Cornet Seminar – Paolo Zappala – 09/06/2023
In the context of team Cornet’s seminars, Paolo Zappala (LIA/Orange) will present his research work on Extensive-form games with perfect information, on June 6, 2023, at 11:35 in the meeting room.
In the context of team Cornet’s seminars, Paolo Zappala (LIA/Orange) will present his research work on Extensive-form games with perfect information, on June 6, 2023, at 11:35 in the meeting room.
Date: 2nd of May at 2:00 pm. Place: Avignon at the Centre d’Enseignement et de Recherche en Informatique (Ada Lovelace Auditorium) The jury members: Title: Assessment of Speech Intelligibility using Deep Learning: Towards Enhanced Interpretability in Clinical Phonetics. Abstract: Speech intelligibility is an essential component of effective communication. It refers to the degree to which a speaker’s intended message can be understood by a listener. This capacity can be hampered as a consequence of speech disorders, which results in a reduced quality of life for individuals. In the case of Head and Neck Cancer (HNC), speech may be affected due to the presence of tumors in the speech production system, but the main cause of speech impairment is typically the tumor treatment including surgery, radiotherapy, chemotherapy, or a combination of these treatments. In such cases, the evaluation of speech quality is crucial to assess the communication deficit of patients and develop targeted treatment plans. In clinical practice, perceptual measures are considered the gold standard for assessing speech disorders. Although these measures are widely used, they suffer from several limitations, the most important of which is their subjectivity. Consequently, the automatic assessment of speech disorders has emerged as a promising alternative to perceptual Plus d'infos
Date: 26th of April at 2:30pm. Place: Centre d’Enseignement et de Recherche en Informatique (Ada Lovelace auditorium) The jury will consist of: Title: Representing evidence for attribute privacy: Bayesian updating, compositional evidence and calibration. Abstract: Attribute privacy in multimedia technology aims to hide only one or a few personal characteristics, or attributes, of an individual rather than the full identity. To give a few examples, these attributes can be the sex, nationality, or health state of the individual. When the attribute to hide is discrete with a finite number of possible values, the attacker’s belief about the attribute is represented by a discrete probability distribution over the set of possible values. The Bayes’ rule is known as an information acquisition paradigm and tells how the likelihood function is changing the prior belief into a posterior belief. In the binary case—i.e. when there are only two possible values for the attribute—the likelihood function can be written in the form of a Log-Likelihood-Ratio (LLR). This has been known as the weight-of-evidence and is considered a good candidate to inform which hypothesis the data is supporting and how strong. The Bayes’ rule can be written as a sum between the LLR and the log-ratio of Plus d'infos
In the context of team Cornet’s seminars, Shane Mannion (University of Limerick) will present his research work on Correlations on complex networks and their degree distributions, on April 5, 2023, at 11:35 in the meeting room. Abstract: First we look at long range correlations in complex networks. The assortativity of a network, that is, the correlation between properties of neighboring nodes can have important practical implications. For example, a targeted vaccination program will be less effective in an assortative social network (where high-degree people mix with others of high degree). We are concerned with whether these correlations between nodes extend to nodes that are separated by more than a single edge. In this talk I will discuss how the correlation between properties of connected nodes in a social network changes as the distances between those nodes increases. This lead us to research on fitting degree distributions, where we introduce a method for fitting to the degree distributions of complex network datasets, such that the most appropriate distribution from a set of candidate distributions is chosen while maximizing the portion of the distribution to which the model is fit. Current methods for fitting to degree distributions in the literature are inconsistent Plus d'infos
In the context of team Cornet’s seminars, Rachid Elazouzi (LIA) will present his research work on Controlled Matching Game for Resource Allocation and User Association in WLANs, on March 31, 2023, at 11:35 in the meeting room. Abstract: In multi-rate IEEE 802.11 WLANs, the traditional user association based on the strongest received signal and the well known anomaly of the MAC protocol can lead to overloaded Access Points (APs), and poor or heterogeneous performance. Our goal is to propose an alternative game-theoretic approach for association. We model the joint resource allocation and user association as a matching game with complementarities and peer effects consisting of selfish players solely interested in their individual throughputs. Using recent game-theoretic results we first show that various resource sharing protocols actually fall in the scope of the set of stability-inducing resource allocation schemes. The game makes an extensive use of the Nash bargaining and some of its related properties that allow to control the incentives of the players. We show that the proposed mechanism can greatly improve the efficiency of 802.11 with heterogeneous nodes and reduce the negative impact of peer effects such as its MAC anomaly. The mechanism can be implemented as a virtual Plus d'infos
In the context of team Cornet’s seminars, Mandar Datar (LIA) will present her research work on Online algorithms in games and convex optimization, on March 10, 2023, at 11:35 in the meeting room.
In the context of team Cornet’s seminars, Panagiotis Andrianesis (Boston University) will present his research work on Optimal Distributed Energy Resource Coordination: A Hierarchical Decomposition Method Based on Distribution Locational Marginal Costs, on February 23, 2023, at 11:35 in the meeting room. Abstract: In this work, we consider the day-ahead operational planning problem of a radial distribution network hosting Distributed Energy Resources (DERs) including rooftop solar and storage-like loads, such as electric vehicles. We present a novel hierarchical decomposition method that is based on a centralized AC Optimal Power Flow (AC OPF) problem interacting iteratively with self-dispatching DER problems adapting to real and reactive power Distribution Locational Marginal Costs. We illustrate the applicability and tractability of the proposed method on an actual distribution feeder, while modeling the full complexity of spatiotemporal DER capabilities and preferences, and accounting for instances of non-exact AC OPF convex relaxations. We show that the proposed method achieves optimal Grid-DER coordination, by successively improving feasible AC OPF solutions, and discovers spatiotemporally varying marginal costs in distribution networks that are key to optimal DER scheduling by modeling losses, ampacity and voltage congestion, and, most importantly, dynamic asset degradation.
In the context of team Cornet’s seminars, Sébastien De Valeriola (Free University of Brussels) will present his research work on “Fading Footprints in the Sand”: Analysis of Historical Networks and Robustness of Centrality Metrics, on February 10, 2023, at 11:35 in the room S6. Abstract: In this presentation, we consider centrality measures in their use in the analysis of historical networks. Since the sources used by historians to construct such networks are inherently incomplete and imperfect, it is necessary to take into account the robustness of these metrics as much as possible, i.e., their stability in the face of the vagaries that time has subjected historical documents to. To study this, we apply a battery of tests to three networks constructed from medieval history data. The first is a network of political history, representing the connections among the key figures in the conflict for the episcopal seat of Cambrai in the 11th century. The second is a network of socio-economic history, describing credit relationships among merchants in Ypres in the 13th century. The third is a hagiographical network depicting the connections between the lives of saints often compiled together in manuscripts. These tests are designed to simulate the processes of Plus d'infos
I am pleased to invite you to attend my PhD defense on 08/02/2023. The defense will start at 2h30 PM and it will be held at Hannah Arendt campus (in salle des thèses). I will be happy to see you there. For those who are not able to attend, the BBB link is: https://v-au.univ-avignon.fr/live/bbb-soutenance-these-afaf-arfaoui-8-fevrier-2023/ Abstract: One of the fundamental components of wireless networks is Radio Access Network (RAN) delivering a wide reach wireless connectivity to the end users. The objective of RAN is to effectively manage and utilize the scarce spectrum to provide good connectivity to the end user. Over the past decade, the growth in usage of smartphones and handheld gadgets, as well as the surging adoption of smart vehicles and sensors, has caused a dramatic increase in the wireless traffic to be carried over the network. This traffic can be categorized into distinct use cases having varying requirements in terms of bandwidth, latency, reliability, etc., which are unlikely to be catered for by the current one-size-fits-all network infrastructure. Network Slicing (NS) has emerged as a promising architectural technology for building a highly flexible and dynamic network to meet the extremely diversified needs of use cases. The resulting network is much Plus d'infos
Thesis presented at Avignon University to obtain the grade of doctor. Titre : Trust Models to secure Internet of Things networks Superviser: Abderrahim Benslimane Date: 15 March, 2023 at 14:00 Abstract: The Internet of Things (IoT) is a new paradigm where any device of everyday life can become part of the Internet. The device just needs to be equipped with a microcontroller, a transceiver and appropriate protocol stacks that make it able to communicate. IoT makes everyday devices intelligent and able to interact in a collaborative way in order to provide intelligent services in different fields such as: agriculture, industry, healthcare and many others. To achieve these objectives, IoT devices must manage confidential and privacy-related data of their users, which makes them very vulnerable to security threats. However, IoT devices do not have the necessary resources (energy, memory, processing, etc.) to implement strong security or to apply the traditional security measures based on cryptographic techniques usually deployed in traditional Internet. Moreover, the traditional security measures cannot ensure the reliability of the IoT networks, especially in the presence of internal attacks. Hence, our work consists in proposing a dynamic analytical trust management model where each IoT device in the network evaluates the trust Plus d'infos
Laboratoire Informatique d'Avignon — Avignon Université