Cornet Seminar – Rachid Elazouzi – 31/03/2023

31 March 2023

In the context of team Cornet’s seminars, Rachid Elazouzi (LIA) will present his research work on Controlled Matching Game for Resource Allocation and User Association in WLANs, on March 31, 2023, at 11:35 in the meeting room. Abstract: In multi-rate IEEE 802.11 WLANs, the traditional user association based on the strongest received signal and the well known anomaly of the MAC protocol can lead to overloaded Access Points (APs), and poor or heterogeneous performance. Our goal is to propose an alternative game-theoretic approach for association. We model the joint resource allocation and user association as a matching game with complementarities and peer effects consisting of selfish players solely interested in their individual throughputs. Using recent game-theoretic results we first show that various resource sharing protocols actually fall in the scope of the set of stability-inducing resource allocation schemes. The game makes an extensive use of the Nash bargaining and some of its related properties that allow to control the incentives of the players. We show that the proposed mechanism can greatly improve the efficiency of 802.11 with heterogeneous nodes and reduce the negative impact of peer effects such as its MAC anomaly. The mechanism can be implemented as a virtual Plus d'infos

Cornet Seminar – Mandar Datar – 10/03/2023

10 March 2023

In the context of team Cornet’s seminars, Mandar Datar (LIA) will present her research work on Online algorithms in games and convex optimization, on March 10, 2023, at 11:35 in the meeting room.

Cornet Seminar – Panagiotis Andrianesis – 24/02/2023

24 February 2023

In the context of team Cornet’s seminars, Panagiotis Andrianesis (Boston University) will present his research work on Optimal Distributed Energy Resource Coordination: A Hierarchical Decomposition Method Based on Distribution Locational Marginal Costs, on February 23, 2023, at 11:35 in the meeting room. Abstract: In this work, we consider the day-ahead operational planning problem of a radial distribution network hosting Distributed Energy Resources (DERs) including rooftop solar and storage-like loads, such as electric vehicles. We present a novel hierarchical decomposition method that is based on a centralized AC Optimal Power Flow (AC OPF) problem interacting iteratively with self-dispatching DER problems adapting to real and reactive power Distribution Locational Marginal Costs. We illustrate the applicability and tractability of the proposed method on an actual distribution feeder, while modeling the full complexity of spatiotemporal DER capabilities and preferences, and accounting for instances of non-exact AC OPF convex relaxations. We show that the proposed method achieves optimal Grid-DER coordination, by successively improving feasible AC OPF solutions, and discovers spatiotemporally varying marginal costs in distribution networks that are key to optimal DER scheduling by modeling losses, ampacity and voltage congestion, and, most importantly, dynamic asset degradation.

Cornet Seminar – Sébastien De Valeriola – 10/02/2023

10 February 2023

In the context of team Cornet’s seminars, Sébastien De Valeriola (Free University of Brussels) will present his research work on “Fading Footprints in the Sand”: Analysis of Historical Networks and Robustness of Centrality Metrics, on February 10, 2023, at 11:35 in the room S6. Abstract: In this presentation, we consider centrality measures in their use in the analysis of historical networks. Since the sources used by historians to construct such networks are inherently incomplete and imperfect, it is necessary to take into account the robustness of these metrics as much as possible, i.e., their stability in the face of the vagaries that time has subjected historical documents to. To study this, we apply a battery of tests to three networks constructed from medieval history data. The first is a network of political history, representing the connections among the key figures in the conflict for the episcopal seat of Cambrai in the 11th century. The second is a network of socio-economic history, describing credit relationships among merchants in Ypres in the 13th century. The third is a hagiographical network depicting the connections between the lives of saints often compiled together in manuscripts. These tests are designed to simulate the processes of Plus d'infos

PhD defense of Afaf Arfaoui – 8 February 2023

8 February 2023

I am pleased to invite you to attend my PhD defense on 08/02/2023. The defense will start at 2h30 PM and it will be held at Hannah Arendt campus (in salle des thèses).  I will be happy to see you there. For those who are not able to attend, the BBB link is: https://v-au.univ-avignon.fr/live/bbb-soutenance-these-afaf-arfaoui-8-fevrier-2023/ Abstract: One of the fundamental components of wireless networks is Radio Access Network (RAN) delivering a wide reach wireless connectivity to the end users. The objective of RAN is to effectively manage and utilize the scarce spectrum to provide good connectivity to the end user. Over the past decade, the growth in usage of smartphones and handheld gadgets, as well as the surging adoption of smart vehicles and sensors, has caused a dramatic increase in the wireless traffic to be carried over the network. This traffic can be categorized into distinct use cases having varying requirements in terms of bandwidth, latency, reliability, etc., which are unlikely to be catered for by the current one-size-fits-all network infrastructure. Network Slicing (NS) has emerged as a promising architectural technology for building a highly flexible and dynamic network to meet the extremely diversified needs of use cases. The resulting network is much Plus d'infos

PhD defense of Chaimaa Boudagdigue – 8 February 2023

8 February 2023

Thesis presented at Avignon University to obtain the grade of doctor. Titre : Trust Models to secure Internet of Things networks Superviser: Abderrahim Benslimane Date: 15 March, 2023 at 14:00 Abstract: The Internet of Things (IoT) is a new paradigm where any device of everyday life can become part of the Internet. The device just needs to be equipped with a microcontroller, a transceiver and appropriate protocol stacks that make it able to communicate. IoT makes everyday devices intelligent and able to interact in a collaborative way in order to provide intelligent services in different fields such as: agriculture, industry, healthcare and many others. To achieve these objectives, IoT devices must manage confidential and privacy-related data of their users, which makes them very vulnerable to security threats. However, IoT devices do not have the necessary resources (energy, memory, processing, etc.) to implement strong security or to apply the traditional security measures based on cryptographic techniques usually deployed in traditional Internet. Moreover, the traditional security measures cannot ensure the reliability of the IoT networks, especially in the presence of internal attacks. Hence, our work consists in proposing a dynamic analytical trust management model where each IoT device in the network evaluates the trust Plus d'infos

Cornet Seminar – Felipe Albuquerque – 13/01/2023

13 January 2023

In the context of team Cornet’s seminars, Felipe Albuquerque (LIA/Espace) will present his research work on January 13, 2023, at 11:35 in the meeting room. Abstract: Frequently, social network information has been used to solve applications in Operation Research, such as the Team Formation Problem, whose goal is to find a subset of the workers that collectively cover a set of skills and can communicate effectively with each other. We use the Structural Balance Theory to define the compatibility between pairs of workers in the same team. For such, the social networks are represented by signed graphs, and the compatibility metric is calculated from the analysis of possible positive paths between pairs of distinct vertices. To solve this new version of the problem, we introduce an Integer Linear Programming formulation and a decomposition for it. We present an analysis of the performed computational tests that prove the potential efficiency of the decomposition proposed.

Cornet Seminar – Olivier Tsemogne – 09/12/2022

9 December 2022

In the context of team Cornet’s seminars, Olivier Tsemogne (LIA) will present his research work on Game Theory for Cyber Deception against Network SIR Epidemics, on December 12, 2022, at 11:35 in the meeting room. Abstract: One of the deleterious aspects of the evolution of information and communication technologies is the combination of efficiency and effectiveness in the malware spread, which clearly constitutes a threat to the security of the users of these technologies. The term “user” here covers individuals, companies, governmental or non-governmental organizations, states, in short, any person or group of persons who communicate using the new technologies. Among these threats, we can cite rumors in a social network and the stealthy recruitment of naive users into a cyber terrorist army capable, for example, of causing serious damage to a company whose services are used by these same users. In these two cases, as in many others, users, tricked by skilled experts, participate against their will and against their own interest in a cyber attack of which they are not aware, the bearer of the attack being deception. Moreover, cybercriminals, unlike cyber defenders, violate the rules of privacy and are therefore the best, if not the only, informed Plus d'infos

PhD defense of Naresh Modina – 6 December 2022

6 December 2022

I would like to invite you to my thesis defence that will be held on 06/12/2022 at 14:30 in the thesis room at Hannah Arendt campus (City centre). I would be glad to see your presence. For those who can not attend in person, a BBB link will be sent soon. Abstract: The widespread adoption of 5G cellular technology will evolve as one of the major drivers for the growth of IoT-based applications. In the first part of this thesis, we consider a service provider that launches a smart city service based on IoT data readings: to serve IoT data collected across different locations, the SP dynamically negotiates and re-scales bandwidth and service functions.  Network slicing is becoming the platform of choice for several applications and services. Nowadays, most applications are virtualized to gain flexibility and portability. With network slicing, operators can create multiple network slices, which can be used for different applications with specific requirements. Behind the network slicing, a slice expresses the need to access a precise service type, under a fully qualified set of computing and network requirements. Also, different infrastructure providers charge slicing services depending on specific access technology supported across sites and IoT data collection patterns. Plus d'infos

Cornet Seminar – Olivier Bilenne – 18/11/2022

18 November 2022

In the context of team Cornet’s seminars, Olivier Bilenne (ENPC) will present his research work on Solutions of Poisson’s equation for first-policy improvement in parallel queueing systems, on November 18, 2022, at 11:35 in the meeting room. Abstract: This talk addresses the problem of (state-aware) job dispatching at minimum long-run average cost in a parallel queueing system with Poisson arrivals. Policy iteration is a technique for approaching optimality through improvement of an initial dispatching policy. Its implementation rests on the computation of value functions. In this context, we will consider the M/G/1-FCFS queue endowed with an arbitrary cost function for the waiting times of the incoming jobs. The associated relative value function is a solution of Poisson’s equation for Markov chains, which I propose to solve in the Laplace transform domain by considering an ancillary stochastic process extended to (imaginary) negative backlog states. This construction enables us to issue closed-form solutions for simple cost functions (polynomial, exponential, and their piecewise compositions), in turn permitting the derivation of interval bounds for the relative value functions to more general cost functions. Such bounds allow for an exact implementation of the first improvement step of policy iteration in a parallel queueing system.One objective Plus d'infos

1 2 3 4 5 6 8