search
Include:
3,850 Research products, page 1 of 385

  • Publications
  • Research software
  • Other research products
  • Part of book or chapter of book
  • US
  • Mémoires en Sciences de l'Information et de la Communication
  • Hal-Diderot
  • HAL AMU

10
arrow_drop_down
Relevance
arrow_drop_down
  • Publication . Part of book or chapter of book . Conference object . Other literature type . Article . 2016
    Open Access English
    Authors: 
    Florent Berthaut; Luke Dahl;
    Publisher: HAL CCSD
    Country: France
    Project: EC | IXMI (330770)

    International audience; Orchestras of Digital Musical Instruments (DMIs) enable new musical collaboration possibilities, extending those of acoustic and electric orchestras. However the creation and development of these orchestras remain constrained. In fact, each new musical collaboration system or orchestra piece relies on a fixed number of musicians, a fixed set of instruments (often only one), and a fixed subset of possible modes of collaboration. In this paper, we describe a unified framework that enables the design of Digital Orchestras with potentially different DMIs and an expand-able set of collaboration modes. It relies on research done on analysis and classification of traditional and digital orchestras, on research in Collaborative Virtual Environments, and on interviews of musicians and composers. The BOEUF framework consists of a classification of modes of collaboration and a set of components for modelling digital orchestras. Integrating this framework into DMIs will enable advanced musical collaboration modes to be used in any digital orchestra, including spontaneous jam sessions.

  • Publication . Part of book or chapter of book . 2012
    Open Access
    Authors: 
    Wakelam, V.; Cuppen, H.M.; Herbst, E.; Smith, I.W.M.; Cockell, C.S.; Leach, S.;
    Publisher: Springer Berlin Heidelberg
    Countries: Netherlands, France, France
    Project: EC | KISMOL (259510)

    2013, IX, 349 p. 79 illus., 55 in color; International audience; We discuss models that astrochemists have developed to study the chemical composition of the interstellar medium. These models aim at computing the evolution of the chemical composition of a mixture of gas and dust under astrophysical conditions. These conditions, as well as the geometry and the physical dynamics, have to be adapted to the objects being studied because different classes of objects have very different characteristics (temperatures, densities, UV radiation fields, geometry, history etc); e.g., proto-planetary disks do not have the same characteristics as proto-stellar envelopes. Chemical models are being improved continually thanks to comparisons with observations but also thanks to laboratory and theoretical work in which the individual processes are studied.

  • Publication . Part of book or chapter of book . 2018
    Closed Access
    Authors: 
    Thierry Billard; François Liger; Mathieu Verdurand;
    Publisher: Elsevier
    Country: France

    Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.

  • English
    Authors: 
    Bouchez, Daniel;
    Publisher: HAL CCSD
    Country: France

    [p. 445] THE SUBJECT OF this paper is a collection of essays composed, in the words of the title "as the brush goes," by Sŏp'o, that is, by Kim Manjung (1637-1692). He is well known, as the author of a masterpiece of Korean fiction, the novel Nine Cloud Dream (Kuunmong). He is also credited with another novel, less famous but not less interesting, The Record of a Southern Journey (Namjŏng ki), which is especially well documented and on which I have already published several articles.

  • Publication . Article . Part of book or chapter of book . 2020
    Open Access English
    Authors: 
    Hassen Nigatu; Yimesker Yihun;
    Publisher: HAL CCSD
    Country: France

    International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.

  • Publication . Part of book or chapter of book . 2014
    English
    Authors: 
    Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;
    Publisher: HAL CCSD
    Country: France

    Increases in arterial stiffness and pulse pressure are typical features of the arterial stiffness during aging and are associated with increased risk of cardiovascular complications. Cellular and molecular determinants of arterial stiffness have not been completely elucidated. Clinically, the carotid-femoral pulse wave velocity (PWV) is the gold standard parameter of arterial stiffness. A recent genome-wide scan of the Framingham Heart Study population has shown that arterial stiffness and mean and pulsatile components of blood pressure are heritable and map to separate the genetic loci in humans, suggesting that distinct genes may modulate these two phenotypes. This chapter details the recent knowledge on the influence of genetic determinants and telomere length on the development of age-related phenotypes. Recent genetic studies have revealed specific genes contributing to arterial stiffening. Available data on genome-wide association (GWA) have been initiated on PWV and have identified common genetic variation in specific loci or single-nucleotide polymorphisms (SNP) significantly associated with PWV. Telomere length at birth is strongly determined genetically and is the main determinant of leukocytes’ telomere length (LTL) later in life. Short LTL is associated with increased risk of stiffness and atherosclerosis of the carotid artery, atherosclerotic heart disease, and diminished survival in the elderly.

  • Open Access English
    Authors: 
    Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;
    Publisher: HAL CCSD
    Country: France

    Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.

  • Open Access English
    Authors: 
    Vladik Kreinovich; Christelle Jacob; Didier Dubois; Janette Cardoso; Martine Ceberio; Ildar Z. Batyrshin;
    Country: France
    Project: NIH | Enhancement of Quantitati... (1T36GM078000-01)

    In many real-life applications (e.g., in aircraft maintenance), we need to estimate the probability of failure of a complex system (such as an aircraft as a whole or one of its subsystems). Complex systems are usually built with redundancy allowing them to withstand the failure of a small number of components. In this paper, we assume that we know the structure of the system, and, as a result, for each possible set of failed components, we can tell whether this set will lead to a system failure. For each component A, we know the probability P(A) of its failure with some uncertainty: e.g., we know the lower and upper bounds P(A) and P(A) for this probability. Usually, it is assumed that failures of different components are independent events. Our objective is to use all this information to estimate the probability of failure of the entire the complex system. In this paper, we describe several methods for solving this problem, including a new efficient method for such estimation based on Cauchy deviates.

  • Open Access English
    Authors: 
    John R. Venable; Jan Pries-Heje; Deborah Bunker; Nancy L. Russo;
    Publisher: HAL CCSD
    Country: France

    International audience; Design science research is a way of creating and studying new technological phenomena, where the understanding comes from inventing, designing, and building new forms of solutions to problems. It has been touted as a new means for the IS field to improve its relevance as the resulting design artifact(s) can directly be used to solve relevant problems. DSR is different from other types of research in its focus on building artifacts and learning from the use and application of the artifacts. It is different in that it engages reality in a way that no descriptive or observational research method can. DSR shares the iterative process with action research but can take place in a laboratory without any involvement of users as researchers (Iivari and Venable 2009).

  • Publication . Conference object . Part of book or chapter of book . 2012
    Open Access
    Authors: 
    Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Stefano Paraboschi; Pierangela Samarati;
    Publisher: Springer Berlin Heidelberg
    Country: France
    Project: NSF | SHF: Small: EAGER: Archit... (1037987), EC | POSECCO (257129)

    Part 5: Database Security; International audience; In the last years, data outsourcing has received an increasing attention by the research community thanks to the benefits that it brings in terms of data management. A basic requirement in such a scenario is that outsourced data be made accessible only to authorized users, that is, no unauthorized party (including the storing server) should have access to the data. While existing proposals provide a sound basis for addressing such a need with respect to data dissemination (i.e., enforcement of read authorizations), they fall short on the support of write authorizations.In this paper we address such an open problem and present an approach to enforce write privileges over outsourced data. Our work nicely extends and complements existing solutions, and exploiting key derivation tokens, hashing, and HMAC functions provides efficient and effective controls.

search
Include:
3,850 Research products, page 1 of 385
  • Publication . Part of book or chapter of book . Conference object . Other literature type . Article . 2016
    Open Access English
    Authors: 
    Florent Berthaut; Luke Dahl;
    Publisher: HAL CCSD
    Country: France
    Project: EC | IXMI (330770)

    International audience; Orchestras of Digital Musical Instruments (DMIs) enable new musical collaboration possibilities, extending those of acoustic and electric orchestras. However the creation and development of these orchestras remain constrained. In fact, each new musical collaboration system or orchestra piece relies on a fixed number of musicians, a fixed set of instruments (often only one), and a fixed subset of possible modes of collaboration. In this paper, we describe a unified framework that enables the design of Digital Orchestras with potentially different DMIs and an expand-able set of collaboration modes. It relies on research done on analysis and classification of traditional and digital orchestras, on research in Collaborative Virtual Environments, and on interviews of musicians and composers. The BOEUF framework consists of a classification of modes of collaboration and a set of components for modelling digital orchestras. Integrating this framework into DMIs will enable advanced musical collaboration modes to be used in any digital orchestra, including spontaneous jam sessions.

  • Publication . Part of book or chapter of book . 2012
    Open Access
    Authors: 
    Wakelam, V.; Cuppen, H.M.; Herbst, E.; Smith, I.W.M.; Cockell, C.S.; Leach, S.;
    Publisher: Springer Berlin Heidelberg
    Countries: Netherlands, France, France
    Project: EC | KISMOL (259510)

    2013, IX, 349 p. 79 illus., 55 in color; International audience; We discuss models that astrochemists have developed to study the chemical composition of the interstellar medium. These models aim at computing the evolution of the chemical composition of a mixture of gas and dust under astrophysical conditions. These conditions, as well as the geometry and the physical dynamics, have to be adapted to the objects being studied because different classes of objects have very different characteristics (temperatures, densities, UV radiation fields, geometry, history etc); e.g., proto-planetary disks do not have the same characteristics as proto-stellar envelopes. Chemical models are being improved continually thanks to comparisons with observations but also thanks to laboratory and theoretical work in which the individual processes are studied.

  • Publication . Part of book or chapter of book . 2018
    Closed Access
    Authors: 
    Thierry Billard; François Liger; Mathieu Verdurand;
    Publisher: Elsevier
    Country: France

    Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.

  • English
    Authors: 
    Bouchez, Daniel;
    Publisher: HAL CCSD
    Country: France

    [p. 445] THE SUBJECT OF this paper is a collection of essays composed, in the words of the title "as the brush goes," by Sŏp'o, that is, by Kim Manjung (1637-1692). He is well known, as the author of a masterpiece of Korean fiction, the novel Nine Cloud Dream (Kuunmong). He is also credited with another novel, less famous but not less interesting, The Record of a Southern Journey (Namjŏng ki), which is especially well documented and on which I have already published several articles.

  • Publication . Article . Part of book or chapter of book . 2020
    Open Access English
    Authors: 
    Hassen Nigatu; Yimesker Yihun;
    Publisher: HAL CCSD
    Country: France

    International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.

  • Publication . Part of book or chapter of book . 2014
    English
    Authors: 
    Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;
    Publisher: HAL CCSD
    Country: France

    Increases in arterial stiffness and pulse pressure are typical features of the arterial stiffness during aging and are associated with increased risk of cardiovascular complications. Cellular and molecular determinants of arterial stiffness have not been completely elucidated. Clinically, the carotid-femoral pulse wave velocity (PWV) is the gold standard parameter of arterial stiffness. A recent genome-wide scan of the Framingham Heart Study population has shown that arterial stiffness and mean and pulsatile components of blood pressure are heritable and map to separate the genetic loci in humans, suggesting that distinct genes may modulate these two phenotypes. This chapter details the recent knowledge on the influence of genetic determinants and telomere length on the development of age-related phenotypes. Recent genetic studies have revealed specific genes contributing to arterial stiffening. Available data on genome-wide association (GWA) have been initiated on PWV and have identified common genetic variation in specific loci or single-nucleotide polymorphisms (SNP) significantly associated with PWV. Telomere length at birth is strongly determined genetically and is the main determinant of leukocytes’ telomere length (LTL) later in life. Short LTL is associated with increased risk of stiffness and atherosclerosis of the carotid artery, atherosclerotic heart disease, and diminished survival in the elderly.

  • Open Access English
    Authors: 
    Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;
    Publisher: HAL CCSD
    Country: France

    Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.

  • Open Access English
    Authors: 
    Vladik Kreinovich; Christelle Jacob; Didier Dubois; Janette Cardoso; Martine Ceberio; Ildar Z. Batyrshin;
    Country: France
    Project: NIH | Enhancement of Quantitati... (1T36GM078000-01)

    In many real-life applications (e.g., in aircraft maintenance), we need to estimate the probability of failure of a complex system (such as an aircraft as a whole or one of its subsystems). Complex systems are usually built with redundancy allowing them to withstand the failure of a small number of components. In this paper, we assume that we know the structure of the system, and, as a result, for each possible set of failed components, we can tell whether this set will lead to a system failure. For each component A, we know the probability P(A) of its failure with some uncertainty: e.g., we know the lower and upper bounds P(A) and P(A) for this probability. Usually, it is assumed that failures of different components are independent events. Our objective is to use all this information to estimate the probability of failure of the entire the complex system. In this paper, we describe several methods for solving this problem, including a new efficient method for such estimation based on Cauchy deviates.

  • Open Access English
    Authors: 
    John R. Venable; Jan Pries-Heje; Deborah Bunker; Nancy L. Russo;
    Publisher: HAL CCSD
    Country: France

    International audience; Design science research is a way of creating and studying new technological phenomena, where the understanding comes from inventing, designing, and building new forms of solutions to problems. It has been touted as a new means for the IS field to improve its relevance as the resulting design artifact(s) can directly be used to solve relevant problems. DSR is different from other types of research in its focus on building artifacts and learning from the use and application of the artifacts. It is different in that it engages reality in a way that no descriptive or observational research method can. DSR shares the iterative process with action research but can take place in a laboratory without any involvement of users as researchers (Iivari and Venable 2009).

  • Publication . Conference object . Part of book or chapter of book . 2012
    Open Access
    Authors: 
    Sabrina De Capitani di Vimercati; Sara Foresti; Sushil Jajodia; Stefano Paraboschi; Pierangela Samarati;
    Publisher: Springer Berlin Heidelberg
    Country: France
    Project: NSF | SHF: Small: EAGER: Archit... (1037987), EC | POSECCO (257129)

    Part 5: Database Security; International audience; In the last years, data outsourcing has received an increasing attention by the research community thanks to the benefits that it brings in terms of data management. A basic requirement in such a scenario is that outsourced data be made accessible only to authorized users, that is, no unauthorized party (including the storing server) should have access to the data. While existing proposals provide a sound basis for addressing such a need with respect to data dissemination (i.e., enforcement of read authorizations), they fall short on the support of write authorizations.In this paper we address such an open problem and present an approach to enforce write privileges over outsourced data. Our work nicely extends and complements existing solutions, and exploiting key derivation tokens, hashing, and HMAC functions provides efficient and effective controls.

Send a message
How can we help?
We usually respond in a few hours.