Institution
Qualcomm
Company•Farnborough, United Kingdom•
About: Qualcomm is a company organization based out in Farnborough, United Kingdom. It is known for research contribution in the topics: Wireless & Signal. The organization has 19408 authors who have published 38405 publications receiving 804693 citations. The organization is also known as: Qualcomm Incorporated & Qualcomm, Inc..
Papers published on a yearly basis
Papers
More filters
•
06 Jan 2010TL;DR: In this paper, reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection, and Messaging schemes are also employed for providing handoverrelated information to access points.
Abstract: Handover parameter settings are automatically adapted in access points in a system to improve handover performance. Reactive detection techniques are employed for identifying different types of handover-related failures and adapting handover parameters based on this detection. Messaging schemes are also employed for providing handover-related information to access points. Proactive detection techniques also may be used for identifying conditions that may lead to handover-related failures and then adapting handover parameters in an attempt to prevent such handover-related failures. Ping-ponging may be mitigated by adapting handover parameters based on analysis of access terminal visited cell history acquired by access points in the system. In addition, configurable parameters (e.g., timer values) may be used to detect handover-related failures.
137 citations
•
14 Jun 2005TL;DR: In this paper, each base station is assigned a specific PN2 sequence that uniquely identifies that base station and a terminal uses TDM pilot 1 to detect for the presence of a signal and uses pilot 2 to identify base stations and obtain accurate timing.
Abstract: Each base station transmits a TDM pilot 1 having multiple instances of a pilot-1 sequence generated with a PN1 sequence and a TDM pilot 2 having at least one instance of a pilot-2 sequence generated with a PN2 sequence. Each base station is assigned a specific PN2 sequence that uniquely identifies that base station. A terminal uses TDM pilot 1 to detect for the presence of a signal and uses TDM pilot 2 to identify base stations and obtain accurate timing. For signal detection, the terminal performs delayed correlation on received samples and determines whether a signal is present. If a signal is detected, the terminal performs direct correlation on the received samples with PN1 sequences for K1 different time offsets and identifies K2 strongest TDM pilot 1 instances. For time synchronization, the terminal performs direct correlation on the received samples with PN2 sequences to detect for TDM pilot 2.
137 citations
•
03 Sep 2008TL;DR: In this paper, the authors describe a system and methodologies that facilitate providing quality of service (QOS) functionality on a host device or tethered processor to conserve resources on a network device, in particular the host device/tethered processor can classify QOS data and manage QOS flows, transmitting data by flow to the network device.
Abstract: Systems and methodologies are described that facilitate providing quality of service (QOS) functionality on a host device or tethered processor to conserve resources on a network device. In particular, the host device/tethered processor can classify QOS data and manage QOS flows, transmitting data by flow to the network device. The data from the QOS flows can be tagged to identify the flow and/or characteristics thereof allowing the wireless device to simply route the data to its respective flow. Thus, the network device is saved from such classification and flow management freeing resources to provide increased performance and decreased power consumption.
137 citations
•
18 Sep 2007
TL;DR: In this article, a mobile handset application configures the handset to receive activation commands from a server to encrypt, upload or download data, either received from the server or generated by the mobile handset and communicated to the server.
Abstract: Method and systems for protecting data on a mobile handset when remotely activated by a user involve encrypting the data using an encryption key, storing the encrypted data, and deleting the non-encrypted data along with the encryption key. Data may also be uploaded to a server to via a cellular data call for use in backing up the mobile handset. A mobile handset application configures the handset to receive activation commands from a server to encrypt, upload or download data. The encryption key is either received from the server or generated by the mobile handset and communicated to the server. Mock data files may be generated and stored on the mobile handset to enable handset applications to function normally after the data files have been encrypted.
137 citations
•
19 May 2009TL;DR: Targeted advertising can be provided by monitoring application specific details that go beyond observing merely the types of applications and/or functionality utilized on a device as mentioned in this paper, which can be monitored on at least a periodic basis and the advertisements can be changed based on the monitoring such that the advertisements transition from generic advertisements to advertisements that are more narrowly tailored for the user.
Abstract: Targeted advertising can be provided by monitoring application specific details that go beyond observing merely the types of applications and/or functionality utilized on a device. The specific details can be monitored on at least a periodic basis and the advertisements changed based on the monitoring such that the advertisements transition from generic advertisements to advertisements that are more narrowly tailored for the user. The targeted advertisements can be retained locally on the user device, accessed over a network, or combinations thereof. Presenting the targeted advertisements can include displaying the advertisements in at least a portion of a display screen, wherein the portion is selectable and changeable.
137 citations
Authors
Showing all 19413 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jian Yang | 142 | 1818 | 111166 |
Xiaodong Wang | 135 | 1573 | 117552 |
Jeffrey G. Andrews | 110 | 562 | 63334 |
Martin Vetterli | 105 | 761 | 57825 |
Vinod Menon | 101 | 269 | 60241 |
Michael I. Miller | 92 | 599 | 34915 |
David Tse | 92 | 438 | 67248 |
Kannan Ramchandran | 91 | 592 | 34845 |
Michael Luby | 89 | 282 | 34894 |
Max Welling | 89 | 441 | 64602 |
R. Srikant | 84 | 432 | 26439 |
Jiaya Jia | 80 | 294 | 33545 |
Hai Li | 79 | 570 | 33848 |
Simon Haykin | 77 | 454 | 62085 |
Christopher W. Bielawski | 76 | 334 | 32512 |