Sorry, you need to enable JavaScript to visit this website.
Partager

Publications

 

Les publications de nos enseignants-chercheurs sont sur la plateforme HAL :

 

Les publications des thèses des docteurs du LTCI sont sur la plateforme HAL :

 

Retrouver les publications figurant dans l'archive ouverte HAL par année :

2019

  • Séminaire : Quantum Key Distribution and Perspectives
    • Alleaume Romain
    , 2019.
  • Performance Enhancement Techniques Based on CDL-impaired Multi-core Fiber Channel Model
    • Rekaya-Ben Othman Ghaya
    • Abousief Akram
    • Jaouën Yves
    , 2019.
  • Urban Surface Reconstruction in SAR Tomography by Graph-Cuts
    • Rambour Clément
    • Denis Loïc
    • Tupin Florence
    • Oriot Hélène
    • Huang Yue
    • Ferro-Famil Laurent
    Computer Vision and Image Understanding, Elsevier, 2019, 188, pp.102791. SAR (Synthetic Aperture Radar) tomography reconstructs 3-D volumes from stacks of SAR images. High resolution satellites such as TerraSAR-X provide images that can be combined to produce 3-D models. In urban areas, sparsity priors are generally enforced during the tomographic inversion process in order to retrieve the location of scatterers seen within a given radar resolution cell. However, such priors often miss parts of the urban surfaces. Those missing parts are typically regions of flat areas such as ground or rooftops. This paper introduces a surface segmentation algorithm based on the computation of the optimal cut in a flow network. This seg-mentation process can be included within the 3-D reconstruction framework in order to improve the recovery of urban surfaces. Illustrations on a TerraSAR-X tomographic dataset demonstrate the potential of the approach to produce a 3-D model of urban surfaces such as ground, façades and rooftops. (10.1016/j.cviu.2019.07.011)
    DOI : 10.1016/j.cviu.2019.07.011
  • Rademacher complexity for Markov chains: Applications to kernel smoothing and Metropolis–Hastings
    • Bertail Patrice
    • Portier François
    Bernoulli, Bernoulli Society for Mathematical Statistics and Probability, 2019, 25 (4B), pp.3912-3938. (10.3150/19-BEJ1115)
    DOI : 10.3150/19-BEJ1115
  • Survey of Performance Acceleration Techniques for Network Function Virtualization
    • Linguaglossa Leonardo
    • Lange Stanislav
    • Pontarelli Salvatore
    • Rétvári Gábor
    • Rossi D.
    • Zinner Thomas
    • Bifulco Roberto
    • Jarschel Michael
    • Bianchi Giuseppe
    Proceedings of the IEEE, Institute of Electrical and Electronics Engineers, 2019. The ongoing network softwarization trend holds the promise to revolutionize network infrastructures by making them more flexible, reconfigurable, portable, and more adaptive than ever. Still, the migration from hard-coded/hardwired network functions towards their software-programmable counterparts comes along with the need for tailored optimizations and acceleration techniques, so as to avoid, or at least mitigate, the throughput/latency performance degradation with respect to fixed function network elements. The contribution of this article is twofold. First, we provide a comprehensive overview of the host-based Network Function Virtualization (NFV) ecosystem, covering a broad range of techniques, from low level hardware acceleration and bump-in-the-wire offloading approaches, to highlevel software acceleration solutions, including the virtualization technique itself. Second, we derive guidelines regarding the design, development, and operation of NFV-based deployments that meet the flexibility and scalability requirements of modern communication networks. (10.1109/JPROC.2019.2896848)
    DOI : 10.1109/JPROC.2019.2896848
  • International mass gatherings and travel-associated illness: A GeoSentinel cross-sectional, observational study
    • Gautret Philippe
    • Angelo Kristina
    • Asgeirsson Hilmir
    • Duvignaud Alexandre
    • van Genderen Perry J.J.
    • Bottieau Emmanuel
    • Chen Lin
    • Parker Salim
    • Connor Bradley
    • Barnett Elizabeth
    • Libman Michael
    • Hamer Davidson
    Travel Medicine and Infectious Disease, Elsevier, 2019, 32, pp.101504. (10.1016/j.tmaid.2019.101504)
    DOI : 10.1016/j.tmaid.2019.101504
  • Several new classes of self-dual bent functions derived from involutions
    • Luo Gaojun
    • Cao Xiwang
    • Mesnager Sihem
    Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, Springer, 2019, 11 (6), pp.1261-1273. (10.1007/s12095-019-00371-9)
    DOI : 10.1007/s12095-019-00371-9
  • Séminaire : Communications et Calcul Quantique
    • Alleaume Romain
    , 2019.
  • L'Ecole sur le site Barrault
    • Gallion Philippe
    La Revue Télécom, 2019, 194 (194), pp.pp 8-12.
  • Water Detection in SWOT HR Images Based on Multiple Markov Random Fields
    • Lobry Sylvain
    • Denis Loïc
    • Williams Brent
    • Fjørtoft Roger
    • Tupin Florence
    IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, IEEE, 2019, 12 (11), pp.4315-4326. (10.1109/JSTARS.2019.2948788)
    DOI : 10.1109/JSTARS.2019.2948788
  • Reinforcement Learning Algorithm for Load Balancing in Self‐Organizing Networks
    • Ali Mohammed Shabbir
    • Coucheney Pierre
    • Coupechoux Marceau
    , 2019 (1).
  • 2D indoor localization system with an UWB multistatic radar
    • Awarkeh Nour
    , 2019. Nowadays, the ability to track objects and people is crucial for a huge number of applications, such as medical applications (monitoring of patients) or independent applications that require a very high accuracy and resolution in the positioning process. Therefore, the main scientific objective of this thesis is to develop a tracking system using an UWB multistatic radar system to provide realtime 2D location of transponders or active tags. The localization is carried out in polar coordinates (distance and azimuth angle) by merging the interferometry and goniometry principles, assuming a propagation channel with a direct path, or LoS between the station and the target. The designed ILS incorporates a hybrid technique by combining the duplex UWB and the Phase Correlation methods for the radial-distance and the azimuth angle estimates. The proposed ILS consists of two main components, a transmitter /receiver (transceiver) station serving as a LBS and an AT. The LBS has one transmitting channel and two identical and independent receiving channels. The localization is performed by sending UWB pulses towards the AT which acts as an active transponder and retransmits in turn the received signal back to the LBS upon delaying it. This designed ILS is expected to offer, under LoS conditions, a position estimation with high accuracy and resolution while maintaining low system complexity. The system works with a single anchor, and simultaneously addresses indoor challenges such as multipaths, strong signal attenuations, reflections, etc.
  • Ethereum for Secure Authentication of IoT using Pre-Shared Keys (PSKs)
    • El-Hajj Mohammad
    • Fadlallah Ahmad
    • Chamoun Maroun
    • Serhrouchni Ahmed
    , 2019, pp.1-7. Enterprises are no doubt interested in reaching data collected from billions of Internet of Things (IoT) devices which opens a huge potential business. The main concern remains the security challenges from the distribution of key while using public key cryptography. To ensure that IOT connected devices can be trusted to be what they are supposed to be, robust IoT device authentication is mandated. Each IoT device therefore requires a unique identity which can be verified when the device tries to link to an intermediate device. One of the early solutions used to secure data transmission among parties in public networks is the Public Key Infrastructure (PKI) which is used to distribute and manage public keys (digital certificates) among different parties and these certificates are generated upon request by Certificate Authorities (CA). Nevertheless, for billions of devices connected to IoT and mobile phones, the distribution management of certificates for each client proved to be inefficient. In this research, we propose a decentralized authentication platform based on PKI and Ethereum Blockchain. The public key certificates are stored in a decentralized fashion and the private keys are stored inside the devices themselves. It also includes a protocol for Pre-Shared Keys (PSK) distribution. PSK keys are then used by PSK-based security protocols for securing the communication channel between two devices. This platform includes a client-side module, a server-side Wallet Management Function, and a smart contract deployed on the Ethereum Blockchain network. This platform can be used by applications for end devices and/or intermediate devices authentication and a secure Machine-to-Machine (M2M) communication. The proposed platform is validated by the implementation of a Secure Session Establishment between IoT devices. Results show that the solution implementation has minimal impact on the existing networks, and the secure session setup time between two devices is negligib... (10.1109/WINCOM47513.2019.8942487)
    DOI : 10.1109/WINCOM47513.2019.8942487
  • Conception d’un Réseau d’Antennes Patch Microruban pour la Détection de Drones
    • Mendes Ruiz Pedro
    • Begaud Xavier
    • Magne François
    • Leder Etienne
    , 2019.
  • COCKPIT VIDEO CODING WITH TEMPORAL PREDICTION
    • Mitrica Iulia
    • Fiandrotti Attilio
    • Cagnazzo Marco
    • Mercier Eric
    • Ruellan Christophe
    , 2019. Recording an airplane cockpit screen is a challenging task since video codecs hardly preserve text details at the low bi-trates required by avionic applications. We recently proposed a scheme for semantic compression of airplane cockpit video that preserves the readability of text while meeting bitrate and encoder complexity constraints. Within each frame, text is segmented from the video and encoded as character strings rather than as pixels. Text in the screen is then inpainted, producing a residual video with few high frequency components easily encodable with standard codecs. The residual video is transmitted with the encoded text as side-information. At the receiver side, characters are synthesized atop the decoded residual video, leaving the text unaffected by compression artefacts. In this work, we evaluate our scheme with multiple video codecs with different prediction schemes, producing novel experimental evidence in terms of attainable rate-distortion performance and highlighting directions for future research.
  • An OPC UA PubSub MQTT Configuration Tool
    • Liu Zepeng
    • Bellot Patrick
    , 2019.
  • Weakly Informed Audio Source Separation
    • Schulze-Forster Kilian
    • Doire Clément
    • Richard Gael
    • Badeau Roland
    , 2019. Prior information about the target source can improve audio source separation quality but is usually not available with the necessary level of audio alignment. This has limited its usability in the past. We propose a separation model that can nevertheless exploit such weak information for the separation task while aligning it on the mixture as a byproduct using an attention mechanism. We demonstrate the capabilities of the model on a singing voice separation task exploiting artificial side information with different levels of expres-siveness. Moreover, we highlight an issue with the common separation quality assessment procedure regarding parts where targets or predictions are silent and refine a previous contribution for a more complete evaluation.
  • Handwriting and Drawing Features for Detecting Personality Traits
    • Esposito Anna
    • Amorese Terry
    • Buonanno Michele
    • Cuciniello Marialucia
    • Esposito Antonietta
    • Faundez-Zanuy Marcos
    • Likforman-Sulem Laurence
    • Riviello Maria Teresa
    • Troncone Alda
    • Cordasco Gennaro
    , 2019, pp.79-84. This research reports on handwriting/drawing quantitative features and their links with personality traits. To this aim, handwriting/drawing tasks have been proposed to 78 subjects (equally balance by gender and aged between 22-35 years), which were first administered the Big Five Personality questionnaire (BFQ). Subjects were clustered as low, typical, and high according to the scores obtained to each 5 personality dimensions (Openness, Conscientiousness, Extraversion, Agreeableness, Neuroticism). Measures of pressure, ductus, time, space, and inclination, were computed from digital recordings of the proposed handwriting/drawing tasks through an INTUOS WACOM digitizing tablet. On these data, ANOVA repeated measures were performed with gender and group category (low, typical and high for each of the BFQ dimension) as between and associated computed measures as within factors. Results show significant differences for each of the BFQ dimension among subject group categories and handwriting/drawing measures connecting quantitatively personality traits to graphology (10.1109/CogInfoCom47531.2019.9089985)
    DOI : 10.1109/CogInfoCom47531.2019.9089985
  • A Blockchain-based Lightweight Authentication Solution for IoT
    • Fayad Achraf
    • Khatoun Rida
    • Hammi Badis
    • Serhrouchni Ahmed
    , 2019.
  • Time-division multiplexing method and circuit for concurrent access to a computer resource
    • Hebbache Farouk
    • Jan Mathieu
    • Brandner Florian
    • Pautet Laurent
    , 2019. The invention relates to a method implemented by computer for arbitration between computer programs seeking to access a shared resource concurrently and each transmitting an access request. The method performs time-division multiple access according to which the time is divided into time slots, each of which is allocated to a critical program for access to the shared resource, each time slot comprising a plurality of time units. The method exploits a processing slack associated with each critical program in order to delay a processing deadline for an access request transmitted by the critical program. The method comprises, for each unit time, a step of selecting a waiting access request and a step of determining authorization for immediate processing of the selected access request. This determining operation comprises, for a unit time which does not correspond to the beginning of a time slot, when the critical program to which the next time slot is allocated has not issued the selected request, authorization for the immediate processing of the selected request if the processing slack of the critical program to which the next time slot is allocated is greater than a threshold.
  • Time-division multiplexing method and circuit for concurrent access to a computer resource
    • Hebbache Farouk
    • Jan Mathieu
    • Brandner Florian
    • Pautet Laurent
    , 2019. The invention relates to a method implemented by computer for arbitration between computer programs seeking to access a shared resource concurrently and each transmitting an access request. The method performs time-division multiple access according to which the time is divided into time slots, each of which is allocated to a critical program for access to the shared resource, each time slot comprising a plurality of time units. The method exploits a processing overhead associated with each critical program in order to delay a processing deadline for an access request transmitted by the critical program. The method comprises, for each unit time, a step of selecting a pending access request and a step of determining authorization for immediate processing of the selected access request. This determining operation comprises, for a unit time which does not correspond to the start of a time slot, when the critical program to which the next time slot is allocated has not transmitted the selected request, authorization for the immediate processing of the selected request if the processing overhead of the critical program to which the next time slot is allocated is greater than a threshold.
  • Exploiting flexibility in irrigation while maintaining optimal crop productivity
    • Kiedanski Diego
    • Kofman Daniel
    • Orda Ariel
    • Horta José
    • Otero Alvaro
    , 2019. Irrigation in agriculture is a major source of electricity demand flexibility that goes largely unexploited. In this paper we provide a model and a solution to the problem of scheduling irrigation time to minimize electricity costs while satisfying crop water requirements. We propose to apply rebates (aimed to consume renewable energy surplus) that were traditionally offered to the industrial sector, in the agricultural one. Furthermore an architecture is proposed to overcome some of the limitations that can hinder the adoption of such rebates. The architecture integrates scheduling techniques best studied in the networking literature. Numerical analysis is performed to validate our model and evaluate the proposed scheduling mechanisms, based on real data from a soybean producer and from the corresponding electricity operator. Results indicate that significant cost reductions can be obtained, specially if the rebates are considered.
  • Reconfigurable Lattice Agreement and Applications
    • Kuznetsov Petr
    • Rieutord Thibault
    • Tucci-Piergiovanni Sara
    , 2019. Reconfiguration is one of the central mechanisms in distributed systems. Due to failures and connectivity disruptions, the very set of service replicas (or $servers$) and their roles in the computation may have to be reconfigured over time. To provide the desired level of consistency and availability to applications running on top of these servers, the $clients$ of the service should be able to reach some form of agreement on the system configuration. We observe that this agreement is naturally captured via a $lattice$ partial order on the system states. We propose an asynchronous implementation of $reconfigurable$ lattice agreement that implies elegant reconfigurable versions of a large class of $lattice$ abstract data types, such as max-registers and conflict detectors, as well as popular distributed programming abstractions, such as atomic snapshot and commit-adopt. (10.4230/LIPIcs)
    DOI : 10.4230/LIPIcs
  • Sensitivity to forecast errors in energy storage arbitrage for residential consumers
    • Kiedanski Diego
    • Hashmi Umar
    • Bušić Ana
    • Kofman Daniel
    , 2019. With the massive deployment of distributed energy resources, there has been an increase in the number of end consumers that own photovoltaic panels and storage systems. The optimal use of such storage when facing Time of Use (ToU) prices is directly related to the quality of the load and generation forecasts as well as the algorithm that controls the battery. The sensitivity of such control to different forecasts techniques is studied in this paper. It is shown that good and bad forecasts can result in losses in particularly bad days. Nevertheless, it is observed that performing Model Predictive Control with a simple forecast that is representative of the pasts can be profitable under different price and battery scenarios. We use real data from Pecan Street and ToU price levels with different buying and selling price for the numerical experiments.
  • EEG-BASED DECODING OF AUDITORY ATTENTION TO A TARGET INSTRUMENT IN POLYPHONIC MUSIC
    • Cantisani Giorgia
    • Essid Slim
    • Richard Gael
    , 2019. Auditory attention decoding aims at determining which sound source a subject is "focusing on". In this work, we address the problem of EEG-based decoding of auditory attention to a target instrument in realistic polyphonic music. To this end, we exploit a stimulus reconstruction model which was proven to decode successfully the attention to speech in multi-speaker environments. To our knowledge, this model was never applied to musical stimuli for decoding attention. The task we consider here is quite complex as the stimuli used are polyphonic, including duets and trios, and are reproduced using loudspeakers instead of headphones. We consider the decoding of three different audio representations and investigate the influence on the decoding performance of multiple variants of musical stimuli, such as the number and type of instruments in the mixture, the spatial rendering, the music genre and the melody/rhythmical pattern that is played. We obtain promising results, comparable to those obtained on speech data in previous works, and confirm that it is possible to correlate the human brain activity with musically relevant features of the attended source.