scispace - formally typeset
Search or ask a question
Institution

Telcordia Technologies

About: Telcordia Technologies is a based out in . It is known for research contribution in the topics: Network packet & Node (networking). The organization has 3097 authors who have published 4737 publications receiving 237882 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A general method for space variant image processing, based on a connectivity graph which represents the neighbor-relations in an arbitrarily structured sensor, which is suitable for real-time implementation, and provides a generic solution to a wide range of image processing applications with space variant sensors.
Abstract: This paper describes a graph-based approach to image processing, intended for use with images obtained from sensors having space variant sampling grids. The connectivity graph (CG) is presented as a fundamental framework for posing image operations in any kind of space variant sensor. Partially motivated by the observation that human vision is strongly space variant, a number of research groups have been experimenting with space variant sensors. Such systems cover wide solid angles yet maintain high acuity in their central regions. Implementation of space variant systems pose at least two outstanding problems. First, such a system must be active, in order to utilize its high acuity region; second, there are significant image processing problems introduced by the non-uniform pixel size, shape and connectivity. Familiar image processing operations such as connected components, convolution, template matching, and even image translation, take on new and different forms when defined on space variant images. The present paper provides a general method for space variant image processing, based on a connectivity graph which represents the neighbor-relations in an arbitrarily structured sensor. We illustrate this approach with the following applications: (1) Connected components is reduced to its graph theoretic counterpart. We illustrate this on a logmap sensor, which possesses a difficult topology due to the branch cut associated with the complex logarithm function. (2) We show how to write local image operators in the connectivity graph that are independent of the sensor geometry. (3) We relate the connectivity graph to pyramids over irregular tessalations, and implement a local binarization operator in a 2-level pyramid. (4) Finally, we expand the connectivity graph into a structure we call a transformation graph, which represents the effects of geometric transformations in space variant image sensors. Using the transformation graph, we define an efficient algorithm for matching in the logmap images and solve the template matching problem for space variant images. Because of the very small number of pixels typical of logarithmic structured space variant arrays, the connectivity graph approach to image processing is suitable for real-time implementation, and provides a generic solution to a wide range of image processing applications with space variant sensors.

124 citations

Patent
16 Oct 1990
TL;DR: In this paper, a tunable liquid-crystal etalon filter comprising two dielectric stack mirrors defining an optical cavity into which is filled a liquid crystal is presented, where the optical pass band can be electrically changed in a low-powered, compact, rugged, and economical structure.
Abstract: A tunable liquid-crystal etalon filter comprising two dielectric stack mirrors defining an optical cavity into which is filled a liquid crystal Electrodes disposed on the outsides of the mirrors apply an electric field to the liquid crystal, changing its refractive index and thereby changing its optical length Thereby, the optical pass band of the filter can be electrically changed in a low-powered, compact, rugged, and economical structure

123 citations

Journal ArticleDOI
TL;DR: This article describes a autoconfiguration solution based on the dynamic configuration and distribution protocol (DCDP) and presents an initial version of the basic user registration protocol (BURP), which provides secure client-network registration and interfaces to AAA protocols such as Diameter.
Abstract: In the vision of pervasive computing, users will exchange information and control their environments from anywhere using various wireline/wireless networks and computing devices. We believe that current protocols, such as DHCP, PPP, and Mobile IP, must be enhanced to support pervasive network access. In particular, this article identifies three fundamental functions: autoconfiguration, registration, and mobility management, that need such enhancements. Realizing that the IP autoconfiguration capabilities must be extended to configure routers and large dynamic networks, we first describe our autoconfiguration solution based on the dynamic configuration and distribution protocol (DCDP). Second, we discuss why providing user-specific services over a common infrastructure needs a uniform registration protocol, independent of the mobility and configuration mechanisms. We present an initial version of the basic user registration protocol (BURP), which provides secure client-network registration and interfaces to AAA protocols such as Diameter. Finally, we discuss the dynamic mobility agent (DMA) architecture, which provides a hierarchical and scalable mobility management framework. The DMA approach allows individual users to customize their own mobility-related features, such as paging, fast handoffs, and QoS support, over a common access infrastructure and to select multiple global binding protocols as appropriate.

123 citations

Journal ArticleDOI
TL;DR: In this paper, the performance of the phase-locked loop subsystem is analyzed taking into account both shot noise and laser phase noise, and it is shown that for reliable phase locking (rms phase error less than 10°), heterodyne second-order loops require at least 6771 electrons/s per volt every hertz of the laser linewidth.
Abstract: An optical PSK heterodyne communications receiver is investigated. The receiver is based on the decision-directed phase-locked loop. The performance of the phase-locked loop subsystem is analyzed taking into account both shot noise and laser phase noise. It is shown that for reliable phase locking (rms phase error less than 10°), heterodyne second-order loops require at least 6771 electrons/s per volt every hertz of the laser linewidth. This number corresponds to the limit when the loop dumping factor η is infinitely large; if \eta = 0.7 , then the loop needs 10 157 electrons/(s . Hz). If the detector has a unity quantum efficiency and \lambda = 1.5 \mu m, the above quoted numberers give 0.9 pW/ kHz for \eta \rightarrow \infty and 1.35 pW/kHz for u = 0.7 . The loop bandwidth required is also evaluated and found to be 155 \Delta u , where \Delta u is the laser linewidth. Finally, the linewidth permitted for PSK heterodyne recievers is evaluated and found to be 2.26 \cdot 10^{-3} R_{b} where R b is the system bit rate. For R_{b}=100 Mbit/s, this leads to \Delta u kHz. Such and better linewidths have been demonstrated with laboratory external cavity lasers. For comparison, ASK and FSK heterodyne receivers are much more tolerant to phase noise,-they can tolerate \Delta u up to 0.09 R b . At the same time, homodyne receivers impose much more stringent requirements on the laser linewidth ( \Delta u ).

123 citations

Journal ArticleDOI
TL;DR: The Concord algorithm is presented, which provides a delay-sensitive solution for playout buffering and the use of aging techniques are explored to improve the effectiveness of the historical information and hence, the delay predictions.
Abstract: Receiver synchronization of continuous media streams is required to deal with delay differences and variations resulting from delivery over packet networks such as the Internet. This function is commonly provided using per-stream playout buffers which introduce additional delay in order to produce a playout schedule which meets the synchronization requirements. Packets which arrive after their scheduled playout time are considered late and are discarded. In this paper, we present the Concord algorithm, which provides a delay-sensitive solution for playout buffering. It records historical information and uses it to make short-term predictions about network delay with the aim of not reacting too quickly to short-lived delay variations. This allows an application-controlled tradeoff of packet lateness against buffering delay, suitable for applications which demand low delay but can tolerate or conceal a small amount of late packets. We present a selection of results from an extensive evaluation of Concord using Internet traffic traces. We explore the use of aging techniques to improve the effectiveness of the historical information and hence, the delay predictions. The results show that Concord can produce significant reductions in buffering delay and delay variations at the expense of packet lateness values of less than 1%.

122 citations


Authors

Showing all 3097 results

NameH-indexPapersCitations
Joseph E. Stiglitz1641142152469
Pete Smith1562464138819
Jean-Marie Tarascon136853137673
Ramamoorthy Ramesh12264967418
Martin Vetterli10576157825
Noga Alon10489544575
Amit P. Sheth10175342655
Harold G. Craighead10156940357
Susan T. Dumais10034660206
Andrzej Cichocki9795241471
Robert E. Kraut9729738116
Kishor S. Trivedi9569836816
David R. Clarke9055336039
Axel Scherer9073643939
Michael R. Lyu8969633257
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

88% related

Bell Labs
59.8K papers, 3.1M citations

87% related

IBM
253.9K papers, 7.4M citations

83% related

Hewlett-Packard
59.8K papers, 1.4M citations

82% related

Eindhoven University of Technology
52.9K papers, 1.5M citations

81% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20191
20182
20171
20161
20151
20143