Zobrazeno 1 - 10
of 4 995
pro vyhledávání: '"Legay, A"'
Autor:
Legay, Bastien, Latapy, Matthieu
Publikováno v:
In: Botta, F., Macedo, M., Barbosa, H., Menezes, R. (eds) Complex Networks XV. CompleNet-Live 2024. Springer Proceedings in Complexity. Springer, Cham
We consider the following problem : we have a high-resolution street network of a given city, and low-resolution measurements of traffic within this city. We want to associate to each measurement the set of streets corresponding to the observed traff
Externí odkaz:
http://arxiv.org/abs/2401.08539
Autor:
Koumeri, Lisa Koutsoviti, Legast, Magali, Yousefi, Yasaman, Vanhoof, Koen, Legay, Axel, Schommer, Christoph
Empirical evidence suggests that algorithmic decisions driven by Machine Learning (ML) techniques threaten to discriminate against legally protected groups or create new sources of unfairness. This work supports the contextual approach to fairness in
Externí odkaz:
http://arxiv.org/abs/2306.08394
Autor:
Korichi, Amel, Clément, Emmanuel, Dosme, Nicolas, Legay, Eric, Stézowski, Olivier, Goasduff, Alain, Aubert, Yann, Dudouet, Jéremie, Elloumi, Souhir, Gauron, Phillipe, Grave, Xavier, Gulmini, Michele, Jacob, Jéremie, Lafage, Vincent, Jeannic, Patrick Le, Lalaire, Guillaume, Ljungvall, Joa, Maugeais, Clothilde, Michelagnoli, Caterina, Molini, Roméo, Philippon, Guillaume, Pietri, Stephane, Ralet, Damian, Roetta, Marco, Saillant, Frederic, Taurigna-Quere, Monique, Toniolo, Nicola
The AGATA tracking detector array represents a significant improvement over previous Compton suppressed arrays. The construction of AGATA led to numerous technological breakthroughs in order to meet the requirements and the challenges of building a m
Externí odkaz:
http://arxiv.org/abs/2305.18653
Autor:
Stézowski, O., Dudouet, J., Goasduff, A., Korichi, A., Aubert, Y., Balogh, M., Baulieu, G., Bazzacco, D., Brambilla, S., Brugnara, D., Dosme, N., Elloumi, S., Gauron, P., Grave, X., Jacob, J., Lafage, V., Lemasson, A., Legay, E., Jeannic, P. Le, Ljungvall, J., Matta, A., Molina, R., Philippon, G., Sedlak, M., Taurigna-Quere, M., Toniolo, N.
Presently, gamma-ray tracking in germanium segmented detectors is realised by applying two advanced, complex algorithms. While they have already triggered an intensive R&D, they are still subject to further improvements. Making such algorithms effect
Externí odkaz:
http://arxiv.org/abs/2303.01275
Be it for a malicious or legitimate purpose, packing, a transformation that consists in applying various operations like compression or encryption to a binary file, i.e. for making reverse engineering harder or obfuscating code, is widely employed si
Externí odkaz:
http://arxiv.org/abs/2302.09286
Autor:
Goorden, Martijn A., Larsen, Kim G., Legay, Axel, Lorber, Florian, Nyman, Ulrik, Wasowski, Andrzej
A specification theory combines notions of specifications and implementations with a satisfaction relation, a refinement relation and a set of operators supporting stepwise design. We develop a complete specification framework for real-time systems u
Externí odkaz:
http://arxiv.org/abs/2302.04529
Autor:
T. Legay, Y. Aubert, J. Verdonck, J. Guilhen, A. Paris, J.-M. Martinez, S. Sauvage, P. Datok, V. Dos Santos, J. M. Sanchez-Perez, S. Bruxelles, E. Lavergne, F. Mercier
Publikováno v:
Proceedings of the International Association of Hydrological Sciences, Vol 385, Pp 477-484 (2024)
Water resources management relies on the use of hydrometric data collected mainly from in situ stations. Despite the efforts made in setting up and maintaining a network of hydrometric and meteorological stations, water resource managers face many pr
Externí odkaz:
https://doaj.org/article/775148ec05f444c0b126af42fe7a621b
Publikováno v:
Frontiers in Plant Science, Vol 15 (2024)
Externí odkaz:
https://doaj.org/article/b98689e5adf04a8792a781b24e30ced8
Over past years, the manually methods to create detection rules were no longer practical in the anti-malware product since the number of malware threats has been growing. Thus, the turn to the machine learning approaches is a promising way to make th
Externí odkaz:
http://arxiv.org/abs/2204.14159
Malware analysis techniques are divided into static and dynamic analysis. Both techniques can be bypassed by circumvention techniques such as obfuscation. In a series of works, the authors have promoted the use of symbolic executions combined with ma
Externí odkaz:
http://arxiv.org/abs/2204.05632