-
公开(公告)号:FI960816A
公开(公告)日:1997-08-23
申请号:FI960816
申请日:1996-02-22
Applicant: NOKIA MOBILE PHONES LTD , IBM
Inventor: MITTS HAOKAN , IMMONEN JUKKA , HANSEN HARRI , BAUCHOT FREDERIC , MARMIGERE GERARD
Abstract: In a radio extension of an ATM network, prior to establishing a given connection the switch of a fixed network enquires access points as to what is the resource situation in said access points. After receiving responses the switch decides to which access point the connection is allocated. During handover, the resource enquiry is accomplished as a response to the handover request sent by the mobile terminal, which request is transmitted either when the connection to the old access point still operates or after the connection is closed; in the latter case, the request is retransmitted through the new access point.
-
公开(公告)号:CA2115211A1
公开(公告)日:1994-10-20
申请号:CA2115211
申请日:1994-02-08
Applicant: IBM
Inventor: AHMADI HAMID , BANTZ DAVID F , BAUCHOT FREDERIC , KRISHNA ARVIND , LAMAIRE RICHARD O , NATARAJAN KADATHUR S
Abstract: A Medium Access (MAC) Protocol is utilized for wireless radio access for a plurality of remote stations to a base station on a LAN. The MAC protocol is based on a reservation scheme for user data traffic and a random access technique for control and signalling traffic. There is a time division fixed frame structure in which time is slotted, and time slots are grouped into fixed frames consisting of data and control subframes or periods. The fixed frame structure consists of three periods (A, B, and C) along with their respective headers. The first period, the A period, is the outbound channel which is used exclusively for data transfer from the base station to the remote stations. The following period, the B period, is the inbound channel that is used for contention-free data transfer from the remote stations to the base station. The allocation of the data slots in the A and B periods is performed by the base station. The last period of the frame, designated as the C period, is the control channel used for the transmission of reservation requests and data from the remote stations to the base station in a random-access contention mode using a slotted Aloha protocol. The duration of the three periods may be varied using a movable boundary technique. The base station estimates the number of actively transmitting remote stations utilizing feedback information from the remote stations. This estimate is broadcast to the remote stations as control indicia to control their transmission attempts in the C period, thus yielding high transmission efficiency.
-
公开(公告)号:CA2872235C
公开(公告)日:2020-09-22
申请号:CA2872235
申请日:2013-05-22
Applicant: IBM
Inventor: BAUCHOT FREDERIC , CLEMENT JEAN-YVES , KLATOVSKY RICARDO , SAMIN JEAN-CHRISTOPHE
Abstract: An anti-tamper system comprises: a fixing device (500) and an anti-tamper detection device (502); said fixing device (500) comprising a body (514) and a head (512) whereby the head (512) having a larger cross section than the body (514) for enabling a tool to engage and drive the body (514) into a first material layer (22) thereby makes a firm connection with the anti-tamper detection device (502) between the head (512) and the first material layer (22); the fixing device (500) further comprising a lock (516) wherein the head (512) is locked to the body (514) by the lock (516) where there is no external magnetic field and wherein the head (512) becomes disengaged from the body (514) when the lock (516) is unlocked by an external magnetic field; and whereby the anti-tamper detection device (502) detects and records a change of the connection when the head (512) becomes disengaged. The anti-tamper system can be less "meter intrusive" than the prior art.
-
公开(公告)号:CA2872235A1
公开(公告)日:2013-12-05
申请号:CA2872235
申请日:2013-05-22
Applicant: IBM
Inventor: BAUCHOT FREDERIC , CLEMENT JEAN-YVES , KLATOVSKY RICARDO , SAMIN JEAN-CHRISTOPHE
Abstract: An anti-tamper system comprises: a fixing device (500) and an anti-tamper detection device (502); said fixing device (500) comprising a body (514) and a head (512) whereby the head (512) having a larger cross section than the body (514) for enabling a tool to engage and drive the body (514) into a first material layer (22) thereby makes a firm connection with the anti-tamper detection device (502) between the head (512) and the first material layer (22); the fixing device (500) further comprising a lock (516) wherein the head (512) is locked to the body (514) by the lock (516) where there is no external magnetic field and wherein the head (512) becomes disengaged from the body (514) when the lock (516) is unlocked by an external magnetic field; and whereby the anti-tamper detection device (502) detects and records a change of the connection when the head (512) becomes disengaged. The anti-tamper system can be less "meter intrusive" than the prior art.
-
公开(公告)号:GB2497194A
公开(公告)日:2013-06-05
申请号:GB201221220
申请日:2012-11-26
Applicant: IBM
Inventor: BAUCHOT FREDERIC , GOUEDO YANN
IPC: G06Q10/10
Abstract: A method, system and computer program product for managing mail comprises providing a list of topics, reference mail associated with the topics, and a defined importance value for each reference mail. It further comprises preparing a topic relevance algorithm for each topic, where each topic relevance algorithm is formed by estimating a relationship value between a topic and its associated attributes based on the reference mail. An importance algorithm is also formed which comprises weighted importance attributes formed by estimating a weight for each of the importance attributes based on defined importance of the reference mail. Target mail is then assessed using the topic relevance algorithms to determine a topic relevance and against the importance algorithm to determine an importance; and it is then determined when a target mail has a threshold importance for a particular topic relevance. A statistical analysis is performed on the words of the mail to determine the relative closeness to the topic, topic attributes and importance attributes and the importance and relevance of the target mail may be provided in graphic form. Topic attributes may comprise a temporal attribute, a spatial attribute, a personal attribute and an informative attribute and the importance attributes may comprise a delivery attribute, an originator attribute and a criticality attribute.
-
公开(公告)号:AT518208T
公开(公告)日:2011-08-15
申请号:AT07820705
申请日:2007-09-28
Applicant: IBM
Inventor: COULOMB BEATRICE , BAUCHOT FREDERIC , MARMIGERE GERARD , TRUNTSCHKA CAROLE
Abstract: A system and method for identifying specific locations where to attach or detach e-mail attachments based on e-mail storage locations is disclosed. The method allows to search in a mail-attachment connection table all the attachment locations that are in relation to the e-mail where the attachment is to be attached to or to be detached from and to present to a user all attachment locations that have a relevance for the attach/detach operation.
-
公开(公告)号:CA2357653C
公开(公告)日:2011-07-12
申请号:CA2357653
申请日:2001-09-24
Applicant: IBM
Inventor: BAUCHOT FREDERIC
Abstract: The present invention relates to the field of information processing by digital computers, and more particularly to a method and system for persistently self replicating multiple ranges of cells through a copy-paste operation, in a multi dimensional spreadsheet comprising a plurality of cells identified by a cell address along each dimension, a range of cells comprising one or a plurality of cells The method comprises the steps of: ~ defining a set of ranges of cells, each range of cells having the same size; ~ each time the content of a range of cells belonging to this set is changed, automatically performing a self-replication operation, the self-replication operation comprising the steps of: ~ copying the changed range of cells onto a buffer; ~ determining the set of ranges of cells to which the changed range of cells belongs to; ~ identifying the ranges of cells belonging to the set; ~ pasting the content of the buffer in each of identified range of cells belonging to the set.
-
公开(公告)号:AT452325T
公开(公告)日:2010-01-15
申请号:AT07728276
申请日:2007-04-19
Applicant: IBM
Inventor: SECONDO PIERRE , MARMIGERE GERARD , BAUCHOT FREDERIC
IPC: G01C15/04
Abstract: A surveyor's mark and a method of forming the mark. A tag is embedded in a head. The head is removably assembled to a stick. The head is configured to be above a ground when the stick is planted in the ground. The head includes a tag. The tag in the head includes an identification number whose value identifies the tag and indicates if the head is disassembled from the stick. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in changing the value of the identification number in the tag from a first code value to a second code value that differs from the first code value.
-
公开(公告)号:AT434804T
公开(公告)日:2009-07-15
申请号:AT06807312
申请日:2006-10-16
Applicant: IBM
Inventor: BAUCHOT FREDERIC , CLEMENT JEAN-YVES , MARMIGERE GERARD , SECONDO PIERRE
Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
-
公开(公告)号:DE60133343T2
公开(公告)日:2009-04-23
申请号:DE60133343
申请日:2001-05-10
Applicant: IBM
Inventor: BAUCHOT FREDERIC , MAUDUIT DANIEL , HARARI ALBERT , SIROT BENOIT
-
-
-
-
-
-
-
-
-