scispace - formally typeset
Search or ask a question
Institution

Qualcomm

CompanyFarnborough, United Kingdom
About: Qualcomm is a company organization based out in Farnborough, United Kingdom. It is known for research contribution in the topics: Wireless & Signal. The organization has 19408 authors who have published 38405 publications receiving 804693 citations. The organization is also known as: Qualcomm Incorporated & Qualcomm, Inc..


Papers
More filters
Patent
Alan Barbieri1, Durga Prasad Malladi1, Yongbin Wei1, Naga Bhushan1, Peter Gaal1 
16 Aug 2011
TL;DR: In this article, a method for controlling signaling and channel selection in cognitive Long Term Evolution (LTE) cognitive networks is presented, which involves receiving, on a licensed channel, broadcasted channel usage information regarding at least one unlicensed channel used by one or more network nodes.
Abstract: Techniques are provided for control signaling and channel selection in cognitive Long Term Evolution (LTE). In one example, there is provided a method, operable by a mobile entity, that involves receiving, on a licensed channel, broadcasted channel usage information regarding at least one unlicensed channel used by one or more network nodes. The method further involves: performing a cell search procedure based at least in part on the channel usage information to select a given network node among the one or more network nodes; determining at least one random access parameter to be used in establishing wireless communication with the given network node, the at least one random access parameter being associated with a characteristic of the user device and determining a preferred downlink channel.

200 citations

Patent
Ephraim Zehavi1
01 Nov 1993
TL;DR: In this article, an improved system and method for communicating information over in-phase (I) and quadrature phase (Q) communication channels in a spread spectrum communication system is disclosed.
Abstract: An improved system and method for communicating information over in-phase (I) and quadrature phase (Q) communication channels in a spread spectrum communication system is disclosed herein. In an exemplary implementation, first and second information signals are respectively transmitted over the I and Q communication channels using direct sequence spread spectrum communication signals. In-phase pseudorandom noise (PN I ) and quadrature phase pseudorandom noise (PN Q ) signals of predetermined PN codes are used for spreading the first and second information signals, respectively. In particular, the PN I and PN Q signals are respectively combined with the first and second information signals and an orthogonal function signal to provide I-channel and Q-channel modulation signals. The I-channel and Q-channel modulation signals are used for modulating in-phase (I) and quadrature phase (Q) carrier signals for transmission to a receiver via the I and Q communication channels, respectively. In a preferred implementation the receiver is operative to produce an estimate of at least the first information signal on the basis of the I-channel and Q-channel modulated carrier signals received over the I and Q communication channels. The received I-channel and Q-channel modulated carrier signals are demodulated and despread, with the resultant sequences being correlated into in-phase (I) and quadrature phase (Q) projection signals. A phase rotator operates to provide an estimate of at least the first information signal based on the I and Q projection signals and a received pilot signal.

200 citations

Patent
Rajesh K. Pankaj1
12 Jan 2000
TL;DR: In this article, an earmark is designed such that any attempt by an unauthorized user to use such false data results in the immediate identification of the unauthorized user as hostile, and indicates that an intrusion of the network is being attempted.
Abstract: A method and a system for providing security to a network (12) by at least identifying an unauthorized user (20) who is attempting to gain access to a node (16) on the network (12), and preferably by then actively blocking that unauthorized user (20) from further activities. Detection is facilitated by the unauthorized user providing 'earmark', or specially crafted false data, which the unauthorized user (20) gathers during the information collection stage performed before an attack. The earmark is designed such that any attempt by The unauthorized user (20) to use such false data results in the immediate idenfication of the unauthorized user (20) as hostile, and indicates that an intrusion of the network (12) is being attempted. Preferably, further access to the network (12) is then blocked by diverting traffic from the unauthorized user (20) to a secure zone (32), where the activities of the unauthorized user can be contained without damage to the network (12).

200 citations

Proceedings ArticleDOI
29 May 2009
TL;DR: The FCC recently issued the regulatory rules for cognitive radio use of the TV white space spectrum provide an opportunity but they also introduce a number of technical challenges that require development of cognitive radio technologies like spectrum sensing as well as new wireless PHY and MAC layer designs.
Abstract: The FCC recently issued the regulatory rules for cognitive radio use of the TV white space spectrum. These new rules provide an opportunity but they also introduce a number of technical challenges. The challenges require development of cognitive radio technologies like spectrum sensing as well as new wireless PHY and MAC layer designs. These challenges include spectrum sensing of both TV signals and wireless microphone signals, frequency agile operation, geo-location, stringent spectral mask requirements, and of course the ability to provide reliable service in unlicensed and dynamically changing spectrum. After describing these various challenges we will describe some of the possible methods for meeting these challenges.

200 citations

Patent
Durga Prasad Malladi1, Xu Hao1
06 Nov 2007
TL;DR: In this article, the peak to average (PAR) back off value is used to determine the transmission power and rate for SIMO and MIMO transmissions, and the power allocation algorithm for different UL-MIMO schemes is described.
Abstract: A method for a wireless communication includes receiving or storing a peak to average (PAR) back off value; and applying the PAR back off value to determine the transmission power and rate for SIMO and MIMO transmissions. In one aspect, the PAR back off value is at least partially based on modulation type. In another aspect, the PAR back off value is more for higher order QAM than for QPSK. The power allocation algorithm for different UL MIMO schemes is described as follows. For MIMO without antenna permutation (e.g. per antenna rate control), different PAR back off values are considered for different data streams. For MIMO with antenna permutation or other unitary transformation such as virtual antenna mapping or precoding, the PAR back off are determined based on combined channel. The transmission data rate depends on power and also the receiver algorithms such as a MMSE receiver or MMSE-SIC receiver.

200 citations


Authors

Showing all 19413 results

NameH-indexPapersCitations
Jian Yang1421818111166
Xiaodong Wang1351573117552
Jeffrey G. Andrews11056263334
Martin Vetterli10576157825
Vinod Menon10126960241
Michael I. Miller9259934915
David Tse9243867248
Kannan Ramchandran9159234845
Michael Luby8928234894
Max Welling8944164602
R. Srikant8443226439
Jiaya Jia8029433545
Hai Li7957033848
Simon Haykin7745462085
Christopher W. Bielawski7633432512
Network Information
Related Institutions (5)
Intel
68.8K papers, 1.6M citations

92% related

Motorola
38.2K papers, 968.7K citations

89% related

Samsung
163.6K papers, 2M citations

88% related

NEC
57.6K papers, 835.9K citations

87% related

Texas Instruments
39.2K papers, 751.8K citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20229
20211,188
20202,266
20192,224
20182,124
20171,477