scispace - formally typeset
Search or ask a question

Showing papers by "Orange S.A. published in 2002"


Journal ArticleDOI
TL;DR: This paper analyzes a particle's trajectory as it moves in discrete time, then progresses to the view of it in continuous time, leading to a generalized model of the algorithm, containing a set of coefficients to control the system's convergence tendencies.
Abstract: The particle swarm is an algorithm for finding optimal regions of complex search spaces through the interaction of individuals in a population of particles. This paper analyzes a particle's trajectory as it moves in discrete time (the algebraic view), then progresses to the view of it in continuous time (the analytical view). A five-dimensional depiction is developed, which describes the system completely. These analyses lead to a generalized model of the algorithm, containing a set of coefficients to control the system's convergence tendencies. Some results of the particle swarm optimizer, implementing modifications derived from the analysis, suggest methods for altering the original algorithm in ways that eliminate problems and increase the ability of the particle swarm to find optima of some well-studied test functions.

8,287 citations


Journal ArticleDOI
TL;DR: A discrete-time analysis of the orthogonal frequency division multiplex/offset QAM (OFDM/OQAM) multicarrier modulation technique, leading to a modulated transmultiplexer, is presented.
Abstract: A discrete-time analysis of the orthogonal frequency division multiplex/offset QAM (OFDM/OQAM) multicarrier modulation technique, leading to a modulated transmultiplexer, is presented. The conditions of discrete orthogonality are established with respect to the polyphase components of the OFDM/OQAM prototype filter, which is assumed to be symmetrical and with arbitrary length. Fast implementation schemes of the OFDM/OQAM modulator and demodulator are provided, which are based on the inverse fast Fourier transform. Non-orthogonal prototypes create intersymbol and interchannel interferences (ISI and ICI) that, in the case of a distortion-free transmission, are expressed by a closed-form expression. A large set of design examples is presented for OFDM/OQAM systems with the number of subcarriers going from four up to 2048, which also allows a comparison between different approaches to get well-localized prototypes.

1,020 citations


Journal ArticleDOI
TL;DR: It is proved that fixed-size window control can achieve fair bandwidth sharing according to any of these criteria, provided scheduling at each link is performed in an appropriate manner.
Abstract: This paper concerns the design of distributed algorithms for sharing network bandwidth resources among contending flows. The classical fairness notion is the so-called max-min fairness. The alternative proportional fairness criterion has recently been introduced by F. Kelly (see Eur. Trans. Telecommun., vol.8, p.33-7, 1997); we introduce a third criterion, which is naturally interpreted in terms of the delays experienced by ongoing transfers. We prove that fixed-size window control can achieve fair bandwidth sharing according to any of these criteria, provided scheduling at each link is performed in an appropriate manner. We then consider a distributed random scheme where each traffic source varies its sending rate randomly, based on binary feedback information from the network. We show how to select the source behavior so as to achieve an equilibrium distribution concentrated around the considered fair rate allocations. This stochastic analysis is then used to assess the asymptotic behavior of deterministic rate adaption procedures.

591 citations


Journal ArticleDOI
TL;DR: This paper forms a model for studying the benefits of cooperation between nodes, which provides insight into peer-to-peer content distribution and shows that the problem of optimally replicating objects in CDN servers is NP complete.

471 citations


Patent
Didier Marquet1
08 Nov 2002
TL;DR: In this article, a portable device for electric power supply comprising of a power supply circuit (6, 16) and a battery (10) is described. But the battery is not connected to the power supply.
Abstract: The invention concerns a portable device for electric power supply comprising: connection means ( 8 ) for connecting an appliance ( 1 ) to be powered; and a power supply circuit ( 6; 16 ) supplying in output a supply voltage for the appliance when the circuit is selectively connected to a mains supply or to a low-voltage electric power source. It may also comprise a battery ( 10 ). In that case, the circuit ( 6, 16 ) can charge the power storage means when the circuit is connected to an appropriate electric power source, the connection means ensuring power supply to the appliance ( 1 ) from the power storage means ( 10 ).

354 citations


Journal ArticleDOI
TL;DR: Increasing commercial use of the Global Positioning System will soon make it possible to locate anything, anywhere, anytime and the system's scale and global reach will benefit everyone.
Abstract: Increasing commercial use of the Global Positioning System will soon make it possible to locate anything, anywhere, anytime. The Global Positioning System can provide extremely accurate location information for mobile objects and people which is far superior to earlier tracking techniques. The challenge today is integrating the necessary components into older systems and improving GPS accuracy in areas with numerous obstructions. As more devices become GPS enabled, accuracy will increase and the system's scale and global reach will benefit everyone. Wireless technology promises to be a key element in any long-term solution.

275 citations


Journal Article
TL;DR: In this paper, the authors propose a data model for IDS alert correlation called M2D2, which uses four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities of the security tools used for the monitoring, and information about events observed.
Abstract: At present, alert correlation techniques do not make full use of the information that is available. We propose a data model for IDS alert correlation called M2D2. It supplies four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities, information about the security tools used for the monitoring, and information about the events observed. M2D2 is formally defined. As far as we know, no other formal model includes the vulnerability and alert parts of M2D2. Three examples of correlations are given. They are rigorously specified using the formal definition of M2D2. As opposed to already published correlation methods, these examples use more than the events generated by security tools; they make use of many concepts formalized in M2D2.

249 citations


Book ChapterDOI
16 Oct 2002
TL;DR: A data model for IDS alert correlation called M2D2 is proposed, which supplies four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities,Information about the security tools used for the monitoring, and information aboutThe events observed.
Abstract: At present, alert correlation techniques do not make full use of the information that is available. We propose a data model for IDS alert correlation called M2D2. It supplies four information types: information related to the characteristics of the monitored information system, information about the vulnerabilities, information about the security tools used for the monitoring, and information about the events observed. M2D2 is formally defined. As far as we know, no other formal model includes the vulnerability and alert parts of M2D2. Three examples of correlations are given. They are rigorously specified using the formal definition of M2D2. As opposed to already published correlation methods, these examples use more than the events generated by security tools; they make use of many concepts formalized in M2D2.

241 citations


Proceedings Article
10 Jun 2002
TL;DR: Performance measurements show no degradation due to componentization and the systematic use of the binding framework, and that application-specific kernels can achieve speed-ups over standard general-purpose operating systems such as Linux.
Abstract: Building a flexible kernel from components is a promising solution for supporting various embedded systems. The use of components encourages code re-use and reduces development time. Flexibility permits the system to be configured at various stages of the design, up to run time. In this paper, we propose a software framework, called THINK, for implementing operating system kernels from components of arbitrary sizes. A unique feature of THINK is that it provides a uniform and highly flexible binding model to help OS architects assemble operating system components in varied ways. An OS architect can build an OS kernel from components using THINK without being forced into a predefined kernel design (e.g. exo-kernel, micro-kernel or classical OS kernel). To evaluate the THINK framework, we have implemented KORTEX, a library of commonly used kernel components. We have used KORTEX to implement several kernels, including an L4-like micro-kernel, and kernels for an active network router, for the Kaffe Java virtual machine, and for a Doom game. Performance measurements show no degradation due to componentization and the systematic use of the binding framework, and that application-specific kernels can achieve speed-ups over standard general-purpose operating systems such as Linux.

205 citations


Journal ArticleDOI
TL;DR: It is demonstrated that the stationary distribution of the network state is insensitive to the distribution of service times if and only if the service capacities are balanced.

140 citations


Journal ArticleDOI
TL;DR: A methodology to explain the classification obtained by a multilayer perceptron is proposed and a saliency measurement is introduced and defined allowing the selection of relevant variables allowing an interpretation of the neural network classifier to be built.

Journal ArticleDOI
TL;DR: This paper focuses on impulsive noise measurements, their statistical properties being the basis of a noise model for optimizing a transmission scheme.
Abstract: The performance of a link using the indoor power line network as a medium for communication strongly depends on the noise characteristics. Besides the background noise and the narrow band noise mainly due to broadcast transmitters, impulsive noise adversely affects the quality of service. This paper focuses on impulsive noise measurements, their statistical properties being the basis of a noise model for optimizing a transmission scheme.

Patent
31 Dec 2002
TL;DR: A method and system for automated annotation and retrieval of remote digital content is described in this paper, where the image capture device of the present invention is configured to communicate with one or more external devices using a wired or wireless protocol.
Abstract: A method and system for automated annotation and retrieval of remote digital content is described The image capture device of the present invention is configured to communicate with one or more external devices using a wired or wireless protocol For example, Smart tag, 80211, or Bluetooth protocols may be used to enable the camera to communicate with the external device, associated with an object of interest, to obtain metadata corresponding to a captured image of the object The metadata collected using various forms of technology, as noted above for instance, can be used to automatically index a digital image and/or other digital content without any manual intervention

Patent
19 Apr 2002
TL;DR: In this paper, a system and method for cueing and intelligently inserting content data into a digital content stream is presented, where user data associated with at least one user profile is compiled into a user profile.
Abstract: A system and method for cueing and intelligently inserting content data into a digital content stream. The system receives user data associated with at least one user profile (505). The user-entered data is compiled into a user profile (510). The compiled user profile is then stored (515). The system receives a user ID indicting a particular user is now viewing the television (530). The system monitors the video stream for embedded cues (535). When a secondary content cue is detected (540), the system evaluates the user profiles associated with the viewing users and makes a determination whether to substitute alternate secondary content (545). If substitution is deemed to be appropriate, the system determines the specific secondary content should be substituted (550). Once the determination of what content to use has been made, the desired secondary content is substituted into the video stream to be viewed by the audience (555).

Book ChapterDOI
Chantal de Gournay1
01 Jan 2002
TL;DR: The mass phenomenon of mobile phone adoption has been analyzed in this article, in light of the exceptional speed of diffusion and the mass phenomenon (quantitative threshold) it expresses, and the limits of growth of a tool destined for universal ownership.
Abstract: Introduction In France the mobile phone, launched in 1987, developed slowly at first, before suddenly taking off in 1997. Since then its annual growth rate has been 120%, with the number of subscribers rising to 14 million in 2000, a little under 30% of the population. This success needs to be analyzed not only in light of the exceptional speed of diffusion but also because of the mass phenomenon (quantitative threshold) it expresses. For once, sociologists of technology are not asking the question: “What is curbing the adoption and use of the tool?” On the contrary, they are wondering: “What are the limits of growth?” of a tool that no one doubts, least of all non-subscribers, is destined for universal ownership. In many surveys non-subscribers mention a prevailing pressure to acquire a tool that they do not need but that they will eventually purchase. Excluding the corded telephone and, to a lesser extent, television, no other medium has had the same potential for universal use. Under pressure from other industrialized countries, the telephone became ubiquitous in France only in the 1970s, nearly a century after its invention. Unlike the corded phone and television, the mobile phone is neither revolutionary nor the harbinger of a new technological capacity. It merely reproduces existing properties of the telephone but shifts them onto new ground and into previously inaccessible situations.

Proceedings ArticleDOI
11 Jun 2002
TL;DR: In this paper, both GAA and bulk devices were shown to be operational on the same chip, and the first-time results were very encouraging: I/sub on/=170 /spl mu/A/spl mu /m@ 1.2 V and gate oxide of 20 /spl Aring.
Abstract: For the first time, both GAA and bulk devices were shown to be operational on the same chip. Not all issues have been solved yet (gate materials, access resistance) but already the first-try results are very encouraging: I/sub on/=170 /spl mu/A//spl mu/m@1.2 V and gate oxide of 20 /spl Aring/. Thanks to the GAA intrinsic immunity to SCE, its DIBL was as small as 10 mV compared with 600 mV on bulk control devices. Calibrating a 2D simulator on this electrical data, the performance of the GAA was estimated to be at least 1500 /spl mu/A//spl mu/m@ 1 V with comfortable gate oxide of 20 /spl Aring/, once having corrected for the large R/sub access/ (/spl sim/3000 /spl Omega/), that was simply due to non-optimal mask layout used in this first device realization.

Journal ArticleDOI
J.-P. Rossi1, Y. Gabillet
TL;DR: In this paper, a geometrical ray implementation for mobile propagation modeling (GRIMM) is presented, which splits the 3D ray construction problem into two successive two-dimensional (2-D) stages without loss of generality compared with brute-force 3-D ray methods.
Abstract: The growth of radio communication services has stimulated interest in ray propagation modeling, particularly in urban areas. The main drawback of these methods is lengthy computation time due to three-dimensional (3-D) space analysis. The model geometrical ray implementation for mobile propagation modeling (GRIMM) presented here splits the 3-D ray construction problem into two successive two-dimensional (2-D) stages without loss of generality compared with brute-force 3-D ray methods. The gain in time and simplicity enables consideration of large areas typical of a cellular environment. The reflections and diffractions (vertical or horizontal) are taken in any order, and their number can be taken large enough to meet convergence. After the description of the model, the results of simulation are compared with a set of 1465 mean power-delay profiles measured over a 30-MHz band at 900 MHz in a cellular environment for mobile positions almost uniformly spread within a 3-km radius from the base station. The model is shown to be very accurate for path-loss prediction with a mean error of about 1 dB and a standard deviation lower than 5 dB. The wide-band evaluation was performed on the delay spread (DS). This parameter was correctly predicted in about 75% of cases.

Journal ArticleDOI
TL;DR: In this article, a high performance acoustooptic tunable filter for add-drop application and for signal equalization in WDM telecommunication crossconnects is described, which results from a thorough investigation in TeO/sub 2/ of bulk collinear interaction.
Abstract: We describe a high performance acoustooptic tunable filter for add-drop application and for signal equalization in WDM telecommunication crossconnects. It results from a thorough investigation in TeO/sub 2/ of bulk collinear interaction, the geometry of which, particularly the direction of propagation of the acoustic wave, has been chosen in order to obtain the best compromise between the spectral resolution of the device and the acoustooptic figure of merit. Less than 40 mW of electric power is needed either to deviate 100% of a selected light wavelength /spl lambda/ at resonance, or to induce a 30-dB attenuation of its intensity. The sidelobes practically vanish for this configuration and the resolution is equal to 0.75 nm (or 94 GHz) for /spl lambda/=1.55 /spl mu/m. Polarization splitters combined with half-wave plates allow to completely get rid of polarization sensitivity problems. The use of optical fibers to collect the signal at the filter outputs, actually contributes to the high performance of the device as a whole. Experiments have been performed by multiplexing three signals in the input fiber, separated by 4, 2, and 1 nm. The transmission of the filter has been examined through the bar and cross state.

Journal ArticleDOI
TL;DR: An integrated admission control scheme to both streaming flows and elastic flows is proposed and detailed packet level simulations of TCP and UDP connections show that the proposed algorithms work satisfactory in the range of admission thresholds predicted by the fluid model.

Proceedings ArticleDOI
02 Jul 2002
TL;DR: The overall architecture and the main algorithms that make Soupsis conceivable are described, which include emissive and receptive fields that determine how avatar kinestesia and multimedia streams are established.
Abstract: This paper envisions a shared virtual reality system that could handle millions of users and objects. The SOLIPSIS system does not rely on servers and is based on a network of peers that collaborate to build up a common virtual world. Real-time interactions and virtual co-presence are enabled by the means of emissive and receptive fields that determine how avatar kinestesia and multimedia streams are established. We describe here the overall architecture and the main algorithms that make Soupsis conceivable.

Book ChapterDOI
01 Jan 2002

Journal ArticleDOI
Etienne Closse1, Michel Poize1, Jacques Pulou1, Patrick Venier1, Daniel Weil1 
TL;DR: This paper presents in detail how E sterel semantic is interpreted on the execution structure of the S axo - rt compiler, and shows significant performance improvement on industrial size examples.

Journal ArticleDOI
TL;DR: The problems related to providing QoS to MHs are discussed and the existing solutions and future work needed are identified.

Journal ArticleDOI
TL;DR: The purpose of this paper is to describe how the EURESCOM project P1013 FIT-MIP has evaluated the use of Mobile IP acting as a mobility management protocol federating various access network technologies such as PSTN, Wireless LAN or General Packet Radio System.

Journal ArticleDOI
J.-Y. Cochennec1
TL;DR: The NGN 2004 Project is a coordination structure led by Study Group 13, with the role of organizing studies on NGN in ITU-T, to prepare Recommendations in 2004.
Abstract: Next-generation networks (NGN) is a new concept commonly used by network designers to depict their vision of future telecommunications networks. However, various views on NGN have been expressed so far by operators, manufacturers, and service providers, and the general wish is now to come to a common understanding on NGN and to prepare standards on it. This is the reason why the ITU-T has decided to start the standardization process on NGN under the form of a new ITU-T Project prepared by Study Group 13. This new Project is in line with results from the existing ITU-T Project on Global Information Infrastructure (GII) because NGN is seen as a concrete realization of the GII. The NGN 2004 Project is a coordination structure led by Study Group 13, with the role of organizing studies on NGN in ITU-T. The target for the NGN 2004 Project is to prepare Recommendations in 2004.

Patent
19 Apr 2002
TL;DR: In this article, the authors present a video processing system for selectively associating cues with stored video frames, and their methods of operation are described, including a content detection controller and a content playback controller.
Abstract: Disclosed systems for selectively associating cues with stored video frames, and methods of operation. An exemplary video processing system (100) comprises a video recording system (220, 240) and a video playback system (220, 240, 250). The video recording system (220, 240) (i) receives a digital content stream and (ii) stores the video track data associated therewith as video frames in a storage device (240). The video recording system (220, 240) comprises a content detection controller (241) operable, in response to received content descriptor data, to (i) detect a subset of the video frames associated with select content in the received digital content stream, and (ii) associate a cue with at least one of the subset of the video frames.

Book ChapterDOI
J. W. Roberts1
07 Jan 2002

Journal ArticleDOI
Julia Velkovska1
TL;DR: In this paper, the authors analyse des interactions ecrites se deroulant en temps reel sur internet dans le cadre des webchats and conclude that the forme des relations dans les chats is caracterisee par une tension entre les categories d'intimite and d'anonymat.
Abstract: Resume Cet article analyse des interactions ecrites se deroulant en temps reel sur internet dans le cadre des webchats . S'inspirant de l'ethnomethodologie et de la sociologie phenomenologique, il interroge les identites et les formes de relation qui s'y constituent. Comment les utilisateurs se dotent-ils d'une identite fondee sur la seule ecriture electronique ? Comment des relations peuvent-elles se nouer, se developper, se maintenir durablement dans ce contexte et quelle en est la specificite ? L'analyse articule deux types de donnees : des recits de pratique et des discussions enregistrees sur les chats . La premiere partie etablit le lien entre le cadre spatio-temporel du dispositif de communication et la forme des interactions qui s'y deploient. La deuxieme partie est consacree aux typifications mises en œuvre par les participants pour construire leurs identites et leurs relations. En conclusion, la forme des relations dans les chats est caracterisee par une tension entre les categories d'intimite et d'anonymat.

Proceedings ArticleDOI
L. Morand1, S. Tessier
28 Apr 2002
TL;DR: The purpose of the document is to describe how the EURESCOM project P1013 FIT-MIP evaluates the use of Mobile IP in an IP core network, acting as a mobility management protocol federating heterogeneous access network technologies such as PSTN, WLAN or GPRS.
Abstract: The purpose of the document is to describe how the EURESCOM project P1013 FIT-MIP evaluates the use of Mobile IP in an IP core network, acting as a mobility management protocol federating heterogeneous access network technologies such as PSTN, WLAN or GPRS. The aim is to provide a wide IP environment with an always-on access to IP applications (VoIP, VPN, mobile Internet, etc.), Mobile IP functionalities enabling seamless mobility through the various networks.

Proceedings Article
Christophe Dousson1
21 Jul 2002
TL;DR: The representation and the corresponding algorithms for processing this extension according to the purpose of supervision in terms of performance are described.
Abstract: This paper is dedicated to the chronicle recognition approach used to design an evolution monitoring system for supervising dynamic systems for which time information is relevant. We propose to extend and also to unify the chronicle representation through event counters. The main motivation of such an extension of the chronicle representation arises from alarm processing: counting the occurrences of alarms can be useful to evaluate the severity of a problem and also to discriminate some kind of faults. The paper describes the representation and the corresponding algorithms for processing this extension according to the purpose of supervision in terms of performance.