4,796 Research products, page 1 of 480
Loading
- Publication . Conference object . Preprint . Article . Part of book or chapter of book . 2010Open Access EnglishAuthors:Britt Reichborn-Kjennerud; Asad M. Aboobaker; Peter A. R. Ade; François Aubin; Carlo Baccigalupi; Chaoyun Bao; Julian Borrill; Christopher Cantalupo; Daniel Chapman; Joy Didier; +36 moreBritt Reichborn-Kjennerud; Asad M. Aboobaker; Peter A. R. Ade; François Aubin; Carlo Baccigalupi; Chaoyun Bao; Julian Borrill; Christopher Cantalupo; Daniel Chapman; Joy Didier; Matt Dobbs; Julien Grain; William F. Grainger; Shaul Hanany; Seth Hillbrand; Johannes Hubmayr; Andrew H. Jaffe; Bradley R. Johnson; Terry J. Jones; Theodore Kisner; Jacob Klein; Andrei Korotkov; S. Leach; Adrian T. Lee; L. J. Levinson; Michele Limon; Kevin MacDermid; Tomotake Matsumura; X. Meng; Amber Miller; Michael Milligan; Enzo Pascale; Daniel Polsgrove; Nicolas Ponthieu; Kate Raach; Ilan Sagiv; Graeme Smecher; F. Stivoli; Radek Stompor; Huan Tran; Matthieu Tristram; Gregory S. Tucker; Yury Vinokurov; Amit P. S. Yadav; Matias Zaldarriaga; Kyle Zilic;Countries: United States, France, France, France, France
EBEX is a NASA-funded balloon-borne experiment designed to measure the polarization of the cosmic microwave background (CMB). Observations will be made using 1432 transition edge sensor (TES) bolometric detectors read out with frequency multiplexed SQuIDs. EBEX will observe in three frequency bands centered at 150, 250, and 410 GHz, with 768, 384, and 280 detectors in each band, respectively. This broad frequency coverage is designed to provide valuable information about polarized foreground signals from dust. The polarized sky signals will be modulated with an achromatic half wave plate (AHWP) rotating on a superconducting magnetic bearing (SMB) and analyzed with a fixed wire grid polarizer. EBEX will observe a patch covering ~1% of the sky with 8' resolution, allowing for observation of the angular power spectrum from \ell = 20 to 1000. This will allow EBEX to search for both the primordial B-mode signal predicted by inflation and the anticipated lensing B-mode signal. Calculations to predict EBEX constraints on r using expected noise levels show that, for a likelihood centered around zero and with negligible foregrounds, 99% of the area falls below r = 0.035. This value increases by a factor of 1.6 after a process of foreground subtraction. This estimate does not include systematic uncertainties. An engineering flight was launched in June, 2009, from Ft. Sumner, NM, and the long duration science flight in Antarctica is planned for 2011. These proceedings describe the EBEX instrument and the North American engineering flight. 12 pages, 9 figures, Conference proceedings for SPIE Millimeter, Submillimeter, and Far-Infrared Detectors and Instrumentation for Astronomy V (2010)
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 1985EnglishAuthors:Bouchez, Daniel;Bouchez, Daniel;Publisher: HAL CCSDCountry: France
[p. 445] THE SUBJECT OF this paper is a collection of essays composed, in the words of the title "as the brush goes," by Sŏp'o, that is, by Kim Manjung (1637-1692). He is well known, as the author of a masterpiece of Korean fiction, the novel Nine Cloud Dream (Kuunmong). He is also credited with another novel, less famous but not less interesting, The Record of a Southern Journey (Namjŏng ki), which is especially well documented and on which I have already published several articles.
- Publication . Part of book or chapter of book . 2016Open Access EnglishAuthors:Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Publisher: HAL CCSDCountry: France
Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2012EnglishAuthors:Soumaya Amdouni; Djamal Benslimane; Mahmoud Barhamgi; Allel Hadjali; Rim Faiz; Parisa Ghodous;Soumaya Amdouni; Djamal Benslimane; Mahmoud Barhamgi; Allel Hadjali; Rim Faiz; Parisa Ghodous;Publisher: HAL CCSDCountry: France
International audience; Data Mashup is a special class of applications mashup thatcombines data elements from multiple data sources (that are often ex-ported as data web services) to respond to transient business needs onthe y. In this paper, we propose a semantic model for data servicesalong with a declarative approach for creating data mashups withoutany programming involved. Given a query formulated over domain on-tologies, and a set of preferences modeled using the fuzzy set theory,our approach selects the relevant data services based on their semanticmodeling using an RDF query rewriting algorithm. Selected services arethen orchestrated using a ranking-aware algebra to rank their returnedresults based on users preferences at the data mashup execution time.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . Part of book or chapter of book . 2017Open Access EnglishAuthors:Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);
handle: 2078.1/187166
Publisher: SpringerCountries: Belgium, France, FranceProject: EC | AMAROUT-II (291803), EC | CRASH (280141)International audience; In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model is not always convenient, e.g. when combined with formal methods for the verification of cryptographic implementations. Therefore we introduce a new model, the bounded moment model, that formalizes a weaker notion of security order frequently used in the side-channel literature. Interestingly , we prove that probing security for a serial implementation implies bounded moment security for its parallel counterpart. This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments Besides its consolidating nature, our work also brings useful technical contributions. First, we describe and analyze refreshing and multiplication algorithms that are well suited for parallel implementations and improve security against multivariate side-channel attacks. Second, we show that simple refreshing algorithms (with linear complexity) that are not secure in the continuous probing model are secure in the continuous bounded moment model. Eventually, we discuss the independent leakage assumption required for masking to deliver its security promises, and its specificities related to the serial or parallel nature of an implementation.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2016Closed Access EnglishAuthors:Dianne Foreback; Mikhail Nesterenko; Sébastien Tixeuil;Dianne Foreback; Mikhail Nesterenko; Sébastien Tixeuil;Publisher: HAL CCSDCountry: France
International audience; We study unlimited infinite churn in peer-to-peer overlay networks. Under this churn, arbitrary many peers may concurrently request to join or leave the overlay network; moreover these requests may never stop coming. We prove that unlimited adversarial churn, where processes may just exit the overlay network, is unsolvable. We focus on cooperative churn where exiting processes participate in the churn handling algorithm. We define the problem of unlimited infinite churn in this setting. We distinguish the fair version of the problem, where each request is eventually satisfied, from the unfair version that just guarantees progress. We focus on local solutions to the problem, and prove that a local solution to the Fair Infinite Unlimited Churn is impossible. We then present our algorithm UIUC that solves the Unfair Infinite Unlimited Churn Problem for a linearized peer-to-peer overlay network. We extend this solution to skip lists and skip graphs.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Other literature type . Preprint . 2012Open Access EnglishAuthors:Yves Capdeboscq; George Leadbetter; Andrew Parker;Yves Capdeboscq; George Leadbetter; Andrew Parker;Countries: France, United Kingdom
We consider the solution of a scalar Helmholtz equation where the potential (or index) takes two positive values, one inside a ball of radius $\eps$ and another one outside. In this short paper, we report that the results recently obtained in the two dimensional case in [1] can be easily extended to three dimensions. In particular, we provide sharp estimates of the size of the scattered field caused by this ball inhomogeneity, for any frequencies and any contrast. We also provide a broadband estimate, that is, a uniform bound for the scattered field for any contrast, and any frequencies outside of a set which tends to zero with $\eps$. 17 pages
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2018Closed Access EnglishAuthors:Thierry Billard; François Liger; Mathieu Verdurand;Thierry Billard; François Liger; Mathieu Verdurand;Publisher: HAL CCSDCountry: France
Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Conference object . 2019Open Access EnglishAuthors:Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Publisher: HAL CCSDCountries: France, United KingdomProject: EC | VisIoN (764461)
International audience; In this paper, we study the effect of smartphone camera exposure on the performance of optical camera communications (OCC) link. The exposure parameters of image sensor sensitivity (ISO), aperture and shutter speed are included. A static OCC link with a 8 × 8 red, green and blue (RGB) LED array employed as the transmitter and a smartphone camera as the receiver is demonstrated to verify the study. Signal-to-noise ratio (SNR) analysis at different ISO values, the effect of aperture and shutter speed on communication link quality is performed. While SNRs of 20.6 dB and 16.9 dB are measured at 1 m and 2 m transmission distance, respectively for a ISO value of 100, they are decreased to 17.4 dB and 13.32 dB for a ISO of 800. The bit error rate (BER) of a 1 m long OCC link with a camera's shutter speed of 1/6000 s is 1.3 × 10 −3 (i.e., below the forward error correction BER limit of 3.8 × 10 −3) and is dropped to 0.0125 at a shutter speed of 1/20 s. This study provides insight of the basic smartphone settings and the exposure adjustment for further complex OCC links.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Part of book or chapter of book . 2020Open Access EnglishAuthors:Hassen Nigatu; Yimesker Yihun;Hassen Nigatu; Yimesker Yihun;Publisher: HAL CCSDCountry: France
International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.
4,796 Research products, page 1 of 480
Loading
- Publication . Conference object . Preprint . Article . Part of book or chapter of book . 2010Open Access EnglishAuthors:Britt Reichborn-Kjennerud; Asad M. Aboobaker; Peter A. R. Ade; François Aubin; Carlo Baccigalupi; Chaoyun Bao; Julian Borrill; Christopher Cantalupo; Daniel Chapman; Joy Didier; +36 moreBritt Reichborn-Kjennerud; Asad M. Aboobaker; Peter A. R. Ade; François Aubin; Carlo Baccigalupi; Chaoyun Bao; Julian Borrill; Christopher Cantalupo; Daniel Chapman; Joy Didier; Matt Dobbs; Julien Grain; William F. Grainger; Shaul Hanany; Seth Hillbrand; Johannes Hubmayr; Andrew H. Jaffe; Bradley R. Johnson; Terry J. Jones; Theodore Kisner; Jacob Klein; Andrei Korotkov; S. Leach; Adrian T. Lee; L. J. Levinson; Michele Limon; Kevin MacDermid; Tomotake Matsumura; X. Meng; Amber Miller; Michael Milligan; Enzo Pascale; Daniel Polsgrove; Nicolas Ponthieu; Kate Raach; Ilan Sagiv; Graeme Smecher; F. Stivoli; Radek Stompor; Huan Tran; Matthieu Tristram; Gregory S. Tucker; Yury Vinokurov; Amit P. S. Yadav; Matias Zaldarriaga; Kyle Zilic;Countries: United States, France, France, France, France
EBEX is a NASA-funded balloon-borne experiment designed to measure the polarization of the cosmic microwave background (CMB). Observations will be made using 1432 transition edge sensor (TES) bolometric detectors read out with frequency multiplexed SQuIDs. EBEX will observe in three frequency bands centered at 150, 250, and 410 GHz, with 768, 384, and 280 detectors in each band, respectively. This broad frequency coverage is designed to provide valuable information about polarized foreground signals from dust. The polarized sky signals will be modulated with an achromatic half wave plate (AHWP) rotating on a superconducting magnetic bearing (SMB) and analyzed with a fixed wire grid polarizer. EBEX will observe a patch covering ~1% of the sky with 8' resolution, allowing for observation of the angular power spectrum from \ell = 20 to 1000. This will allow EBEX to search for both the primordial B-mode signal predicted by inflation and the anticipated lensing B-mode signal. Calculations to predict EBEX constraints on r using expected noise levels show that, for a likelihood centered around zero and with negligible foregrounds, 99% of the area falls below r = 0.035. This value increases by a factor of 1.6 after a process of foreground subtraction. This estimate does not include systematic uncertainties. An engineering flight was launched in June, 2009, from Ft. Sumner, NM, and the long duration science flight in Antarctica is planned for 2011. These proceedings describe the EBEX instrument and the North American engineering flight. 12 pages, 9 figures, Conference proceedings for SPIE Millimeter, Submillimeter, and Far-Infrared Detectors and Instrumentation for Astronomy V (2010)
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 1985EnglishAuthors:Bouchez, Daniel;Bouchez, Daniel;Publisher: HAL CCSDCountry: France
[p. 445] THE SUBJECT OF this paper is a collection of essays composed, in the words of the title "as the brush goes," by Sŏp'o, that is, by Kim Manjung (1637-1692). He is well known, as the author of a masterpiece of Korean fiction, the novel Nine Cloud Dream (Kuunmong). He is also credited with another novel, less famous but not less interesting, The Record of a Southern Journey (Namjŏng ki), which is especially well documented and on which I have already published several articles.
- Publication . Part of book or chapter of book . 2016Open Access EnglishAuthors:Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;Publisher: HAL CCSDCountry: France
Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2012EnglishAuthors:Soumaya Amdouni; Djamal Benslimane; Mahmoud Barhamgi; Allel Hadjali; Rim Faiz; Parisa Ghodous;Soumaya Amdouni; Djamal Benslimane; Mahmoud Barhamgi; Allel Hadjali; Rim Faiz; Parisa Ghodous;Publisher: HAL CCSDCountry: France
International audience; Data Mashup is a special class of applications mashup thatcombines data elements from multiple data sources (that are often ex-ported as data web services) to respond to transient business needs onthe y. In this paper, we propose a semantic model for data servicesalong with a declarative approach for creating data mashups withoutany programming involved. Given a query formulated over domain on-tologies, and a set of preferences modeled using the fuzzy set theory,our approach selects the relevant data services based on their semanticmodeling using an RDF query rewriting algorithm. Selected services arethen orchestrated using a ranking-aware algebra to rank their returnedresults based on users preferences at the data mashup execution time.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . Part of book or chapter of book . 2017Open Access EnglishAuthors:Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);Barthe, Gilles; Dupressoir, François; Faust, Sebastian; Grégoire, Benjamin; Standaert, François-Xavier; Strub, Pierre-Yves; 36th Annual International Conference on the Theory and Applications of cryptographic Techniques (EUROCRYPT 2017);
handle: 2078.1/187166
Publisher: SpringerCountries: Belgium, France, FranceProject: EC | AMAROUT-II (291803), EC | CRASH (280141)International audience; In this paper, we provide a necessary clarification of the good security properties that can be obtained from parallel implementations of masking schemes. For this purpose, we first argue that (i) the probing model is not straightforward to interpret, since it more naturally captures the intuitions of serial implementations, and (ii) the noisy leakage model is not always convenient, e.g. when combined with formal methods for the verification of cryptographic implementations. Therefore we introduce a new model, the bounded moment model, that formalizes a weaker notion of security order frequently used in the side-channel literature. Interestingly , we prove that probing security for a serial implementation implies bounded moment security for its parallel counterpart. This result therefore enables an accurate understanding of the links between formal security analyses of masking schemes and experimental security evaluations based on the estimation of statistical moments Besides its consolidating nature, our work also brings useful technical contributions. First, we describe and analyze refreshing and multiplication algorithms that are well suited for parallel implementations and improve security against multivariate side-channel attacks. Second, we show that simple refreshing algorithms (with linear complexity) that are not secure in the continuous probing model are secure in the continuous bounded moment model. Eventually, we discuss the independent leakage assumption required for masking to deliver its security promises, and its specificities related to the serial or parallel nature of an implementation.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Conference object . 2016Closed Access EnglishAuthors:Dianne Foreback; Mikhail Nesterenko; Sébastien Tixeuil;Dianne Foreback; Mikhail Nesterenko; Sébastien Tixeuil;Publisher: HAL CCSDCountry: France
International audience; We study unlimited infinite churn in peer-to-peer overlay networks. Under this churn, arbitrary many peers may concurrently request to join or leave the overlay network; moreover these requests may never stop coming. We prove that unlimited adversarial churn, where processes may just exit the overlay network, is unsolvable. We focus on cooperative churn where exiting processes participate in the churn handling algorithm. We define the problem of unlimited infinite churn in this setting. We distinguish the fair version of the problem, where each request is eventually satisfied, from the unfair version that just guarantees progress. We focus on local solutions to the problem, and prove that a local solution to the Fair Infinite Unlimited Churn is impossible. We then present our algorithm UIUC that solves the Unfair Infinite Unlimited Churn Problem for a linearized peer-to-peer overlay network. We extend this solution to skip lists and skip graphs.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Other literature type . Preprint . 2012Open Access EnglishAuthors:Yves Capdeboscq; George Leadbetter; Andrew Parker;Yves Capdeboscq; George Leadbetter; Andrew Parker;Countries: France, United Kingdom
We consider the solution of a scalar Helmholtz equation where the potential (or index) takes two positive values, one inside a ball of radius $\eps$ and another one outside. In this short paper, we report that the results recently obtained in the two dimensional case in [1] can be easily extended to three dimensions. In particular, we provide sharp estimates of the size of the scattered field caused by this ball inhomogeneity, for any frequencies and any contrast. We also provide a broadband estimate, that is, a uniform bound for the scattered field for any contrast, and any frequencies outside of a set which tends to zero with $\eps$. 17 pages
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Part of book or chapter of book . 2018Closed Access EnglishAuthors:Thierry Billard; François Liger; Mathieu Verdurand;Thierry Billard; François Liger; Mathieu Verdurand;Publisher: HAL CCSDCountry: France
Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Other literature type . Conference object . 2019Open Access EnglishAuthors:Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Shivani Rajendra Teli; Stanislav Zvanovec; Zabih Ghassemlooy;Publisher: HAL CCSDCountries: France, United KingdomProject: EC | VisIoN (764461)
International audience; In this paper, we study the effect of smartphone camera exposure on the performance of optical camera communications (OCC) link. The exposure parameters of image sensor sensitivity (ISO), aperture and shutter speed are included. A static OCC link with a 8 × 8 red, green and blue (RGB) LED array employed as the transmitter and a smartphone camera as the receiver is demonstrated to verify the study. Signal-to-noise ratio (SNR) analysis at different ISO values, the effect of aperture and shutter speed on communication link quality is performed. While SNRs of 20.6 dB and 16.9 dB are measured at 1 m and 2 m transmission distance, respectively for a ISO value of 100, they are decreased to 17.4 dB and 13.32 dB for a ISO of 800. The bit error rate (BER) of a 1 m long OCC link with a camera's shutter speed of 1/6000 s is 1.3 × 10 −3 (i.e., below the forward error correction BER limit of 3.8 × 10 −3) and is dropped to 0.0125 at a shutter speed of 1/20 s. This study provides insight of the basic smartphone settings and the exposure adjustment for further complex OCC links.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product. - Publication . Article . Part of book or chapter of book . 2020Open Access EnglishAuthors:Hassen Nigatu; Yimesker Yihun;Hassen Nigatu; Yimesker Yihun;Publisher: HAL CCSDCountry: France
International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.
Average popularityAverage popularity In bottom 99%Average influencePopularity: Citation-based measure reflecting the current impact.Average influence In bottom 99%Influence: Citation-based measure reflecting the total impact.add Add to ORCIDPlease grant OpenAIRE to access and update your ORCID works.This Research product is the result of merged Research products in OpenAIRE.
You have already added works in your ORCID record related to the merged Research product.