This chapter presents the Integrated Lens Antenna (ILA) technology as it evolved since its introduction aiming to respond to the needs of emerging applications such as high-data-rate communication, intelligent transport, and mm-wave imaging. The topics covered include the ILA design concepts as well as the electromagnetic phenomena intrinsic to dielectric lenses…
research Paper / Sep 2020 / Wireless communication, Network and Communications, Computing and Optimization
Mobile edge computing (MEC) is an emerging paradigm that integrates computing resources in wireless access networks to process computational tasks in close proximity to mobile users with low latency. In this paper, we propose an online double deep Q networks (DDQN) based learning scheme for task assignment in dynamic MEC networks, which enables multiple distribu…
"The increased mobile connectivity, the range and number of services available in various computing environments in the network, demand mobile applications to be highly dynamic to be able to efficiently incorporate those services into applications, along with other local capabilities on mobile devices. However, the monolithic structure and mostly static configur…
Accounts are often shared by multiple users, each of them having different item consumption and temporal habits. Identifying of the active user can lead to improvements in a variety of services by switching from account personalized services to user personalized services. To do so, we develop a topic model extending the Latent Dirichlet Allocation using a hidden…
Les liens DSL peuvent subir des pannes sporadiques entraînant des deconnexions ou un acces Internet dégradé. Ces pannes sont a l’origine d’une expérience utilisateur négative et générent des coûts pour les fournisseurs d’accès Internet (FAI) via des appels d’assistance technique. La prediction de pannes permet aux FAI de mettre en oeuvre des mesures proactives d…
The success of Google’s PageRank algorithm popularized graphs as a tool to model the web’s navigability. At that time, the web topology was resulting from human edition of hyper-links. Nowadays, that topology is mostly resulting from algorithms. In this paper, we propose to study the topology realized by a class of such algorithms: recommenders. By modeling the …
Efficient Nearest Neighbor (NN) search in high-dimensional spaces is a foundation of many multimedia retrieval systems. A common approach is to rely on Product Quantization, which allows the storage of large vector databases in memory and efficient distance computations. Yet, implementations of nearest neighbor search with Product Quantization have their perform…
research Paper / Nov 2020 / 5G, Wireless communication, Network and Communications, Computing and Optimization
This paper investigates the task management for cooperative mobile edge computing (MEC), where a set of geographically distributed heterogeneous edge nodes not only cooperate with remote cloud data centers but also help each other to jointly process tasks and support real-time IoT applications at the edge of the network. Especially, we address the challenges in …
"A recently celebrated kind of deep neural networks is Generative Adversarial Networks. GANs are generators of samples from a distribution that has been learned; they are up to now centrally trained from local data on a single location.
In order for network slicing to deliver on its promise as an effective tool to generate new revenues and profitability, new business models must match the dynamic technical and operational changes that it brings. Significant progress is being made in demonstrations and trials, as highlighted in this report and the accompanying RCR Wireless Webinar with Strategy …
research Paper / Sep 2021 / Video coding, Compression, Machine learning/ Deep learning /Artificial Intelligence Neural network
Despite many modern applications of Deep Neural Networks (DNNs), the large number of parameters in the hidden layers makes them unattractive for deployment on devices with storage capacity constraints. In this paper we propose a Data-Driven Low-rank (DDLR) method to reduce the number of parameters of pretrained DNNs and expedite inference by imposing low-rank st…
research Paper / Dec 2020 / 5G, Machine learning/ Deep learning /Artificial Intelligence, Network and Communications
This document describes the winning solution to the GNN Challenge 2020 organized by the Barcelona Neural Networking
A large portion of data mining and analytic services use modern machine learning techniques, such as deep learning. The state-of-the-art results by deep learning come at the price of an intensive use of computing resources. The leading frameworks (e.g., TensorFlow) are executed on GPUs or on high-end servers in datacenters. On the other end, there is a prolifera…
End-to-end network slicing holds promise as the key to unlocking new business opportunities with 5G to drive revenue growth. So exactly how will service providers benefit from slicing? And how can they overcome technical challenges?
This webinar, developed by Strategy Analytics, showcases where business issues meet technical topics to help service providers unc…
research Paper / Oct 2021 / Audio Processing, Neural network, Machine learning/ Deep learning /Artificial Intelligence
Music source separation is the task of isolating individual instruments which are mixed in a musical piece. This task is particularly challenging, and even state-of-the-art models can hardly generalize to unseen test data. Nevertheless, prior knowledge about individual sources can be used to better adapt a generic source separation model to the observed signal. …
Détecter au plus tôt les utilisateurs importants dans les réseaux sociaux est un problème majeur. Les services de classement d'utilisateurs (peer ranking) sont maintenant des outils bien établis, par des sociétés comme PeerIndex, Klout ou Kred. Leur fonction est de ``classer'' les utilisateurs selon leur influence. Cette notion est néanmoins abstraite, et les mé…
We propose XRC, an explicit rate control algorithm that overcomes the poor performance of commonly used TCP variants in cellular networks. XRC exploits an explicit feedback from the radio access network that is aware of the physical, network and transport layer information of all UEs as well as resource distribution policies among users with different traffic ch…
"5G new radio (NR) sidelink (SL) is envisioned as a key enabler of high speed, low latency applications like automated driving. To meet the high data rate requirements for such applications, SL support at mmWave and sub-THz frequencies with large bandwidths will be essential. Several enhancements and optimizations will be needed to the latest version of NR SL, w…
The backdoor attack raises a serious security concern to deep neural networks, by fooling a model to misclassify certain inputs designed by an attacker. In particular, the trigger-free backdoor attack is a great challenge to be detected and mitigated. It targets one or a few specific samples, called target samples, to misclassify them to a target class. Without …
La recommandation joue un rôle central dans le e-commerce et dans l'industrie du divertissement. L'intérêt croissant pour la transparence algorithmique nous motive dans cet article à observer les résultats de recommandations sous la forme d'un graphe capturant les navigations proposées dans l'espace des items. Nous argumentons qu'une telle approche en "boite noi…
Ensuring the early detection of important social network users is a challenging task. Some peer ranking services are now well established, such as PeerIndex, Klout, or Kred. Their function is to rank users according to their influence. This notion of influence is however abstract, and the algorithms achieving this ranking are opaque. Following the rising demand …
research Paper / Oct 2021 / Computer Vision, Neural network, Machine learning/ Deep learning /Artificial Intelligence
High quality facial attribute editing in videos is a challenging problem as it requires the modifications to be realistic and consistent throughout the video frames. Previous works address the problem with auto-encoder architectures and rely on adversarial training to ensure the attribute editing and the temporal consistency of the results. However, many algorit…
Video services traffic over the internet has drastically grown these past years, currently representing more than 80% of the internet bandwidth [1]. The massive usage of unicast delivery leads to network congestion that can result in poor quality of experience for the viewer, high delivery cost for operators and increased energy consumption. In addition, the cur…
Aggregation of streamed data is key to the expansion of the Internet of Things. This paper addresses the problem of designing a topology for reliably aggregating data flows from many devices arriving at a datacenter. Reliability here means ensuring operation without data loss. We seek a frugal solution that prevents wasteful resource consumption (over-provisioni…
Some structural characteristics of online discussions have been successfully modeled in the recent years. When parameters of these models are properly estimated, the models are able to generate synthetic discussions that are structurally similar to the real discussions. A common aspect of these models is that they consider that all users behave according to the …
research Paper / Dec 2020 / Network and Communications, 5G, Wireless communication, Computing and Optimization
For Internet operators, on-line service providers and end-users, representative operational measurements are crucial to monitor and diagnose the performance of networks and on-line services. While numerous approaches have been proposed to measure performance, only a few works fully adopt an end-user perspective by taking measurements from within web browsers. In…
research Paper / Jul 2021 / Machine learning/ Deep learning /Artificial Intelligence, Network and Communications, Wireless communication, IoT
Low-power wide-area networks (LPWANs) bring exceptional networking capabilities that will enable the massive roll-out of the Internet of Things (IoT). Among these capabilities are the support of ultra-low power consumption devices – up to 10 years of battery life – and connectivity up to tens of kilometers. The Long Range (LoRa) protocol has captured the researc…