Abstract:
A method and device are provided for modifying a compounded voice message having at least one first voice component. The method includes a step of obtaining at least one second voice component, a step of updating at least one item of information belonging to a group of items of information associated with the compounded voice message as a function of the at least one second voice component and a step of making available the compounded voice message comprising the at least one first and second voice components, and the group of items of information associated with the compounded voice message. The compounded voice message is intended to be consulted by at least one recipient user.
Abstract:
A method of controlling an execution of a software application. The method includes, within a control device designed for driving at least one multimedia contents restitution device: a step of obtaining, from an execution device configured to trigger an execution of the software application, first connection data to be used by a restitution device to establish a first communication link across a network with the execution device and receiving, during the execution, via the first communication link a multimedia stream resulting from the execution; a step of transmitting to the restitution device parameters for restitution of a multimedia content comprising the first connection data; and a step of dispatching to the restitution device a command for restitution of the multimedia content, intended for triggering a restitution by the restitution device of the multimedia stream.
Abstract:
A method is provided for determining an existence or strength of a relationship between a first and a second user of a storage database having first user documents owned by the first user and second user documents owned by the second user stored in the storage database. The method includes: comparing the first user documents with the second user documents and creating a degree of similarity measure for the documents based on the comparing; and determining the existence or strength of the relationship between the first and second users based on the degree of similarity measure for the documents.
Abstract:
A method including: detecting a first input on a first specific element of a user interface of an electronic device, the detection of the first input triggering a selecting mode; while in the selecting mode, when detecting a plurality of second inputs on second specific elements of the user interface, selecting the second specific elements, each second specific element corresponding to an electronic content to be displayed; storing the selected second specific elements; detecting a third input on a third specific element of the user interface, the detection of the third input terminating the selecting mode; after terminating the selecting mode, displaying at least an electronic content corresponding to a first stored second specific element; and detecting a fourth input on a fourth specific element of the user interface triggering the display of another electronic content corresponding to another stored second specific element.
Abstract:
a method and system are provided for populating an electronic device registered for a user with applications from an application platform that the electronic device is operating with. The method is carried out by an application recommendation node. The method includes the acts of collecting a user profile for the user and an identifier for the electronic device, selecting a list of applications from the application platform based on the user profile, associating the list of applications with the identifier, receiving notification of a first presentation of the identifier following the association, and pushing the list of applications to the electronic device corresponding to the identifier following the notification.
Abstract:
A ring-signature scheme is adapted so that at least one of the variability parameter values used is an identity trace of the anonymous signatory, determined as a function of anonymity withdrawal data stored and held secret by an anonymity withdrawal entity in connection with an identification of the anonymous signatory. This provides a subsequent controlled capacity of withdrawing the anonymity of the signatory, either by an authority, or by the signatory himself.
Abstract:
A method of representing the effects on a received signal of a radio communications channel having L paths with a reduced computational effort is achieved by transforming a representation of the channel into a simplified representation. Each path of the radio communications channel has an average attenuation and a pre-determined respective delay. The received signal includes a combination of correlated components determined from an effect of pulse shaping filters on the received signal, each component being correlated with respect to each of the other components represented by a plurality of correlation coefficients. The method comprises generating a plurality of complex zero mean gaussian random variables each having a pre-determined variance, and summing the variables, to form a representation of the signal received via the radio communications channel. The pre-determined variance of each variable is calculated from the eigen values of a matrix formed from the correlation coefficients and a channel correlation matrix which includes the average attenuation of each of the L paths. Accordingly a transformation of the L-path channel into a simplified representation is effected, without a requirement to represent the correlated components of the received signal. The correlated components may be, for example, the signal components produced by each of a plurality of correlators of a rake receiver.
Abstract:
The digital data packets received contain data describing successive time segments of a signal stream to be restored, for example audio. Elements obtained from the packets received are recorded in a buffer memory organized in first-in first-out mode. A burst of packets fulfilling a certain burst size condition is detected a priori, on the basis of a reception delay evaluated in response to the reception of a first packet of the burst. The content of the buffer memory is controlled by accounting for the detection of the burst fulfilling the size condition.
Abstract:
During a learning phase, a speech recognition device generates parameters of an acceptance voice model relating to a voice segment spoken by an authorized speaker and a rejection voice model. It uses normalization parameters to normalize a speaker verification score depending on the likelihood ratio of a voice segment to be tested and the acceptance model and rejection model. The speaker obtains access to a service application only if the normalized score is above a threshold. According to the invention, a module updates the normalization parameters as a function of the verification score on each voice segment test only if the normalized score is above a second threshold.
Abstract:
A modular home medical service terminal includes a basic module (100) installed in a patient's home and is equipped with a telephone link (1) for communicating with a remote home medical service center. The basic module (100) is able to accommodate at least one additional module (200, 300, 400) that provides at least one home medical service functionality and which can exchange information with the remote center via the telephone link (1).