Apr 2019
03
Apr
Organizing a Python Package with Cookiecutter
In this tutorial, we will see how to create and maintain a Python package, especially relying on Cookiecutter, by Audrey Roy Greenfeld, and PyCharm. Even [...]
01
Apr
Efficient Production of Training Data for Classification Supervised Learning
Supervised learning relies on the existence of training data, typically labeled by human experts. The size and quality of this data has a critical impact [...]
Mar 2019
21
Mar
Thesis Defense : Smart grid-aware radio engineering in 5G mobile networks
The energy demand in mobile networks is increasing due to the emergence of new technologies and new services with higher requirements (data rates, delays, etc). [...]
13
Mar
Multiparametric Boltzmann sampling and applications
I will describe the problem of multiparametric generation (which is #P-complete) and a relaxation of this problem (multiparametric Boltzmann sampling) for which we construct a [...]
11
Mar
An information-theoretic perspective of tf–idf measures.
Reference: Aizawa, Akiko. "An information-theoretic perspective of tf–idf measures." Information Processing & Management 39.1 (2003): 45-65.
06
Mar
A simple discrete-time model for complex NFV accelerators
Network Functions Virtualization (NFV) is among the latest network revolutions, bringing flexibility and avoiding network ossification. At the same time, all-software NFV implementations on commodity [...]
Feb 2019
27
Feb
Processing of Aggregations over Big Data Streams
Online analytics and real-time data processing in most advanced IoT, scientific, business, and defense applications, rely heavily on the efficient execution of large numbers of [...]
25
Feb
Tropical Geometry of Deep Neural Networks 🌴 (continued)
Reference: “Tropical geometry of deep neural networks” (Liwen Zhang, Gregory Naitzat, Lek-Heng Lim, 2018)
21
Feb
Ending the Era of Information Overload and Cognitive Fatigue
In the post-digital era we face the risk of cognitive insufficiency in the attempt of dealing with the increasing exposure to large volume of data [...]
20
Feb
Optimally Gathering Two Robots
We present a self-stabilizing algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, [...]
18
Feb
Tropical Geometry of Deep Neural Networks 🌴
Reference: "Tropical geometry of deep neural networks" (Liwen Zhang, Gregory Naitzat, Lek-Heng Lim, 2018)
13
Feb
Human Behavior is Low Dimensional
Every person is unique and complex. But can we predict anything about how large groups of people will behave? In the 1950s the writer [...]
06
Feb
Fully Dynamic k-center Clustering
Static and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms [...]
04
Feb
Limit distributions and Laplace's method
I will present some tools based on generating functions in order to study the limit distributions of some random variables. References: Analytic Combinatorics (Flajolet & [...]
Jan 2019
30
Jan
Resource Allocation in Cloud Radio Access Networks: A Combinatorial Optimization Point of View
In this presentation, we would like to focus on two well known NP-Hard problems and then provide a combinatorial optimization view before proposing new and [...]
23
Jan
Thesis Defense : Auction-based Dynamic Resource Orchestration in Cloud-based Radio Access Networks
The paradigm of a Cloud-based RAN (C-RAN) is a key technology that combines the enabling solutions for the 5G requirements in terms of data rate, [...]
16
Jan
Internet Video Quality Inference from Encrypted Network Traffic
Accurately monitoring application performance is becoming more important for Internet Service Providers (ISPs), as users increasingly expect their networks to consistently deliver acceptable application quality. [...]
07
Jan
Multi-armed bandits: Bayesian vs frequentist (2)
Lorenzo Maggi will present two approaches of multi-armed bandits: Bayesian and frequentist, based on the papers: Tsitsiklis, J. N. (1994). A short proof of the [...]
Dec 2018
19
Dec
12
Dec
Protecting encrypted data against key exposure
Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim at minimizing the additional processing costs due to data fragmentation and dispersion.
05
Dec
Nov 2018
28
Nov
Too Many SDN Rules, Compress Them Using Minnie
Software Defined Networking (SDN) is gaining momentum with the support of major manufacturers. While it brings flexibility in the management of flows within the data [...]
26
Nov
Multi-armed bandits: Bayesian vs frequentist
Lorenzo Maggi will present two approaches of multi-armed bandits: Bayesian and frequentist, based on the papers: Tsitsiklis, J. N. (1994). A short proof of the [...]
21
Nov
Thesis Defense : Hyperfractals for the Modelling of Wireless Networks
We are on the verge of an industrial revolution that will make cities smarter, industries more efficient and people’s life easier. Urban communication will place [...]
19
Nov
Canopus: Scalable Consensus for Permissioned Blockchains
A critical problem with the consensus protocols underlying blockchains is that they do not scale well. As the number of participants trying to achieve consensus [...]
14
Nov
The Forward-Backward Embedding of Directed Graphs
We introduce a novel embedding of directed graphs derived from the singular value decomposition (SVD) of the normalized adjacency matrix. Specifically, we show that, after [...]
12
Nov
A tutorial on hidden Markov models
Achille Salaün will present a tutorial on Hidden Markov Models based on the reference: Lawrence R. Rabiner, A Tutorial on Hidden Markov Models and Selected Applications in [...]
07
Nov
Some Recent Advances on the Application of Game Theory to Networking
In the first part of the talk we shall consider game theory as a tool for analyzing and predicting the evolution of the Internet topology. [...]
05
Nov
Belief Propagation in Bayesian Networks
Céline Comte will present Belief Propagation in Bayesian Networks based on the two references: J. Pearl, Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach. [...]
Oct 2018
24
Oct
Two new methods for graph classification
Graph classification has recently received a lot of attention from various fields of machine learning e.g. kernel methods, sequential modeling or graph embedding. We address [...]
24
Oct
Some Architectural Considerations for Algorithms in Python
In this talk, we address a very common and practical question for the programmer: what should be the general architecture of our code? In particular, [...]
17
Oct
The Physics of Spectral Graph Embedding
Learning from data strutured as a graph usually requires to embed this graph in some vector space of low dimension. The most popular technique relies [...]
10
Oct
The Roaming Edge
Edge computing provides a new way to implement services with many unique advantages. While many edge computing solutions have been implemented within different network infrastructures, [...]
08
Oct
Finding structure with randomness: Probabilistic algorithms for constructing approximate matrix decompositions
Nathan de Lara will present the article Halko, N., Martinsson, P. G., & Tropp, J. A. (2011). Finding structure with randomness: Probabilistic algorithms for constructing [...]
03
Oct
Of Kernels and Queues: when network calculus meets analytic combinatorics
Stochastic network calculus is a tool for computing error bounds on the performance of queueing systems. However, deriving accurate bounds for networks consisting of several [...]
Sep 2018
26
Sep
Irrational Agents and the Power Grid
For decades power systems academics have proclaimed the need for real time prices to create a more efficient grid. The rationale is economics 101: proper [...]
24
Sep
Convex Optimization and Duality
The talk is based on the Online Course Convex Optimization by Stephen Boyd and the Book Convex Optimization by Stephen Boyd and Lieven Vandenberghe. Slides [...]
19
Sep
Regular Inference on Artificial Neural Networks
This lecture explores the general problem of explaining the behavior of Artificial Neural Networks (ANN). The goal is to construct a representation which enhances human [...]
12
Sep
Asymptotic Optimal Control of Markov-Modulated Restless Bandits
In this talk we will discuss optimal control subject to changing conditions (a changing environment). This is an area that recently received a lot of [...]
10
Sep
JiT acceleration in Python: introduction to Numba
This tutorial will explain how to easily turn slow Python into fast Python with the numba package. Speed up of X2000 will be demonstrated on [...]
Aug 2018
29
Aug
Protecting privacy in dynamic decision making
Motivated by the increasing ubiquity of large-scale data collection infrastructures, we investigate how to protect sensitive information in dynamic resource allocation problems. The central question [...]
02
Aug
On Network Connectivity for Distributed Machine Learning
Abstract: Many learning problems are formulated as minimization of some loss function on a training set of examples. Distributed gradient methods on a cluster are [...]
Jun 2018
27
Jun
In the wild Sensing for Smarter Cities and Healthcare
Modern cities are alive with sensors, such as smartphones, wearables, vehicles, and cameras. Realizing our plans for smart environments of the future necessitates a radical [...]
19
Jun
2018 LINCS Workshop
Workshop LINCS and its Scientific Committee June 19th and 20th, 2018 LINCS - 23 avenue d’Italie, 4th floor – 75013 Paris Agenda June 19th Welcome [...]
07
Jun
On the notion of Dimension of Unimodular Random Graphs
In this talk we will define notions of dimension on unimodular random graphs. The key point in this definition is unimodularity which is used indispensably [...]
06
Jun
On Mapping the Interconnections in Today’s Internet
Internet interconnections are the means by which networks exchange traffic between one another. These interconnections are typically established in facilities that have known geographic locations, [...]
May 2018
23
May
Machine Learning approaches for Computer Vision applications
Machine Learning, as the most successful paradigm of Artificial Intelligence to date, has shown its great potential in restructuring all aspects in our everyday life, [...]
14
May
Online influence maximization
We will talk about the online influence maximization problem in social networks under the independent cascade model. Specifically, we aim to learn the set of [...]
14
May
Topic detection and classification in Twitter
In this talk we introduce a novel information propagation method in Twitter, while maintaining a low computational complexity. The proposed method first employs Joint Complexity, [...]
14
May
On finding dense subgraphs and events in social media
Social media contain information shared by hundreds of millions of users across the world and provide one of the richest dataset created by human activity. [...]
