摘要:
A composition suitable for control of diseases caused by phytopathogens comprising (A) a compound of Formula (I) or a compound of Formula (II) wherein R1b is difluoromethyl or trifluoromethyl and R2b is alkyl, alkoxyalkyl or haloalkyl, or tautomers of such compounds; and (B) a compound selected from compounds known for their fungicidal activity.
摘要:
A composition for control of diseases on useful plants or on propagation material thereof caused by phytopathogens, comprising (A) a compound of formula (I) or a tautomer of such a compound; and component (B) and component (C) are pesticides as described in claim 1.
摘要:
The invention concerns a method for assigning parts of multimedia files to distributed storage devices, the number of said devices being an integer n, characterized in that it comprises the following steps: a step consisting in dividing each multimedia file in windows, which represent data for contiguous playback of a given duration; a step consisting, for each multimedia file, in determining a number k so that any original window of file can be recovered from any k distinct symbols; a step consisting, for each window of each said multimedia files, in assigning n corresponding symbols to said devices, one to each device, the n distinct symbols being created using erasure coding; and a step consisting in partially or totally filling the storage memory left on each device after said first steps with prefix windows of said multimedia files.
摘要:
A method for fingerprinting wireless devices and a method for using a device fingerprint for identifying wireless devices. A monitoring station listens to a channel. For each received frame, the station measures the inter-arrival time from the end of the previously received frame to the end of the present frame, if possible, the station obtains the identity of the sender of the frame. If the sender is known, then the station stores the inter-arrival time in a histogram for the sender; the histogram becomes the fingerprint for the sender. Identification of a device begins by obtaining a number of inter-arrival times for an unknown sender and then matching these to stored fingerprints using a suitable similarity measure. The invention is particularly suitable for IEEE 802.11 and may for example be used to detect so-called MAC spoofing and as an additional layer of an identification protocol.
摘要:
A management device (D) that is part of a communication network (R1) to which can be connected items of communication equipment (T1-T4) constituting peers storing content data and operating in P2P mode. This device (D) comprises analysing means (MA) adapted to, in the case of reception of a request for obtaining peer identifiers, said request designating content, from a peer (T1), i) to access a tree structure comprising leaves (associated with peer identifiers storing content associated with content identifiers) and location nodes (associated with location information, representative of location of peers associated with leaves that are attached to them, and with content information, representative at least of content identifiers that store these peers), in order to determine the location of the leaf associated with the content identifier designated in the received request, then the peer identifiers associated with leaves that are attached to this determined location node and said content identifier, and ii) order the transmission to the requesting peer (T1) of the determined peer identifiers.
摘要:
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity symbols from, for each parity symbol, a plurality of source symbols and at least one parity symbol of preceding rank, including at least encrypting once (54) at least one first value (P1) into several encrypted values and integrating at least one combination (P1,j) of said encrypted values to compute (55) at least one part (P2 . . . Pn−k) of said parity symbols.
摘要:
The invention relates to a method for monitoring the earth's surface with a moving aircraft using a radar sensor with a synthetic aperture. In order to produce high resolution radar images, the flight parameters of the aircraft are also required. According to the inventive method, key parameters, such as speed and acceleration, are detected in the sight line of the radar sensor from the radio signals received. One of the advantages of the invention is that an inertial navigation system (INS) is no longer required for this purpose.
摘要:
A distributed communication and data sharing system that provides anonymity and unlinkability. A group comprising a number of structures, each having a public/private key pair, is stored on a plurality of nodes in a Distributed Hash Table. Advantageous features of the group management system are provided through the use of Cryptographically Generated Addresses (CGA) for the structures, a secure capture method that enables a user to capture an address and be the only one authorized to request certain operations for the address, and an anonymous get/set mechanism in which a user signs messages, encloses the public key in the message and encrypts the message and public key using the public key of the receiver. The distributed communication and data sharing system of the invention can advantageously be used for group management of social networks.
摘要:
A method and a system for coding digital data represented by source symbols (Si) with an error-correction code. The error-correction code generates parity symbols (Pj) based on, for each parity symbol, several source symbols and at least one parity symbol of preceding rank. At least a part of the source symbols is submitted to at least a first ciphering. The obtained ciphered symbols and the rest of the unciphered source symbols are submitted to the error-correction code.
摘要:
The invention concerns a method and a system for encoding digital data (DATA) represented by source symbols, with an error correcting code generating parity symbols from, for each parity symbol, a plurality of source symbols and at least one parity symbol of preceding rank, including at least encrypting once (54) at least one first value (P1) into several encrypted values and integrating at least one combination (P1,j) of said encrypted values to compute (55) at least one part (P2 . . . Pn-k) of said parity symbols.