Damaskinos, Georgios Guerraoui, Rachid Kermarrec, Anne-Marie Nitu, Vlad Patra, Rhicheek Taiani, Francois
Federated Learning (FL) is very appealing for its privacy benefits: essentially, a global model is trained with updates computed on mobile devices while keeping the data of users local. Standard FL infrastructures are however designed to have no energy or performance impact on mobile devices, and are therefore not suitable for applications that req...
Mesri, Youssef
International audience
Aleixandre-Carrera, Fernando Engelmayer, Nurit Ares-Suárez, David Acosta, María Del Carmen Belmonte, Carlos Gallar, Juana Meseguer, Víctor Binshtok, Alexander M
Published in
International journal of molecular sciences
Free nerve endings are key structures in sensory transduction of noxious stimuli. In spite of this, little is known about their functional organization. Transient receptor potential (TRP) channels have emerged as key molecular identities in the sensory transduction of pain-producing stimuli, yet the vast majority of our knowledge about sensory TRP ...
Cruciani, Emilio Mimun, Hlafo Alfie Quattropani, Matteo Rizzo, Sara
International audience
Yildiz, Orcun Ibrahim, Shadi
Recently, MapReduce and its open-source implementation Hadoop have emerged as prevalent tools for big data analysis in the cloud. Fair resource allocation in-between jobs and users is an important issue, especially in multi-tenant environments such as clouds. Thus several scheduling policies have been developed to preserve fairness in multi-tenant ...
Amestoy, Thomas Hamidouche, Wassim Bergeron, Cyril Menard, Daniel
VVC is the next generation video coding standard, offering coding capability beyond HEVC standard. The high computational complexity of the latest video coding standards requires high-level parallelism techniques, in order to achieve real-time and low latency encoding and decoding. HEVC and VVC include tile grid partitioning that allows to process ...
Aubert, Clément Cristescu, Ioana
"In a process-algebraic approach to system verification, one typically writes two specifications. One, call it SYS, captures the design of the actual system and the other, call it SPEC, describes the system's desired 'high-level' behavior. One may then establish the correctness of SYS with respect to SPEC by showing that SYS behaves the 'same as' S...
Anceaume, Emmanuelle Pozzo, Antonella Rieutord, Thibault Tucci-Piergiovanni, Sara
There exist many forms of Blockchain finality conditions, from deterministic to probabilistic terminations. To favor availability against consistency in the face of partitions, most blockchains only offer probabilistic eventual finality: blocks may be revoked after being appended to the blockchain, yet with decreasing probability as they sink deepe...
Fahs, Ali
Geo-distributed fog computing architectures provide users with resources reachable within low latency. However, fully exploiting the fog architecture requires a similar distribution of the application by the means of replication. As a result, fog application replica management should implementproximity-aware algorithms to handle different levels of...
Ahmed, Safuriyawu Le Mouël, Frédéric Stouls, Nicolas
Pipeline networks dominate the oil and gas mid-stream sector, and although the safest means of transportation for oil and gas products, they are susceptible to failures. These failures are due to manufacturing defects, environmental effects, material degradation, or third party interference through sabotage and vandalism. Internet of Things (IoT)-b...