82 results on '"Tredan, Gilles"'
Search Results
52. Bonsai: Efficient Fast Failover Routing Using Small Arborescences
- Author
-
Foerster, Klaus-Tycho, primary, Kamisinski, Andrzej, additional, Pignolet, Yvonne-Anne, additional, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2019
- Full Text
- View/download PDF
53. CASA: Congestion and Stretch Aware Static Fast Rerouting
- Author
-
Foerster, Klaus-Tycho, primary, Pignolet, Yvonne-Anne, additional, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2019
- Full Text
- View/download PDF
54. Tomographic Node Placement Strategies and the Impact of the Routing Model
- Author
-
Pignolet, Yvonne-Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2019
- Full Text
- View/download PDF
55. Load-Optimal Local Fast Rerouting for Dense Networks
- Author
-
Borokhovich, Michael, primary, Pignolet, Yvonne-Anne, additional, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2018
- Full Text
- View/download PDF
56. Tomographic Node Placement Strategies and the Impact of the Routing Model
- Author
-
Pignolet, Yvonne-Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2018
- Full Text
- View/download PDF
57. Local Fast Failover Routing With Low Stretch
- Author
-
Foerster, Klaus-Tycho, primary, Pignolet, Yvonne-Anne, additional, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2018
- Full Text
- View/download PDF
58. Tomographic Node Placement Strategies and the Impact of the Routing Model
- Author
-
Pignolet, Yvonne-Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2017
- Full Text
- View/download PDF
59. Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection
- Author
-
Bertero, Christophe, primary, Roy, Matthieu, additional, Sauvanaud, Carla, additional, and Tredan, Gilles, additional
- Published
- 2017
- Full Text
- View/download PDF
60. The many faces of graph dynamics
- Author
-
Pignolet, Yvonne Anne, primary, Roy, Matthieu, additional, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2017
- Full Text
- View/download PDF
61. Load-Optimal Local Fast Rerouting for Resilient Networks
- Author
-
Pignolet, Yvonne-Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2017
- Full Text
- View/download PDF
62. Loca
- Author
-
Pasqua, Roberto, primary, Roy, Matthieu, additional, and Tredan, Gilles, additional
- Published
- 2016
- Full Text
- View/download PDF
63. ColorCast: Deterministic broadcast in powerline networks with uncertainties
- Author
-
Pignolet, Yvonne Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2014
- Full Text
- View/download PDF
64. Centralité du second ordre : Calcul distribué de l'importance de noeuds dans un réseau complexe
- Author
-
Kermarrec, Anne-Marie, Le Merrer, Erwan, Sericola, Bruno, Tredan, Gilles, As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES (IRISA-D2), INRIA, SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] - Abstract
A complex network can be modeled as a graph representing the "who knows who" relationship. In the context of graph theory for social networks, the notion of centrality is used to assess the relative importance of nodes in a given network topology. For example, in a network composed of large dense clusters connected through only a few links, the nodes involved in those links are particularly critical as far as the network survivability is concerned. This may also impact any application running on top of it. Such information can be exploited for various topological maintenance issues to prevent congestion and disruptance. This can also be used offline to identify the most important nodes in large social interaction graphs. Several forms of centrality have been proposed so far. Yet, they suffer from imperfections : designed for abstract graphs, they are either of limited use (degree centrality), either uncomputable in a distributed setting (random walk betweenness centrality). In this paper we introduce a novel form of centrality : the second order centrality which can be computed in a fully decentralized manner. This provides locally each node with its relative criticity and relies on a random walk visiting the network in an unbiased fashion. To this end, each node records the time elapsed between visits of that random walk (called return time in the sequel) and computes the standard deviation (or second order moment) of such return times. Both through theoretical analysis and simulation, we show that the standard deviation can be used to accurately identify critical nodes as well as to globally characterize graphs topology in a fully decentralized way.
- Published
- 2009
65. Centralite du second ordre : Calcul distribue de l'importance de noeuds
- Author
-
Kermarrec, Anne-Marie, Le Merrer, Erwan, Sericola, Bruno, Tredan, Gilles, As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Dependability Interoperability and perfOrmance aNalYsiS Of networkS (DIONYSOS), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES (IRISA-D2), Chaintreau, Augustin and Magnien, Clemence, SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Caractérisation de graphes ,Marches Aléatoires ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,Centralité - Abstract
International audience; Dans le contexte de la théorie des graphes pour les réseaux sociaux, la notion de centralité a été introduite pour mesurer l'importance relative de noeuds dans une topologie donnée. Connaître cette importance est un enjeu majeur pour assurer la robustesse des systèmes distribués. De nombreuses formes de centralités ont déjà été définies; dans le contexte des systèmes distribués, elles sont cependant soit d'un intérêt limité (centralité des degrés), soit difficilement distribuables (centralité d'intermédiarité). Dans cet article, nous introduisons une nouvelle forme de centralité: la centralité du second ordre. Celle-ci est calculée de façon totalement distribuée, au moyen d'une marche aléatoire. Elle attribue à chaque noeud une valeur indicatrice de son importance dans le graphe. Pour cela, chaque noeud conserve les temps écoulés entre deux visites de la marche et calcule l'écart type de ces temps. Nous montrons que cet écart type est une mesure de centralité qui permet également de caractériser globalement la topologie d'un graphe donné.
- Published
- 2009
66. Modeling and measuring graph similarity
- Author
-
Roy, Matthieu, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2014
- Full Text
- View/download PDF
67. Does Mobility Matter? An Evaluation Methodology for Opportunistic Apps
- Author
-
Friginal, Jesus, primary, Killijian, Marc Olivier, additional, Pasqua, Roberto, additional, Roy, Matthieu, additional, and Tredan, Gilles, additional
- Published
- 2014
- Full Text
- View/download PDF
68. Adversarial topology discovery in network virtualization environments: a threat for ISPs?
- Author
-
Pignolet, Yvonne Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2014
- Full Text
- View/download PDF
69. A GENERIC TRUST FRAMEWORK FOR LARGE-SCALE OPEN SYSTEMS USING MACHINE LEARNING
- Author
-
Liu, Xin, primary, Tredan, Gilles, additional, and Datta, Anwitaman, additional
- Published
- 2013
- Full Text
- View/download PDF
70. Adversarial VNet embeddings: A threat for ISPs?
- Author
-
Pignolet, Yvonne-Anne, primary, Schmid, Stefan, additional, and Tredan, Gilles, additional
- Published
- 2013
- Full Text
- View/download PDF
71. Low-Cost Secret-Sharing in Sensor Networks
- Author
-
Bertier, Marin, primary, Mostefaoui, Achour, additional, and Tredan, Gilles, additional
- Published
- 2010
- Full Text
- View/download PDF
72. How robust are gossip-based communication protocols?
- Author
-
Alvisi, Lorenzo, primary, Doumen, Jeroen, additional, Guerraoui, Rachid, additional, Koldehofe, Boris, additional, Li, Harry, additional, van Renesse, Robbert, additional, and Tredan, Gilles, additional
- Published
- 2007
- Full Text
- View/download PDF
73. A Timing Assumption and a t-Resilient Protocol for Implementing an Eventual Leader Service in Asynchronous Shared Memory Systems
- Author
-
Fernandez, Antonio, primary, Jimenez, Ernesto, additional, Raynal, Michel, additional, and Tredan, Gilles, additional
- Published
- 2007
- Full Text
- View/download PDF
74. A GENERIC TRUST FRAMEWORK FOR LARGE-SCALE OPEN SYSTEMS USING MACHINE LEARNING.
- Author
-
Liu, Xin, Tredan, Gilles, and Datta, Anwitaman
- Subjects
- *
LARGE scale systems , *MACHINE learning , *WEB services , *RELIABILITY (Personality trait) , *COMPUTER systems - Abstract
In many large-scale distributed systems and on the Web, agents need to interact with other unknown agents to carry out some tasks or transactions. The ability to reason about and assess the potential risks in carrying out such transactions is essential for providing a safe and reliable interaction environment. A traditional approach to reason about the risk of a transaction is to determine if the involved agent is trustworthy on the basis of its behavior history. As a departure from such traditional trust models, we propose a generic, trust framework based on machine learning where an agent uses its own previous transactions (with other agents) to build a personal knowledge base. This is used to assess the trustworthiness of a transaction on the basis of the associated features, particularly using the features that help discern successful transactions from unsuccessful ones. These features are handled by applying appropriate machine learning algorithms to extract the relationships between the potential transaction and the previous ones. Experiments based on real data sets show that our approach is more accurate than other trust mechanisms, especially when the information about past behavior of the specific agent is rare, incomplete, or inaccurate. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
75. On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system
- Author
-
MOSTEFAOUI, Achour, primary, RAYNAL, Michel, additional, and TREDAN, Gilles, additional
- Published
- 2006
- Full Text
- View/download PDF
76. Tomographic Node Placement Strategies and the Impact of the Routing Model
- Author
-
Pignolet, Yvonne-Anne, Schmid, Stefan, and Tredan, Gilles
- Abstract
Tomographic techniques can be used for the fast detection of link failures at low cost. Our paper studies the impact of the routing model on tomographic node placement costs. We present a taxonomy of path routing models and provide optimal and near-optimal algorithms to deploy a minimal number of asymmetric and symmetric tomography nodes for basic network topologies under different routing model classes. Intriguingly, we find that in many cases routing according to a more restrictive routing model gives better results: compared to a more general routing model, computing a good placement is algorithmically more tractable and does not entail high monitoring costs, a desirable trade-off in practice.
- Published
- 2018
- Full Text
- View/download PDF
77. Routing Attacks as a Viable Threat: Can Software Systems Protect Themselves?
- Author
-
Alistarh, Dan, Avramopoulos, Ioannis, Kuznetsov, Petr, and Tredan, Gilles
- Subjects
routing attacks ,byzantine fault-tolerance - Abstract
In this paper, we show that distributed systems are vul- nerable to routing attacks and propose an architecture to obviate this vulnerability. A somewhat surprising finding is that even a small-scale routing attack can completely dis- rupt the operation of a state-machine replication service. The architecture that we propose is based on the following simple ideas: (1) Circumvent the adversary if possible and (2) if it is not possible, relax the application semantics.
78. A Generic Trust Framework For Large-Scale Open Systems Using Machine Learning
- Author
-
Liu, Xin, Tredan, Gilles, and Datta, Anwitaman
- Subjects
FOS: Computer and information sciences ,large-scale systems ,Computer Science - Learning ,Computer Science - Cryptography and Security ,machine learning ,Computer Science - Distributed, Parallel, and Cluster Computing ,features ,Distributed, Parallel, and Cluster Computing (cs.DC) ,trust management ,Cryptography and Security (cs.CR) ,Machine Learning (cs.LG) - Abstract
In many large scale distributed systems and on the web, agents need to interact with other unknown agents to carry out some tasks or transactions. The ability to reason about and assess the potential risks in carrying out such transactions is essential for providing a safe and reliable environment. A traditional approach to reason about the trustworthiness of a transaction is to determine the trustworthiness of the specific agent involved, derived from the history of its behavior. As a departure from such traditional trust models, we propose a generic, machine learning approach based trust framework where an agent uses its own previous transactions (with other agents) to build a knowledge base, and utilize this to assess the trustworthiness of a transaction based on associated features, which are capable of distinguishing successful transactions from unsuccessful ones. These features are harnessed using appropriate machine learning algorithms to extract relationships between the potential transaction and previous transactions. The trace driven experiments using real auction dataset show that this approach provides good accuracy and is highly efficient compared to other trust mechanisms, especially when historical information of the specific agent is rare, incomplete or inaccurate., Comment: 30 pages
79. Grafting Arborescences for Extra Resilience of Fast Rerouting Schemes
- Author
-
Stefan Schmid, Andrzej Kamisinski, Gilles Tredan, Klaus-Tycho Foerster, Yvonne-Anne Pignolet, TREDAN, Gilles, University of Vienna [Vienna], Dfinity Switzerland, Équipe Tolérance aux fautes et Sûreté de Fonctionnement informatique (LAAS-TSF), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), and Université de Toulouse (UT)
- Subjects
Spanning tree ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Computer science ,Distributed computing ,Grafting (decision trees) ,[INFO] Computer Science [cs] ,Network topology ,Telecommunications network ,Failover ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Forwarding plane ,[INFO]Computer Science [cs] ,Resilience (network) ,Heterogeneous network - Abstract
International audience; To provide a high availability and to be able to quickly react to link failures, most communication networks feature fast rerouting (FRR) mechanisms in the data plane. However, configuring these mechanisms to provide a high resilience against multiple failures is algorithmically challenging, as rerouting rules can only depend on local failure information and need to be predefined. This paper is motivated by the observation that the common approach to design fast rerouting algorithms, based on spanning trees and covering arborescences, comes at a cost of reduced resilience as it does not fully exploit the available links in heterogeneous topologies. We present several novel fast rerouting algorithms which are not limited by spanning trees, but rather extend and combine ("graft") multiple spanning arborescences to improve resilience. We compare our algorithms analytically and empirically, and show that they can significantly improve not only the resilience, but also accelerate the preprocessing to generate the local fast failover rules.
- Published
- 2021
80. Implications of Routing Coherence and Consistency on Network Optimization
- Author
-
Pignolet, Yvonne-Anne, Schmid, Stefan, Trédan, Gilles, Dfinity Switzerland, University of Vienna [Vienna], Équipe Tolérance aux fautes et Sûreté de Fonctionnement informatique (LAAS-TSF), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), and TREDAN, Gilles
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS - Abstract
International audience; In network optimization problems, from traffic engineering to network monitoring, the routing model is typically considered as something given and fixed. This paper is motivated by the fundamental question how the ability to change and optimize the routing model itself influences the efficiency at which communication networks can be operated. To this end, we identify two main dimensions of the routing model: consistency (of a single route) and coherence (of sets of routes). We present analytical results on the impact of the routing model on the achievable route diversity as well as on the runtime of solving optimization problems underlying different case studies. We also uncover that it can sometimes be beneficial to artificially restrict the routing model, to significantly reduce the computational complexity without negatively affecting the route diversity much.
- Published
- 2020
81. Adaptive Data Collection Mechanisms for Smart Monitoring of Distribution Grids
- Author
-
Kemal, Mohammed Seifu, Olsen, Rasmus Løvenstein, Peter Schwefel, Hans, and Tredan, Gilles
- Subjects
FOS: Computer and information sciences ,Computer Science - Distributed, Parallel, and Cluster Computing ,FOS: Electrical engineering, electronic engineering, information engineering ,Computer Science - Systems and Control ,Systems and Control (eess.SY) ,Distributed, Parallel, and Cluster Computing (cs.DC) - Abstract
Smart Grid systems not only transport electric energy but also information which will be active part of the electricity supply system. This has led to the introduction of intelligent components on all layers of the electrical grid in power generation, transmission, distribution and consumption units. For electric distribution systems, Information from Smart Meters can be utilized to monitor and control the state of the grid. Hence, it is indeed inherent that data from Smart Meters should be collected in a resilient, reliable, secure and timely manner fulfilling all the communication requirements and standards. This paper presents a proposal for smart data collection mechanisms to monitor electrical grids with adaptive smart metering infrastructures. A general overview of a platform is given for testing, evaluating and implementing mechanisms to adapt Smart Meter data aggregation. Three main aspects of adaptiveness of the system are studied, adaptiveness to smart metering application needs, adaptiveness to changing communication network dynamics and adaptiveness to security attacks. Execution of tests will be conducted in real field experimental set-up and in an advanced hardware in the loop test-bed with power and communication co-simulation for validation purposes., 5 pages, 2 figures , Hans-Peter Schwefel. 12th European Dependable Computing Conference (EDCC 2016), September 5-9, 2016, Gothenburg, Sweden. Proceedings of Student Forum - EDCC 2016
- Published
- 2016
82. Collective information processing in human phase separation.
- Author
-
Jayles B, Escobedo R, Pasqua R, Zanon C, Blanchet A, Roy M, Tredan G, Theraulaz G, and Sire C
- Subjects
- Humans, Models, Psychological, Group Processes, Interpersonal Relations, Pedestrians psychology
- Abstract
In our digital societies, individuals massively interact through digital interfaces whose impact on collective dynamics can be important. In particular, the combination of social media filters and recommender systems can lead to the emergence of polarized and fragmented groups. In some social contexts, such segregation processes of human groups have been shown to share similarities with phase separation phenomena in physics. Here, we study the impact of information filtering on collective segregation behaviour of human groups. We report a series of experiments where groups of 22 subjects have to perform a collective segregation task that mimics the tendency of individuals to bond with other similar individuals. More precisely, the participants are each assigned a colour (red or blue) unknown to them, and have to regroup with other subjects sharing the same colour. To assist them, they are equipped with an artificial sensory device capable of detecting the majority colour in their 'environment' (defined as their k nearest neighbours, unbeknownst to them), for which we control the perception range, k = 1, 3, 5, 7, 9, 11, 13. We study the separation dynamics (emergence of unicolour groups) and the properties of the final state, and show that the value of k controls the quality of the segregation, although the subjects are totally unaware of the precise definition of the 'environment'. We also find that there is a perception range k = 7 above which the ability of the group to segregate does not improve. We introduce a model that precisely describes the random motion of a group of pedestrians in a confined space, and which faithfully reproduces and allows interpretation of the results of the segregation experiments. Finally, we discuss the strong and precise analogy between our experiment and the phase separation of two immiscible materials at very low temperature. This article is part of the theme issue 'Multi-scale analysis and modelling of collective migration in biological systems'.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.