scispace - formally typeset
Search or ask a question
Institution

Qualcomm

CompanyFarnborough, United Kingdom
About: Qualcomm is a company organization based out in Farnborough, United Kingdom. It is known for research contribution in the topics: Wireless & Signal. The organization has 19408 authors who have published 38405 publications receiving 804693 citations. The organization is also known as: Qualcomm Incorporated & Qualcomm, Inc..


Papers
More filters
Patent
24 Feb 2004
TL;DR: In this paper, a cellular network may provide an advertisement for a WLAN, such as in an overhead signaling message, and the advertisement may identify the Access Point(s) by an Extended Service Set Identifier (ESSID), the remote station may then scan for the WLAN service automatically or manually.
Abstract: Method and apparatus for detection and selection of Wireless Local Area Network (WLAN) service. A cellular network may provide an advertisement for a WLAN, such as in an overhead signaling message. The advertisement may identify the Access Point(s) by an Extended Service Set Identifier (ESSID). The remote station may then scan for the WLAN service automatically or manually.

487 citations

Patent
29 Mar 2012
TL;DR: In this article, a head mounted device provides an immersive virtual or augmented reality experience for viewing data and enabling collaboration among multiple users, which includes capturing an image and spatial data with a body mounted camera and sensor array, and displaying a virtual object such that the virtual object appears anchored to the selected first anchor surface.
Abstract: A head mounted device provides an immersive virtual or augmented reality experience for viewing data and enabling collaboration among multiple users. Rendering images in a virtual or augmented reality system may include capturing an image and spatial data with a body mounted camera and sensor array, receiving an input indicating a first anchor surface, calculating parameters with respect to the body mounted camera and displaying a virtual object such that the virtual object appears anchored to the selected first anchor surface. Further operations may include receiving a second input indicating a second anchor surface within the captured image that is different from the first anchor surface, calculating parameters with respect to the second anchor surface and displaying the virtual object such that the virtual object appears anchored to the selected second anchor surface and moved from the first anchor surface.

487 citations

Patent
15 May 2002
TL;DR: In this article, one or more sets of terminals are formed for possible data transmission, with each set including a unique combination of one-or more terminals and corresponding to a hypothesis to be evaluated.
Abstract: Techniques to schedule downlink data transmission to a number of terminals in a wireless communication system. In one method, one or more sets of terminals are formed for possible data transmission, with each set including a unique combination of one or more terminals and corresponding to a hypothesis to be evaluated. One or more sub-hypotheses may further be formed for each hypothesis, with each sub-hypothesis corresponding to specific assignments of a number of transmit antennas to the one or more terminals in the hypothesis. The performance of each sub-hypothesis is then evaluated, and one of the evaluated sub-hypotheses is selected based on their performance. The terminal(s) in the selected sub-hypothesis are then scheduled for data transmission, and data is thereafter coded, modulated, and transmitted to each scheduled terminal from one or more transmit antennas assigned to the terminal.

482 citations

Journal ArticleDOI
TL;DR: In this article, a distributed denial-of-service attack demonstrated the high vulnerability of Internet of Things (IoT) systems and devices and addressed this challenge will require scalable security solutions optimized for the IoT ecosystem.
Abstract: Recent distributed denial-of-service attacks demonstrate the high vulnerability of Internet of Things (IoT) systems and devices. Addressing this challenge will require scalable security solutions optimized for the IoT ecosystem.

470 citations

Proceedings ArticleDOI
18 May 2014
TL;DR: This paper introduces a novel representation of source code called a code property graph that merges concepts of classic program analysis, namely abstract syntax trees, control flow graphs and program dependence graphs, into a joint data structure that enables it to elegantly model templates for common vulnerabilities with graph traversals that can identify buffer overflows, integer overflOWS, format string vulnerabilities, or memory disclosures.
Abstract: The vast majority of security breaches encountered today are a direct result of insecure code. Consequently, the protection of computer systems critically depends on the rigorous identification of vulnerabilities in software, a tedious and error-prone process requiring significant expertise. Unfortunately, a single flaw suffices to undermine the security of a system and thus the sheer amount of code to audit plays into the attacker's cards. In this paper, we present a method to effectively mine large amounts of source code for vulnerabilities. To this end, we introduce a novel representation of source code called a code property graph that merges concepts of classic program analysis, namely abstract syntax trees, control flow graphs and program dependence graphs, into a joint data structure. This comprehensive representation enables us to elegantly model templates for common vulnerabilities with graph traversals that, for instance, can identify buffer overflows, integer overflows, format string vulnerabilities, or memory disclosures. We implement our approach using a popular graph database and demonstrate its efficacy by identifying 18 previously unknown vulnerabilities in the source code of the Linux kernel.

461 citations


Authors

Showing all 19413 results

NameH-indexPapersCitations
Jian Yang1421818111166
Xiaodong Wang1351573117552
Jeffrey G. Andrews11056263334
Martin Vetterli10576157825
Vinod Menon10126960241
Michael I. Miller9259934915
David Tse9243867248
Kannan Ramchandran9159234845
Michael Luby8928234894
Max Welling8944164602
R. Srikant8443226439
Jiaya Jia8029433545
Hai Li7957033848
Simon Haykin7745462085
Christopher W. Bielawski7633432512
Network Information
Related Institutions (5)
Intel
68.8K papers, 1.6M citations

92% related

Motorola
38.2K papers, 968.7K citations

89% related

Samsung
163.6K papers, 2M citations

88% related

NEC
57.6K papers, 835.9K citations

87% related

Texas Instruments
39.2K papers, 751.8K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20229
20211,188
20202,266
20192,224
20182,124
20171,477