion, we propose a pricing-based collusion-resistant dynamic spectrum allocation approach to optimize overall spectrum efficiency, while not only keeping the participating incentives of the selfish users but also combating possible user collusion. The simulation results show that the proposed scheme achieves high efficiency of spectrum usage even with the presence of severe user collusion.

156 citations

Patent
13 Oct 2010
TL;DR: In this paper, an adaptive stream manager monitors at least one parameter of a user terminal and predicts a future value of the user terminal, and requests a multimedia segment having the target characteristic from a media server.
Abstract: A method, system, and computer program for adaptively streaming multimedia content is disclosed. An adaptive stream manager monitors at least one parameter of a user terminal. The adaptive stream manager monitors at least one parameter of the user terminal and predicting a future value of at least one parameter of the user terminal. The adaptive stream manager also selects a target characteristic, based on the predicted future value of the at least one parameter of the user terminal, and requests a multimedia segment having the target characteristic from a media server.

156 citations

Patent
21 Nov 2014
TL;DR: In this article, a mobile computing device is operated to control a vehicle and a digital key for accessing a vehicle is stored for accessing the vehicle in order to configure operation and/or use of a vehicle.
Abstract: A mobile computing device is operated to control a vehicle. A digital key for accessing a vehicle is stored for accessing the vehicle. Profile information is associated with the digital key for configuring operation and/or use of a vehicle. The profile information may include one or more outside parameters for implementing one or more pre-entry vehicle configurations. When one or more proximity conditions are detected as being satisfied as between the mobile computing device and the vehicle, a communication is sent to the vehicle in order to cause the vehicle to implement one or more pre-entry vehicle configurations. The communication can be based on the digital key and may specify the one or more outside parameters.

156 citations


Authors

Showing all 19413 results

NameH-indexPapersCitations
Jian Yang1421818111166
Xiaodong Wang1351573117552
Jeffrey G. Andrews11056263334
Martin Vetterli10576157825
Vinod Menon10126960241
Michael I. Miller9259934915
David Tse9243867248
Kannan Ramchandran9159234845
Michael Luby8928234894
Max Welling8944164602
R. Srikant8443226439
Jiaya Jia8029433545
Hai Li7957033848
Simon Haykin7745462085
Christopher W. Bielawski7633432512
Network Information
Related Institutions (5)
Intel
68.8K papers, 1.6M citations

92% related

Motorola
38.2K papers, 968.7K citations

89% related

Samsung
163.6K papers, 2M citations

88% related

NEC
57.6K papers, 835.9K citations

87% related

Texas Instruments
39.2K papers, 751.8K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20229
20211,188
20202,266
20192,224
20182,124
20171,477