Pournajafi, Pegah Trotignon, Nicolas
The Burling sequence is a sequence of triangle-free graphs of unbounded chromatic number. The class of Burling graphs consists of all the induced subgraphs of the graphs of this sequence. In the first and second parts of this work, we introduced derived graphs, a class of graphs, equal to the class of Burling graphs, and proved several geometric an...
Shibasaki, Rui S. Rossi, André Gurevsky, Evgeny
International audience
Sadeghi, Mostafa Alameda-Pineda, Xavier Horaud, Radu
This paper addresses the problem of analysing the performance of 3D face alignment (3DFA), or facial landmark localization. This task is usually supervised, based on annotated datasets. Nevertheless, in the particular case of 3DFA, the annotation process is rarely error-free, which strongly biases the results. Alternatively, unsupervised performanc...
Cherbal, Sarra Zier, Abdelhak Hebal, Sara Louail, Lemia Annane, Boubakeur
The Internet of Things (IoT) is an important virtual network that allows remote users to access linked multimedia devices. The development of IoT and its ubiquitous application across various domains of everyday life has led to continuous research efforts. Security is a perceptual concern for researchers involved in IoT as it is a key factor in the...
Pournajafi, Pegah Trotignon, Nicolas
The Burling sequence is a sequence of triangle-free graphs of increasing chromatic number. Any graph which is an induced subgraph of a graph in this sequence is called a Burling graph. These graphs have attracted some attention because they have geometric representations and because they provide counter-examples to several conjectures about boundin...
Liu, Yinling Moyaux, Thierry Bouleux, Guillaume Cheutet, Vincent
This paper addresses the problem of resource scheduling of emergency departments in an uncertain environment. An innovative approach based on Agent-Based Simulation (ABS) and Discrete Event Simulation (DES) is proposed. To do so, this paper first proposes a framework integrating ABS and DES. Subsequently, we provide a detailed description of the DE...
Yese, Solomon Berri, Sara Chorti, Arsenia
The emergence of 5G systems brought to fore the importance of network slicing (NS) as it allows infrastructure providers (InPs) to create logical networks (slices) and virtually share network resources to their tenants. However, due to the limited resources of the InP, the resource management algorithms like resource allocation and admission contro...
Alkhoury, George Berri, Sara Chorti, Arsenia
Network slicing is a promising solution to handlethe multiple use cases of the 5G system with their diverserequirements. However, applying a static slicing scheme couldcause waste of resource and affect the performance. Therefore,dynamic slicing and resource management are necessaryto manage the network’s resources efficiently among differentslices...
Couvreur, Alain Mora, Rocco Tillich, Jean-Pierre
We bring in here a novel algebraic approach for attacking the McEliece cryptosystem. It consists in introducing a subspace of matrices representing quadratic forms. Those are associated with quadratic relationships for the component-wise product in the dual of the code used in the cryptosystem. Depending on the characteristic of the code field, thi...
Abdelhedi, Fatma Jemmali, Rym Zurfluh, Gilles
In today's world, there is a growing need to analyze data stored in a Data Lake, which is a collection of large, heterogeneous databases. Our work is part of a medical application that aims to help healthcare professionals analyze complex data for decision-making. We propose mechanisms that promote data accessibility. The data are stored in a Data ...