scispace - formally typeset
Search or ask a question
Institution

Telcordia Technologies

About: Telcordia Technologies is a based out in . It is known for research contribution in the topics: Network packet & Node (networking). The organization has 3097 authors who have published 4737 publications receiving 237882 citations.


Papers
More filters
Proceedings ArticleDOI
01 Dec 1987
TL;DR: The Datacycle architecture is introduced, an attempt to exploit the enormous transmission bandwidth of optical systems to permit the implementation of high throughput multiprocessor database systems.
Abstract: The evolutionary trend toward a database-driven public communications network has motivated research into database architectures capable of executing thousands of transactions per second. In this paper we introduce the Datacycle architecture, an attempt to exploit the enormous transmission bandwidth of optical systems to permit the implementation of high throughput multiprocessor database systems. The architecture has the potential for unlimited query throughput, simplified data management, rapid execution of complex queries, and efficient concurrency control. We describe the logical operation of the architecture and discuss implementation issues in the context of a prototype system currently under construction.

167 citations

Patent
18 Oct 1995
TL;DR: In this article, a method of processing a phone call from a caller (112) in a network-based telephone system (100), including a plurality of switches (108) and an intelligent peripheral (IP) (104), is presented.
Abstract: A method of processing a phone call from a caller (112) in a network-based telephone system (100), the network-based telephone system (100) including a plurality of switches (108) and an intelligent peripheral (IP) (104) for interfacing the plurality of switches (108) to a service control point (SCP) (102). When a phone call is received at one of the plurality of switches (108), the call is sent to the IP (104). The IP (104) then requests that the SCP (102) perform a call processing request. Service logic within the SCP (102) is accessed in order to process the phone call according to the call processing request. The service logic then requests and receives account information from one or more external systems (106). The phone call is routed to a selected telephone (117) based on the account information received from the one or more external systems (106). The received account information is routed to the selected telephone (117).

166 citations

Patent
08 Jul 2005
TL;DR: In this article, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA-server) and a DHCP (Dynamic Host Configuration Protocol) server (DHCP server), such as, e g, for synchronization between the PANA SA state and the DHCP SA state, maintaining synchronization when a connection is lost.
Abstract: According to some embodiments, systems and methods for binding dynamic host configuration and network access authentication are provided related to, inter alia, interactions between a PAA (PANA-server) and a DHCP (Dynamic Host Configuration Protocol) server (DHCP server), such as, e g, for synchronization between the PANA SA state and the DHCP SA state, such as, e g, maintaining synchronization when a connection is lost In some embodiments, systems and methods for binding network bridge and network access authentication (Network Access Authenticator) are also provided related to, inter alia, interactions between a PAA and a layer-2 switch, such as, e g, for avoiding service thefts and the like (such as, e g, MAC address and/or IP address spoofing) in the context of, e g, the above In some other embodiments, systems and methods for bootstrapping multicast security from network access authentication protocol are also provided related to, inter alia, key management for protected IP multicast streams, such as, e g, to avoid IP multicast streams unnecessarily received and/or processed by unauthorized receivers connected to the same layer 2 segment as authorized receivers

166 citations

Journal ArticleDOI
TL;DR: An algorithm which determines the number of integer points in a polyhedron to within a multiplicative factor of 1+ε in time polynomial inm, ϕ and 1/ε when the dimensionn is fixed is described.
Abstract: We give an upper bound on the number of vertices ofP I , the integer hull of a polyhedronP, in terms of the dimensionn of the space, the numberm of inequalities required to describeP, and the size ϕ of these inequalities. For fixedn the bound isO(m n ϕ n− ). We also describe an algorithm which determines the number of integer points in a polyhedron to within a multiplicative factor of 1+e in time polynomial inm, ϕ and 1/e when the dimensionn is fixed.

164 citations

Patent
16 Dec 1991
TL;DR: In this article, a system for creating and modifying intelligent tele-phone network call processing logic trees which can be custom-ized for individual customers and created in a user-friendly vis-ual environment is presented.
Abstract: A system for creating and modifying intelligent tele-phone network call processing logic trees which can be custom-ized for individual customers and created in a user-friendly vis-ual environment (10, 15, Fig. 3-5). Service primitives are de-fined as logical graph nodes (20, Fig. 2, Fig. 3) which can be visually assembled into logic trees (Fig. 5) which represent the service logic flow and which provide default values for all ser-vice options. Higher level nodes, assembled from a plurality of service primitives, can likewise be defined and stored (12, 13, 19) for later use as entities in defining yet further call process-ing logic trees. These call processing logic trees are interpreted to allow the service control point computers (17) to implement the services in the switched telephone network (18) by sequen-tially executing the specified call processing primitives. A lib-rary (12, 13, 19) of defined nodes and defined node assemblies which represent service features can thus be made available to permit graphical manipulation into complete logic trees repres-enting new services. These logic trees are then interpreted by generic programs in the service control point to actually pro-vide the described services.

164 citations


Authors

Showing all 3097 results

NameH-indexPapersCitations
Joseph E. Stiglitz1641142152469
Pete Smith1562464138819
Jean-Marie Tarascon136853137673
Ramamoorthy Ramesh12264967418
Martin Vetterli10576157825
Noga Alon10489544575
Amit P. Sheth10175342655
Harold G. Craighead10156940357
Susan T. Dumais10034660206
Andrzej Cichocki9795241471
Robert E. Kraut9729738116
Kishor S. Trivedi9569836816
David R. Clarke9055336039
Axel Scherer9073643939
Michael R. Lyu8969633257
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

88% related

Bell Labs
59.8K papers, 3.1M citations

87% related

IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

82% related

Eindhoven University of Technology
52.9K papers, 1.5M citations

81% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20191
20182
20171
20161
20151
20143