Abstract:
The procedure comprises using a pre-planned path restoration scheme for computing in advance, or pre-calculating, recovery paths for recovering failed working paths, and particularly comprises pre-calculating a set of recovery paths for each working path linking an origin node with a destination node, and simultaneously using the recovery paths of the set of recovery paths to try to communicate the origin node with the destination node, in case of one or more failures have been produced in the working path.The system is arranged for pre-calculating a set of recovery paths for each working path and simultaneously using them to recover a working path failure, and is apt for implementing the procedure.
Abstract:
An identification method for accessing mobile Broadband services or applications using a communications device of a computing equipment and involving sending a credential to a server providing Broadband services or applications, through an MBB network.
Abstract:
Two ends of a QKD system are connected through a private quantum channel using a protocol based on the principles of quantum physics and a conventional channel, both channels being introduced through the same medium using multiplexing techniques, wherein a possible intrusion in the communication is detected by checking the variability of the distribution of exchanged photons between both ends of said private quantum channel and in case of detecting an intrusion due to the risk identified on the communication channel the system launches an alarm. To avoid other attacks another conventional channel different from the quantum channel is further used in order to check the error rate in the exchanges.
Abstract:
Comprises a network termination device (1) at a home network, and, for providing broadband services to different end devices of said home network, networking and service capabilities which are implemented, virtualized, in separate elements (2, 3) of a broadband service provider network, and connected to said termination device (1), therefore providing a home gateway capabilities Virtualization system.
Abstract:
The present disclosure relates generally to methods for characterizing communication networks, and more particularly to methods of characterizing the propagation of information throughout communications in such networks.
Abstract:
A method and system for classifying traffic in a communication network. The method comprises the steps of: capturing IP packets (35) from said communication network; profiling said captured packets (36) by assigning one vector to each of said captured packets (36) according to a set of determined characteristics; calculating a set of classification values for each of said profiled packets (37) according to its IP header information and its specific protocol header information; rewriting said captured packets' (35) headers, including said calculated classification values on an IP header.
Abstract:
The method comprises: i) obtaining, an authentication registrar (S-CSCF) of a IMS control layer, two sets of IMS credentials for a user: a first set from a user equipment (UE) and a second set from a Home Server Subscriber, or HSS (100); and ii) said authentication registrar (S-CSCF) comparing said first and second sets of IMS credentials, and depending on the result of said comparison granting or denying the access of said user to IMS services. The method further comprises, before and in order to perform said steps i) and ii), obtaining, the user equipment (UE), the first set of IMS credentials from a network element (40) via a HTTP-based mechanism. The system is adapted for implementing the method, and the network element is also adapted for implementing the method and for being included in the system.
Abstract:
A method for managing presence information. It comprises setting, by a user, a hyper-availability status to active, at any time said user wants to be contacted by his peers in a presence service, and selecting, by said user, at least one service and/or communication means he wants his peers to contact him through, when in said hyper-availability status by associating the at least one service and/or communication means selection to said hyper-availability status.
Abstract:
A method to assess aesthetic quality of photographs, including classifying photographs into categories; generating computational models of image aesthetics, each computational model of image aesthetics associated to one different category of the categories; extracting a plurality of features from a photograph, the plurality of features being simplicity features, global features computed in the whole image and/or low-level features in contrasting regions of an image of said photograph. The contrasting regions are partitions of the image obtained by applying an image segmentation algorithm based on feature contrast to the photograph. The method also including applying a computational model of image aesthetics to at least part of the plurality of features extracted from said photograph, the computational model applied according to the category of the photograph, in order to assess aesthetic quality of the photograph.
Abstract:
A method and a system for improving the selection of a group of services, in an exchange services environment, by a user of a telecommunication network. The following steps are comprised by the invention: defining a first set of requirements in a selection criteria manager module to be fulfilled by the services; performing a search among all services available, according to services functionalities defined in a service catalog and matching the first set of requirements; discarding services which do not fulfilled the first set of requirements; defining a second set of requirements in the selection criteria manager module, the second set of requirements indicates user preferences; assigning weights to the services taking into account the second set of requirements, data from an historical information module of previous selections of the user, data from a profile of the user with previous preferences; arranging all service combination according to the weights obtained, being the first one an optimal selection; storing the selection of the user at the historical information module.