Institution
Qualcomm
Company•Farnborough, United Kingdom•
About: Qualcomm is a company organization based out in Farnborough, United Kingdom. It is known for research contribution in the topics: Wireless & Signal. The organization has 19408 authors who have published 38405 publications receiving 804693 citations. The organization is also known as: Qualcomm Incorporated & Qualcomm, Inc..
Papers published on a yearly basis
Papers
More filters
•
16 Aug 2011TL;DR: In this article, a method for controlling signaling and channel selection in cognitive Long Term Evolution (LTE) cognitive networks is presented, which involves receiving, on a licensed channel, broadcasted channel usage information regarding at least one unlicensed channel used by one or more network nodes.
Abstract: Techniques are provided for control signaling and channel selection in cognitive Long Term Evolution (LTE). In one example, there is provided a method, operable by a mobile entity, that involves receiving, on a licensed channel, broadcasted channel usage information regarding at least one unlicensed channel used by one or more network nodes. The method further involves: performing a cell search procedure based at least in part on the channel usage information to select a given network node among the one or more network nodes; determining at least one random access parameter to be used in establishing wireless communication with the given network node, the at least one random access parameter being associated with a characteristic of the user device and determining a preferred downlink channel.
200 citations
•
01 Nov 1993TL;DR: In this article, an improved system and method for communicating information over in-phase (I) and quadrature phase (Q) communication channels in a spread spectrum communication system is disclosed.
Abstract: An improved system and method for communicating information over in-phase (I) and quadrature phase (Q) communication channels in a spread spectrum communication system is disclosed herein. In an exemplary implementation, first and second information signals are respectively transmitted over the I and Q communication channels using direct sequence spread spectrum communication signals. In-phase pseudorandom noise (PN I ) and quadrature phase pseudorandom noise (PN Q ) signals of predetermined PN codes are used for spreading the first and second information signals, respectively. In particular, the PN I and PN Q signals are respectively combined with the first and second information signals and an orthogonal function signal to provide I-channel and Q-channel modulation signals. The I-channel and Q-channel modulation signals are used for modulating in-phase (I) and quadrature phase (Q) carrier signals for transmission to a receiver via the I and Q communication channels, respectively. In a preferred implementation the receiver is operative to produce an estimate of at least the first information signal on the basis of the I-channel and Q-channel modulated carrier signals received over the I and Q communication channels. The received I-channel and Q-channel modulated carrier signals are demodulated and despread, with the resultant sequences being correlated into in-phase (I) and quadrature phase (Q) projection signals. A phase rotator operates to provide an estimate of at least the first information signal based on the I and Q projection signals and a received pilot signal.
200 citations
•
12 Jan 2000TL;DR: In this article, an earmark is designed such that any attempt by an unauthorized user to use such false data results in the immediate identification of the unauthorized user as hostile, and indicates that an intrusion of the network is being attempted.
Abstract: A method and a system for providing security to a network (12) by at least identifying an unauthorized user (20) who is attempting to gain access to a node (16) on the network (12), and preferably by then actively blocking that unauthorized user (20) from further activities. Detection is facilitated by the unauthorized user providing 'earmark', or specially crafted false data, which the unauthorized user (20) gathers during the information collection stage performed before an attack. The earmark is designed such that any attempt by The unauthorized user (20) to use such false data results in the immediate idenfication of the unauthorized user (20) as hostile, and indicates that an intrusion of the network (12) is being attempted. Preferably, further access to the network (12) is then blocked by diverting traffic from the unauthorized user (20) to a secure zone (32), where the activities of the unauthorized user can be contained without damage to the network (12).
200 citations
••
29 May 2009TL;DR: The FCC recently issued the regulatory rules for cognitive radio use of the TV white space spectrum provide an opportunity but they also introduce a number of technical challenges that require development of cognitive radio technologies like spectrum sensing as well as new wireless PHY and MAC layer designs.
Abstract: The FCC recently issued the regulatory rules for cognitive radio use of the TV white space spectrum. These new rules provide an opportunity but they also introduce a number of technical challenges. The challenges require development of cognitive radio technologies like spectrum sensing as well as new wireless PHY and MAC layer designs. These challenges include spectrum sensing of both TV signals and wireless microphone signals, frequency agile operation, geo-location, stringent spectral mask requirements, and of course the ability to provide reliable service in unlicensed and dynamically changing spectrum. After describing these various challenges we will describe some of the possible methods for meeting these challenges.
200 citations
•
06 Nov 2007TL;DR: In this article, the peak to average (PAR) back off value is used to determine the transmission power and rate for SIMO and MIMO transmissions, and the power allocation algorithm for different UL-MIMO schemes is described.
Abstract: A method for a wireless communication includes receiving or storing a peak to average (PAR) back off value; and applying the PAR back off value to determine the transmission power and rate for SIMO and MIMO transmissions. In one aspect, the PAR back off value is at least partially based on modulation type. In another aspect, the PAR back off value is more for higher order QAM than for QPSK. The power allocation algorithm for different UL MIMO schemes is described as follows. For MIMO without antenna permutation (e.g. per antenna rate control), different PAR back off values are considered for different data streams. For MIMO with antenna permutation or other unitary transformation such as virtual antenna mapping or precoding, the PAR back off are determined based on combined channel. The transmission data rate depends on power and also the receiver algorithms such as a MMSE receiver or MMSE-SIC receiver.
200 citations
Authors
Showing all 19413 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jian Yang | 142 | 1818 | 111166 |
Xiaodong Wang | 135 | 1573 | 117552 |
Jeffrey G. Andrews | 110 | 562 | 63334 |
Martin Vetterli | 105 | 761 | 57825 |
Vinod Menon | 101 | 269 | 60241 |
Michael I. Miller | 92 | 599 | 34915 |
David Tse | 92 | 438 | 67248 |
Kannan Ramchandran | 91 | 592 | 34845 |
Michael Luby | 89 | 282 | 34894 |
Max Welling | 89 | 441 | 64602 |
R. Srikant | 84 | 432 | 26439 |
Jiaya Jia | 80 | 294 | 33545 |
Hai Li | 79 | 570 | 33848 |
Simon Haykin | 77 | 454 | 62085 |
Christopher W. Bielawski | 76 | 334 | 32512 |