Sorry, you need to enable JavaScript to visit this website.
Share

Publications

2020

  • High resolution face age editing
    • Yao Xu
    • Newson Alasdair
    • Puy Gilles
    • Gousseau Yann
    • Hellier Pierre
    , 2020.
  • On generalized hyper-bent functions
    • Mesnager Sihem
    Cryptography and Communications-Discrete Structures, Boolean Functions, and Sequences (CCDS), 2020.
  • New characterizations and construction methods of bent and hyper-bent Boolean functions
    • Mesnager Sihem
    • Mandal B.
    • Tang C.
    Discrete Mathematics, Elsevier, 2020.
  • Codebooks from generalized bent Z4-valued quadratic forms
    • Qi Y.
    • Mesnager Sihem
    • Tang C.
    Discrete Mathematics, Elsevier, 2020.
  • Pythagore, J'adore
    • Zayana Karim
    Repères IREM, IREM, 2020. Ce texte reprend la trame d'un atelier proposé en avril-mai 2019 à Besançon pour le cinquantenaire des IREM, à Paris dans le cadre d'un plan national de formation, ainsi que dans les INSPÉ de Grenoble, Lyon et Nantes auprès des professeurs stagiaires (mathématiques et math-sciences). Il propose une étude, circonscrite aux programmes du second degré et à l'aune d'un questionnement QQOQCP 1 , de l'oeuvre de Pythagore. Flânons ainsi entre histoire, géographie, physique, musique, philosophie et bien sûr mathématiques... par Karim Zayana Inspecteur général, professeur invité à l'institut Mines-Télécom Avec esprit, humour et un zeste d'impertinence, on l'a mis en rap [1] et on l'a mis par terre [2] tandis qu'il nous mettait en pleurs [3]. En chanson, les artistes Isaaba, Renaud ou Aldebert, font rimer Pythagore sur nos chagrins d'école. Le grand homme ne sonne pourtant pas qu'avec « hardcore » et « mort »… À notre tour, dansons sur son trésor qui, charrié par les siècles, voyagea jusqu'à nous. L'exercice est plus sérieux qu'il y paraît, la simplicité d'un théorème, fût-il enfantin, n'est souvent qu'illusion. En savourer les mille et un reflets, en saisir l'essence, embrasser sa richesse reste un chemin ardu. La compréhension naît de l'effort, puis le plaisir de la compréhension. Là est la délivrance, point d'orgue culminant d'un processus long et sinueux qu'Heidegger résume en deux mots, chercher et questionner : « Tout questionner est un chercher. Tout chercher tire de ce qu'il recherche la direction qui précède et guide sa démarche. Questionner, c'est, sur le plan de la connaissance, chercher l'élément quant au fait qu'il soit et quant à son être tel. Chercher, sur le plan de la connaissance, s'appelle " recherche " quand est dégagé pour le déterminer ce après quoi la question se pose. » [4]. Toute la difficulté de trouver un sens aux choses est ici rendue par cette phrase, aussi complexe qu'abstraite. Il en va de même pour qui veut apprécier les mathématiques. Heureusement nous disposons d'outils. L'angle pédagogique des compétences en est un, et nous pourrions interroger en quoi la science des pythagoriciens les valide ou les développe, de calculer à communiquer en passant par modéliser sans oublier les facultés raisonner, représenter, chercher qu'il est d'usage d'effeuiller telles les pétales d'une fleur [5]. Une autre approche, que nous privilégions ici, relève de la méthodologie scientifique. Quand un chercheur analyse un problème, il le soumet un jour ou l'autre à ce crible [6] : 1. C'est de Qui, c'est Quand, c'est Où ? 1 Qui, Quand, Où, Quoi, Comment, Combien, Pour quoi/qui. Méthode empirique de questionnement circonstancié très utilisée en journalisme (de façon consciente), mais aussi en R&D (de façon sans doute moins formalisée).
  • Private free-space communications based on chaos synchronization of mid-infrared quantum cascade laser light
    • Spitz O
    • Herdt A
    • Wu J
    • Wong C.-W
    • Elsässer W
    • Grillot F
    , 2020. Free Space Optics (FSO) is a growing technology offering higher bandwidth with fast and cost-effective deployment compared to fiber technology. This work demonstrates private free-space communication with quantum cascade lasers (QCLs). The secret message is encoded into a chaotic waveform so that the information is hard for an eavesdropper to extract [1]. Chaos-based transmissions in FSO are fundamentally restricted by atmospheric phenomena (e.g., turbulence, fog or scattering). Thus, the operating wavelength is a key parameter that has to be chosen wisely to reduce the impact of the environmental parameters. In this context, QCLs are relevant semiconductor lasers because their optical wavelength lies within mid-infrared domains where the atmosphere is highly transparent [2]. The simplest way to generate a chaotic optical carrier from a QCL is to feed back part of its emitted light into the device after a certain time delay [3], beyond which chaos synchronization between the drive and the response QCLs occurs.
  • Real Time Multiscale Rendering of Dense Dynamic Stackings
    • Michel Elie
    • Boubekeur Tamy
    Computer Graphics Forum, Wiley, 2020, 39 (7), pp.169-179. Dense dynamic aggregates of similar elements are frequent in natural phenomena and challenging to render under full real time constraints. The optimal representation to render them changes drastically depending on the distance at which they are observed, ranging from sets of detailed textured meshes for near views to point clouds for distant ones. Our multiscale representation use impostors to achieve the mid-range transition from mesh-based to point-based scales. To ensure a visual continuum, the impostor model should match as closely as possible the mesh on one side, and reduce to a single pixel response that equals point rendering on the other. In this paper, we propose a model based on rich spherical impostors, able to combine precomputed as well as dynamic procedural data, and offering seamless transitions from close instanced meshes to distant points. Our approach is architectured around an on-the-fly discrimination mechanism and intensively exploits the rough spherical geometry of the impostor proxy. In particular, we propose a new sampling mechanism to reconstruct novel views from the precomputed ones, together with a new conservative occlusion culling method, coupled with a two-pass rendering pipeline leveraging early-Z rejection. As a result, our system scales well and is even able to render sand, while supporting completely dynamic stackings. (10.1111/cgf.14135)
    DOI : 10.1111/cgf.14135
  • La théorie de l'information
    • Rioul Olivier
    , 2020, pp.7.
  • Improving Interpretability for Computer-aided Diagnosis tools on Whole Slide Imaging with Multiple Instance Learning and Gradient-based Explanations
    • Pirovano A.
    • Heuberger H.
    • Berlemont S.
    • Ladjal S.
    • Bloch Isabelle
    , 2020, LNCS 12446, pp.43-53.
  • A lightweight ECC-based authentication scheme for Internet of Things (IoT)
    • Hammi Badis
    • Fayad Achraf
    • Khatoun Rida
    • Zeadally Sherali
    IEEE Systems Journal, IEEE, 2020. (10.1109/JSYST.2020.2970167)
    DOI : 10.1109/JSYST.2020.2970167
  • From Interferometric to Tomographic Synthetic Aperture Radar. Scatterer unmixing in urban areas: A review of synthetic aperture radar tomography-processing techniques
    • Rambour Clement
    • Budillon Alessandra
    • Johnsy Angel
    • Denis Loïc
    • Tupin Florence
    • Schirinzi Gilda
    IEEE geoscience and remote sensing magazine, IEEE, 2020, 8 (2).
  • Discrete and stochastic coalitional storage games
    • Kiedanski Diego
    • Orda Ariel
    • Kofman Daniel
    , 2020. To achieve a fully decarbonized power grid, a massive deployment of renewable energy resources will be needed, but because of the intermittent nature of their generation, their full potential will not be unleashed unless demand side flexibility plays a bigger role than today. Introducing energy storage at the residential level enables increasing load flexibility, as it allows end-customers to easily change their consumption profile and adapt to the grid requirements. As of today, energy storage for residential consumers represents a considerable investment that is not guaranteed to be profitable. Shared investment models in which a group of consumers jointly acquires energy storage have been proposed in the literature to increase the attractiveness of these devices. Such models naturally employ concepts of cooperative game theory. In this paper, we extend the state-of-the-art cooperative game for modeling the shared investment in storage by adding two crucial extensions: stochasticity of the load and discreetness of the storage device capacity. As our goal is to increase storage capacity in the grid, the number of devices that would be acquired by a group of players that cooperate according to our proposed scheme is compared to the number of devices that would be bought by consumers acting individually. Under the same criteria of customer profitability , simulations using real data reveal that our proposed scheme can increase the deployed storage capacity between 100% and 250%. (10.1145/3396851.3397729)
    DOI : 10.1145/3396851.3397729
  • Donsker's theorem in {Wasserstein}-1 distance
    • Coutin Laure
    • Decreusefond Laurent
    Electronic Communications in Probability, Institute of Mathematical Statistics (IMS), 2020, 25, pp.1--13. We compute the Wassertein-1 (or Kantorovitch-Rubinstein) distance between a random walk in $R^d$ and the Brownian motion. The proof is based on a new estimate of the Lipschitz modulus of the solution of the Stein's equation. As an application, we can evaluate the rate of convergence towards the local time at 0 of the Brownian motion. (10.1214/20-ECP308)
    DOI : 10.1214/20-ECP308
  • « Je dois y aller ». Analyses de séquences de clôtures entre humains et robot
    • Licoppe Christian
    • Rollet Nicolas
    Réseaux : communication, technologie, société, Lavoisier, La Découverte, 2020, N°220-221 (2), pp.151. (10.3917/res.220.0151)
    DOI : 10.3917/res.220.0151
  • Minimal linear codes from characteristic functions
    • Mesnager Sihem
    • Qi Y.
    • Ru H.
    • Tang C.
    IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2020.
  • La transmission « naturelle » des savoirs
    • Dessalles Jean-Louis
    , 2020, pp.49-58. Les sociétés de chasseurs-cueilleurs n'ont pas d'écoles. Elles accumulent pourtant des savoirs, elles possèdent des langues et des cultures sophistiquées. Si l'on compare notre espèce aux autres primates, tout est différent. Les cultures animales existent, mais elles sont si restreintes qu'elles sont longtemps passées inaperçues aux yeux des éthologues. Pourquoi existe-t-il tant de « savoirs » dans notre espèce ? Et pourquoi les transmettons-nous ? Si la question semble saugrenue, c'est parce que nous avons perdu de vue le caractère apparemment contre-nature de ce comportement. Un comportement contre-nature Les chimpanzés étudiés par l'éthologue Tetsuro Matsuzawa [1994] dans la forêt de Bossou, en Guinée, cassent spontanément des noix très dures en posant la noix sur une pierre (l'enclume) et en frappant avec une autre pierre (le marteau). Leur expertise demande des années d'imitation des congénères. Les jeunes l'acquièrent en explorant un peu au hasard des centaines de combinaisons de paramètres : choix des pierres, position de l'enclume, face et angle de frappe, etc. Les adultes sont très bienveillants vis-à-vis des jeunes qui les observent, mais on ne les voit jamais leur montrer activement le bon geste et encore moins intervenir lorsqu'ils font des erreurs à répétition. L'espèce humaine offre un contraste saisissant. Prenons l'exemple des forums techniques. Imaginons un étudiant qui apprend le langage informatique Python et cherche à savoir comment inverser une liste. Il tape « python reverse list » sur son moteur de recherche et arrive sur un forum comme Stackoverflow. Il constate que sa question a déjà été posée par un autre débutant et qu'elle a obtenu 29 réponses qui ont elles-mêmes reçu 34 commentaires. Les personnes qui ont pris la peine de répondre ne connaissent pas l'étudiant. Elles font partie d'une communauté, celle des programmeurs Python, au sein de laquelle l'entraide spontanée est considérée comme normale. Paru dans : P. Pion & N. Schlanger (Eds.), Apprendre-Archéologie de la transmission des savoirs, pp. 49-58. Paris: La Découverte, 2020.
  • Real-Time Deformation with Coupled Cages and Skeletons
    • Corda F
    • Thiery J M
    • Livesu M
    • Puppo E
    • Boubekeur T
    • Scateni R
    Computer Graphics Forum, Wiley, 2020. Skeleton-based and cage-based deformation techniques represent the two most popular approaches to control real-time deformations of digital shapes and are, to a vast extent, complementary to one another. Despite their complementary roles, high-end modelling packages do not allow for seamless integration of such control structures, thus inducing a considerable burden on the user to maintain them synchronized. In this paper, we propose a framework that seamlessly combines rigging skeletons and deformation cages, granting artists with a real-time deformation system that operates using any smooth combination of the two approaches. By coupling the deformation spaces of cages and skeletons, we access a much larger space, containing poses that are impossible to obtain by acting solely on a skeleton or a cage. Our method is oblivious to the specific techniques used to perform skinning and cage-based deformation, securing it compatible with pre-existing tools. We demonstrate the usefulness of our hybrid approach on a variety of examples. (10.1111/cgf.13900)
    DOI : 10.1111/cgf.13900
  • phiflow: A Differentiable PDE Solving Framework for Deep Learning via Physical Simulations
    • Holl Philipp
    • Koltun Vladlen
    • Um Kiwon
    • Thuerey Nils
    , 2020.
  • The Compared Costs of Domination, Location-Domination and Identification
    • Hudry Olivier
    • Lobstein Antoine
    Discussiones Mathematicae Graph Theory, University of Zielona Góra, 2020, 40 (1), pp.127-147. Let G = (V, E) be a finite graph and r ≥ 1 be an integer. For v ∈ V , let B r (v) = {x ∈ V : d(v, x) ≤ r} be the ball of radius r centered at v. A set C ⊆ V is an r-dominating code if for all v ∈ V , we have B r (v) ∩ C = ∅; it is an r-locating-dominating code if for all v ∈ V , we have B r (v) ∩ C = ∅, and for any two distinct non-codewords x ∈ V \ C, y ∈ V \ C, we have B r (x) ∩ C = B r (y) ∩ C; it is an r-identifying code if for all v ∈ V , we have B r (v) ∩ C = ∅, and for any two distinct vertices x ∈ V , y ∈ V , we have B r (x) ∩ C = B r (y) ∩ C. We denote by γ r (G) (respectively, ld r (G) and id r (G)) the smallest possible cardinality of an r-dominating code (respectively, an r-locating-dominating code and an r-identifying code). We study how small and how large the three differences id r (G)−ld r (G), id r (G)−γ r (G) and ld r (G) − γ r (G) can be. (10.7151/dmgt.2129)
    DOI : 10.7151/dmgt.2129
  • Complexity of voting procedures
    • Hudry Olivier
    , 2020.
  • SENSITIVITY ANALYSIS FOR STOCHASTIC SIMULATORS USING DIFFERENTIAL ENTROPY
    • Azzi Soumaya
    • Sudret Bruno
    • Wiart Joe
    International Journal for Uncertainty Quantification, Begell House Publishers, 2020, 10 (1), pp.25-33. (10.1615/Int.J.UncertaintyQuantification.2020031610)
    DOI : 10.1615/Int.J.UncertaintyQuantification.2020031610
  • A new parametrization for the Rician distribution
    • Nicolas Jean Marie
    • Tupin Florence
    IEEE Geoscience and Remote Sensing Letters, IEEE - Institute of Electrical and Electronics Engineers, 2020. The Rician distribution is widely used in SAR imagery to model the backscattering of a strong target inside a resolution cell. Nevertheless the computation of the parameters of the Rice distribution remains a difficult task. In this paper, a new parametrization to model the Rice distribution is introduced. Thanks to the introduction of a new variable defined by the ratio of the target contribution to the speckle, the relationship between the coefficient of variation and this new parameter can be derived. An efficient numerical method is proposed to evaluate it from the coefficient of variation and a discussion on the variance of this estimator is led. A comparison with other methods of estimation showed that the proposed approach is a good compromise between the variance of the estimate and the computation time. At last, a link between permanent scatterers and Rice distributed targets is proposed through this new parametrization. (10.1109/LGRS.2019.2957240)
    DOI : 10.1109/LGRS.2019.2957240
  • Resolution of a Routing and Wavelength Assignment Problem by Independent Sets in Conflict Graphs
    • Hudry Olivier
    , 2020.
  • Advanced Optical Communications and Networking
    • Gallion Philippe
    Proceeding of International Conference on Optical & Wireless Technologies , OWT 2019, 2020, Éditeurs : Ghanshyam Singh, Manish Tiwari, Tawfik Ismail, Vijay Janyani.
  • Query Rewriting On Path Views Without Integrity Constraints
    • Romero Julien
    • Preda Nicoleta
    • Suchanek Fabian
    , 2020. A view with a binding pattern is a parameterised query on a database. Such views are used, e.g., to model Web services. To answer a query on such views, one has to orchestrate the views together in execution plans. The goal is usually to nd equivalent rewritings, which deliver precisely the same results as the query on all databases. However, such rewritings are usually possible only in the presence of integrity constraints and not all databases have such constraints. In this paper, we describe a class of plans that give practical guarantees about their result even if there are no integrity constraints. We provide a characterisation of such plans and a complete and correct algorithm to enumerate them. Finally, we show that our method can nd plans on real-world Web Services.