Jun 2014
				06
				Jun
			
		
				06
				Jun
			
		
				05
				Jun
			
		
				05
				Jun
			
		Industry Panel: Trends in ICT and the role of research
			Israel Cidon – Sookasa, Vania Conan – Thales, Dohy Hong – Samsung, Robert Plana – Alstom, Krishan Subnani – Alcatel-Lucent, Dirk Trossen - Interdigital, Claire [...]
		
		
	
				05
				Jun
			
		
				05
				Jun
			
		
				05
				Jun
			
		2014 LINCS Workshop
			Workshop LINCS - agenda 2014-2 Workshop LINCS and its Scientific Committee June 5th and 6th, 2014 LINCS - 23 avenue d’Italie, 4th floor – 75013 [...]
		
		
	Apr 2014
				23
				Apr
			
		Some Thoughts on Loc/ID Separation
			Locator(Loc)/identifier(ID) Separation(LIS) was conceived to mitigate the explosion of the DFZ routing table. To be literally exact, every host would be given a Loc in [...]
		
		
	
				30
				Apr
			
		Tandem Jackson Networks, Asymmetric Inclusion Processes and Catalan Numbers
			The Tandem Jackson Networkis a system of n sites (queues)in series, where single particles (customers, jobs, packets, etc.) move, one by one anduni-directionally,from one site [...]
		
		
	
				02
				Apr
			
		Gold mining in a River of Internet Content Traffic
			With the advent of Over-The-Top content providers(OTTs), Internet Service Providers (ISPs) saw their portfolio of services shrink to the low margin role of data transporters. [...]
		
		
	
				02
				Apr
			
		Characterizing bufferbloat from end-hosts
			While, on routers and gateways, buffers on forwarding devices are required to handle bursty Internet traffic, overly large or badly sized buffers can interact with [...]
		
		
	Mar 2014
				26
				Mar
			
		Making mobile access networks green: from research to standardization
			Energy efficiency in mobile networks is gaining in importance from both environmental and business points of view. In particular, site sleep mode techniques are being [...]
		
		
	
				20
				Mar
			
		Opportunistic Channel Selection by Cognitive Radios Under Imperfect Observations and Limited Memory: A Repeated Game Model
			To help mitigate the critical stress on spectrum resources spurred by the more powerful and the more capable smart devices, a recent presidential advisory committee [...]
		
		
	
				19
				Mar
			
		Quantun Information
			Information is something encoded in physical systems's properties. Hence the study of information and computation is linked to the underlying physical processes. Quantum Information is [...]
		
		
	
				12
				Mar
			
		Network Fingerprinting: TTL-Based Router Signatures
			Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures [...]
		
		
	
				05
				Mar
			
		On the resiliency of the French Internet
			This presentation focuses on the resiliency of the French Internet, studied from thepoint of view of network interconnectivity. We define a model for representing theBGP-level [...]
		
		
	Feb 2014
				26
				Feb
			
		Impact of the electronic architecture of optical slot switching nodes on latency in ring networks
			An optical slot switching node network called POADM (packet optical add-drop multiplexers) has formerly been proposed as a flexible solution for metropolitan ring networks to [...]
		
		
	
				26
				Feb
			
		Energy-Aware Computing with Application Processors
			Energy aware computing is as ubiquitous as ubiquitous computing itself. The user experience and up-time of hand-held devices are affected directly by the squander of [...]
		
		
	
				20
				Feb
			
		On Recovering Causality Information from Time Series Data
			Suppose we have N time series available where one time-series could be causally dependent on others. For example, such dependence can be found in economic [...]
		
		
	
				19
				Feb
			
		Optimal cache allocation for content-centric networking
			Content-Centric Networking (CCN) is a promis-ing framework for evolving the current network architecture,advocating ubiquitous in-network caching to enhance contentdelivery. Consequently, in CCN, each router has [...]
		
		
	
				05
				Feb
			
		Be fair to flows: a fair network is attractive and trustworthy and far more than just adequate
			The subject of active queue management is again highly topical with the recent creation of a new IETF working group. Regained interest has arisen notably [...]
		
		
	Jan 2014
				29
				Jan
			
		Protecting Privacy While Providing Utility in Published Network Mobility Traces Using Differential Privacy
			Those who design, develop and deploy computer and networked systems, have a vital interest in how these systems perform in "real-world" scenarios. But real-world conditions [...]
		
		
	
				22
				Jan
			
		COBRA: Lean Intra-domain Routing in NDN
			Named Data Networking (NDN) is an emerging In-formation Centric Networking architecture based on hierarchicalcontent names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN [...]
		
		
	
				15
				Jan
			
		Community detection in stochastic block models via spectral methods
			Community detection consists in identification of groups of similar items within a population. In the context of online social networks, it isa useful primitive for [...]
		
		
	
				08
				Jan
			
		Presentation du PPP 5G
			Brigitte CARDINAEL Head of Cooperative Research France Telecom Orange Brigitte Cardinael graduated from INT in 1987. She joined Matra Communication in 1987,where she was involved [...]
		
		
	Dec 2013
				11
				Dec
			
		Combating Internet Attacks Via Infiltration
			Far and away the most energetic driver of modern Internet attacks is the ability of attackers to financially profit from their assaults. Many of these [...]
		
		
	
				10
				Dec
			
		Convergence Speed of Asymptotic Consensus Algorithms
			Asymptotic consensus is a phenomenon observed in bird flocking, firefly synchronization, opinion spreading, or synchronization of coupled oscillators. Algorithms that achieve asymptotic consensus are used [...]
		
		
	
				04
				Dec
			
		Understanding the Dynamic Behaviour of the Google Congestion
			This is a joint with G. Carlucci and S. Mascolo, and will be presented at Packet Video Workshop, San Jose, CA, USA, December 2013. Real-time [...]
		
		
	Nov 2013
				27
				Nov
			
		Adaptive Internet Governance: Innovation in the Ecosystem
			Abstract: The years following the United Nation's World Summit on the Information Society (WSIS) have seen much technological change related to the Internet as well [...]
		
		
	
				27
				Nov
			
		Providing Incentives for Wireless Peer-to-Peer Networks
			Wireless Peer-to-Peer (P2P) systems allow mobile users to obtain data from nearby peers instead of the far away base station. It has the benefits of [...]
		
		
	
				26
				Nov
			
		Feature Selection for Neuro-Dynamic Programming
			Neuro-Dynamic Programming encompasses techniques from both reinforcement learning and approximate dynamic programming. Feature selection refers to the choice of basis that defines the function class that is required [...]
		
		
	
				13
				Nov
			
		Reliable and Scalable Account Correlation Across Large Social Networks
			There is lot of interest and concern, both in research and industry, about the potential for correlating user accounts across multiple online social networking sites. [...]
		
		
	
				06
				Nov
			
		Détecteurs de défaillances
			Les détecteurs de défaillances ont été introduit par Chandra et Toueg en 1996 et ont été l'objet d'une recherche active depuis cette date. On présentera [...]
		
		
	Oct 2013
				23
				Oct
			
		Adaptive traffic light control using a wireless sensor network
			We consider the problem of controlling traffic lights in an urban environment composed of multiple adjacent intersections by using an intelligent transportation system to reduce [...]
		
		
	
				15
				Oct
			
		Randomized Load Balancing in Large Processor Sharing Systems
			Processor sharing models occur in a wide variety of situations. They are good models forbandwidth sharing as well as being solutions to NUM for logarithmic [...]
		
		
	
				09
				Oct
			
		Locator/ID split: Analysis of the caching system
			Abstract: Locator/Identifier splitting is a paradigm proposed to helpInternet scalability. At the same time, the separation of the locatorand the identifier name spaces allows for [...]
		
		
	Sep 2013
				18
				Sep
			
		Violation of interdomain routing assumptions
			We challenge a set of common assumptions that are frequently used tomodel interdomain routing in the Internet. We draw assumptions from thescientific literature and confront [...]
		
		
	
				18
				Sep
			
		Tolerating Byzantine failures in sparse networks
			As network grow larger and larger, they become more likely to fail locally. Indeed, the nodes may be subject to attacks, failures, memory corruption... In [...]
		
		
	
				04
				Sep
			
		Locator/ID split: Analysis of the caching system
			Locator/Identifier splitting is a paradigm proposed to help Internet scalability. At the same time, the separation of the locator and the identifier name spaces allows [...]
		
		
	Aug 2013
				28
				Aug
			
		Peeking Behind the NAT: An Empirical Study of Home Networks
			We present the first empirical study of home network availability, infrastructure, and usage, using data collected from home networks around the world. In each home, we de- ploy a [...]
		
		
	Jul 2013
				17
				Jul
			
		POMDP Approach for Pilot Allocation and Receive Antenna Selection
			This talk considers antenna selection (AS) at a receiver equipped with multiple antenna elements but only a single radio frequency chain for packet reception. As information about [...]
		
		
	
				10
				Jul
			
		Toward an Enhanced Internet Architecture: the Locator/Identifier Separation Protocol (LISP)
			The Locator/ID Separation Protocol (LISP), proposed by Ciscoand currently under standardization at the IETF (Internet Engineering Task Force), is an instantiation of the paradigm separating [...]
		
		
	
				04
				Jul
			
		Point-Map Palm Measures
			In this talk, we speak about a framework for studying point-map invariant measures. A compatible point-map on the set of counting measures is a mapping [...]
		
		
	