Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailS-GHOST: Un modèle d'auto-organisation de l'étalement urbain et du réseau de transport
Caruso, Geoffrey UL; Cavailhès, Jean; Frankhauser, Pierre et al

in Antoni, Jean-Philippe (Ed.) Modéliser la ville: formes urbaines et politiques de transport (2011)

Detailed reference viewed: 60 (2 UL)
Full Text
Peer Reviewed
See detailSa-TikZ: a library to draw switching architectures
Fiandrino, Claudio UL

in Ars TeXnica (2013), 15

The article illustrates how it is possible to draw some types of switching architectures in a simple manner. The Sa-TikZ library provides not only the keys devoted to the drawing part, but also the keys ... [more ▼]

The article illustrates how it is possible to draw some types of switching architectures in a simple manner. The Sa-TikZ library provides not only the keys devoted to the drawing part, but also the keys devoted to customize the aspect of the architectures in the spirit of the TikZ syntax. [less ▲]

Detailed reference viewed: 81 (9 UL)
Full Text
Peer Reviewed
See detailScalable Gaussian Process Inference with Finite-data Mean and Variance Guarantees
Huggins, Jonathan; Campbell, Trevor; Kasprzak, Mikolaj UL et al

in Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS) 2019 (2019)

Detailed reference viewed: 16 (2 UL)
Full Text
Peer Reviewed
See detailSecure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey
Schaffer, Peter UL; Farkas, Károly; Horváth, Ádám et al

in Computer Networks (2012), 56(11), 27262741

In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and ... [more ▼]

In the past few years, research interest has been increased towards wireless sensor networks (WSNs) and their application in both the military and civil domains. To support scalability in WSNs and increase network lifetime, nodes are often grouped into disjoint clusters. However, secure and reliable clustering, which is critical in WSNs deployed in hostile environments, has gained modest attention so far or has been limited only to fault tolerance. In this paper, we review the state-of-the-art of clustering protocols in WSNs with special emphasis on security and reliability issues. First, we define a taxonomy of security and reliability for cluster head election and clustering in WSNs. Then, we describe and analyze the most relevant secure and reliable clustering protocols. Finally, we propose countermeasures against typical attacks and show how they improve the discussed protocols. [less ▲]

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detail(Semi-) Pervasive Gaming Educational and Entertainment Facilities via Interactive Video-to-Video Communication over the Internet, for Museum Exhibits
Chochliouros, Ioannis; McCall, Roderick UL; Popleteev, Andrei UL et al

in Papadopoulos, Harris; Andreou, Andreass; Iliadis, Lazaros (Eds.) et al Artificial Intelligence Applications and Innovations (2013)

Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot,designed to allow for visitors at two defined locations to interact with one another in a ... [more ▼]

Based upon the core concept of the LiveCity Project we focus on the specific City Cultural Experiences v2v Pilot,designed to allow for visitors at two defined locations to interact with one another in a joint experience and to get educational/entertainment benefits, originating directly from the museum content delivery. We discuss a set of semi-pervasive games (the so-called “Twin Cities”games) which are designed to bring people together at remotely twinned locations through the use of video-to-video communication and multitouch interaction. We also present an early classification of video-to-video (v2v) interaction games that is designed to inform designers about the potential of such technologies. We classify them as: using video for awareness and communication, interacting with video and video as a game. [less ▲]

Detailed reference viewed: 243 (16 UL)
Full Text
Peer Reviewed
See detailSemi-global analysis of relay feedback systems
Goncalves, Jorge UL; Megretski, A.; Dahleh, M. A.

in Proceedings of the 37th IEEE Conference on Decision and Control (1998)

This paper presents semi-global sufficient stability conditions of limit cycles for relay feedback systems. Local stability conditions exist. These are based on analyzing the linear part of the Poincare ... [more ▼]

This paper presents semi-global sufficient stability conditions of limit cycles for relay feedback systems. Local stability conditions exist. These are based on analyzing the linear part of the Poincare map. We know that when a certain limit cycle satisfies those local conditions, a neighborhood around the limit cycle exists such that any trajectory starting in this neighborhood converges to the limit cycle as time goes to infinity. However, tools to characterize this neighborhood do not exist. In this work, we present conditions, in the form of linear matrix inequalities (LMI), that guarantee the stability of a limit cycle in a reasonably large set around it. These results differ from previous local results as they take into account the high order terms of the Poincare map. [less ▲]

Detailed reference viewed: 85 (0 UL)
Full Text
Peer Reviewed
See detailSensitivity Analysis and Shape Optimisation through a T-spline Isogeometric Boundary Element Method
Lian, Haojie; Simpson, Robert; Bordas, Stéphane UL

Scientific Conference (2013, March)

Detailed reference viewed: 257 (1 UL)
Full Text
See detailSensitivity Analysis and Shape Optimisation through a T-spline Isogeometric Boundary Element Method
Lian, Haojie; Simpson, Robert; Bordas, Stéphane UL

Scientific Conference (2013, March 25)

Detailed reference viewed: 384 (9 UL)
Full Text
See detailSensitivity analysis and shape optimisation with the isogeometric boundary element methods
Lian, Haojie; Simpson, Robert; Bordas, Stéphane UL

Scientific Conference (2012, March 27)

Detailed reference viewed: 238 (5 UL)
Full Text
See detailSensitivity analysis and shape optimization using isogeomgetric boundary element methods
Lian, Haojie; Simpson, Robert; Bordas, Stéphane UL

Scientific Conference (2014, July)

Detailed reference viewed: 326 (7 UL)
Full Text
Peer Reviewed
See detailA sensitivity-based approach for adaptive decomposition of anticipatory network traffic control
Rinaldi, Marco UL; Himpe, W.; Tampère, C. M. J.

in Transportation Research. Part C : Emerging Technologies (2016), 66

Anticipatory optimal network control is defined as the problem of determining the set of control actions that minimizes a network-wide objective function. This not only takes into account local ... [more ▼]

Anticipatory optimal network control is defined as the problem of determining the set of control actions that minimizes a network-wide objective function. This not only takes into account local consequences on the propagation of flows, but also the global network-wide routing behavior of the users. Such an objective function is, in general, defined in a centralized setting, as knowledge regarding the whole network is needed to correctly compute it. Reaching a level of centralization sufficient to attain network-wide control objectives is however rarely realistic in practice. Multiple authorities are influencing different portions the network, separated either hierarchically or geographically. The distributed nature of networks and traffic directly influences the complexity of the anticipatory control problem. This is our motivation for this work, in which we introduce a decomposition mechanism for the global anticipatory network traffic control problem, based on dynamic clustering of traffic controllers. Rather than solving the full centralized problem, or blindly performing a full controller-wise decomposition, this technique allows recognizing when and which controllers should be grouped in clusters, and when, instead, these can be optimized separately. The practical relevance with respect to our motivation is that our approach allows identification of those network traffic conditions in which multiple actors need to actively coordinate their actions, or when unilateral action suffices for still approximating global optimality. This clustering procedure is based on well-known algebraic and statistical tools that exploit the network's sensitivity to control and its structure to deduce coupling behavior. We devise several case studies in order to assess our newly introduced procedure's performances, in comparison with fully decomposed and fully centralized anticipatory optimal network control, and show that our approach is able to outperform both centralized and decomposed procedures. © 2016 Elsevier Ltd. [less ▲]

Detailed reference viewed: 52 (2 UL)
Full Text
Peer Reviewed
See detailSerge Abiteboul, au cœur des données
Schafer, Valerie UL

in Technique et Science Informatiques (2014)

Des bases de données au « data déluge » actuel, Serge Abiteboul se passionne depuis plus de trente ans pour un domaine qui ne cesse d’évoluer et de nous confronter à de nouveaux défis, techniques, mais ... [more ▼]

Des bases de données au « data déluge » actuel, Serge Abiteboul se passionne depuis plus de trente ans pour un domaine qui ne cesse d’évoluer et de nous confronter à de nouveaux défis, techniques, mais aussi sociétaux. Il a reçu en 2013 le prix Milner de la Royal Society et vient d’achever le projet Webdam sur la gestion des données, pour lequel il avait été lauréat en 2008 d’une bourse ERC. Membre de l’Académie des Sciences et du Conseil National du Numérique, président du conseil scientifique de la SIF, co-fondateur du blog binaire, Serge Abiteboul, chercheur à Inria, revient sur sa carrière, ses recherches et éclaire pour nous quelques-uns des enjeux que pose aujourd’hui le numérique. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
See detailShape Optimization Directly from CAD: an Isogeometric Boundary Element Approach Using T-splines
Lian, Haojie; Pierre, Kerfriden; Bordas, Stéphane UL

Report (2016)

Detailed reference viewed: 271 (5 UL)
Full Text
Peer Reviewed
See detailShaping Pulses to Control Bistable Monotone Systems Using Koopman Operator
Sootla, Aivar; Mauroy, Alexandre UL; Goncalves, Jorge UL

in 10th IFAC Symposium on Nonlinear Control Systems (2016, August)

In this paper, we further develop a recently proposed control method to switch a bistable system between its steady states using temporal pulses. The motivation for using pulses comes from biomedical and ... [more ▼]

In this paper, we further develop a recently proposed control method to switch a bistable system between its steady states using temporal pulses. The motivation for using pulses comes from biomedical and biological applications (e.g. synthetic biology), where it is generally di cult to build feedback control systems due to technical limitations in sensing and actuation. The original framework was derived for monotone systems and all the extensions relied on monotone systems theory. In contrast, we introduce the concept of switching function which is related to eigenfunctions of the so-called Koopman operator subject to a xed control pulse. Using the level sets of the switching function we can (i) compute the set of all pulses that drive the system toward the steady state in a synchronous way and (ii) estimate the time needed by the ow to reach an epsilon neighborhood of the target steady state. Additionally, we show that for monotone systems the switching function is also monotone in some sense, a property that can yield e cient algorithms to compute it. This observation recovers and further extends the results of the original framework, which we illustrate on numerical examples inspired by biological applications. [less ▲]

Detailed reference viewed: 79 (1 UL)
Full Text
Peer Reviewed
See detailA Shared Basis for Functional Modelling
Eisenbart, Boris UL; Gericke, Kilian UL; Blessing, Lucienne UL

in Proceedings of Norddesign 2012 (2012)

The presented research aims at contributing to a better understanding of the diverse functional modelling approaches proposed across disciplines, often involving more than one function model. The paper ... [more ▼]

The presented research aims at contributing to a better understanding of the diverse functional modelling approaches proposed across disciplines, often involving more than one function model. The paper presents a review of 41 systematic design approaches from different disciplines, analysing what is addressed by functional modelling at which point in the proposed development process, i.e. in which sequence, if any. The analysis aims at deriving potential commonalities across disciplines, which could support the development of an integrative functional modelling approach. Finally, the results of the analysis are discussed, concluding that while there seems to be no shared sequence in functional modelling across disciplines, a common base can be derived, with regard to what is prominently addressed by functional modelling in the different disciplines. [less ▲]

Detailed reference viewed: 63 (4 UL)
See detailA short course on The Extended Finite Element Method
Fries, Thomas-Peter; Zilian, Andreas UL

Book published by CES University of Luxembourg - 1 (2013)

Detailed reference viewed: 276 (21 UL)
Peer Reviewed
See detailA short Survey on the Cyber Security in Control Systems
Bezzaoucha, Souad UL; Voos, Holger UL

Scientific Conference (2020, July)

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due ... [more ▼]

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due to a highest degree of connectivity in modern systems, new related control-specific cyber-physical systems security challengesarise and novel approaches integrating the cyber aspect are developed.Our goal in this paper is then to provide an overview of attack-modeling and security analysis approaches in recent works thatexplore networked control systems subject to cyber-attacks attacks. To this end, we look at the control, estimation, and modeling problems. [less ▲]

Detailed reference viewed: 49 (2 UL)
Full Text
See detailSignal control strategies in day-to-day dynamic process of combined traffic assignment and control
Huang, Wei; Viti, Francesco UL; Tampere, Chris M.J.

Scientific Conference (2013)

Detailed reference viewed: 78 (3 UL)
Full Text
Peer Reviewed
See detailSignal phase and timing (spat) for cooperative public transport priority measures
Seredynski, Marcin; Viti, Francesco UL; Khadraoui, Djamel

Scientific Conference (2015, October)

Detailed reference viewed: 59 (1 UL)