Apr 2017
04
Apr
Stable matchings: roommates, marriage and kidneys
Fabien Mathieu will present Stable matchings: roommates, marriage and kidneys Starting point to learn about stable matchings: Mariages stables (Dominique Dumont)
Mar 2017
29
Mar
28
Mar
Research Overflow: pre-KickOff
An early, informal meeting, to discuss the whereabouts of the Research Overflow working group. Tentative ordre du jour Link with the Lincs Upgrade Yourself Academy: [...]
21
Mar
Application of the Mellin transform to suffix trees and tries
Anne Bouillard will present Average size of a suffix tree for Markov sources, Jacquet, Szpankowaki, 2016
15
Mar
13
Mar
Meeting IoT #03
3 short presentations: Overview of a survey about IoT (Nesrine Ammar); Presentation about Wireless Body Area Networks (Gewu Bu); Presentation of issues on transparency and [...]
08
Mar
Wi-Fi Direct-based Device-to-Device Communications for Dense Wireless Networks
Wi-Fi Direct is a popular wireless technology which is integrated in most of today's smartphones and tablets. This technology allows a set of devices to [...]
07
Mar
Mellin transform and asymptotics: harmonic sums
Anne Bouillard will present Mellin transform and asymptotics: harmonic sums, Flajolet, Gourdon and Dumas, 1995
06
Mar
03
Mar
03
Mar
Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
Abstract: As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures. The Security-as-a-Service (SECaaS) paradigm allows customers to outsource security to the [...]
01
Mar
Named-Object Based Services in the Future Internet Architecture
After many years of constant evolution, the Internet has approached a historic inflection point where mobile platforms, applications and services are poised to replace the [...]
Feb 2017
27
Feb
22
Feb
Insensitivity of Loss Systems under Randomized SQ(d) Algorithms
Abstract: In many applications such as cloud computing, managing server farm resources etc. an incoming task or job has to be matched with an appropriate [...]
21
Feb
The formal Theory of Birth-and-death processes, lattice path combinatorics and continuous fractions
Céline Comte and Élie de Panafieu will present The formal Theory of Birth-and-death processes, lattice path combinatorics and continuous fractions, Flajolet and Guillemin, 2000
20
Feb
Meeting IoT #01
Kick-off meeting. Initial discussions about interests of people in IoT and about objective of this group at LINCS
15
Feb
Real option game theoretic framework for investment decisions in mobile TV
We present a strategic investment framework for mobile TV delivery by two potential operators: broadcaster (DVB) and cellular (MNO), in the presence of demand and [...]
08
Feb
Data Protection by Means of Fragmentation
Although symmetric ciphers may provide strong computational security, a key leakage makes the encrypted data vulnerable. In a distributed storage environment, reinforcement of data protection [...]
03
Feb
QoE Management for Internet Applications: Technologies and Challenges
Abstract: The talk starts by presenting the current approaches for a QoE-aware service management in the Internet, i.e., application oriented or network management, which are [...]
01
Feb
The FUTEBOL project - experimentation on the optical/wireless network frontier
This talk will present the FUTEBOL project, which is a joint EU-Brazilproject focused on the creation of experimental testbeds. Theproject’s goal is to allow the [...]
01
Feb
PEERING: An AS for Us
PEERING is a testbed that provides safe and easy access for researchers to the Internet's BGP routing system, enabling and inspiring transformational research. Traditionally, the [...]
Jan 2017
25
Jan
Towards a Networking ``Characteristica Universalis''
Most unwritten languages today have no known grammar, and are rather governed by "unspoken rules". Similarly, we think that the young discipline of networking is [...]
18
Jan
Summarizing Performance Samples with Extrema rather than Averages: A Lesson from Practitioners
The notion of performance seems crucial to many fields of science and engineering. Some scientists are concerned with the performance of algorithms or computing hardware, [...]
11
Jan
The many faces of fault-tolerant and Byzantine tolerant distributed computing
The tolerance to faults and Byzantine behaviors has a long tradition in distributed computing. Now, more than ever, fault-tolerant and Byzantine tolerant distributed computing finds [...]
Dec 2016
14
Dec
Modeling and algorithms for IoT service characterization and recommendation
Connected devices, as key constituent elements of the Internet of Things (IoT), are flooding our real world environment. This digital wave paves the way for [...]
07
Dec
IRT SystemX: le programme "Internet de Confiance" et le projet "Cloud et virtualisation"
Presentation du programme IRT SystemX qui comprend les thématiques Cybersécurité et évolutionsdes architectures réseaux.
06
Dec
Granger Causality Networks: Causal Inference for Time Series Data
Identifying causal (rather than merely correlative)relationships in physical systems is a difficult task, particularly ifit is not feasible to perform controlled experiments. Granger'snotion of causality [...]
01
Dec
A BILEVEL MODEL OF FACILITY LOCATION THAT INVOLVES 
COMPETITION, SELFISH USERS AND QUEUES
In a competitive setting, we consider the problem faced by a firm that makes decisions concerning both the location and service levels of its facilities, [...]
Nov 2016
30
Nov
Variable neighborhood prediction of temporal collective profiles in web services usage
Temporal collective profiles generated by mobile network users can be used to predict network usage, which in turn can be used to improve the performance [...]
23
Nov
Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements
Understanding network health is essential to improving Internet reliability. For instance, detecting disruptions in peer and provider networks identifies fixable connectivity problems. Currently this task [...]
16
Nov
WalkSCAN: Improving PageRank for local community detection
Community detection is a fundamental problem in the field of graph mining. The objective is to find densely connected clusters of nodes, so-called communities, possibly [...]
08
Nov
Prototyping IoT-Cloud Services over Multisite Edge Clouds based on Affordable SmartX K-Clusters
Recently we are in the middle of structural changes toward software-defined ICT infrastructure, which attempts to transform the existing silo-based infrastructure into futuristic composable one by integrating [...]
02
Nov
Liberté, sans fraternité, est la mort de l'égalité pour video dans l'Internet(Network-layer QoE-fairness for Encrypted Adaptive Video Streams)
Netflix, YouTube, and the like, are now the dominant sources of traffic on the Internet. Recent studies observe that competing adaptive video streams generate flows [...]
Oct 2016
26
Oct
Maximum Coloring of Random Geometric Graphs
We have examined maximum vertex coloring of random geometric graphs, in an arbitrary but fixed dimension, with a constant number of colors, in a recent [...]
19
Oct
Hands-on series: Jupyter Notebook
The Jupyter Notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations and explanatory text. Uses [...]
12
Oct
Caching Games between Content Providers and Internet Service Providers
We consider a scenario where an Internet Service Provider (ISP) serves users that choose digital content among M Content Providers (CP). In the status quo, [...]
05
Oct
Generalized Threshold-Based Epidemics in Random Graphs: the Power of Extreme Values
Bootstrap percolation is a well-known activation process in a graph,in which a node becomes active when it has at least $r$ active neighbors.Such process, originally [...]
03
Oct
Data and Algorithmic Bias in the Web - Amphi Jade (Barrault)
Abstract: The Web is the largest public big data repository that humankind hascreated. In this overwhelming data ocean, we need to be aware of thequality [...]
Sep 2016
28
Sep
n-Backtracking Spectrum of Degree-Corrected Stochastic Block Models
Motivated by community detection, we characterise the spectrum of the non-backtracking matrix $B$ in the Degree-Corrected Stochastic Block Model.Specifically, we consider a random graph on [...]
07
Sep
Network Function Virtualization; Techno-Economics
Network Function Virtualization (NFV) is an emerging approach that has received attention from both academia and industry as a way to improve flexibility, efficiency, and [...]
07
Sep
Dynamic Cache Partitioning for Encrypted Content Delivery
In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio and data transfer over the Internet. Nonetheless, an increasing [...]
Jul 2016
13
Jul
Data-Driven Design and Simulation of Future Mobile Networks (with applications in Vehicular Networks, Transportation, Mobile Health)
The future of social networking is in the mobile world. Future network services are expected to center around human activity and behavior. Wireless networks (including [...]
13
Jul
The Effects of Mobility on the Hit Performance of Cached D2D Networks
In this talk we will deal with problems arising in device-to-device (D2D) wireless networks, where user devices also have the ability to cache content. In [...]
06
Jul
Mining usage patterns in residential intranet of things
Ubiquitous smart technologies gradually transform modern homes into Intranet of Things, where a multitude of connected devices allow for novel home automation services (e.g., energy [...]
Jun 2016
29
Jun
A Minimax Optimal Algorithm for Crowdsourcing
We consider the problem of accurately estimating the reliability of workers based on noisy labels they provide, which is a fundamental question in crowdsourcing. We [...]
May 2016
18
May
Finding Very Damaging Needles in Very Large Haystacks
Abstract: Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within an ocean of other site activity. [...]
11
May
Networks of multi-server queues with parallel processing
We consider a network of multi-server queues wherein each job can be processed in parallel by any subset of servers within a pre-defined set that [...]
Apr 2016
20
Apr
Where are the anycasters
Use of anycast IP addresses has increased in the last few years: once relegated to DNS root and top-level domain servers, anycast is now commonly [...]
18
Apr
Data Cleaning in the Big Data era @ Barrault (Amphi Rubis)
Abstract: In the “big data†era, data is often dirty in nature because of several reasons, such as typos, missing values, and duplicates. The intrinsic [...]
18
Apr
Webstrates : Shareable Dynamic Media
I present our ACM UIST'15 Best Paper Award-winning research on Webstrates: Shareable Dynamic Media. In this work, we revisit Alan Kay's early vision of dynamic [...]
13
Apr
A Study of the Impact of DNS Resolvers on CDN Performance Using a Causal Approach
Resources such as Web pages or videos that are published in the Internet are referred to by their Uniform Resource Locator (URL). If a user [...]