Institution
Qualcomm
Company•Farnborough, United Kingdom•
About: Qualcomm is a company organization based out in Farnborough, United Kingdom. It is known for research contribution in the topics: Wireless & Signal. The organization has 19408 authors who have published 38405 publications receiving 804693 citations. The organization is also known as: Qualcomm Incorporated & Qualcomm, Inc..
Papers published on a yearly basis
Papers
More filters
•
24 Feb 2004TL;DR: In this paper, a cellular network may provide an advertisement for a WLAN, such as in an overhead signaling message, and the advertisement may identify the Access Point(s) by an Extended Service Set Identifier (ESSID), the remote station may then scan for the WLAN service automatically or manually.
Abstract: Method and apparatus for detection and selection of Wireless Local Area Network (WLAN) service. A cellular network may provide an advertisement for a WLAN, such as in an overhead signaling message. The advertisement may identify the Access Point(s) by an Extended Service Set Identifier (ESSID). The remote station may then scan for the WLAN service automatically or manually.
487 citations
•
29 Mar 2012TL;DR: In this article, a head mounted device provides an immersive virtual or augmented reality experience for viewing data and enabling collaboration among multiple users, which includes capturing an image and spatial data with a body mounted camera and sensor array, and displaying a virtual object such that the virtual object appears anchored to the selected first anchor surface.
Abstract: A head mounted device provides an immersive virtual or augmented reality experience for viewing data and enabling collaboration among multiple users. Rendering images in a virtual or augmented reality system may include capturing an image and spatial data with a body mounted camera and sensor array, receiving an input indicating a first anchor surface, calculating parameters with respect to the body mounted camera and displaying a virtual object such that the virtual object appears anchored to the selected first anchor surface. Further operations may include receiving a second input indicating a second anchor surface within the captured image that is different from the first anchor surface, calculating parameters with respect to the second anchor surface and displaying the virtual object such that the virtual object appears anchored to the selected second anchor surface and moved from the first anchor surface.
487 citations
•
15 May 2002TL;DR: In this article, one or more sets of terminals are formed for possible data transmission, with each set including a unique combination of one-or more terminals and corresponding to a hypothesis to be evaluated.
Abstract: Techniques to schedule downlink data transmission to a number of terminals in a wireless communication system. In one method, one or more sets of terminals are formed for possible data transmission, with each set including a unique combination of one or more terminals and corresponding to a hypothesis to be evaluated. One or more sub-hypotheses may further be formed for each hypothesis, with each sub-hypothesis corresponding to specific assignments of a number of transmit antennas to the one or more terminals in the hypothesis. The performance of each sub-hypothesis is then evaluated, and one of the evaluated sub-hypotheses is selected based on their performance. The terminal(s) in the selected sub-hypothesis are then scheduled for data transmission, and data is thereafter coded, modulated, and transmitted to each scheduled terminal from one or more transmit antennas assigned to the terminal.
482 citations
••
TL;DR: In this article, a distributed denial-of-service attack demonstrated the high vulnerability of Internet of Things (IoT) systems and devices and addressed this challenge will require scalable security solutions optimized for the IoT ecosystem.
Abstract: Recent distributed denial-of-service attacks demonstrate the high vulnerability of Internet of Things (IoT) systems and devices. Addressing this challenge will require scalable security solutions optimized for the IoT ecosystem.
470 citations
••
18 May 2014TL;DR: This paper introduces a novel representation of source code called a code property graph that merges concepts of classic program analysis, namely abstract syntax trees, control flow graphs and program dependence graphs, into a joint data structure that enables it to elegantly model templates for common vulnerabilities with graph traversals that can identify buffer overflows, integer overflOWS, format string vulnerabilities, or memory disclosures.
Abstract: The vast majority of security breaches encountered today are a direct result of insecure code. Consequently, the protection of computer systems critically depends on the rigorous identification of vulnerabilities in software, a tedious and error-prone process requiring significant expertise. Unfortunately, a single flaw suffices to undermine the security of a system and thus the sheer amount of code to audit plays into the attacker's cards. In this paper, we present a method to effectively mine large amounts of source code for vulnerabilities. To this end, we introduce a novel representation of source code called a code property graph that merges concepts of classic program analysis, namely abstract syntax trees, control flow graphs and program dependence graphs, into a joint data structure. This comprehensive representation enables us to elegantly model templates for common vulnerabilities with graph traversals that, for instance, can identify buffer overflows, integer overflows, format string vulnerabilities, or memory disclosures. We implement our approach using a popular graph database and demonstrate its efficacy by identifying 18 previously unknown vulnerabilities in the source code of the Linux kernel.
461 citations
Authors
Showing all 19413 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jian Yang | 142 | 1818 | 111166 |
Xiaodong Wang | 135 | 1573 | 117552 |
Jeffrey G. Andrews | 110 | 562 | 63334 |
Martin Vetterli | 105 | 761 | 57825 |
Vinod Menon | 101 | 269 | 60241 |
Michael I. Miller | 92 | 599 | 34915 |
David Tse | 92 | 438 | 67248 |
Kannan Ramchandran | 91 | 592 | 34845 |
Michael Luby | 89 | 282 | 34894 |
Max Welling | 89 | 441 | 64602 |
R. Srikant | 84 | 432 | 26439 |
Jiaya Jia | 80 | 294 | 33545 |
Hai Li | 79 | 570 | 33848 |
Simon Haykin | 77 | 454 | 62085 |
Christopher W. Bielawski | 76 | 334 | 32512 |