Seminars and Workshops
Apr 2014
02
Apr
Gold mining in a River of Internet Content Traffic
With the advent of Over-The-Top content providers(OTTs), Internet Service Providers (ISPs) saw their portfolio of services shrink to the low margin role of data transporters. [...]
02
Apr
Characterizing bufferbloat from end-hosts
While, on routers and gateways, buffers on forwarding devices are required to handle bursty Internet traffic, overly large or badly sized buffers can interact with [...]
Mar 2014
26
Mar
Making mobile access networks green: from research to standardization
Energy efficiency in mobile networks is gaining in importance from both environmental and business points of view. In particular, site sleep mode techniques are being [...]
20
Mar
Opportunistic Channel Selection by Cognitive Radios Under Imperfect Observations and Limited Memory: A Repeated Game Model
To help mitigate the critical stress on spectrum resources spurred by the more powerful and the more capable smart devices, a recent presidential advisory committee [...]
19
Mar
Quantun Information
Information is something encoded in physical systems's properties. Hence the study of information and computation is linked to the underlying physical processes. Quantum Information is [...]
12
Mar
Network Fingerprinting: TTL-Based Router Signatures
Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures [...]
05
Mar
On the resiliency of the French Internet
This presentation focuses on the resiliency of the French Internet, studied from thepoint of view of network interconnectivity. We define a model for representing theBGP-level [...]
Feb 2014
26
Feb
Impact of the electronic architecture of optical slot switching nodes on latency in ring networks
An optical slot switching node network called POADM (packet optical add-drop multiplexers) has formerly been proposed as a flexible solution for metropolitan ring networks to [...]
26
Feb
Energy-Aware Computing with Application Processors
Energy aware computing is as ubiquitous as ubiquitous computing itself. The user experience and up-time of hand-held devices are affected directly by the squander of [...]
20
Feb
On Recovering Causality Information from Time Series Data
Suppose we have N time series available where one time-series could be causally dependent on others. For example, such dependence can be found in economic [...]
19
Feb
Optimal cache allocation for content-centric networking
Content-Centric Networking (CCN) is a promis-ing framework for evolving the current network architecture,advocating ubiquitous in-network caching to enhance contentdelivery. Consequently, in CCN, each router has [...]
05
Feb
Be fair to flows: a fair network is attractive and trustworthy and far more than just adequate
The subject of active queue management is again highly topical with the recent creation of a new IETF working group. Regained interest has arisen notably [...]
Jan 2014
29
Jan
Protecting Privacy While Providing Utility in Published Network Mobility Traces Using Differential Privacy
Those who design, develop and deploy computer and networked systems, have a vital interest in how these systems perform in "real-world" scenarios. But real-world conditions [...]
22
Jan
COBRA: Lean Intra-domain Routing in NDN
Named Data Networking (NDN) is an emerging In-formation Centric Networking architecture based on hierarchicalcontent names, in-network caching mechanisms, receiver-driven operations, and content-level security schema. NDN [...]
15
Jan
Community detection in stochastic block models via spectral methods
Community detection consists in identification of groups of similar items within a population. In the context of online social networks, it isa useful primitive for [...]
08
Jan
Presentation du PPP 5G
Brigitte CARDINAEL Head of Cooperative Research France Telecom Orange Brigitte Cardinael graduated from INT in 1987. She joined Matra Communication in 1987,where she was involved [...]
Dec 2013
11
Dec
Combating Internet Attacks Via Infiltration
Far and away the most energetic driver of modern Internet attacks is the ability of attackers to financially profit from their assaults. Many of these [...]
10
Dec
Convergence Speed of Asymptotic Consensus Algorithms
Asymptotic consensus is a phenomenon observed in bird flocking, firefly synchronization, opinion spreading, or synchronization of coupled oscillators. Algorithms that achieve asymptotic consensus are used [...]
04
Dec
Understanding the Dynamic Behaviour of the Google Congestion
This is a joint with G. Carlucci and S. Mascolo, and will be presented at Packet Video Workshop, San Jose, CA, USA, December 2013. Real-time [...]
Nov 2013
27
Nov
Adaptive Internet Governance: Innovation in the Ecosystem
Abstract: The years following the United Nation's World Summit on the Information Society (WSIS) have seen much technological change related to the Internet as well [...]
27
Nov
Providing Incentives for Wireless Peer-to-Peer Networks
Wireless Peer-to-Peer (P2P) systems allow mobile users to obtain data from nearby peers instead of the far away base station. It has the benefits of [...]
26
Nov
Feature Selection for Neuro-Dynamic Programming
Neuro-Dynamic Programming encompasses techniques from both reinforcement learning and approximate dynamic programming. Feature selection refers to the choice of basis that defines the function class that is required [...]
13
Nov
Reliable and Scalable Account Correlation Across Large Social Networks
There is lot of interest and concern, both in research and industry, about the potential for correlating user accounts across multiple online social networking sites. [...]
06
Nov
Détecteurs de défaillances
Les détecteurs de défaillances ont été introduit par Chandra et Toueg en 1996 et ont été l'objet d'une recherche active depuis cette date. On présentera [...]
Oct 2013
23
Oct
Adaptive traffic light control using a wireless sensor network
We consider the problem of controlling traffic lights in an urban environment composed of multiple adjacent intersections by using an intelligent transportation system to reduce [...]
15
Oct
Randomized Load Balancing in Large Processor Sharing Systems
Processor sharing models occur in a wide variety of situations. They are good models forbandwidth sharing as well as being solutions to NUM for logarithmic [...]
09
Oct
Locator/ID split: Analysis of the caching system
Abstract: Locator/Identifier splitting is a paradigm proposed to helpInternet scalability. At the same time, the separation of the locatorand the identifier name spaces allows for [...]
Sep 2013
18
Sep
Violation of interdomain routing assumptions
We challenge a set of common assumptions that are frequently used tomodel interdomain routing in the Internet. We draw assumptions from thescientific literature and confront [...]
18
Sep
Tolerating Byzantine failures in sparse networks
As network grow larger and larger, they become more likely to fail locally. Indeed, the nodes may be subject to attacks, failures, memory corruption... In [...]
04
Sep
Locator/ID split: Analysis of the caching system
Locator/Identifier splitting is a paradigm proposed to help Internet scalability. At the same time, the separation of the locator and the identifier name spaces allows [...]
Aug 2013
28
Aug
Peeking Behind the NAT: An Empirical Study of Home Networks
We present the first empirical study of home network availability, infrastructure, and usage, using data collected from home networks around the world. In each home, we de- ploy a [...]
Jul 2013
17
Jul
POMDP Approach for Pilot Allocation and Receive Antenna Selection
This talk considers antenna selection (AS) at a receiver equipped with multiple antenna elements but only a single radio frequency chain for packet reception. As information about [...]
10
Jul
Toward an Enhanced Internet Architecture: the Locator/Identifier Separation Protocol (LISP)
The Locator/ID Separation Protocol (LISP), proposed by Ciscoand currently under standardization at the IETF (Internet Engineering Task Force), is an instantiation of the paradigm separating [...]
04
Jul
Point-Map Palm Measures
In this talk, we speak about a framework for studying point-map invariant measures. A compatible point-map on the set of counting measures is a mapping [...]
03
Jul
Optimizing QoS in Wireless Sensor Networks Using a Caching Platform
This paper addresses monitoring and surveillance applications using Wireless Sensors Networks (WSN). In this context, several remote clients are interested in receiving the information collected by the nodes in a WSN. As [...]
03
Jul
Efficient IP-level network topology capture
Large-scale distributed traceroute-based measurement systems are used to obtain the topology of the Internet at the IP-level and can be used to monitor and understand the behaviour of [...]
Jun 2013
19
Jun
Nash equilibrium structure of a class of blocking games arising in network security
We study a game-theoretic model for security/availability in a networking context. To perform some desired task, a defender needs to choose a subset from a set of resources. To [...]
12
Jun
Integer programming models for transmission scheduling in wireless networks
In the presentation, we will discuss exact integer programming models for transmission scheduling in wireless networks based on the notion of compatible set. A compatible set is defined as [...]
04
Jun
From Gossip to Distributed Optimization (and back again)
Consensus in a network is a fundamental, thoroughly, studied problem. It is well known that the main obstacles to it are unreliability and asynchronism as [...]
May 2013
22
May
SMOOTH: A Simple and Realistic Way to Model Human Mobility
Simulation is the research tool of choice for a majority of the mobile ad hoc network (MANET) community; however, while the use of simulation has [...]
14
May
Design of a Survivable VPN Topology over a Service Provider Network
Survivability in IP-over-WDM networks has already been extensively discussed in a series of studies. Up to date,most of the studies assume single-hop working routing of [...]
03
May
CLIPS: Infrastructure-free Collaborative Indoor Positioning Scheme
Indoor localization has attracted much attentionrecently due to its potential for realizing indoor location-awareapplication services. This talk considers a time-criticalscenario with a team of soldiers or first responders conductingemergency mission operations in a [...]
Apr 2013
30
Apr
Control of the grid in 2020, and how economics can help us
In this talk we survey control issues in the grid, and how the introduction of renewables brings new and interesting control problems. We also explain the need for economic theory [...]
24
Apr
Real-time Monitoring of Physical Phenomena and their Dynamics with Quality Guarantees via Wireless Sensor Networks
Wireless sensor networks (WSN) are a powerful type of instrument with thepotential of remotely observing the physical world at high resolution and scale.However, to be [...]
23
Apr
A Benes Packet Network
Benes networks are constructed with simple switch modules and have many advantages, including small latency and requiring only an almost linear number of switch modules. As circuit-switches, Benes networks [...]
17
Apr
Controlling Electric Loads to Manage Energy Imbalances in Power
Increasing the share of energy produced by wind turbines, solar photovoltaics, and solar thermal power plants helps society address many key energy challenges including climate [...]
15
Apr
NDN Reaching 3: Results and Challenges -- A Personal Perspective
In this talk I plan to do a quick walk-through for part of the works we have done over the last 2.5 years. More specifically I will discuss what [...]
10
Apr
Robust Mobile Wireless Networking
Cellular wireless networks are expanded to support ultra high speed multimedia applications and incorporate the use of next generation energy efficient micro base stations in supporting much higher density of mobile [...]
Mar 2013
29
Mar
Optimization of Decentralized Partially Observable Systems in Cognitive Radio Networks
We consider a non-cooperative Dynamic Spectrum Access (DSA) game where Secondary Users (SUs) access opportunistically the spectrum licensed for Primary Users (PUs). As SUs spend [...]