Feb 2017
08
Feb
Data Protection by Means of Fragmentation
Although symmetric ciphers may provide strong computational security, a key leakage makes the encrypted data vulnerable. In a distributed storage environment, reinforcement of data protection [...]
03
Feb
QoE Management for Internet Applications: Technologies and Challenges
Abstract: The talk starts by presenting the current approaches for a QoE-aware service management in the Internet, i.e., application oriented or network management, which are [...]
01
Feb
The FUTEBOL project - experimentation on the optical/wireless network frontier
This talk will present the FUTEBOL project, which is a joint EU-Brazilproject focused on the creation of experimental testbeds. Theproject’s goal is to allow the [...]
01
Feb
PEERING: An AS for Us
PEERING is a testbed that provides safe and easy access for researchers to the Internet's BGP routing system, enabling and inspiring transformational research. Traditionally, the [...]
Jan 2017
25
Jan
Towards a Networking ``Characteristica Universalis''
Most unwritten languages today have no known grammar, and are rather governed by "unspoken rules". Similarly, we think that the young discipline of networking is [...]
18
Jan
Summarizing Performance Samples with Extrema rather than Averages: A Lesson from Practitioners
The notion of performance seems crucial to many fields of science and engineering. Some scientists are concerned with the performance of algorithms or computing hardware, [...]
11
Jan
The many faces of fault-tolerant and Byzantine tolerant distributed computing
The tolerance to faults and Byzantine behaviors has a long tradition in distributed computing. Now, more than ever, fault-tolerant and Byzantine tolerant distributed computing finds [...]
Dec 2016
14
Dec
Modeling and algorithms for IoT service characterization and recommendation
Connected devices, as key constituent elements of the Internet of Things (IoT), are flooding our real world environment. This digital wave paves the way for [...]
07
Dec
IRT SystemX: le programme "Internet de Confiance" et le projet "Cloud et virtualisation"
Presentation du programme IRT SystemX qui comprend les thématiques Cybersécurité et évolutionsdes architectures réseaux.
06
Dec
Granger Causality Networks: Causal Inference for Time Series Data
Identifying causal (rather than merely correlative)relationships in physical systems is a difficult task, particularly ifit is not feasible to perform controlled experiments. Granger'snotion of causality [...]
01
Dec
A BILEVEL MODEL OF FACILITY LOCATION THAT INVOLVES 
COMPETITION, SELFISH USERS AND QUEUES
In a competitive setting, we consider the problem faced by a firm that makes decisions concerning both the location and service levels of its facilities, [...]
Nov 2016
30
Nov
Variable neighborhood prediction of temporal collective profiles in web services usage
Temporal collective profiles generated by mobile network users can be used to predict network usage, which in turn can be used to improve the performance [...]
23
Nov
Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements
Understanding network health is essential to improving Internet reliability. For instance, detecting disruptions in peer and provider networks identifies fixable connectivity problems. Currently this task [...]
16
Nov
WalkSCAN: Improving PageRank for local community detection
Community detection is a fundamental problem in the field of graph mining. The objective is to find densely connected clusters of nodes, so-called communities, possibly [...]
08
Nov
Prototyping IoT-Cloud Services over Multisite Edge Clouds based on Affordable SmartX K-Clusters
Recently we are in the middle of structural changes toward software-defined ICT infrastructure, which attempts to transform the existing silo-based infrastructure into futuristic composable one by integrating [...]
02
Nov
Liberté, sans fraternité, est la mort de l'égalité pour video dans l'Internet(Network-layer QoE-fairness for Encrypted Adaptive Video Streams)
Netflix, YouTube, and the like, are now the dominant sources of traffic on the Internet. Recent studies observe that competing adaptive video streams generate flows [...]
Oct 2016
26
Oct
Maximum Coloring of Random Geometric Graphs
We have examined maximum vertex coloring of random geometric graphs, in an arbitrary but fixed dimension, with a constant number of colors, in a recent [...]
19
Oct
Hands-on series: Jupyter Notebook
The Jupyter Notebook is a web application that allows you to create and share documents that contain live code, equations, visualizations and explanatory text. Uses [...]
12
Oct
Caching Games between Content Providers and Internet Service Providers
We consider a scenario where an Internet Service Provider (ISP) serves users that choose digital content among M Content Providers (CP). In the status quo, [...]
05
Oct
Generalized Threshold-Based Epidemics in Random Graphs: the Power of Extreme Values
Bootstrap percolation is a well-known activation process in a graph,in which a node becomes active when it has at least $r$ active neighbors.Such process, originally [...]
03
Oct
Data and Algorithmic Bias in the Web - Amphi Jade (Barrault)
Abstract: The Web is the largest public big data repository that humankind hascreated. In this overwhelming data ocean, we need to be aware of thequality [...]
Sep 2016
28
Sep
n-Backtracking Spectrum of Degree-Corrected Stochastic Block Models
Motivated by community detection, we characterise the spectrum of the non-backtracking matrix $B$ in the Degree-Corrected Stochastic Block Model.Specifically, we consider a random graph on [...]
07
Sep
Network Function Virtualization; Techno-Economics
Network Function Virtualization (NFV) is an emerging approach that has received attention from both academia and industry as a way to improve flexibility, efficiency, and [...]
07
Sep
Dynamic Cache Partitioning for Encrypted Content Delivery
In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio and data transfer over the Internet. Nonetheless, an increasing [...]
Jul 2016
13
Jul
Data-Driven Design and Simulation of Future Mobile Networks (with applications in Vehicular Networks, Transportation, Mobile Health)
The future of social networking is in the mobile world. Future network services are expected to center around human activity and behavior. Wireless networks (including [...]
13
Jul
The Effects of Mobility on the Hit Performance of Cached D2D Networks
In this talk we will deal with problems arising in device-to-device (D2D) wireless networks, where user devices also have the ability to cache content. In [...]
06
Jul
Mining usage patterns in residential intranet of things
Ubiquitous smart technologies gradually transform modern homes into Intranet of Things, where a multitude of connected devices allow for novel home automation services (e.g., energy [...]
Jun 2016
29
Jun
A Minimax Optimal Algorithm for Crowdsourcing
We consider the problem of accurately estimating the reliability of workers based on noisy labels they provide, which is a fundamental question in crowdsourcing. We [...]
May 2016
18
May
Finding Very Damaging Needles in Very Large Haystacks
Abstract: Many of the most costly security compromises that enterprises suffer manifest as tiny trickles of behavior hidden within an ocean of other site activity. [...]
11
May
Networks of multi-server queues with parallel processing
We consider a network of multi-server queues wherein each job can be processed in parallel by any subset of servers within a pre-defined set that [...]
Apr 2016
20
Apr
Where are the anycasters
Use of anycast IP addresses has increased in the last few years: once relegated to DNS root and top-level domain servers, anycast is now commonly [...]
18
Apr
Data Cleaning in the Big Data era @ Barrault (Amphi Rubis)
Abstract: In the “big data†era, data is often dirty in nature because of several reasons, such as typos, missing values, and duplicates. The intrinsic [...]
18
Apr
Webstrates : Shareable Dynamic Media
I present our ACM UIST'15 Best Paper Award-winning research on Webstrates: Shareable Dynamic Media. In this work, we revisit Alan Kay's early vision of dynamic [...]
13
Apr
A Study of the Impact of DNS Resolvers on CDN Performance Using a Causal Approach
Resources such as Web pages or videos that are published in the Internet are referred to by their Uniform Resource Locator (URL). If a user [...]
Mar 2016
30
Mar
Dynamic Resource Allocation for C-RAN systems
Abstract: Cloud-Radio Access Network (C-RAN) is a new emerging technology that holds alluring promises for Mobile network operators regarding capital and operation cost savings. However, [...]
30
Mar
Passive Wi-Fi link Capacity Estimation on Commodity Access Points
Wi-Fi is the preferred way of accessing the internet for many devices at home, but it is vulnerable to performance problems due to sharing an [...]
25
Mar
Power Control for Non-Orthogonal Multiple Access in 5G Cellular Systems
Abstract: Non-orthogonal multiple access (NOMA) is a promising candidate for wireless access in 5G cellular systems, and has recently received considerable attentions from both academia [...]
23
Mar
iBGP2: a scalable iBGP redistribution mechanism leading to optimal routing
The Internet is made of almost 50,000 ASes exchanging routing informationthanks to BGP. Inside each AS, information is redistributed via iBGP sessions.This allows each router [...]
09
Mar
Bandwidth calendaring: a new SDN service
Abstract: Software Defined Networking paves the way for new services that enable better utilization of network resources. Bandwidth Calendaring (BWC) is a typical such example [...]
02
Mar
An Opportunistic Blanking SubFrame (OBS) solution for 5G networks
Abstract: Telco operators view network densification as a viable solution for the challenging goals set for the next generation cellular networks. Among other goals, network [...]
Feb 2016
26
Feb
On the Whittle Index for Restless Multi-armed Hidden Markov Bandits
Abstract: We consider a restless multi-armed bandit in which each armcan be in one two states. When an arm is sampled, the state of the [...]
24
Feb
Lattice network codes based on Barnes-Wall lattices
Abstract: Lattice network coding is employed in physical-layer network coding, with applications to two-way relay networks and multiple-access channels. The receiver wants to compute a [...]
24
Feb
Logic-Based Integrative Causal Discovery with Business Applications
Computational Causal Discovery aims to induce causal models,causal networks, and causal relations from observational data withoutperforming or by performing only few interventions (perbutations,manipulations) of [...]
10
Feb
That's the end of the Web as we know it
HTTP is one crucial element of nowadays Internet, almost to the point of being nowadays that ``thin waits'' that used to be identified with the [...]
03
Feb
Centralized Content Delivery Infrastructure Exploiting Resource Pools: Performance Models and Asymptotics
We consider a centralized content delivery infrastructure where a large number of storage-intensive files are replicated across several collocated servers. To achieve scalable delays in [...]
Jan 2016
27
Jan
Model-Graft: Accurate, Scalable and Flexible Analysis of Cache Networks
Large scale deployments of general cache networks, such as Content Delivery Networks or Information Centric Networking architectures, arise new challenges regarding their performance prediction and [...]
20
Jan
Virtualization techniques in the design of 5G networks
We describe in this talk the new possibilities offered by virtualization techniques in the design of 5G networks. We precisely introduce a convergent gateway realizing [...]
Dec 2015
16
Dec
Dynamic control of stochastic and fluid resource-sharing systems
We study the dynamic control of resource-sharing systems that arise in various domains: e.g. inventory management, healthcare and communication networks. We aim at efficiently allocating [...]
02
Dec
Finding dense subgraphs and interesting events in social networks
Algorithms for finding dense subgraphs are an important subroutine in many data mining tasks, in particular, community and event detection in social networks. Huge amount [...]
Nov 2015
18
Nov
CrowdSurf: Empowering Transparency in the Web
Abstract: Individuals lack proper means to supervise the services they contact and the information they exchange when surfing the web. Thissecurity task has become challenging [...]
