Seminars and Workshops
Oct 2019
09
Oct
OFDMA Dimensioning
This presentation will cover different models for the dimensioning of OFDMA air interfaces. In a first part, models that rely on classical stochastic geometry results [...]
Sep 2019
25
Sep
Distributed Reconfiguration of Graph Problems
In Graph Theory, a reconfiguration problem is as following: given two solutions of a problem and a transition definition, is there a path of acceptable [...]
19
Sep
Harnessing the Difficulties of Synchronization
We are well into the era of multi-core architectures and as the applications demands are still growing, we soon expect to see the first many-cores [...]
18
Sep
Backtrack bandit algorithms for cloud computing
Unimodal functions arise whenever the expected value f(x) of the metric to be optimized has a single peak as a function of the available control [...]
04
Sep
Tractable reliable communication in static and dynamic compromised networks
Many solutions to fault tolerant distributed system problems, such as state machine replication, safe broadcast or agreement, rely on reliable communication primitives which guarantee the [...]
Jul 2019
10
Jul
Towards theoretically-founded structure learning
Solving most inference tasks, such as denoising and linear regression, relies on exploiting the structure of the desired class of signals (e.g. images). Traditionally, such structures [...]
10
Jul
Channel Estimation in Visible Light Communications
In visible light communications (VLC), LEDs are used for not only illumination but also communications. LEDs can further be used to support indoor positioning with [...]
03
Jul
Structural and Temporal Information
Shannon's information theory has served as a bedrock for advances in communication and storage systems over the past five decades. However, this theory does not [...]
Jun 2019
26
Jun
Mirai and the Current State of IoT Security
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed and censored high-profile websites [...]
26
Jun
Leveraging Quantum Annealing for Large MIMO Processing in Centralized Radio Access Networks
Conventional thinking treats the wireless channel as a given constraint, so wireless networks to date center on the problem optimizing the communication endpoints. We instead [...]
19
Jun
Fine-grained analysis of wireless networks: Spatial outage capacity and rate control
Modern wireless networks should be able to accommodate a high density of users. But serving more users usually generates higher interference which leads to more [...]
19
Jun
Function Computation in Networks
This talk describes a new perspective on cloud/fog computing, by distributing computation in order to handle the large volume of data with growing computational demand. [...]
05
Jun
Transparent remote connectivity to short-range IoT devices
Short-range wireless communication technologies such as Bluetooth or ZigBee represent an important part of the Internet of Things ecosystem.By design, this category of smart devices [...]
May 2019
29
May
Stability and Metastability of Traffic Dynamics in Uplink Random Access Networks
This talk is about the characterization of the stability, metastability, and the stationary regime of traffic dynamics in a single-cell uplink wireless system. The traffic [...]
15
May
Real-time identification of IoT device types
Identifying IoT devices types as they connect to the network enables better devices and services management. However, real-time identification is very challenging in such heterogeneous [...]
Apr 2019
24
Apr
Community Structures in Social (Information) Networks
Communities play an important role in social networks. However while there exists a large body of work that formally models and studies macroscopic properties of [...]
17
Apr
Communication Modeling in Wireless Body Area Networks (WBAN)
Wireless body area network has received a lot of attention in the medical monitoring domain because of its wireless convenience. Considering the safety of user, [...]
17
Apr
Combatting toxicity in on-line conversations
Abusive behaviour in online social media platforms (a.k.a. hate speech, toxicity, cyberbullying) has forced major companies to hire hundreds of moderators, or even buy a whole company to deal with [...]
10
Apr
Hackathon Report
On March 27th 2019, students from LINCS hosted a Hackathon session on public data. The event gathered 20 participants from various institutions. In this talk, [...]
03
Apr
The effect of ramp constraints on coalitional storage games
Energy storage systems (ESS) are envisaged as a solution to a vast number of problems in Smart Grids, yet their prices are hindering a massive [...]
Mar 2019
13
Mar
Multiparametric Boltzmann sampling and applications
I will describe the problem of multiparametric generation (which is #P-complete) and a relaxation of this problem (multiparametric Boltzmann sampling) for which we construct a [...]
06
Mar
A simple discrete-time model for complex NFV accelerators
Network Functions Virtualization (NFV) is among the latest network revolutions, bringing flexibility and avoiding network ossification. At the same time, all-software NFV implementations on commodity [...]
Feb 2019
27
Feb
Processing of Aggregations over Big Data Streams
Online analytics and real-time data processing in most advanced IoT, scientific, business, and defense applications, rely heavily on the efficient execution of large numbers of [...]
21
Feb
Ending the Era of Information Overload and Cognitive Fatigue
In the post-digital era we face the risk of cognitive insufficiency in the attempt of dealing with the increasing exposure to large volume of data [...]
20
Feb
Optimally Gathering Two Robots
We present a self-stabilizing algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, [...]
13
Feb
Human Behavior is Low Dimensional
Every person is unique and complex. But can we predict anything about how large groups of people will behave? In the 1950s the writer [...]
06
Feb
Fully Dynamic k-center Clustering
Static and dynamic clustering algorithms are a fundamental tool in any machine learning library. Most of the efforts in developing dynamic machine learning and data mining algorithms [...]
Jan 2019
30
Jan
Resource Allocation in Cloud Radio Access Networks: A Combinatorial Optimization Point of View
In this presentation, we would like to focus on two well known NP-Hard problems and then provide a combinatorial optimization view before proposing new and [...]
16
Jan
Internet Video Quality Inference from Encrypted Network Traffic
Accurately monitoring application performance is becoming more important for Internet Service Providers (ISPs), as users increasingly expect their networks to consistently deliver acceptable application quality. [...]
Dec 2018
12
Dec
Protecting encrypted data against key exposure
Hardening data protection using multiple methods rather than solely encryption is of paramount importance when considering continuous and powerful attacks to spy private and confidential information. Our research focuses on reinforcing data protection using a combination of data fragmentation, encryption, and dispersion. Each operation participates in the increasing of the protection level. We aim at minimizing the additional processing costs due to data fragmentation and dispersion.
05
Dec
Nov 2018
28
Nov
Too Many SDN Rules, Compress Them Using Minnie
Software Defined Networking (SDN) is gaining momentum with the support of major manufacturers. While it brings flexibility in the management of flows within the data [...]
19
Nov
Canopus: Scalable Consensus for Permissioned Blockchains
A critical problem with the consensus protocols underlying blockchains is that they do not scale well. As the number of participants trying to achieve consensus [...]
14
Nov
The Forward-Backward Embedding of Directed Graphs
We introduce a novel embedding of directed graphs derived from the singular value decomposition (SVD) of the normalized adjacency matrix. Specifically, we show that, after [...]
07
Nov
Some Recent Advances on the Application of Game Theory to Networking
In the first part of the talk we shall consider game theory as a tool for analyzing and predicting the evolution of the Internet topology. [...]
Oct 2018
24
Oct
Two new methods for graph classification
Graph classification has recently received a lot of attention from various fields of machine learning e.g. kernel methods, sequential modeling or graph embedding. We address [...]
24
Oct
Some Architectural Considerations for Algorithms in Python
In this talk, we address a very common and practical question for the programmer: what should be the general architecture of our code? In particular, [...]
17
Oct
The Physics of Spectral Graph Embedding
Learning from data strutured as a graph usually requires to embed this graph in some vector space of low dimension. The most popular technique relies [...]
10
Oct
The Roaming Edge
Edge computing provides a new way to implement services with many unique advantages. While many edge computing solutions have been implemented within different network infrastructures, [...]
03
Oct
Of Kernels and Queues: when network calculus meets analytic combinatorics
Stochastic network calculus is a tool for computing error bounds on the performance of queueing systems. However, deriving accurate bounds for networks consisting of several [...]
Sep 2018
26
Sep
Irrational Agents and the Power Grid
For decades power systems academics have proclaimed the need for real time prices to create a more efficient grid. The rationale is economics 101: proper [...]
19
Sep
Regular Inference on Artificial Neural Networks
This lecture explores the general problem of explaining the behavior of Artificial Neural Networks (ANN). The goal is to construct a representation which enhances human [...]
12
Sep
Asymptotic Optimal Control of Markov-Modulated Restless Bandits
In this talk we will discuss optimal control subject to changing conditions (a changing environment). This is an area that recently received a lot of [...]
Aug 2018
29
Aug
Protecting privacy in dynamic decision making
Motivated by the increasing ubiquity of large-scale data collection infrastructures, we investigate how to protect sensitive information in dynamic resource allocation problems. The central question [...]
02
Aug
On Network Connectivity for Distributed Machine Learning
Abstract: Many learning problems are formulated as minimization of some loss function on a training set of examples. Distributed gradient methods on a cluster are [...]
Jun 2018
27
Jun
In the wild Sensing for Smarter Cities and Healthcare
Modern cities are alive with sensors, such as smartphones, wearables, vehicles, and cameras. Realizing our plans for smart environments of the future necessitates a radical [...]
19
Jun
2018 LINCS Workshop
Workshop LINCS and its Scientific Committee June 19th and 20th, 2018 LINCS - 23 avenue d’Italie, 4th floor – 75013 Paris Agenda June 19th Welcome [...]
07
Jun
On the notion of Dimension of Unimodular Random Graphs
In this talk we will define notions of dimension on unimodular random graphs. The key point in this definition is unimodularity which is used indispensably [...]
06
Jun
On Mapping the Interconnections in Today’s Internet
Internet interconnections are the means by which networks exchange traffic between one another. These interconnections are typically established in facilities that have known geographic locations, [...]
May 2018
23
May
Machine Learning approaches for Computer Vision applications
Machine Learning, as the most successful paradigm of Artificial Intelligence to date, has shown its great potential in restructuring all aspects in our everyday life, [...]
14
May
Online influence maximization
We will talk about the online influence maximization problem in social networks under the independent cascade model. Specifically, we aim to learn the set of [...]