39 results on '"Tredan, Gilles"'
Search Results
2. Algorithmic audits of algorithms, and the law
3. Modeling rabbit-holes on YouTube
4. On the Price of Locality in Static Fast Rerouting
5. Improved Fast Rerouting Using Postprocessing
6. On the Implications of Routing Models on Network Optimization
7. Grafting Arborescences for Extra Resilience of Fast Rerouting Schemes
8. Setting the Record Straighter on Shadow Banning
9. Request Complexity of VNet Topology Extraction: Dictionary-Based Attacks
10. Brief Announcement: Do VNet Embeddings Leak Information about ISP Topology?
11. Misleading Stars: What Cannot Be Measured in the Internet?
12. Large-Scale Networked Systems: From Anarchy to Geometric Self-structuring
13. Collective information processing in human phase separation
14. Improved Fast Rerouting Using Postprocessing
15. Application-Aware Adaptive Partitioning for Graph Processing Systems
16. Bonsai: Efficient Fast Failover Routing Using Small Arborescences
17. CASA: Congestion and Stretch Aware Static Fast Rerouting
18. Tomographic Node Placement Strategies and the Impact of the Routing Model
19. Load-Optimal Local Fast Rerouting for Dense Networks
20. Tomographic Node Placement Strategies and the Impact of the Routing Model
21. Tomographic Node Placement Strategies and the Impact of the Routing Model
22. Local Fast Failover Routing With Low Stretch
23. Tomographic Node Placement Strategies and the Impact of the Routing Model
24. Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection
25. The many faces of graph dynamics
26. Load-Optimal Local Fast Rerouting for Resilient Networks
27. Loca
28. Upper and lower bounds for deterministic broadcast in powerline communication networks
29. ColorCast: Deterministic broadcast in powerline networks with uncertainties
30. Modeling and measuring graph similarity
31. Does Mobility Matter? An Evaluation Methodology for Opportunistic Apps
32. Adversarial topology discovery in network virtualization environments: a threat for ISPs?
33. A GENERIC TRUST FRAMEWORK FOR LARGE-SCALE OPEN SYSTEMS USING MACHINE LEARNING
34. Adversarial VNet embeddings: A threat for ISPs?
35. Misleading stars: what cannot be measured in the internet?
36. Low-Cost Secret-Sharing in Sensor Networks
37. How robust are gossip-based communication protocols?
38. A Timing Assumption and a t-Resilient Protocol for Implementing an Eventual Leader Service in Asynchronous Shared Memory Systems
39. On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.