Jun 2019
12
Jun
12
Jun
12
Jun
Veolia blockchain projects
Veolia blockchain projects, Olivier Tridon, Véolia Slides Olivier Tridon - Veolia blockchain projectsDownload
12
Jun
Lifestyle Authentication
Tags : Lifestyle Authentification, Rie Yamaguchi, Tokyo University, Université de Tokyo, Blockchain Day Slides Rie Yamaguchi - Lifestyle AuthenticationDownload
12
Jun
Multi Signatures for Blockchains
Tags: Multi Signatures for Blockchains, Yannick Seurin, ANSSI, BlockChain Day Slides Yannick Seurin - Multi-Signatures for BlockchainsDownload
12
Jun
Blockchain Abstract Data Type
Tags : Blockchain Abstract Data Type, Antonella de Pozzo, CEA Slides Antonella del Pozzo - Abstract Data TypeDownload
12
Jun
The Consensus Number of a Cryptocurrency
Tags : The Consensus Number of a Cryptocurrency, Petr Kouznetsov, Telecom Paris, BlockChain Day Slides Petr Kouznetsov - The Consensus Number of a CryptocurrencyDownload
12
Jun
Dissection of a public Blockchain in Banque de France
Tags: BlockChain Day, Jean-Baptiste Baraton, Banque de France, Dissection of a public Blockchain in Banque de France
12
Jun
Blockchain Day
Program 9:00 Reception 9:15-9:20 Opening (Fabio + Maria) 9:20-10:00 Maurice Herlihy (Brown University) Cross-chain Deals and Adversarial Commerce 10:00-10:20 Jean-Baptiste Baraton (Banque de France) Dissection [...]
05
Jun
Transparent remote connectivity to short-range IoT devices
Short-range wireless communication technologies such as Bluetooth or ZigBee represent an important part of the Internet of Things ecosystem.By design, this category of smart devices [...]
May 2019
29
May
Stability and Metastability of Traffic Dynamics in Uplink Random Access Networks
This talk is about the characterization of the stability, metastability, and the stationary regime of traffic dynamics in a single-cell uplink wireless system. The traffic [...]
20
May
Manipulating and analyzing data with pandas
The Python Data Analysis Library (pandas) provides data structures and tools for manipulating and analyzing data. It is built on top of NumPy, the core [...]
15
May
Real-time identification of IoT device types
Identifying IoT devices types as they connect to the network enables better devices and services management. However, real-time identification is very challenging in such heterogeneous [...]
Apr 2019
24
Apr
Community Structures in Social (Information) Networks
Communities play an important role in social networks. However while there exists a large body of work that formally models and studies macroscopic properties of [...]
17
Apr
Communication Modeling in Wireless Body Area Networks (WBAN)
Wireless body area network has received a lot of attention in the medical monitoring domain because of its wireless convenience. Considering the safety of user, [...]
17
Apr
Combatting toxicity in on-line conversations
Abusive behaviour in online social media platforms (a.k.a. hate speech, toxicity, cyberbullying) has forced major companies to hire hundreds of moderators, or even buy a whole company to deal with [...]
15
Apr
Introduction to Conda and Jupyter notebooks
In this tutorial, we will see how to install the conda package manager and use it to create a Jupyter environment. We’ll then go through [...]
10
Apr
Hackathon Report
On March 27th 2019, students from LINCS hosted a Hackathon session on public data. The event gathered 20 participants from various institutions. In this talk, [...]
08
Apr
Journée d'exposé Inria-IMT sur les réseaux de communication radio
09:30-10:15 L. DecreusefondBreak10:30-11:15 B. BlaszczyszynBreak11:30-12:15 M. Coupechoux 12:15-14:00 Lunch break 14:00-14:45 S. KalamkarBreak15:00-15:45 P. MartinsBreak16:00-16:45 F. [...]
03
Apr
The effect of ramp constraints on coalitional storage games
Energy storage systems (ESS) are envisaged as a solution to a vast number of problems in Smart Grids, yet their prices are hindering a massive [...]
03
Apr
Organizing a Python Package with Cookiecutter
In this tutorial, we will see how to create and maintain a Python package, especially relying on Cookiecutter, by Audrey Roy Greenfeld, and PyCharm. Even [...]
01
Apr
Efficient Production of Training Data for Classification Supervised Learning
Supervised learning relies on the existence of training data, typically labeled by human experts. The size and quality of this data has a critical impact [...]
Mar 2019
21
Mar
Thesis Defense : Smart grid-aware radio engineering in 5G mobile networks
The energy demand in mobile networks is increasing due to the emergence of new technologies and new services with higher requirements (data rates, delays, etc). [...]
13
Mar
Multiparametric Boltzmann sampling and applications
I will describe the problem of multiparametric generation (which is #P-complete) and a relaxation of this problem (multiparametric Boltzmann sampling) for which we construct a [...]
11
Mar
An information-theoretic perspective of tf–idf measures.
Reference: Aizawa, Akiko. "An information-theoretic perspective of tf–idf measures." Information Processing & Management 39.1 (2003): 45-65.
06
Mar
A simple discrete-time model for complex NFV accelerators
Network Functions Virtualization (NFV) is among the latest network revolutions, bringing flexibility and avoiding network ossification. At the same time, all-software NFV implementations on commodity [...]
Feb 2019
27
Feb
Processing of Aggregations over Big Data Streams
Online analytics and real-time data processing in most advanced IoT, scientific, business, and defense applications, rely heavily on the efficient execution of large numbers of [...]
25
Feb
Tropical Geometry of Deep Neural Networks 🌴 (continued)
Reference: “Tropical geometry of deep neural networks” (Liwen Zhang, Gregory Naitzat, Lek-Heng Lim, 2018)
21
Feb
Ending the Era of Information Overload and Cognitive Fatigue
In the post-digital era we face the risk of cognitive insufficiency in the attempt of dealing with the increasing exposure to large volume of data [...]
20
Feb
Optimally Gathering Two Robots
We present a self-stabilizing algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, [...]
18
Feb
Tropical Geometry of Deep Neural Networks 🌴
Reference: "Tropical geometry of deep neural networks" (Liwen Zhang, Gregory Naitzat, Lek-Heng Lim, 2018)
13
Feb
Human Behavior is Low Dimensional
Every person is unique and complex. But can we predict anything about how large groups of people will behave? In the 1950s the writer [...]
06
Feb
Fully Dynamic k-center Clustering
Static and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms [...]
04
Feb
Limit distributions and Laplace's method
I will present some tools based on generating functions in order to study the limit distributions of some random variables. References: Analytic Combinatorics (Flajolet & [...]
Jan 2019
30
Jan
Resource Allocation in Cloud Radio Access Networks: A Combinatorial Optimization Point of View
In this presentation, we would like to focus on two well known NP-Hard problems and then provide a combinatorial optimization view before proposing new and [...]
23
Jan
Thesis Defense : Auction-based Dynamic Resource Orchestration in Cloud-based Radio Access Networks
The paradigm of a Cloud-based RAN (C-RAN) is a key technology that combines the enabling solutions for the 5G requirements in terms of data rate, [...]
16
Jan
Internet Video Quality Inference from Encrypted Network Traffic
Accurately monitoring application performance is becoming more important for Internet Service Providers (ISPs), as users increasingly expect their networks to consistently deliver acceptable application quality. [...]
07
Jan
Multi-armed bandits: Bayesian vs frequentist (2)
Lorenzo Maggi will present two approaches of multi-armed bandits: Bayesian and frequentist, based on the papers: Tsitsiklis, J. N. (1994). A short proof of the [...]
Dec 2018
19
Dec
12
Dec
Protecting encrypted data against key exposure
Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim at minimizing the additional processing costs due to data fragmentation and dispersion.
05
Dec
Nov 2018
28
Nov
Too Many SDN Rules, Compress Them Using Minnie
Software Defined Networking (SDN) is gaining momentum with the support of major manufacturers. While it brings flexibility in the management of flows within the data [...]
26
Nov
Multi-armed bandits: Bayesian vs frequentist
Lorenzo Maggi will present two approaches of multi-armed bandits: Bayesian and frequentist, based on the papers: Tsitsiklis, J. N. (1994). A short proof of the [...]
21
Nov
Thesis Defense : Hyperfractals for the Modelling of Wireless Networks
We are on the verge of an industrial revolution that will make cities smarter, industries more efficient and people’s life easier. Urban communication will place [...]
19
Nov
Canopus: Scalable Consensus for Permissioned Blockchains
A critical problem with the consensus protocols underlying blockchains is that they do not scale well. As the number of participants trying to achieve consensus [...]
14
Nov
The Forward-Backward Embedding of Directed Graphs
We introduce a novel embedding of directed graphs derived from the singular value decomposition (SVD) of the normalized adjacency matrix. Specifically, we show that, after [...]
12
Nov
A tutorial on hidden Markov models
Achille Salaün will present a tutorial on Hidden Markov Models based on the reference: Lawrence R. Rabiner, A Tutorial on Hidden Markov Models and Selected Applications in [...]
07
Nov
Some Recent Advances on the Application of Game Theory to Networking
In the first part of the talk we shall consider game theory as a tool for analyzing and predicting the evolution of the Internet topology. [...]
05
Nov
Belief Propagation in Bayesian Networks
Céline Comte will present Belief Propagation in Bayesian Networks based on the two references: J. Pearl, Reverend Bayes on Inference Engines: A Distributed Hierarchical Approach. [...]