Abstract:
Methods and apparatus automatically identify which Internet-of-Things (IoT) devices within a set are behaving in a manner non-compliant to a target behaviour. Each IoT device (11) is assigned to a grid point in a notional m-dimensional space. A respective assessment module (2, 3) is arranged to monitor behaviour of a group of IoT devices assigned to grid points that are aligned with one another at a respective position along the respective dimension, and to produce an output indicative of non-compliant behaviour in the event that the monitoring indicates that behaviour in the group of IoT devices deviates from a behavioural model of the IoT devices of said group. An identification module (5) identifies at least one non-compliant IoT device in the set of IoT devices by combining outputs from the assessment modules assigned to the different dimensions of the space. The assessment modules may use trained machine-learning algorithms embodying a model of normal behaviour of the group of devices.
Abstract:
The present invention relates to a method for assisting the acquisition of a media content at a scene (S) provided with at least one main acquisition unit (C) connected to a server (2), characterized it comprises performing by a processing unit (21) of the server (2), steps of: -Receiving (a), from an electronic device (1) comprising a secondary acquisition unit (14), a request for acquiring a media content at the scene (S), said request comprising data representative of acquisition conditions at the secondary acquisition unit (14); -Providing (b) in response a first media content generated as a function of data representative of acquisition conditions at the secondary acquisition unit (14) from generic media content outputted by said at least one main acquisition unit (C).
Abstract:
Methods and systems to monitor, at a source device (1), the rendering at a destination device (2) of content received by the destination device from the source device. In one use case, a source device monitors the fidelity of screen-sharing by a remote device. At the destination device (2), a metric is generated characterising the content rendered at the destination device. Using this metric, the similarity between the content rendered at the destination device (2) and source content transmitted by the source device (1) is estimated. An indication of the estimated similarity is then displayed on a display (11) associated with the source device.
Abstract:
Methods and systems to train artificial intelligence modules protect privacy of sensitive data by virtue of the fact that the data source (1) extracts blocks of partial data from the source item of content (11) and distributes the extracted partial data to a plurality of processing nodes (5) in an intermediate processing system (2). The processing nodes each perform an initial portion of the training process, for example by performing a convolution of the partial data, to produce a partial model (PM). The partial models (PM) are transmitted to a merging module (10) which amalgamates them and completes the training process to generate a global model (GM) for the AI task.
Abstract:
A method determines a deployment of virtual network functions (VNFs) in a network that is to implement a set of one or more network services and that includes a software defined networking (SDN) controller to control which of plural alternative service chains is used to implement a network service. The method comprises:generating a group of candidate VNF-deployment configurations, each of the candidate configurations defining a deployment of VNFs that enables implementation of a set of service chains which could be specified by the SDN controller, the set of service chains including the plural alternative service chains; evaluating the fitness of each candidate configuration in the group, using a fitness function that quantifies fitness dependent on at least one of the computational and communication resources used by a configuration; and selecting a candidate configuration on the basis of its evaluated fitness.
Abstract:
A method of assuring end-to-end quality of service for a network service implemented on networking infrastructure comprising network function virtualization (NFV) comprises determining a target profile for end-to-end quality of service (QoS) for the network service, monitoring network function virtualization platform information as it changes, determining a service chain deployment, comprising virtualised network functions, satisfying said target QoS profile and output-ting information indicative of the determined service chain deployment to NFV management infrastructure for set-up of the VNFs of said service chain.
Abstract:
A method for checking the integrity of data emitted by at least a first transceiver equipment (21, 30) to at least a second transceiver equipment (30, 21) belonging to a first telecommunication operator, the data being transmitted through at least one intermediate transceiver equipment (11) belonging to a second telecommunication operator, the method comprising the following steps executed by the second transceiver equipment (30, 21): receiving data packets emitted by the first transceiver equipment (21, 30), said data packets comprising the emitted data and data intended for integrity checking of the emitted data, called integrity checking data, the emitted data and the integrity checking data being encrypted prior the emission of the data packet; deciphering the encrypted emitted data and the encrypted integrity checking data by means of a decryption key corresponding to an encryption key associated to the first transceiver equipment (21, 30) and used to generate the encrypted emitted data and the encrypted integrity checking data; processing the integrity checking data in order to check the integrity of the emitted data.
Abstract:
A method of determining a suitable configuration of virtual network functions, VNFs (301, 303, 305), for operation on a plurality of servers (311,313), the suitable configuration being for the provision of a service chain that provides a computer networking function, the method comprising: determining a fitness function for determining a fitness of different configurations of the VNFs (301, 303, 305), wherein the fitness function depends on at least one of the computational and communication resources used by a configuration; generating a set of possible configurations of the VNFs (301, 303, 305) for implementing the desired networking function; determining the fitness of each of the set of generated possible configurations using the fitness function; selecting, on the basis of their respective fitness functions, a subset of the possible configurations for inclusion in a first population; generating a second population from the first population by applying a genetic algorithm; and outputting a member of the second population as the suitable configuration on the basis of its fitness function.
Abstract:
Cosmetic compositions containing an eyelash curling or branching agent, or a skin-lifting mask or lotion. The mascara composition comprises a SMP, at least one film-forming polymer and at least one wax and leads to a make-up product with good staying power, as well as good coating and curling. The skin-lifting mask or lotion comprises a SMP, a water phase and an oil phase and leads to a make-up product with a skin-lifting effect. The invention also pertains to a process for coating eyelashes which consists of applying the composition to the eyelashes with heat.
Abstract:
A cosmetic sample sheet is provided which includes cosmetics contained within or under a solid, water-soluble polymeric film, and supported by a substrate sheet. The cosmetics are easily reconstitutable by a consumer to allow the consumer to try different shades or colors of particular cosmetics.