Sorry, you need to enable JavaScript to visit this website.
Share

Publications

2017

  • Infinite dispersion in bursty communication
    • Tchamkerten Aslan
    • Li Longguang
    , 2017.
  • Nonlinear Fourier Transform in Optical Communications
    • Goossens Jen-Willem
    • Hafermann Hartmut
    • Yousefi Mansoor
    • Jaouën Yves
    , 2017, pp., paper CI-1.3.
  • Filter Assisted Memory Polynomial Predistortion for Small-Cell Base Stations
    • Manyam Venkata Narasimha
    • Pham Dang-Kièn Germain
    • Jabbour Chadi
    • Desgreys Patricia
    , 2017.
  • Benefits of Cache Assignment in Degraded BCs
    • Saeedi Bidokhti Shirin
    • Wigger Michèle
    • Yener A.
    , 2017.
  • Dependence Balance in Multiple Access Channels with Correlated Sources
    • Lapidoth Amos
    • Saeedi Bidokhti Shirin
    • Wigger Michèle
    , 2017.
  • Channel model accuracy in the near field: comparison and performances
    • Charaf Akl
    • Rodriguez G.
    IEEE Antennas and Wireless Propagation Letters, Institute of Electrical and Electronics Engineers, 2017.
  • Design and Verification of Secure Autonomous Vehicles
    • Apvrille Ludovic
    • Li Letitia W.
    • Bracquemond Annie
    , 2017. The rising wave of attacks on communicating embedded systems has exposed their users to risks of information theft, monetary damage, and personal injury. Unprotected remote access to connected features on conventional vehicles already can provide attackers operational control. With the impending introduction of autonomous vehicles, their increased connectivity of autonomous vehicles will offer even more avenues for attack. In this paper, we present a survey of previous attacks on connected vehicles, and the prospective security risks threatening autonomous vehicles. To address these vulnerabilities, previous projects on connected vehicle security, such as EVITA, proposed countermeasures including key distribution and Hardware Security Modules. The expense and overhead of these solutions can be high, leading us to place them only where necessary. We propose developing systems using our toolkit TTool, which locates insecure communications, and then determines performance impact of these countermeasures through modelling and formal verification.
  • Novel Pulsed-Latch Replacement in Non-Volatile Flip-Flop Core
    • Cai Hao
    • Wang You
    • Naviner Lirida
    • Zhao Weisheng
    , 2017.
  • Age-optimal constrained cache updating
    • Yates R.Y.
    • Ciblat Philippe
    • Yener A.
    • Wigger Michèle
    , 2017.
  • InAs/InP Quantum Dot Distributed Feedback Lasers With Narrow Spectral Linewidth
    • Duan Jianan
    • Huang Heming
    • Schires Kevin
    • Poole Philip
    • Grillot Frédéric
    , 2017.
  • Choisir la diversité - Le cas du mastère CPD
    • Guyon Magali
    • Moissinac Jean-Claude Jc
    • Lemarchand S.
    , 2017.
  • Simplified Assessment Method for Population RF Exposure Induced by a 4G Network
    • Huang Yuanyuan
    • Wiart Joe
    IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology, IEEE, 2017, 1 (1), pp.34-40. (10.1109/JERM.2017.2751751)
    DOI : 10.1109/JERM.2017.2751751
  • Information quantique - Distribution quantique de clés
    • Alleaume Romain
    , 2017.
  • Ultra-high resolution programmable arbitrary optical filter: design and applications
    • Jaouën Yves
    • Wei Wei
    • Yi L. L.
    • Hu W.
    , 2017.
  • Worst-Case Execution Time Analysis of Predicated Architectures
    • Brandner Florian
    • Amine Naji
    , 2017, 57, pp.1-13. The time-predictable design of computer architectures for the use in (hard) real-time systems is becoming more and more important, due to the increasing complexity of modern computer architectures. The design of predictable processor pipelines recently received considerable attention. The goal here is to find a trade-off between predictability and computing power. Branches and jumps are particularly problematic for high-performance processors. For one, branches are executed late in the pipeline. This either leads to high branch penalties (flushing) or complex software/hardware techniques (branch predictors). Another side-effect of branches is that they make it difficult to exploit instruction-level parallelism due to control dependencies. Predicated computer architectures allow to attach a predicate to the instructions in a program. An instruction is then only executed when the predicate evaluates to true and otherwise behaves like a simple nop instruction. Predicates can thus be used to convert control dependencies into data dependencies, which helps to address both of the aforementioned problems. A downside of predicated instructions is the precise worst-case execution time (WCET) analysis of programs making use of them. Predicated memory accesses, for instance, may or may not have an impact on the processor's cache and thus need to be considered by the cache analysis. Predication potentially has an impact on all analysis phases of a WCET analysis tool. We thus explore a preprocessing step that explicitly unfolds the control-flow graph, which allows us to apply standard analyses that are themselves not aware of predication. (10.4230/OASIcs.WCET.2017.6)
    DOI : 10.4230/OASIcs.WCET.2017.6
  • Représentations continues dérivées des caractères pour un modèle de langue neuronal à vocabulaire ouvert
    • Labeau Matthieu
    • Allauzen Alexandre
    , 2017. Cet article propose une architecture neuronale pour un modèle de langue à vocabulaire ouvert. Les représentations continues des mots sont calculées à la volée à partir des caractères les composant, gràce à une couche convolutionnelle suivie d'une couche de regroupement (pooling). Cela permet au modèle de représenter n'importe quel mot, qu'il fasse partie du contexte ou soit évalué pour la prédiction. La fonction objectif est dérivée de l'estimation contrastive bruitée (Noise Contrastive Estimation, ou NCE), calculable dans notre cas sans vocabulaire. Nous évaluons la capacité de notre modèle à construire des représentations continues de mots inconnus sur la tâche de traduction automatique IWSLT-2016, de l'Anglais vers le Tchèque, en ré-évaluant les N meilleures hypothèses (N-best reranking). Les résultats expérimentaux permettent des gains jusqu'à 0,7 point BLEU. Ils montrent aussi la difficulté d'utiliser des représentations dérivées des caractères pour la prédiction.
  • Fully Digital Feedforward Background Calibration Of Clock Skews For Sub-sampling TIADCs Using The Polyphase Decomposition
    • Le Duc Han
    • Nguyen D. M.
    • Jabbour Chadi
    • Desgreys Patricia
    • Jamin Olivier
    • Nguyen V. T.
    Transactions on Circuits ans Systems I, 2017, 64 (6), pp.1515-1528. (10.1109/TCSI.2016.2645978)
    DOI : 10.1109/TCSI.2016.2645978
  • Modeling and Characterization of the Uplink and Downlink Exposure in Wireless Networks
    • Krayni A.
    • Hadjem A.
    • Vermeeren G.
    • Sibille Alain
    • Roblin Christophe
    • Joseph W.
    • Martens L.
    • Wiart Joe
    International Journal of Antennas and Propagation, 2017, pp.1-15. This paper deals with a new methodology to assess the exposure induced by both uplink and downlink of a cellular network using 3D electromagnetic simulations. It aims to analyze together the exposure induced by a personal device (uplink exposure) and that induced by a base station (downlink exposure). The study involved the major parameters contributing to variability and uncertainty in exposure assessment, such as the user’s posture, the type of wireless device and the propagation environment. Our approach is relying basically on the modeling of the power radiated by the personal device and the ambient electric field, while taking into account the effects of human body shadowing and the propagation channel fluctuations. The exposure assessment as well as the human-wave interactions have been simulated using the finite difference in time domain method (FDTD). In uplink scenarios, four FDTD simulations were performed with a child model, used in two postures (sitting and standing) and in two usage scenarios (voice and data), which aimed to examine the exposure induced by a mobile phone and a tablet emitting, respectively, at 900 MHz and 1940 MHz. In the downlink scenario, a series of FDTD simulations of an exposure to a single plane wave and multi-plane waves have been conducted, and an efficient metamodeling of the exposure using the Polynomial Chaos approach has been developed. (10.1155/2017/8243490)
    DOI : 10.1155/2017/8243490
  • SC-PTM or MBSFN for Mission Critical Communications?
    • Daher Alaa
    • Coupechoux Marceau
    • Godlewski Philippe
    • Ngouat Pierre
    • Minot Pierre
    , 2017, pp.1-6. Long Term Evolution (LTE), designed by 3rd Generation Partnership Project (3GPP) to increase the capacity of radio mobile communications, has been endorsed by multiple public protection and disaster relief organizations as a next generation technology for Professional Mobile Radio (PMR) networks, which convey business and mission critical communications. One of the main services of PMR is the group communication that can be seen as a Multimedia Broadcast Multicast Service (MBMS). LTE offers functionality to transmit this type of flows either by MBMS over Single Frequency Network (MBSFN), or Single-Cell Point-To-Multipoint (SC-PTM). In this paper, we compare MBSFN, SC-PTM and unicast transmissions in terms of radio quality, system spectral efficiency and cell coverage. Our main conclusion is that SC-PTM together with Transmission Time Interval (TTI) bundling transmissions offers a flexible solution to trade coverage off for capacity.
  • TWEETHER Future Generation W-band Backhaul and Access Network Technology
    • Paoloni Claudio
    • Magne François
    • André Frédéric
    • Begaud Xavier
    • Krozer Viktor
    • Marilier Marc
    • Ramirez Antonio
    • Raimundo Ruiz Carrasco José
    • Vilar Ruth
    • Zimmermann Ralph
    , 2017.
  • Replication-Based Self-healing of Mobile Agents Exploring Complex Networks
    • Rodriguez Arles
    • Gomez Jonatan
    • Diaconescu Ada
    , 2017, pp.222-233. (10.1007/978-3-319-59930-4_18)
    DOI : 10.1007/978-3-319-59930-4_18
  • A Comparative Case Study of HTTP Adaptive Streaming Algorithms in Mobile Networks
    • Karagkioules Theodoros
    • Concolato Cyril
    • Tsilimantos Dimitrios
    • Valentin Stefan
    , 2017.
  • Injection-locking properties of a Fabry-Perot quantum cascade laser emitting at 5.6 µm
    • Spitz Olivier
    • Schires Kevin
    • Carras Mathieu
    • Grillot Frédéric
    , 2017.
  • Assessment of Fetal Exposure to 4G LTE Tablet in Realistic Scenarios: Effect of Position, Gestational Age, and Frequency
    • Chiaramello Emma
    • Parazzini Marta
    • Fiocchi Serena
    • Ravazzani Paolo
    • Wiart Joe
    IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology, IEEE, 2017, 1 (1), pp.26-33. (10.1109/JERM.2017.2727279)
    DOI : 10.1109/JERM.2017.2727279
  • Nonasymptotic convergence analysis for the unadjusted Langevin algorithm
    • Durmus Alain
    • Moulines Éric
    The Annals of Applied Probability, Institute of Mathematical Statistics (IMS), 2017, 27 (3), pp.1551 - 1587. In this paper, we study a method to sample from a target distribution π over Rd having a positive density with respect to the Lebesgue measure, known up to a normalisation factor. This method is based on the Euler discretization of the overdamped Langevin stochastic differential equation associated with π. For both constant and decreasing step sizes in the Euler discretization, we obtain nonasymptotic bounds for the convergence to the target distribution π in total variation distance. A particular attention is paid to the dependency on the dimension d, to demonstrate the applicability of this method in the high-dimensional setting. These bounds improve and extend the results of Dalalyan [J. R. Stat. Soc. Ser. B. Stat. Methodol. (2017) 79 651–676]. (10.1214/16-AAP1238)
    DOI : 10.1214/16-AAP1238