Abstract:
The method comprising: receiving, a controller (106), traffic packets from a device, each one of said traffic packets including a VLAN tag indicating a destination of a second device; analyzing, by a first monitoring unit (101) during a period of time, the bytes content of said received packets and reporting said analysis to said controller (106); receiving, said controller (106), said plurality of different subcarriers to be used for said sending; adding, by a tag unit (102), an embedded S-VLAN tag to said analyzed packets identifying to which subcarrier and to which sliceable bandwidth variable transponder (105) each tagged traffic packets per destination is going to be sent; sending said S-VLAN tagged traffic packets to a switch (104), the latter forwarding them to a given port of said identified sliceable bandwidth variable transponder (105) for sending them via different sub-carriers to its corresponding destination, said plurality of different sub-carriers following a same or different path.
Abstract:
A method for generating a realistic 3D reconstruction model for an object or being, comprising: a) capturing a sequence of images of an object or being from a plurality of surrounding cameras; b) generating a mesh of said an object or being from said sequence of images captured; c) creating a texture atlas using the information obtained from said sequence of images captured of said object or being; d) deforming said generated mesh according to higher accuracy meshes of critical areas;and e) rigging said mesh using an articulated skeleton model and assigning bone weights to a plurality of vertices of said skeleton model; the method comprises generating said 3D reconstruction model as an articulation model further using semantic information enabling animation in a fully automatic framework. The system is arranged to implement the method of the invention.
Abstract:
The method comprising providing communication between at least one wireless client device through a connectivity to a corresponding dedicated access point, as well as locating and recognizing a plurality of neighboring Access Points', and further comprising following actions: a) notifying said dedicated access point, a predetermined absence period to said at least one wireless client device it provides communication; b) during said predetermined absence period, said dedicated access point becoming a client to at least a second access point; c) receiving, said dedicated access point as a client, data corresponding to a backhaul bandwidth of said at least a second access point and aggregating said received backhaul data from said at least a second access point to its own backhaul data; and d) sending, said dedicated access point, said aggregated backhaul bandwidth data to said at least one wireless client device after the predetermined absence period has lapsed. The system is adapted for implementing the method of the invention.
Abstract:
In the method of the invention said detection is performed in an Anomaly Detection System, or ADS, by analyzing the behavior of a network and looking for deviations with respect to a normality, said normality indicating common behavior of users of said network and being defined previous to said detection. The method is characterised in that it comprises building a plurality of detection models, each of said plurality of detection models adapted to different entities of said network and to different algorithms, said different algorithms implementing different detection strategies and said plurality of detection models representing said normality. The system of the invention is arranged to implement the method of the invention.
Abstract:
Disclosed are different terminals involved in a conference and arranged in a tree topology. Each terminal stores a list of participating terminals, the types of media streams of each terminal, and a media diagram referring to the processing actions of the terminals, in order to allow the conference to be conducted without a server and in a self-organized manner, providing fault tolerance such that the conference as a whole can overcome the failure of any of the participating terminals, allowing the conference to be reconfigured when a user leaves the same, either because it ceases to respond owing to a problem in the terminal or because the user so desires.
Abstract:
The method comprises performing said subscription switching automatically based on a generated event. Said event is generated by an application running on top of the operating system of said personal device, said event containing encoded information to perform said subscription switching. Said event is captured by the Universal Integrated Circuit Card of the personal device, which switches the active subscription to a new subscription.The method further comprises analyzing the contents of the Terminal Profile message sent to the UICC in its initialization to discover the capabilities supported by said personal device, which will determine the events that can be captured by the UICC.
Abstract:
It comprises: i) generating, by a Trusted Third Party (T), a private key for each signer or member (F1, F2, . . . , Ft) of a group of signers (G); ii) generating, each of said signers (F1, F2, . . . , Ft), a partial signature of a document (M) using their private keys; iii) generating a multiple signature from said partial signatures; and iv) verifying said multiple signature. It further comprises generating, by the Trusted Third Party (T), a common public key for all of said signers (F1, F2, . . . , Ft) and using said common public key for performing said multiple signature verification of iv).
Abstract:
An access point sends geographical positioning information from the access point to mobile terminals and to a mobile terminal which receives this information and estimates the position thereof based on said information. Geographical-locating architecture for WiFi 802.11 mobile terminals on ADSL access points generally includes geographical positioning information, i.e., the geographical coordinates of the access point during the registration phase thereof. The access point includes this geographical information in the information posted so that the mobile terminals can be connected to same. The mobile terminals can thus know the geographical location where they are located with an approximation that will depend directly on the number of access points that the mobile terminal can detect.
Abstract:
Comprises providing several widgets and linking them to exchange data there between for performing the execution of an application or functionality, the method further comprising providing a widget suite grouping said several widgets and having an external entry point associated to one of said several widgets.
Abstract:
Method, system and computer program for determining the matching between a first and a second sampled signals using an improved Dynamic Time Warping algorithm, called Unbounded DTW. It uses a dynamic programming algorithm to find exact start-end alignment points, unknown a priori, being the initial subsampling of the similarity matrix made via definition of optimal synchronization points, allowing a very fast process.