search
Include:
2,306 Research products, page 1 of 231

  • Publications
  • Research software
  • Other research products
  • 2013-2022
  • Part of book or chapter of book
  • US
  • Mémoires en Sciences de l'Information et de la Communication
  • Hal-Diderot
  • HAL AMU

10
arrow_drop_down
Relevance
arrow_drop_down
  • Publication . Part of book or chapter of book . Conference object . Other literature type . Article . 2016
    Open Access English
    Authors: 
    Florent Berthaut; Luke Dahl;
    Publisher: HAL CCSD
    Country: France
    Project: EC | IXMI (330770)

    International audience; Orchestras of Digital Musical Instruments (DMIs) enable new musical collaboration possibilities, extending those of acoustic and electric orchestras. However the creation and development of these orchestras remain constrained. In fact, each new musical collaboration system or orchestra piece relies on a fixed number of musicians, a fixed set of instruments (often only one), and a fixed subset of possible modes of collaboration. In this paper, we describe a unified framework that enables the design of Digital Orchestras with potentially different DMIs and an expand-able set of collaboration modes. It relies on research done on analysis and classification of traditional and digital orchestras, on research in Collaborative Virtual Environments, and on interviews of musicians and composers. The BOEUF framework consists of a classification of modes of collaboration and a set of components for modelling digital orchestras. Integrating this framework into DMIs will enable advanced musical collaboration modes to be used in any digital orchestra, including spontaneous jam sessions.

  • Publication . Part of book or chapter of book . 2018
    Closed Access
    Authors: 
    Thierry Billard; François Liger; Mathieu Verdurand;
    Publisher: Elsevier
    Country: France

    Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.

  • Publication . Article . Part of book or chapter of book . 2020
    Open Access English
    Authors: 
    Hassen Nigatu; Yimesker Yihun;
    Publisher: HAL CCSD
    Country: France

    International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.

  • Publication . Part of book or chapter of book . 2014
    English
    Authors: 
    Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;
    Publisher: HAL CCSD
    Country: France

    Increases in arterial stiffness and pulse pressure are typical features of the arterial stiffness during aging and are associated with increased risk of cardiovascular complications. Cellular and molecular determinants of arterial stiffness have not been completely elucidated. Clinically, the carotid-femoral pulse wave velocity (PWV) is the gold standard parameter of arterial stiffness. A recent genome-wide scan of the Framingham Heart Study population has shown that arterial stiffness and mean and pulsatile components of blood pressure are heritable and map to separate the genetic loci in humans, suggesting that distinct genes may modulate these two phenotypes. This chapter details the recent knowledge on the influence of genetic determinants and telomere length on the development of age-related phenotypes. Recent genetic studies have revealed specific genes contributing to arterial stiffening. Available data on genome-wide association (GWA) have been initiated on PWV and have identified common genetic variation in specific loci or single-nucleotide polymorphisms (SNP) significantly associated with PWV. Telomere length at birth is strongly determined genetically and is the main determinant of leukocytes’ telomere length (LTL) later in life. Short LTL is associated with increased risk of stiffness and atherosclerosis of the carotid artery, atherosclerotic heart disease, and diminished survival in the elderly.

  • Open Access English
    Authors: 
    Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;
    Publisher: HAL CCSD
    Country: France

    Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.

  • Publication . Part of book or chapter of book . 2019
    Closed Access English
    Authors: 
    Dan E. Webster; Sandrine Roulland; James D. Phelan;
    Publisher: HAL CCSD
    Country: France
    Project: EC | LYMPHOSIGN (661066)

    Genome-wide screens are a powerful technique to dissect the complex network of genes regulating diverse cellular phenotypes. The recent adaptation of the CRISPR-Cas9 system for genome engineering has revolutionized functional genomic screening. Here, we present protocols used to introduce Cas9 into human lymphoma cell lines, produce high-titer lentivirus of a genome-wide sgRNA library, transduce and culture cells during the screen, isolate genomic DNA, and prepare a custom library for next-generation sequencing. These protocols were tailored for loss-of-function CRISPR screens in human lymphoma cell lines but are highly amenable for other experimental purposes.

  • Publication . Conference object . 2016
    Closed Access English
    Authors: 
    Dianne Foreback; Mikhail Nesterenko; Sébastien Tixeuil;
    Publisher: HAL CCSD
    Country: France

    International audience; We study unlimited infinite churn in peer-to-peer overlay networks. Under this churn, arbitrary many peers may concurrently request to join or leave the overlay network; moreover these requests may never stop coming. We prove that unlimited adversarial churn, where processes may just exit the overlay network, is unsolvable. We focus on cooperative churn where exiting processes participate in the churn handling algorithm. We define the problem of unlimited infinite churn in this setting. We distinguish the fair version of the problem, where each request is eventually satisfied, from the unfair version that just guarantees progress. We focus on local solutions to the problem, and prove that a local solution to the Fair Infinite Unlimited Churn is impossible. We then present our algorithm UIUC that solves the Unfair Infinite Unlimited Churn Problem for a linearized peer-to-peer overlay network. We extend this solution to skip lists and skip graphs.

  • Open Access English
    Authors: 
    Ehab ElSalamouny; Konstantinos Chatzikokolakis; Catuscia Palamidessi;
    Publisher: HAL CCSD
    Country: France
    Project: EC | MEALS (295261)

    International audience; Differential privacy is a notion of privacy that was initially designed for statistical databases, and has been recently extended to a more general class of domains. Both differential privacy and its generalized version can be achieved by adding random noise to the reported data. Thus, privacy is obtained at the cost of reducing the data's accuracy, and therefore their utility. In this paper we consider the problem of identifying optimal mechanisms for gen- eralized differential privacy, i.e. mechanisms that maximize the utility for a given level of privacy. The utility usually depends on a prior distribution of the data, and naturally it would be desirable to design mechanisms that are universally optimal, i.e., optimal for all priors. However it is already known that such mechanisms do not exist in general. We then characterize maximal classes of priors for which a mechanism which is optimal for all the priors of the class does exist. We show that such classes can be defined as convex polytopes in the priors space. As an application, we consider the problem of privacy that arises when using, for instance, location-based services, and we show how to define mechanisms that maximize the quality of service while preserving the desired level of geo- indistinguishability.

  • Publication . Conference object . Part of book or chapter of book . Report . 2014
    Open Access English
    Authors: 
    Michel Abdalla; Fabrice Benhamouda; David Pointcheval;
    Publisher: HAL CCSD
    Country: France
    Project: EC | CRYPTOCLOUD (339563)

    International audience; An important problem in secure multi-party computation is the design of protocols that can tolerate adversaries that are capable of corrupting parties dynamically and learning their internal states. In this paper, we make significant progress in this area in the context of password-authenticated key exchange (PAKE) and oblivious transfer (OT) protocols. More precisely, we first revisit the notion of projective hash proofs and introduce a new feature that allows us to explain any message sent by the simulator in case of corruption, hence the notion of Explainable Projective Hashing. Next, we demonstrate that this new tool generically leads to efficient PAKE and OT protocols that are secure against semi-adaptive adversaries without erasures in the Universal Composability (UC) framework. We then show how to make these protocols secure even against adaptive adversaries, using \emph{non-committing encryption}, in a much more efficient way than generic conversions from semi-adaptive to adaptive security. Finally, we provide concrete instantiations of explainable projective hash functions that lead to the most efficient PAKE and OT protocols known so far, with UC-security against adaptive adversaries, with or without erasures, in the single global CRS setting.As an important side contribution, we also propose a new commitment scheme based on DDH, which leads to the construction of the first one-round PAKE adaptively secure under plain DDH without pairing, assuming reliable erasures, and also improves previous constructions of OT and two- or three-round PAKE schemes.

  • Closed Access English
    Authors: 
    Emin Bayraktar; Ibrahim Miskioglu; D. Katundi; Fabio Gatamorta;
    Publisher: HAL CCSD
    Country: France

    Aluminum based hybrid composites were produced from recycled AA7075 chips with the addition of TiC (d ≤ 3–5 micron), MoS2 and Al2O3 fiber. In the two groups of composites produced, the content of MoS2 and Al2O3 were fixed as 2 wt % and 3 wt % respectively, whereas TiC content was at two levels (5–10%). The combined method of powder metallurgy route, sintering followed by forging, was used to manufacture these composites. These composites are targeted for aeronautical and automotive industries for components subjected to static as well as cyclic and dynamic loading. In addition to mechanical properties, machinability of these composites is of importance hence, MoS2 was included in the formulation. Micro hardness, 3 point bending, low velocity impact and nanoindentation (creep and wear) tests were performed on samples manufactured by just sintering and sintering followed by forging. The results showed that, in generals, the samples that were forged after sintering yielded better properties. The microstructure analyses (matrix/interface) have been carried out by Scanning Electron Microscope (SEM).

search
Include:
2,306 Research products, page 1 of 231
  • Publication . Part of book or chapter of book . Conference object . Other literature type . Article . 2016
    Open Access English
    Authors: 
    Florent Berthaut; Luke Dahl;
    Publisher: HAL CCSD
    Country: France
    Project: EC | IXMI (330770)

    International audience; Orchestras of Digital Musical Instruments (DMIs) enable new musical collaboration possibilities, extending those of acoustic and electric orchestras. However the creation and development of these orchestras remain constrained. In fact, each new musical collaboration system or orchestra piece relies on a fixed number of musicians, a fixed set of instruments (often only one), and a fixed subset of possible modes of collaboration. In this paper, we describe a unified framework that enables the design of Digital Orchestras with potentially different DMIs and an expand-able set of collaboration modes. It relies on research done on analysis and classification of traditional and digital orchestras, on research in Collaborative Virtual Environments, and on interviews of musicians and composers. The BOEUF framework consists of a classification of modes of collaboration and a set of components for modelling digital orchestras. Integrating this framework into DMIs will enable advanced musical collaboration modes to be used in any digital orchestra, including spontaneous jam sessions.

  • Publication . Part of book or chapter of book . 2018
    Closed Access
    Authors: 
    Thierry Billard; François Liger; Mathieu Verdurand;
    Publisher: Elsevier
    Country: France

    Abstract The serotonergic system plays a key modulatory role in the brain. This system is critical in many drug developments for brain disorders via interactions with the 14 subtypes of 5-HT receptors or through reuptake blockade. Positron emission tomography (PET) is an efficient tool for in vivo studies of physiological and pathological processes. Because of its pertinent radiochemical properties, fluorine-18 is one of the most used radioisotopes in PET imaging. This chapter will propose an overview of the 18F-radioligands targeting serotonin receptors, which have been developed over the last few years. Both radiosyntheses and pharmacological properties of these radiotracers will be described, with a specific emphasis on their potential medical applications.

  • Publication . Article . Part of book or chapter of book . 2020
    Open Access English
    Authors: 
    Hassen Nigatu; Yimesker Yihun;
    Publisher: HAL CCSD
    Country: France

    International audience; This study presents an algebraic method to detect, count, and identify concomitant motions of parallel robots at the velocity level. The pose and orientation of moving platform of parallel manipulators (PMs) with f-DOF could be commonly described by f possible motion variables on the instantaneous motion space (IMS) and (6 − f) restriction motion variables on the instantaneous restriction space (IRS). However, in some situations, PMs moving platform may accompanied by a concomitant (parasitic) motions along the direction of restriction space. Therefore, the commonly understood one-to-one correspondence between joint space and task space mobility of non-redundant PMs would be compromised. This phenomenon occurred due to the fact that the alignment of screws can change the reciprocal screws while the given screw systems are still maintained. To demonstrate the proposed method, an amplitude-based concomitant motion comparison is performed on two widely utilized lower-mobility parallel mechanisms, 3RPS and 3PRS. The result has shown that for the selected mechanisms, concomitant motion is identical regardless of their difference in joint arrangements in each limbs.

  • Publication . Part of book or chapter of book . 2014
    English
    Authors: 
    Athanase Benetos; Abraham Aviv; Patrick Lacolley; Michel E. Safar; Véronique Regnault;
    Publisher: HAL CCSD
    Country: France

    Increases in arterial stiffness and pulse pressure are typical features of the arterial stiffness during aging and are associated with increased risk of cardiovascular complications. Cellular and molecular determinants of arterial stiffness have not been completely elucidated. Clinically, the carotid-femoral pulse wave velocity (PWV) is the gold standard parameter of arterial stiffness. A recent genome-wide scan of the Framingham Heart Study population has shown that arterial stiffness and mean and pulsatile components of blood pressure are heritable and map to separate the genetic loci in humans, suggesting that distinct genes may modulate these two phenotypes. This chapter details the recent knowledge on the influence of genetic determinants and telomere length on the development of age-related phenotypes. Recent genetic studies have revealed specific genes contributing to arterial stiffening. Available data on genome-wide association (GWA) have been initiated on PWV and have identified common genetic variation in specific loci or single-nucleotide polymorphisms (SNP) significantly associated with PWV. Telomere length at birth is strongly determined genetically and is the main determinant of leukocytes’ telomere length (LTL) later in life. Short LTL is associated with increased risk of stiffness and atherosclerosis of the carotid artery, atherosclerotic heart disease, and diminished survival in the elderly.

  • Open Access English
    Authors: 
    Taiwo Oyedare; Ashraf Al Sharah; Sachin Shetty;
    Publisher: HAL CCSD
    Country: France

    Part 6: Network Modeling; International audience; Mobile Adhoc Networks (MANET) are susceptible to jamming attacks which can inhibit data transmissions. There has been considerable work done in the detection of external jamming attacks. However, detection of insider jamming attack in MANET has not received enough attention. The presence of an insider node that has constantly monitored the network and is privy to the network secrets can acquire sufficient information to cause irreparable damage. In this paper we propose a framework for a novel reputation-based coalition game between multiple players in a MANET to prevent internal attacks caused by an erstwhile legitimate node. A grand coalition is formed which will make a strategic security defense decision by depending on the stored transmission rate and reputation for each individual node in the coalition. Our results show that the simulation of the reputation-based coalition game would help improve the network’s defense strategy while also reducing false positives that results from the incorrect classification of unfortunate legitimate nodes as insider jammers.

  • Publication . Part of book or chapter of book . 2019
    Closed Access English
    Authors: 
    Dan E. Webster; Sandrine Roulland; James D. Phelan;
    Publisher: HAL CCSD
    Country: France
    Project: EC | LYMPHOSIGN (661066)

    Genome-wide screens are a powerful technique to dissect the complex network of genes regulating diverse cellular phenotypes. The recent adaptation of the CRISPR-Cas9 system for genome engineering has revolutionized functional genomic screening. Here, we present protocols used to introduce Cas9 into human lymphoma cell lines, produce high-titer lentivirus of a genome-wide sgRNA library, transduce and culture cells during the screen, isolate genomic DNA, and prepare a custom library for next-generation sequencing. These protocols were tailored for loss-of-function CRISPR screens in human lymphoma cell lines but are highly amenable for other experimental purposes.

  • Publication . Conference object . 2016
    Closed Access English
    Authors: 
    Dianne Foreback; Mikhail Nesterenko; Sébastien Tixeuil;
    Publisher: HAL CCSD
    Country: France

    International audience; We study unlimited infinite churn in peer-to-peer overlay networks. Under this churn, arbitrary many peers may concurrently request to join or leave the overlay network; moreover these requests may never stop coming. We prove that unlimited adversarial churn, where processes may just exit the overlay network, is unsolvable. We focus on cooperative churn where exiting processes participate in the churn handling algorithm. We define the problem of unlimited infinite churn in this setting. We distinguish the fair version of the problem, where each request is eventually satisfied, from the unfair version that just guarantees progress. We focus on local solutions to the problem, and prove that a local solution to the Fair Infinite Unlimited Churn is impossible. We then present our algorithm UIUC that solves the Unfair Infinite Unlimited Churn Problem for a linearized peer-to-peer overlay network. We extend this solution to skip lists and skip graphs.

  • Open Access English
    Authors: 
    Ehab ElSalamouny; Konstantinos Chatzikokolakis; Catuscia Palamidessi;
    Publisher: HAL CCSD
    Country: France
    Project: EC | MEALS (295261)

    International audience; Differential privacy is a notion of privacy that was initially designed for statistical databases, and has been recently extended to a more general class of domains. Both differential privacy and its generalized version can be achieved by adding random noise to the reported data. Thus, privacy is obtained at the cost of reducing the data's accuracy, and therefore their utility. In this paper we consider the problem of identifying optimal mechanisms for gen- eralized differential privacy, i.e. mechanisms that maximize the utility for a given level of privacy. The utility usually depends on a prior distribution of the data, and naturally it would be desirable to design mechanisms that are universally optimal, i.e., optimal for all priors. However it is already known that such mechanisms do not exist in general. We then characterize maximal classes of priors for which a mechanism which is optimal for all the priors of the class does exist. We show that such classes can be defined as convex polytopes in the priors space. As an application, we consider the problem of privacy that arises when using, for instance, location-based services, and we show how to define mechanisms that maximize the quality of service while preserving the desired level of geo- indistinguishability.

  • Publication . Conference object . Part of book or chapter of book . Report . 2014
    Open Access English
    Authors: 
    Michel Abdalla; Fabrice Benhamouda; David Pointcheval;
    Publisher: HAL CCSD
    Country: France
    Project: EC | CRYPTOCLOUD (339563)

    International audience; An important problem in secure multi-party computation is the design of protocols that can tolerate adversaries that are capable of corrupting parties dynamically and learning their internal states. In this paper, we make significant progress in this area in the context of password-authenticated key exchange (PAKE) and oblivious transfer (OT) protocols. More precisely, we first revisit the notion of projective hash proofs and introduce a new feature that allows us to explain any message sent by the simulator in case of corruption, hence the notion of Explainable Projective Hashing. Next, we demonstrate that this new tool generically leads to efficient PAKE and OT protocols that are secure against semi-adaptive adversaries without erasures in the Universal Composability (UC) framework. We then show how to make these protocols secure even against adaptive adversaries, using \emph{non-committing encryption}, in a much more efficient way than generic conversions from semi-adaptive to adaptive security. Finally, we provide concrete instantiations of explainable projective hash functions that lead to the most efficient PAKE and OT protocols known so far, with UC-security against adaptive adversaries, with or without erasures, in the single global CRS setting.As an important side contribution, we also propose a new commitment scheme based on DDH, which leads to the construction of the first one-round PAKE adaptively secure under plain DDH without pairing, assuming reliable erasures, and also improves previous constructions of OT and two- or three-round PAKE schemes.

  • Closed Access English
    Authors: 
    Emin Bayraktar; Ibrahim Miskioglu; D. Katundi; Fabio Gatamorta;
    Publisher: HAL CCSD
    Country: France

    Aluminum based hybrid composites were produced from recycled AA7075 chips with the addition of TiC (d ≤ 3–5 micron), MoS2 and Al2O3 fiber. In the two groups of composites produced, the content of MoS2 and Al2O3 were fixed as 2 wt % and 3 wt % respectively, whereas TiC content was at two levels (5–10%). The combined method of powder metallurgy route, sintering followed by forging, was used to manufacture these composites. These composites are targeted for aeronautical and automotive industries for components subjected to static as well as cyclic and dynamic loading. In addition to mechanical properties, machinability of these composites is of importance hence, MoS2 was included in the formulation. Micro hardness, 3 point bending, low velocity impact and nanoindentation (creep and wear) tests were performed on samples manufactured by just sintering and sintering followed by forging. The results showed that, in generals, the samples that were forged after sintering yielded better properties. The microstructure analyses (matrix/interface) have been carried out by Scanning Electron Microscope (SEM).

Send a message
How can we help?
We usually respond in a few hours.