References of "Avanesov, Tigran 50000527"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailDistributed C++-Python embedding for fast predictions and fast prototyping
Varisteas, Georgios UL; Avanesov, Tigran UL; State, Radu UL

in Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning (2018)

Python has evolved to become the most popular language for data science. It sports state-of-the-art libraries for analytics and machine learning, like Sci-Kit Learn. However, Python lacks the ... [more ▼]

Python has evolved to become the most popular language for data science. It sports state-of-the-art libraries for analytics and machine learning, like Sci-Kit Learn. However, Python lacks the computational performance that a industrial system requires for high frequency real time predictions. Building upon a year long research project heavily based on SciKit Learn (sklearn), we faced performance issues in deploying to production. Replacing sklearn with a better performing framework would require re-evaluating and tuning hyperparameters from scratch. Instead we developed a python embedding in a C++ based server application that increased performance by up to 20x, achieving linear scalability up to a point of convergence. Our implementation was done for mainstream cost effective hardware, which means we observed similar performance gains on small as well as large systems, from a laptop to an Amazon EC2 instance to a high-end server. [less ▲]

Detailed reference viewed: 77 (6 UL)
Full Text
Peer Reviewed
See detailDriving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction
Louveton, Nicolas UL; Mccall, Roderick UL; Koenig, Vincent UL et al

in Applied Ergonomics (2016), 54

Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures ... [more ▼]

Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures such as kinetic scrolling are problematic in this respect. In this study we evaluate three prototype tasks which can be found in common mobile interaction use-cases. In a repeated-measures design, 29 participants interacted with the prototypes in a car-following task within a driving simulator environment. Task completion, driving performance and eye gaze have been analysed. We found that the slider widget used in the filtering task was too demanding and led to poor performance, while kinetic scrolling generated a comparable amount of visual distraction despite it requiring a lower degree of finger pointing accuracy. We discuss how to improve continuous list browsing in a dual-task context. [less ▲]

Detailed reference viewed: 191 (13 UL)
Full Text
Peer Reviewed
See detailCognition: a tool for reinforcing security in Software Defined Netwks
Tantar, Emilia UL; Palattella, Maria Rita UL; Avanesov, Tigran UL et al

in Tantar, Alexandru-Adrian; Tantar, Emilia; Jian-Qiao, Sun (Eds.) et al EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V (2014)

Detailed reference viewed: 188 (10 UL)
Full Text
Peer Reviewed
See detailApplications embarquées/mobiles dans la voiture : quels outils pour la conception et l’évaluation ?
Louveton, Nicolas UL; Koenig, Vincent UL; Avanesov, Tigran UL et al

Scientific Conference (2013, July 11)

Les systèmes d’infotainment embarqués dans les véhicules sont amenés à se multiplier davantage dans les années à venir. Bien que cette tendance mette en évidence la nécessité de comprendre et d’optimiser ... [more ▼]

Les systèmes d’infotainment embarqués dans les véhicules sont amenés à se multiplier davantage dans les années à venir. Bien que cette tendance mette en évidence la nécessité de comprendre et d’optimiser la charge attentionnelle placée sur le conducteur, force est de constater qu’il existe peu de données et d’outils communs pour la conception et l’évaluation de tels systèmes. Nous présentons deux directions que la communauté doit poursuivre pour améliorer cette situation ainsi qu’une plate-­‐forme de simulation automobile que nous développons et dont l’architecture favorise la ré-­‐utilisation des composants logiciels et la reproductibilité des résultats. [less ▲]

Detailed reference viewed: 157 (29 UL)
Full Text
Peer Reviewed
See detailTouch By Touch: Promoting cultural awareness with multitouch gaming
Popleteev, Andrei UL; McCall, Roderick UL; Molnar, Andreea et al

in LiveCity Workshop on Smart and Pervasive Communications for Enhanced Communities (in conjunction with SaCoNeT-2013) (2013, June)

This paper presents a work in progress focused on facilitation of cross-cultural awareness between citizens of two European cities. We aim to engage visitors of telecom museums in Athens and Luxembourg to ... [more ▼]

This paper presents a work in progress focused on facilitation of cross-cultural awareness between citizens of two European cities. We aim to engage visitors of telecom museums in Athens and Luxembourg to learn more about both cities by means of collaborative games played on multitouch tables. We also explore how live video-to-video streaming influences players’ behaviour and collaboration with remote players. [less ▲]

Detailed reference viewed: 110 (7 UL)
Full Text
Peer Reviewed
See detailGamification as a Methodology: A Multi-Part Development Process
McCall, Roderick UL; Louveton, Nicolas UL; Kracheel, Martin UL et al

Scientific Conference (2013, April 28)

Gamification is often thought of as the end result or outcome of a project. In this paper we explore how it can also be adopted during the conceptual design stage using metaphorical games and as a method ... [more ▼]

Gamification is often thought of as the end result or outcome of a project. In this paper we explore how it can also be adopted during the conceptual design stage using metaphorical games and as a method of testing concepts within a more advanced simulation environment. We explore this from the perspective of the I-GEAR project where it is used as one of many methods in the design of a commuter mobility game. [less ▲]

Detailed reference viewed: 240 (86 UL)
Full Text
Peer Reviewed
See detail(Semi-) Pervasive Gaming Educational and Entertainment Facilities via Interactive Video-to-Video Communication over the Internet, for Museum Exhibits
Chochliouros, Ioannis; McCall, Roderick UL; Popleteev, Andrei UL et al

in Papadopoulos, Harris; Andreou, Andreass; Iliadis, Lazaros (Eds.) et al Artificial Intelligence Applications and Innovations (2013)

Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot,designed to allow for visitors at two defined locations to interact with one another in a ... [more ▼]

Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot,designed to allow for visitors at two defined locations to interact with one another in a joint experience and to get educational/entertainment benefits, originating directly from the museum content delivery. We discuss a set of semi-pervasive games (the so-called “Twin Cities”games) which are designed to bring people together at remotely twinned locations through the use of video-to-video communication and multitouch interaction. We also present an early classification of video-to-video (v2v) interaction games that is designed to inform designers about the potential of such technologies. We classify them as: using video for awareness and communication, interacting with video and video as a game. [less ▲]

Detailed reference viewed: 236 (16 UL)
Full Text
Peer Reviewed
See detailAssessing In-Vehicle Information Systems application in the car: a versatile tool and unified testing platform.
Louveton, Nicolas UL; McCall, Roderick UL; Avanesov, Tigran UL et al

in Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2013)

In this paper we present the DriveLab IVIS testing platform which allows for the same experiments to be conducted both under simulator and real car conditions. Other key aspects of DriveLab is that it is ... [more ▼]

In this paper we present the DriveLab IVIS testing platform which allows for the same experiments to be conducted both under simulator and real car conditions. Other key aspects of DriveLab is that it is highly modular (therefore allowing the exchange or integration of different components) and that it supports more than one driver. For example we show that the same IVIS devices and scenario can be used with two different 3D engines. The paper provides a technical overview and a brief example of use. [less ▲]

Detailed reference viewed: 147 (23 UL)
Full Text
Peer Reviewed
See detailTowards a Simple City Driving Simulator Based on Speed Dreams and OSM
Avanesov, Tigran UL; Louveton, Nicolas UL; McCall, Roderick UL et al

in Adjunct Proceedings of 4th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2012), 2

This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting ... [more ▼]

This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting multiple drivers and the ability to swap in and out different software components and devices. [less ▲]

Detailed reference viewed: 180 (20 UL)
Full Text
Peer Reviewed
See detailTowards the Orchestration of Secured Services under Non-disclosure Policies
Avanesov, Tigran UL; Chevalier, Yannick; Rusinowitch, Michaël et al

in 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings (2012)

The problem of finding a mediator to compose secured services has been reduced in our former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol ... [more ▼]

The problem of finding a mediator to compose secured services has been reduced in our former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. We extend in this paper the mediator synthesis procedure by a construction for expressing that some data is not accessible to the mediator. Then we give a decision procedure for verifying that a mediator satisfying this non-disclosure policy can be effectively synthesized. This procedure has been implemented in CL-AtSe, our protocol analysis tool. The procedure extends constraint solving for cryptographic protocol analysis in a significative way as it is able to handle negative deducibility constraints without restriction. In particular it applies to all subterm convergent theories and therefore covers several interesting theories in formal security analysis including encryption, hashing, signature and pairing. [less ▲]

Detailed reference viewed: 65 (6 UL)
Full Text
Peer Reviewed
See detailThe AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures
Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran UL et al

in Proceedings of 18th International Conference "Tools and Algorithms for the Construction and Analysis of Systems", as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. (2012)

The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of ... [more ▼]

The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our custom languages) and features three validation backends (CL-AtSe, OFMC, and SATMC), which provide a range of complementary automated reasoning techniques (including service orchestration, compositional reasoning, model checking, and abstract interpretation). We have applied the platform to a large number of industrial case studies, collected into the AVANTSSAR Library of validated problem cases. In doing so, we unveiled a number of problems and vulnerabilities in deployed services. These include, most notably, a serious flaw in the SAML-based Single Sign-On for Google Apps (now corrected by Google as a result of our findings). We also report on the migration of the platform to industry. [less ▲]

Detailed reference viewed: 85 (5 UL)
Full Text
Peer Reviewed
See detailWeb Services Verification and Prudent Implementation
Avanesov, Tigran UL; Chevalier, Yannick; Anis Mekki, Mohammed et al

in Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. (2011)

Alice&Bob notation is widely used to describe conversations between partners in security protocols. We present a tool that compiles an Alice&Bob description of a Web Services choreography into a set of ... [more ▼]

Alice&Bob notation is widely used to describe conversations between partners in security protocols. We present a tool that compiles an Alice&Bob description of a Web Services choreography into a set of servlets. For that we first compute for each partner an executable specification as prudent as possible of her role in the choreography. This specification is expressed in ASLan language, a formal language designed for modeling Web Services tied with security policies. Then we can check with automatic tools that this ASLan specification verifies some required security properties such as secrecy and authentication. If no flaw is found, we compile the specification into Java servlets that real partners can use to execute the choreography. [less ▲]

Detailed reference viewed: 80 (1 UL)
Full Text
Peer Reviewed
See detailDistributed Orchestration of Web Services under Security Constraints
Avanesov, Tigran UL; Chevalier, Yannick; Anis Mekki, Mohammed et al

in Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. (2011)

We present a novel approach to automated distributed orchestration of Web services tied with security policies. The construction of an orchestration complying with the policies is based on the resolution ... [more ▼]

We present a novel approach to automated distributed orchestration of Web services tied with security policies. The construction of an orchestration complying with the policies is based on the resolution of deducibility constraint systems and has been implemented for the non-distributed case as part of the AVANTSSAR Validation Platform. The tool has been successfully experimented on several case-studies from industry and academia. [less ▲]

Detailed reference viewed: 73 (0 UL)
Full Text
Peer Reviewed
See detailSatisfiability of general intruder constraints with a set constructor
Avanesov, Tigran UL; Chevalier, Yannick; Rusinowitch, Michael et al

in CRiSIS 2010, Proceedings of the Fifth International Conference on Risks and Security of Internet and Systems, Montreal, QC, Canada, October 10-13, 2010. (2010)

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of ... [more ▼]

Many decision problems on security protocols can be reduced to solving so-called intruder constraints in Dolev Yao model. Most constraint solving procedures for protocol security rely on two properties of constraint systems called monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intruder constraints (that do not have these properties). Our result extends a first work by L. Mazaré in several directions: we allow non-atomic keys, and an associative, commutative and idempotent symbol (for modeling sets). We also give several new applications of the result. [less ▲]

Detailed reference viewed: 60 (4 UL)
Full Text
Peer Reviewed
See detailAbusing SIP authentication
Abdelnur, Humberto J.; Avanesov, Tigran UL; Rusinowitch, Michael et al

in Journal of Information Assurance and Security (2009), 4

The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will ... [more ▼]

The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. In this paper, we will present a new attack against the authentication mechanism of SIP. This attack allows to perform toll fraud and call hijacking. We will detail the formal specification method that allowed to detect this vulnerability, highlight a simple usage case and propose a mitigation technique. [less ▲]

Detailed reference viewed: 108 (2 UL)