2,032 Research products, page 1 of 204
Loading
- Publication . Conference object . 2021Open Access EnglishAuthors:Antonio Alguacil; Michaël Bauerheim; Marc C. Jacob; Stéphane Moreau;Antonio Alguacil; Michaël Bauerheim; Marc C. Jacob; Stéphane Moreau;
doi: 10.2514/6.2021-2239
Publisher: HAL CCSDCountry: FranceInternational audience; A deep learning surrogate for the direct numerical prediction of two-dimensional acoustic waves propagation and scattering with obstacles is developed through an auto-regressive spatio- temporal convolutional neural network. A single database of high-fidelity lattice Boltzmann temporal simulations is employed in the training of the network, achieving accurate predictions for long simulation times for a variety of test cases, representative of bounded and unbounded configurations. The capacity of the network to extrapolate outside the manifold of examples seen during the training phase is demonstrated by the obtaining of accurate acoustic predic- tions for relevant applications, such as the scattering of acoustic waves on an airfoil trailing edge, an engine nacelle or in-duct propagation. The method is tested for two types of input normalizations, coupled with an a-posteriori correction which improves the acoustic energy conservation of the predictions. The use of an adaptive local normalization along with the physics-based energy conservation results in an error reduction for all the studied cases.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . Part of book or chapter of book . 2021Open Access EnglishAuthors:Song Wang; Yuting He; Youyong Kong; Xiaomei Zhu; Shaobo Zhang; Pengfei Shao; Jean-Louis Dillenseger; Jean-Louis Coatrieux; Shuo Li; Guanyu Yang;Song Wang; Yuting He; Youyong Kong; Xiaomei Zhu; Shaobo Zhang; Pengfei Shao; Jean-Louis Dillenseger; Jean-Louis Coatrieux; Shuo Li; Guanyu Yang;Publisher: HAL CCSDCountry: France
Renal compartment segmentation on CT images targets on extracting the 3D structure of renal compartments from abdominal CTA images and is of great significance to the diagnosis and treatment for kidney diseases. However, due to the unclear compartment boundary, thin compartment structure and large anatomy variation of 3D kidney CT images, deep-learning based renal compartment segmentation is a challenging task. We propose a novel weakly supervised learning framework, Cycle Prototype Network, for 3D renal compartment segmentation. It has three innovations: (1) A Cycle Prototype Learning (CPL) is proposed to learn consistency for generalization. It learns from pseudo labels through the forward process and learns consistency regularization through the reverse process. The two processes make the model robust to noise and label-efficient. (2) We propose a Bayes Weakly Supervised Module (BWSM) based on cross-period prior knowledge. It learns prior knowledge from cross-period unlabeled data and perform error correction automatically, thus generates accurate pseudo labels. (3) We present a Fine Decoding Feature Extractor (FDFE) for fine-grained feature extraction. It combines global morphology information and local detail information to obtain feature maps with sharp detail, so the model will achieve fine segmentation on thin structures. Our extensive experiments demonstrated our great performance. Our model achieves Dice of \(79.1\%\) and \(78.7\%\) with only four labeled images, achieving a significant improvement by about \(20\%\) than typical prototype model PANet [16].
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . 2017Open Access EnglishAuthors:Xavier Bultel; Sébastien Gambs; David Gérault; pascal lafourcade; Cristina Onete; Jean-Marc Robert;Xavier Bultel; Sébastien Gambs; David Gérault; pascal lafourcade; Cristina Onete; Jean-Marc Robert;Publisher: HAL CCSDCountry: FranceProject: NSERC
International audience; Les communications sans contact sont omniprésentes dans notre quotidien, allant des badges de contrôle d'accès au passeport électronique. Ces systèmes sont sensibles aux attaques par relais, dans lesquelles un adversaire transfère simplement les messages entre le prouveur et le vérifieur pour usurper l'identité du prouveur. Les protocoles délimiteurs de distance (distance-bounding) ont été ont ntroduits pour contrer ces attaques en assurant une borne sur la distance entre le prouveur et le vérifieur grâcè a la mesure du temps des communications. Par la suite de nombreux travaux ont amélioré la sécurité de ces protocoles, mais ont aussi cherché à assurer le respect de la vie privée face à des adversaires actifs et également face à des vérifieurs malicieux. En particulier, une menace difficile à prévenir est la fraude terroriste, où un prouveur lointain coopère avec un complice proche pour tromper le vérifieur. La contre-mesure usuelle pour cette menace est de rendre impossible l'action du complice sans l'aide du prouveur lointain, à moins que le prouveur ne lui donne suffisamment d'information pour qu'il retrouve sa clef privée et puisse ainsi toujours se faire passer pour le prouveur. Dans cet article, nous proposons une nouvelle approche où le prouveur ne révèle pas sa clef privée mais utilise une clef de session avec une signature de groupe, la rendant ainsi utilisable plusieurs fois. Ceci permet à un adversaire d'usurper l'identité du prouveur sans même connaître sa clef de signature. Grâce à cette approche nous proposons SPADE le premier protocole de délimiteur de distance qui est anonyme, révocable et formellement prouvé sûr. Mots-clefs : Protocole délimiteur de distance (Distance Bounding), Sécurité, résitance à la fraude terroriste.
- Publication . Conference object . 2013EnglishAuthors:Dhaou Said; Soumaya Cherkaoui; Lyes Khoukhi;Dhaou Said; Soumaya Cherkaoui; Lyes Khoukhi;Publisher: HAL CCSDCountry: France
In this paper, a scheduling protocol for electric vehicle (EV) home charging with time of use pricing is introduced. This work addresses the problem of EVs charging at home by adopting an appropriate charging process protocol over Power Line Communications (PLC). The scheduling protocol is aimed at minimizing peak loads on distribution feeders due to multiple EVs charging while using a time-of-use pricing policy. Energy efficiency and performance are both taken into account. An appropriate analytical formulation of the scheduling problem is given together with the proposed scheduling protocol. Simulations demonstrate the effectiveness of the proposed approach in minimizing peak loads while satisfying the defined constraints.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Part of book or chapter of book . Conference object . 2019Open Access EnglishAuthors:Ebizimoh Abodei; Alex Norta; Irene Azogu; Chibuzor Udokwu; Dirk Draheim;Ebizimoh Abodei; Alex Norta; Irene Azogu; Chibuzor Udokwu; Dirk Draheim;Publisher: HAL CCSDCountry: France
Part 7: Digital Governance; International audience; Infrastructural development is a significant determinant of economic growth. It remains an elusive pursuit for many developing economies suffering from public infrastructural project failures. Although the causes of these failures are identifiable, they remain persistent. Government corruption has been identified as the primary cause of project failures amidst a host of other causal factors, spurred by the ambiguity in public service administration. These factors heighten capital expenditures and hence, the need for more transparent systems in public infrastructural project planning and -delivery. This research uses a case-study methodology to examine the importance of public involvement in addressing the causes of failures in public infrastructural project planning and -delivery. Using Nigeria as a case, the findings from conducted interviews and a document review support the proposition of a technologically collaborative approach in addressing the causes of public infrastructural project failures. The institutionalization of transparency-enhancing blockchain systems are vital in government and public involvement in the processes of public infrastructural project planning and -delivery.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . Conference object . Preprint . 2019Open Access EnglishAuthors:Quentin Roy; Camelia Zakaria; Simon T. Perrault; Mathieu Nancel; Wonjung Kim; Archan Misra; Andy Cockburn;Quentin Roy; Camelia Zakaria; Simon T. Perrault; Mathieu Nancel; Wonjung Kim; Archan Misra; Andy Cockburn;Publisher: HAL CCSDCountry: France
Part 8: Pointing, Touch, Gesture and Speech-Based Interaction Techniques; International audience; Eyewear displays allow users to interact with virtual content displayed over real-world vision, in active situations like standing and walking. Pointing techniques for eyewear displays have been proposed, but their social acceptability, efficiency, and situation awareness remain to be assessed. Using a novel street-walking simulator, we conducted an empirical study of target acquisition while standing and walking under different levels of street crowdedness. We evaluated three phone-based eyewear pointing techniques: indirect touch on a touchscreen, and two in-air techniques using relative device rotations around forward and a downward axes. Direct touch on a phone, without eyewear, was used as a control condition. Results showed that indirect touch was the most efficient and socially acceptable technique, and that in-air pointing was inefficient when walking. Interestingly, the eyewear displays did not improve situation awareness compared to the control condition. We discuss implications for eyewear interaction design.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Conference object . 2017Open Access EnglishAuthors:Alessandro Chiancone; Florence Forbes; Stéphane Girard;Alessandro Chiancone; Florence Forbes; Stéphane Girard;Publisher: HAL CCSDCountry: FranceProject: ANR | PERSYVAL-lab (ANR-11-LABX-0025)
International audience; Sliced Inverse Regression (SIR) has been extensively used to reduce the dimension of the predictor space before performing regression. SIR is originally a model free method but it has been shown to actually correspond to the maximum likelihood of an inverse regression model with Gaussian errors. This intrinsic Gaussianity of standard SIR may explain its high sensitivity to outliers as observed in a number of studies. To improve robustness, the inverse regression formulation of SIR is therefore extended to non-Gaussian errors with heavy-tailed distributions. Considering Student distributed errors it is shown that the inverse regression remains tractable via an Expectation- Maximization (EM) algorithm. The algorithm is outlined and tested in the presence of outliers, both in simulated and real data, showing improved results in comparison to a number of other existing approaches.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2018Open Access EnglishAuthors:Diala Naboulsi; Assia Mermouri; Razvan Stanica; Hervé Rivano; Marco Fiore;Diala Naboulsi; Assia Mermouri; Razvan Stanica; Hervé Rivano; Marco Fiore;Publisher: HAL CCSDCountries: France, Italy
International audience; The development of virtualization techniques enables an architectural shift in mobile networks, where resource allocation, or even signal processing, become software functions hosted in a data center. The centralization of computing resources and the dynamic mapping between baseband processing units (BBUs) and remote antennas (RRHs) provide an increased flexibility to mobile operators, with important reductions of operational costs. Most research efforts on Cloud Radio Access Networks (CRAN) consider indeed an operator perspective and network-side performance indicators. The impact of such new paradigms on user experience has been instead overlooked. In this paper, we shift the viewpoint, and show that the dynamic assignment of computing resources enabled by CRAN generates a new class of mobile terminal handover that can impair user quality of service. We then propose an algorithm that mitigates the problem, by optimizing the mapping between BBUs and RRHs on a time-varying graph representation of the system. Furthermore, we show that a practical online BBU-RRH mapping algorithm achieves results similar to an oracle-based scheme with perfect knowledge of future traffic demand. We test our algorithms with two large-scale real-world datasets, where the total number of handovers, compared with the current architectures, is reduced by more than 20%. Moreover, if a small tolerance to dropped calls is allowed, 30% less handovers can be obtained.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2017EnglishAuthors:Ndeye Bineta Sarr; Abdul Karim Yazbek; Hervé Boeglen; Jean-Pierre Cances; Rodolphe Vauzelle; Francois Gagnon;Ndeye Bineta Sarr; Abdul Karim Yazbek; Hervé Boeglen; Jean-Pierre Cances; Rodolphe Vauzelle; Francois Gagnon;Publisher: HAL CCSDCountry: France
Integrating wireless sensor networks (WSNs) in power substations for the future smart grid is growing in interest. Nevertheless, high voltage (HV) substations are harsh environments. In particular, impulsive noise needs to be taken into account. To tackle the constraints of these environments, we propose in this paper an efficient wideband channel coding scheme. The proposed approach consists in a robust physical layer based on the integration of several very interesting error correcting codes with Orthogonal Frequency Division Multiplexing (OFDM). Using real measurements of impulsive noise, the impact of rank metric (RC), Low Rank Parity Check codes (LRPC) and polar codes is evaluated in terms of BER and PER in a realistic multipath channel. The results show that using this coding scheme is very efficient in mitigating the bursty nature of impulsive noise while having a quite low level of complexity.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2018Open Access EnglishAuthors:Bongrani, Alice; Elfassy, Yaelle; Brun, Jean Sebastien; Ramé, Christelle; Mellouk, Namya; Froment, Pascal; Berthaut, Isabelle; Fellahi, Soraya; Bastard, Jean Philippe; Levy, Rachel; +2 moreBongrani, Alice; Elfassy, Yaelle; Brun, Jean Sebastien; Ramé, Christelle; Mellouk, Namya; Froment, Pascal; Berthaut, Isabelle; Fellahi, Soraya; Bastard, Jean Philippe; Levy, Rachel; Vasseur, Claudine; Dupont, Joëlle;Country: FranceProject: NSF | Graduate Research Fellows... (1256260), NIH | Developmental effects of ... (5R21HD080763-02), NIH | Project 1: Measuring and ... (5P50HD076188-03), NIH | Signal Transduction at Fe... (5R37HD014939-34), NSERC , CIHR , NIH | Engineering an immuno-iso... (1R01EB022033-01A1), NIH | Project 3: Endocrine Disr... (3P01ES022848-03S2), NIH | Research Training Program... (5T32ES007326-12)
International audience
2,032 Research products, page 1 of 204
Loading
- Publication . Conference object . 2021Open Access EnglishAuthors:Antonio Alguacil; Michaël Bauerheim; Marc C. Jacob; Stéphane Moreau;Antonio Alguacil; Michaël Bauerheim; Marc C. Jacob; Stéphane Moreau;
doi: 10.2514/6.2021-2239
Publisher: HAL CCSDCountry: FranceInternational audience; A deep learning surrogate for the direct numerical prediction of two-dimensional acoustic waves propagation and scattering with obstacles is developed through an auto-regressive spatio- temporal convolutional neural network. A single database of high-fidelity lattice Boltzmann temporal simulations is employed in the training of the network, achieving accurate predictions for long simulation times for a variety of test cases, representative of bounded and unbounded configurations. The capacity of the network to extrapolate outside the manifold of examples seen during the training phase is demonstrated by the obtaining of accurate acoustic predic- tions for relevant applications, such as the scattering of acoustic waves on an airfoil trailing edge, an engine nacelle or in-duct propagation. The method is tested for two types of input normalizations, coupled with an a-posteriori correction which improves the acoustic energy conservation of the predictions. The use of an adaptive local normalization along with the physics-based energy conservation results in an error reduction for all the studied cases.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . Part of book or chapter of book . 2021Open Access EnglishAuthors:Song Wang; Yuting He; Youyong Kong; Xiaomei Zhu; Shaobo Zhang; Pengfei Shao; Jean-Louis Dillenseger; Jean-Louis Coatrieux; Shuo Li; Guanyu Yang;Song Wang; Yuting He; Youyong Kong; Xiaomei Zhu; Shaobo Zhang; Pengfei Shao; Jean-Louis Dillenseger; Jean-Louis Coatrieux; Shuo Li; Guanyu Yang;Publisher: HAL CCSDCountry: France
Renal compartment segmentation on CT images targets on extracting the 3D structure of renal compartments from abdominal CTA images and is of great significance to the diagnosis and treatment for kidney diseases. However, due to the unclear compartment boundary, thin compartment structure and large anatomy variation of 3D kidney CT images, deep-learning based renal compartment segmentation is a challenging task. We propose a novel weakly supervised learning framework, Cycle Prototype Network, for 3D renal compartment segmentation. It has three innovations: (1) A Cycle Prototype Learning (CPL) is proposed to learn consistency for generalization. It learns from pseudo labels through the forward process and learns consistency regularization through the reverse process. The two processes make the model robust to noise and label-efficient. (2) We propose a Bayes Weakly Supervised Module (BWSM) based on cross-period prior knowledge. It learns prior knowledge from cross-period unlabeled data and perform error correction automatically, thus generates accurate pseudo labels. (3) We present a Fine Decoding Feature Extractor (FDFE) for fine-grained feature extraction. It combines global morphology information and local detail information to obtain feature maps with sharp detail, so the model will achieve fine segmentation on thin structures. Our extensive experiments demonstrated our great performance. Our model achieves Dice of \(79.1\%\) and \(78.7\%\) with only four labeled images, achieving a significant improvement by about \(20\%\) than typical prototype model PANet [16].
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . 2017Open Access EnglishAuthors:Xavier Bultel; Sébastien Gambs; David Gérault; pascal lafourcade; Cristina Onete; Jean-Marc Robert;Xavier Bultel; Sébastien Gambs; David Gérault; pascal lafourcade; Cristina Onete; Jean-Marc Robert;Publisher: HAL CCSDCountry: FranceProject: NSERC
International audience; Les communications sans contact sont omniprésentes dans notre quotidien, allant des badges de contrôle d'accès au passeport électronique. Ces systèmes sont sensibles aux attaques par relais, dans lesquelles un adversaire transfère simplement les messages entre le prouveur et le vérifieur pour usurper l'identité du prouveur. Les protocoles délimiteurs de distance (distance-bounding) ont été ont ntroduits pour contrer ces attaques en assurant une borne sur la distance entre le prouveur et le vérifieur grâcè a la mesure du temps des communications. Par la suite de nombreux travaux ont amélioré la sécurité de ces protocoles, mais ont aussi cherché à assurer le respect de la vie privée face à des adversaires actifs et également face à des vérifieurs malicieux. En particulier, une menace difficile à prévenir est la fraude terroriste, où un prouveur lointain coopère avec un complice proche pour tromper le vérifieur. La contre-mesure usuelle pour cette menace est de rendre impossible l'action du complice sans l'aide du prouveur lointain, à moins que le prouveur ne lui donne suffisamment d'information pour qu'il retrouve sa clef privée et puisse ainsi toujours se faire passer pour le prouveur. Dans cet article, nous proposons une nouvelle approche où le prouveur ne révèle pas sa clef privée mais utilise une clef de session avec une signature de groupe, la rendant ainsi utilisable plusieurs fois. Ceci permet à un adversaire d'usurper l'identité du prouveur sans même connaître sa clef de signature. Grâce à cette approche nous proposons SPADE le premier protocole de délimiteur de distance qui est anonyme, révocable et formellement prouvé sûr. Mots-clefs : Protocole délimiteur de distance (Distance Bounding), Sécurité, résitance à la fraude terroriste.
- Publication . Conference object . 2013EnglishAuthors:Dhaou Said; Soumaya Cherkaoui; Lyes Khoukhi;Dhaou Said; Soumaya Cherkaoui; Lyes Khoukhi;Publisher: HAL CCSDCountry: France
In this paper, a scheduling protocol for electric vehicle (EV) home charging with time of use pricing is introduced. This work addresses the problem of EVs charging at home by adopting an appropriate charging process protocol over Power Line Communications (PLC). The scheduling protocol is aimed at minimizing peak loads on distribution feeders due to multiple EVs charging while using a time-of-use pricing policy. Energy efficiency and performance are both taken into account. An appropriate analytical formulation of the scheduling problem is given together with the proposed scheduling protocol. Simulations demonstrate the effectiveness of the proposed approach in minimizing peak loads while satisfying the defined constraints.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Part of book or chapter of book . Conference object . 2019Open Access EnglishAuthors:Ebizimoh Abodei; Alex Norta; Irene Azogu; Chibuzor Udokwu; Dirk Draheim;Ebizimoh Abodei; Alex Norta; Irene Azogu; Chibuzor Udokwu; Dirk Draheim;Publisher: HAL CCSDCountry: France
Part 7: Digital Governance; International audience; Infrastructural development is a significant determinant of economic growth. It remains an elusive pursuit for many developing economies suffering from public infrastructural project failures. Although the causes of these failures are identifiable, they remain persistent. Government corruption has been identified as the primary cause of project failures amidst a host of other causal factors, spurred by the ambiguity in public service administration. These factors heighten capital expenditures and hence, the need for more transparent systems in public infrastructural project planning and -delivery. This research uses a case-study methodology to examine the importance of public involvement in addressing the causes of failures in public infrastructural project planning and -delivery. Using Nigeria as a case, the findings from conducted interviews and a document review support the proposition of a technologically collaborative approach in addressing the causes of public infrastructural project failures. The institutionalization of transparency-enhancing blockchain systems are vital in government and public involvement in the processes of public infrastructural project planning and -delivery.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . Conference object . Preprint . 2019Open Access EnglishAuthors:Quentin Roy; Camelia Zakaria; Simon T. Perrault; Mathieu Nancel; Wonjung Kim; Archan Misra; Andy Cockburn;Quentin Roy; Camelia Zakaria; Simon T. Perrault; Mathieu Nancel; Wonjung Kim; Archan Misra; Andy Cockburn;Publisher: HAL CCSDCountry: France
Part 8: Pointing, Touch, Gesture and Speech-Based Interaction Techniques; International audience; Eyewear displays allow users to interact with virtual content displayed over real-world vision, in active situations like standing and walking. Pointing techniques for eyewear displays have been proposed, but their social acceptability, efficiency, and situation awareness remain to be assessed. Using a novel street-walking simulator, we conducted an empirical study of target acquisition while standing and walking under different levels of street crowdedness. We evaluated three phone-based eyewear pointing techniques: indirect touch on a touchscreen, and two in-air techniques using relative device rotations around forward and a downward axes. Direct touch on a phone, without eyewear, was used as a control condition. Results showed that indirect touch was the most efficient and socially acceptable technique, and that in-air pointing was inefficient when walking. Interestingly, the eyewear displays did not improve situation awareness compared to the control condition. We discuss implications for eyewear interaction design.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Conference object . 2017Open Access EnglishAuthors:Alessandro Chiancone; Florence Forbes; Stéphane Girard;Alessandro Chiancone; Florence Forbes; Stéphane Girard;Publisher: HAL CCSDCountry: FranceProject: ANR | PERSYVAL-lab (ANR-11-LABX-0025)
International audience; Sliced Inverse Regression (SIR) has been extensively used to reduce the dimension of the predictor space before performing regression. SIR is originally a model free method but it has been shown to actually correspond to the maximum likelihood of an inverse regression model with Gaussian errors. This intrinsic Gaussianity of standard SIR may explain its high sensitivity to outliers as observed in a number of studies. To improve robustness, the inverse regression formulation of SIR is therefore extended to non-Gaussian errors with heavy-tailed distributions. Considering Student distributed errors it is shown that the inverse regression remains tractable via an Expectation- Maximization (EM) algorithm. The algorithm is outlined and tested in the presence of outliers, both in simulated and real data, showing improved results in comparison to a number of other existing approaches.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2018Open Access EnglishAuthors:Diala Naboulsi; Assia Mermouri; Razvan Stanica; Hervé Rivano; Marco Fiore;Diala Naboulsi; Assia Mermouri; Razvan Stanica; Hervé Rivano; Marco Fiore;Publisher: HAL CCSDCountries: France, Italy
International audience; The development of virtualization techniques enables an architectural shift in mobile networks, where resource allocation, or even signal processing, become software functions hosted in a data center. The centralization of computing resources and the dynamic mapping between baseband processing units (BBUs) and remote antennas (RRHs) provide an increased flexibility to mobile operators, with important reductions of operational costs. Most research efforts on Cloud Radio Access Networks (CRAN) consider indeed an operator perspective and network-side performance indicators. The impact of such new paradigms on user experience has been instead overlooked. In this paper, we shift the viewpoint, and show that the dynamic assignment of computing resources enabled by CRAN generates a new class of mobile terminal handover that can impair user quality of service. We then propose an algorithm that mitigates the problem, by optimizing the mapping between BBUs and RRHs on a time-varying graph representation of the system. Furthermore, we show that a practical online BBU-RRH mapping algorithm achieves results similar to an oracle-based scheme with perfect knowledge of future traffic demand. We test our algorithms with two large-scale real-world datasets, where the total number of handovers, compared with the current architectures, is reduced by more than 20%. Moreover, if a small tolerance to dropped calls is allowed, 30% less handovers can be obtained.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2017EnglishAuthors:Ndeye Bineta Sarr; Abdul Karim Yazbek; Hervé Boeglen; Jean-Pierre Cances; Rodolphe Vauzelle; Francois Gagnon;Ndeye Bineta Sarr; Abdul Karim Yazbek; Hervé Boeglen; Jean-Pierre Cances; Rodolphe Vauzelle; Francois Gagnon;Publisher: HAL CCSDCountry: France
Integrating wireless sensor networks (WSNs) in power substations for the future smart grid is growing in interest. Nevertheless, high voltage (HV) substations are harsh environments. In particular, impulsive noise needs to be taken into account. To tackle the constraints of these environments, we propose in this paper an efficient wideband channel coding scheme. The proposed approach consists in a robust physical layer based on the integration of several very interesting error correcting codes with Orthogonal Frequency Division Multiplexing (OFDM). Using real measurements of impulsive noise, the impact of rank metric (RC), Low Rank Parity Check codes (LRPC) and polar codes is evaluated in terms of BER and PER in a realistic multipath channel. The results show that using this coding scheme is very efficient in mitigating the bursty nature of impulsive noise while having a quite low level of complexity.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2018Open Access EnglishAuthors:Bongrani, Alice; Elfassy, Yaelle; Brun, Jean Sebastien; Ramé, Christelle; Mellouk, Namya; Froment, Pascal; Berthaut, Isabelle; Fellahi, Soraya; Bastard, Jean Philippe; Levy, Rachel; +2 moreBongrani, Alice; Elfassy, Yaelle; Brun, Jean Sebastien; Ramé, Christelle; Mellouk, Namya; Froment, Pascal; Berthaut, Isabelle; Fellahi, Soraya; Bastard, Jean Philippe; Levy, Rachel; Vasseur, Claudine; Dupont, Joëlle;Country: FranceProject: NSF | Graduate Research Fellows... (1256260), NIH | Developmental effects of ... (5R21HD080763-02), NIH | Project 1: Measuring and ... (5P50HD076188-03), NIH | Signal Transduction at Fe... (5R37HD014939-34), NSERC , CIHR , NIH | Engineering an immuno-iso... (1R01EB022033-01A1), NIH | Project 3: Endocrine Disr... (3P01ES022848-03S2), NIH | Research Training Program... (5T32ES007326-12)
International audience