Abstract:
A method is provided for transmission, by a server in a communication network, of a multimedia message, which includes a video sequence, to a remote terminal. The method includes detecting the video sequence in the message by the server, wherein the method includes the following additional steps: coding by the server of the video sequence in a scalable stream including a base layer and one or more refinement layers, when the video sequence is not already coded in such a stream, storage of at least one of the refinement layers in a storage server, and sending the base layer and of a link to recover the at least one duly stored refinement layer to the remote terminal.
Abstract:
A technique is provided for transmitting a roof structure for constructing a three-dimensional representation of a building, via a communication network. The technique is based on the transmission of an ordered list of at least two roof models, each including at least: one type of roof; one maximum height parameter of the roof. During construction of the three-dimensional representation of a building, the maximum height parameter of a roof of the list determines a base of the roof in accordance with the list, so that the roof structure corresponds to the ordered superimposition of the roods of the list.
Abstract:
A process for generating a performance model from a functional model for a system including a plurality of distributed hardware and software entities that engage to provide a service to at least one user. The process distributes the representative system requests in a finite number of groups and identifies, for each request group, the corresponding execution flow, formalizes the execution flows by a notation that makes it possible to highlight the causal relationships between the different software entities of the system that are involved in the execution flows and the data characterizing the system's resource consumption, develops an intermediate model, and automates the conversion of the developed intermediate model into a performance model.
Abstract:
A method and system for dynamically managing quality of service metrics in an ad hoc network including a plurality of routing nodes (100) that are used to route data packets. The system also includes a network manager (200) that is used to determine, compute and deploy a quality of service metric to be applied at a given time based on the quality of service available on the network and on the quality of service required by one or more applications. Each node includes a metric manager (111) that updates routing tables (1121) of the nodes as a function of the received quality of service metric to be applied.
Abstract:
A domain name server includes a zone file containing partitioning rules that define the partitioning of all subfolders of this domain into subzones. The DNS data of each of these subzones is hosted by a partition server that is able to obtain from the zone file information for identifying the partition server able to respond to a query sent by a client to obtain a DNS folder.
Abstract:
A method of secure mutual identification of nodes (Nn) in a communications network comprising for each node a file (Fn) containing parameters descriptive of the node, each parameter being indexed by a cryptographic identifier of the node and an identifier of the parameter. An interface (IR) broadcasts from the node a message containing the cryptographic identifier of said node to the other nodes of the network. A unit (UC) transmits an identification request containing the cryptographic identifier of a first other node and the identifier of a parameter of said first other node requested by said node. A unit (HF) searches the file for a part of a parameter requested by a second other node as a function of the cryptographic identifier of said node and the identifier of the parameter transmitted by the second other node, and the interface transmits the part found of the parameter requested by the second other node to said second other node.
Abstract:
The present invention relates to a cryptographic method of protecting an electronic chip against fraud and a device including an electronic chip which is adapted to protect the electronic chip against fraud. The method includes: mixing some or all of the input parameters (Em) to supply an output data item E′=(e′1, e′2, . . . , e′n, . . . , e′N), changing the state of a finite state automaton from an old state to a new state as a function of the data item E′=(e′1, e′2, . . . , e′n, . . . , e′N), and calculating a certificate (S) by means of an output function having at least one state of the automaton as an input argument. The device includes: mixing means, a finite state automaton, and output means for calculating a certificate (S).
Abstract:
A speech recognition method including for a spoken expression: a) providing a vocabulary of words including predetermined subsets of words, b) assigning to each word of at least one subset an individual score as a function of the value of a criterion of the acoustic resemblance of that word to a portion of the spoken expression, c) for a plurality of subsets, assigning to each subset of the plurality of subsets a composite score corresponding to a sum of the individual scores of the words of said subset, d) determining at least one preferred subset having the highest composite score.
Abstract:
A method of filtering packets coming from a communication network (1) comprising, after successful registration of a terminal (20) with a service platform (32): a step of associating a registration context with the terminal, the context comprising registration information transmitted between the terminal and the service platform during registration; a step of creating at least one filtering rule on the basis of the registration context, said rule aiming to block packets that do not conform to at least a portion of the registration information; and a step of filtering the packets as a function of the rule created.
Abstract:
Method for the detection of symbols by a receiver, each symbol (S0, S1) being transmitted from a transmitter in the form of a succession of pulses (3a, 3b, . . . , 3n; 4a, 4b, . . . , 4n) representing a predetermined sequence of numerical values, the numerical values having respective nominal weights within each predetermined sequence. According to this method, a succession of pulses corresponding substantially to a symbol (S0, S1) transmitted from the transmitter is received at the receiver. A sequence of numerical values (Sr) corresponding to the said received succession of pulses is determined, the said numerical values having respective weights within the determined sequence. The received symbol is chosen as a function of the determined sequence of numerical values, the choice comprising a weighting of the numerical values of the determined sequence, chosen to re-establish the respective nominal weights of the said numerical values.