Nov 2022
30
Nov
Unimodular Random Graphs
I will define the unimodularity of random graphs and then I will give several examples of applications concerning tessellations, optimization, dynamic systems, etc. If time [...]
16
Nov
Coverage and Stability Analysis of Cellular Network with Temporal Traffic
In this talk, we discuss the stability region characterization of a random network when a traffic model is integrated into the network geometry description. First, [...]
16
Nov
Introduction to Multi-Agent Reinforcement Learning with Petting Zoo
PettingZoo (https://pettingzoo.farama.org/) is an open source Python source library supported by Farama Foundation to accelerate research in multi-agent reinforcement learning (RL). Inheriting the standard features [...]
09
Nov
Talking to robots and drones: Network requirements for autonomous agents in factories and warehouses of the future
Future factories and warehouses will contain fleets of autonomous agents to assist with monitoring and control. In this talk we will describe a variety of [...]
09
Nov
An introduction to network calculus
Network calculus is a theoretical framework for performance guarantees in communication networks. Here we present a first introduction to some fundamental concepts and principles in [...]
08
Nov
PhD thesis defense "Analysis and Control of Online Interactions through Neural Natural Language Processing"
Natural Language Processing is motivated by applications where computers should gain a semantic and syntactic understanding of human language. Recently, the field has been impacted [...]
02
Nov
Distributed Optimization for Cellular Networks
In this presentation, we will introduce a class of distributed optimization algorithms for resource allocation problem, built on potential game and related to simulated annealing. We [...]
Oct 2022
26
Oct
Work Memory Requirements in Error Susceptible Quantum Networks
We consider the problem of path congestion avoidance in networks of quantum repeaters and terminals. In other words, the avoidance of situations when demands exceed [...]
26
Oct
Concurrent Programming in Python3 Using Asyncio
Asyncio is a library to write concurrent code using the async/await syntax. Asyncio is used as a foundation for multiple Python asynchronous frameworks that provide [...]
19
Oct
Quantum Cryptography: Quantum Key Distribution protocols
Quantum cryptography [BBE92] consists of the communication of a shared secret key between two users (Alice and Bob) which prevents an eavesdropper (Eve) from intercepting [...]
12
Oct
Extended Reality in 5G NR and Beyond
Extended Reality (XR) has been one of the ambitious research topics under development for several decades and today it is becoming mature enough to appear [...]
12
Oct
Vehicular Networks, in Practice
Vehicular ad hoc networks are composed by vehicles sharing data over the radio channel. They are the basic infrastructure of Cooperative Intelligent Transport Systems (C-ITS), [...]
05
Oct
Distributed Task Processing with GNU Parallel
You probably tried many times to execute a script on multiple files in parallel, or to download multiple files at the same time, only to [...]
Sep 2022
28
Sep
PCANT — Programable Capture and Analysis of Network Traffic
PCANT is a solution for streamlining the deployment of arbitrary online traffic analysis methods inside networks. It allows network administrators to dynamically instantiate new monitoring [...]
21
Sep
Calculating the probability of the Condorcet Paradox using combinatorics tools
The paradox of Condorcet (1785) is a phenomenon that occurs when people express their preferences amongst candidates. Calculating the limiting probability of the Condorcet paradox [...]
Jun 2022
29
Jun
2022 LINCS Workshop with the Scientific Committee
This year Annual Workshop with the Scientific Committe will take place in LINCS new premises in Palaiseau (@Télécom-Paris). Four members of our Scientific Committee will [...]
22
Jun
Invertibility on the Poisson space and construction of Hawkes processes
Following previous investigations by Üstünel about the invertibility of some transformations on the Wiener space, we find some entropic conditions under which a random [...]
15
Jun
Bidding efficiently in Simultaneous Ascending Auctions using Monte Carlo Tree Search
We tackle in this work the problem for a player to efficiently bid in Simultaneous Ascending Auctions (SAA). Although the success of SAA partially comes [...]
15
Jun
Enumerating Bipartite Graphs With Degree Constraints
Enumerating graphs with a given degree sequence is a problem of interest in many fields such as voting theory and statistics. If we are able [...]
08
Jun
Stability of multiclass spatial birth-and-death processes with wireless-type interactions
With the densification of wireless networks and the increasing standards of wireless communication protocols, the study of the stochastic stability of wireless networks becomes increasingly [...]
08
Jun
Easy Convex Optimization in Python with CVXPY
Convex Optimization provide a set of fast, practical tools and algorithms which have applications accross many fields, from Machine Learning to Networking or Finance. However, [...]
May 2022
18
May
Operationalizing machine learning in real world networks
Applications of machine learning to networking, from performance diagnosis to security, have conventionally relied on models that are trained on offline packet traces, without regard [...]
18
May
Introduction to submodular functions
Submodularity is a property that models "diminishing return", when the benefits of adding a new element to a set decreases with the size of the [...]
11
May
LINCS young researchers "elevator pitch" presentation n°3/2022
Bizon Monroc Claire Inria PhD Informatique Le Corre Thomas Inria PhD Smart greed Shilov Ilia Inria PhD Game theoretic approaches for decentralized electricity markets Weber [...]
04
May
LINCS young researchers "elevator pitch" presentation n°2/2022
Davydov Michel Inria PhD Dynamiques markoviennes à base de processus ponctuels et leurs applications Khaniha Sayeh Inria PhD Popineau Pierre Inria PhD Study [...]
04
May
Introduction to Gym and Stable Baselines for reinforcement learning
Gym by OpenAI is an open source interface to reinforcement learning (RL) tasks. It comes with a set of standard tasks useful for benchmarking RL [...]
02
May
PhD Thesis defense "Model-Based Reinforcement Learning for Dynamic Resource Allocation in Cloud Environments"
The emergence of new technologies (Internet of Things, smart cities, autonomous vehicles, health, industrial automation, ...) requires efficient resource allocation to satisfy the demand. These [...]
Apr 2022
27
Apr
Representing reputation in a multiagent system
We consider the problem of a multiagent system where entities meet and interact in a pairwise fashion. Agents may rate the outcome of the interaction [...]
20
Apr
Cache Allocation in Multi-Tenant Edge Computing via online Reinforcement Learning
We consider in this work Edge Computing (EC) in a multi-tenant environment: the resource owner, i.e., the Network Operator (NO), virtualizes the resources and lets [...]
13
Apr
Towards an interactive visualization of the Internet
All kinds of Internet maps have been produced to emphasize various features of the network such as undersea cables [1], relationships between autonomous systems [2] [...]
13
Apr
Architecture in Object-Oriented Programming: A Case Study
What is often done: Explain basics of OOP (e.g. syntax), Give principles of clean programming (e.g. SOLID) with simplified examples, more or less realistic. What [...]
06
Apr
LINCS young researchers "elevator pitch" presentation n°1/2022
Elkael Maxime Télécom-SudParis (IMT) PhD Reinforcement learning, Networking Ben Ameur Ayoub Télécom-SudParis (IMT) PhD Edge computing Bezerra de Araujo Joao Paulo Télécom-Paris (IMT) PhD [...]
06
Apr
The Weakest Failure Detector Abstraction
Many important distributed computing problems cannot be solved in purely asynchronous fault-prone systems. These impossibilities can be circumvented with failure detectors, distributed oracles that provide [...]
Mar 2022
30
Mar
Learning Optimal Bids in Second Price Auctions with Temporal and Overlapping Targeting Constraints
Ad placement in web-browsing and wireless mobiles is an increasingly important component of the advertisement market. The market size is over $ 100 billion and [...]
23
Mar
GeoLink: a Multimodal approach Internet Scale Geolocation System for Improved Coverage and Accuracy
Despite being critical infrastructure, it remains challenging to accurately position the physical location of Internet routers. In contrast to end-host geolocation where provider databases, registry [...]
23
Mar
A brief introduction to Sagemath
SageMath is a free open-source mathematics software system licensed under the GPL. It builds on top of many existing open-source packages: NumPy, SciPy, matplotlib, Sympy, [...]
16
Mar
Cryptocurrency Wallet Security Solutions
With the growing popularity of cryptocurrencies, interest in digital signatures for securing keys is also on the rise. Researchers have been attempting since the 90’s [...]
16
Mar
Wireless communication channel for dummies (like me)
The bulk of the scientific talks on wireless communication begin with: "Let’s consider the classic model y = Hx where x and y are the [...]
10
Mar
LINCS-NEMO WORKSHOP on V2X
LINCS-NEMO workshop on vehicular networks **PROGRAM OF THE WORKSHOP** MARCH 2022, THURSDAY 10TH AND FRIDAY 11TH (9AM – 6PM) To make our vehicles smarter and [...]
02
Mar
Wireless scheduling subject to slice constraints
We present methods for achieving slice guarantees in cellular networks by adjusting the MAC scheduling weights. A network slice is a portion of a network [...]
02
Mar
SOLID Principles in Object-Oriented Programming
Once you know the basics of object-oriented programming, a more difficult step can be to design the architecture of your code for a given project: [...]
Feb 2022
23
Feb
Application of stream graphs theory on internet topology
The network topology of the internet and its dynamics has been studied extensively for two decades. Meanwhile, Latapy et al. extended graph theory to capture [...]
18
Feb
PhD thesis defense "Unsupervised Anomaly Detection: Methods and applications"
An anomaly (also known as outlier) is an instance that significantly deviates from the rest of the input data and being defined by Hawkins as [...]
16
Feb
Securing communications in the C-ITS
Cooperative Intelligent Transport Systems allow connected vehicles to communicate with each other, with the road-side infrastructure, and with other smart devices to improve road safety [...]
09
Feb
Graph-based contributions to machine learning
A graph is a mathematical object that makes it possible to represent relationships (called edges) between entities (called nodes). Graphs have long been a focal [...]
09
Feb
Object-Oriented Programming in Python
We will deep dive into the OOP paradigm and see how it’s implemented in Python. This session will be beginner-friendly and aims to give explanations and practical [...]
02
Feb
The Quantum Internet: Recent Advances and Challenges
Quantum information processing is at the cusp of having significant impact on technology and society in the form of providing unbreakable security, ultra-high-precision distributed sensing [...]
02
Feb
Infinite Hidden Markov Models
The Hidden Markov Model is a generative model in which the distribution of the observations depends on the state of a Markov chain. These models [...]
Jan 2022
26
Jan
A stochastic matching between graph theory and linear algebra
Stochastic dynamic matching has numerous applications, ranging from supply-chain management to kidney exchange programs. In a matching problem, different classes arrive according to independent Poisson processes. Unmatched items [...]
19
Jan
Accountable distributed computing
There are two major ways to deal with failures in distributed computing: fault-tolerance and accountability. Fault-tolerance intends to anticipate failures by investing into replication and [...]
19
Jan
Developping in Python
When you develop a Python project, it is highly recommended that you design it as a Python package, which gives you access to a variety [...]