-
Pocket Bluff : A cooperation enforcing scheduled pocket switching protocol
We propose Pocket Bluff; a novel pocket switched message forwarding protocol that can foil selfish/malicious nodes that deliberately drop data. Pocket Bluff hides the... -
The CompCert Memory Model, Version 2
A memory model is an important component of the formal semantics of imperative programming languages: it specifies the behavior of operations over memory states, such... -
Integrating dynamic resources in corporate semantic web: an approach to enter...
We present our experiment in integrating semantic web services in the existing semantic web server architecture used by the ACACIA team to implement corporate... -
Complexity of Zero-dimensional Gröbner Bases
In this paper, it is shown that the Gröbner basis (for any monomial ordering) of a zero-dimensional ideal may be computed within a bit complexity which is essentially... -
Sparse Representations and Low-Rank Tensor Approximation
En cours de soumission sous le titre "Multilinear identification" -
Hyperfeatures - Multilevel Local Coding for Visual Recognition
Histograms of local appearance descriptors are a popular representation for visual recognition. They are highly discriminant and they have good resistance to local... -
Prévision d'un processus à valeurs fonctionnelles en présence de non stationn...
We study here the problem of predicting a functional valued stochastic process. We first explore the model proposed by Antoniadis et al. (2006) in the context of a... -
An ExpSpace Tableau-based Algorithm for SHOIQ
In this work, we propose an ExpSpace tableau-based algorithm for deciding consistency of a knowledge base in the description logic SHOIQ. The construction of this... -
Higher Order Active Contours
We introduce a new class of active contour models that hold great promise for region and shape modelling, and we apply a special case of these models to the extraction... -
Modeling and estimation of the cardiac electromechanical activity
{\it Computers \& Structures}, in press -
VoIP Capacity Evaluation in IEEE 802.11e WLAN Environment
In this report, we present an analytical model for VoIP capacity in IEEE 802.11e WLAN. We illustrate performance results relative to typical codec rates of G.711 PCM... -
Equilibria of a Class of Transport Equations Arising in Congestion Control
This paper studies a class of transport equations arising from stochastic models in congestion control. This class contains two cases of loss point process models: the... -
About the Self-Stabilization of a Virtual Topology for Self-Organization in A...
Ad hoc networks are spontaneous wireless networks without any wired infrastructure, composed of mobile terminals. We assume that nodes must collaborate to set up an... -
Self Organization of Interfering 802.11 Wireless Access Networks
The increased popularity of IEEE 802.11 WLANs has led to dense deployments in urban areas. Such high density leads to sub-optimal performance unless the interfering... -
Constructing Incremental Sequences in Graphs
Given a weighted graph $G=(V,E,w)$, we investigate the problem of constructing a sequence of $n=|V|$ subsets of vertices $M_1,...,M_n$ (called groups) with small... -
Design of Robust Receding Horizon Controls for Constrained Polytopic-Uncertai...
In this paper, we propose a new robust receding horizon control scheme for linear input-constrained discrete-time systems with polytopic uncertainty. We provide a... -
Traffic Grooming on the Path
In a WDM network, routing a request consists in assigning it a route in the physical network and a wavelength. If each request uses at most $1/C$ of the bandwidth of... -
An algorithm for reporting maximal c-cliques
Given two graphs, a fundamental task faced by matching algorithms consists of computing either the (Connected) Maximal Common Induced Subgraphs ((C)MCIS) or the... -
Support d'ordonnancement et d'optimisation automatisés des communications pou...
Madeleine 4 est une nouvelle implémentation de l'interface de communication multi-protocole Madeleine. Sa particularité consiste en l'introduction d'une couche... -
Wireless Channel Parameters Maximizing TCP Throughput
We consider a single TCP session traversing a wireless channel, with a constant signal to noise ratio (SINR) at the receiver. We consider the problem of determining...
