The Blog
September 24, 2019
And the Best Paper award CP 19 goes to ...
Generic Constraint-based Block Modeling using Constraint Programming
By Alex Mattenet, Ian Davidson, Siegfried Nijssen, and Pierre Schaus
Block Modeling is a problem related to graph...
September 25, 2019
Emergent Overlays for Adaptive MANET Broadcast
By Raziel Carvajal Gomez, Yérom-David Bromberg, Yehia Elkhatib, Laurent Réveillère, Etienne Riviere
Mobile Ad-Hoc Networks (MANETs) allow distributed applications where no fixed...
September 17, 2019
Learning Optimal Decision Trees using Constraint Programming
By Hélène Verhaeghe, Siegfried Nijssen, Gilles Pesant, Claude-Guy Quimper, Pierre Schaus
Decision trees are among the most popular classification models in machine learning....
September 11, 2019
Explicit Control of Feature Relevance and Selection...
By Victor Hamer and Pierre Dupont.
Feature selection is an important issue when one deals with large amounts of omics data. Feature selection offers interpretability of the predictive model to...
August 23, 2019
Pluginizing QUIC
by Quentin De Coninck, François Michel, Maxime Piraux, Florentin Rochet, Thomas Given-Wilson, Axel Legay, Olivier Pereira, Olivier Bonaventure
Application requirements evolve over time and the...
June 12, 2019
Testé comme jamais...
Cet article présente SolverCheck, une bibliothèque libre de "test par propriétés" (property-based testing, PBT) qui a été spécifiquement conçue pour tester les solveurs CP.
En...
June 12, 2019
Implementation of a Feature-Based Context-Oriented...
This paper will be presented at The 11th International Workshop on Context-Oriented Programming and Advanced Modularity (COP), at ECOOP 2019 - 15-19 July 2019 - Hammersmith, London, United...
June 12, 2019
Beyond socket options: making the Linux TCP stack truly...
The Transmission Control Protocol (TCP) is one of the most important protocols in today’s Internet. It was designed to be extensible for various use cases. A client can propose to use an...
May 17, 2019
QUIC-FEC: Bringing the benefits of Forward Erasure...
Originally implemented by Google, QUIC gathers a growing interest by providing, on top of UDP, the same service as the classical TCP/TLS/HTTP/2 stack. The IETF will finalise the QUIC specification...
March 21, 2019
The superpowers of eBPF in the networking stack
eBPF is the extended Berkeley Packet Filter, a simple virtual machine that has been added to the Linux kernel. This virtual machine implements a simple RISC-like assembly language that enables...
March 26, 2019
Measurements As First-class Artifacts
The emergence of programmable switches has sparked a significant amount of work on new techniques to performmore powerful measurement tasks, for instance, to obtain fine-grained traffic and...
December 06, 2018
CG4SR: Near Optimal Traffic Engineering for Segment...
Segment Routing (SR) is a powerful tool to solve traffic engineering in large networks. It enables steering the traffic along any arbitrary network path while limiting scalability issues as...
November 16, 2018
Observing the Evolution of QUIC Implementations
The QUIC protocol combines features that were initially found inside the TCP, TLS and HTTP/2 protocols. The IETF is actively working on a complete specification of this protocol. More than a dozen...
November 06, 2018
Learning Computationally Efficient Metrics for Large...
Nearest neighbor (NN) classifiers rely on a distance metric either a priori fixed or previously estimated through metric learning. When such metric learning occurs, a natural objective is to...
October 30, 2018
The prize to the most visionary contribution in Data...
Thomas Bollen (Eura Nova), Guillaume Leurquin and Siegfried Nijssen (INGI) who received the IDA frontier prize for their article "ConvoMap: Using Convolution to Order Boolean Data" on the...
October 23, 2018
HomePad: A Privacy-aware Smart Hub for Home Environments
The adoption of smart home devices is hindered today by the privacy concerns users have regarding their personal data. Since these devices depend on remote service providers, users remain...
October 22, 2018
Leveraging eBPF for programmable network functions with...
With the advent of Software Defined Networks (SDN), Network Function Virtualisation (NFV) or Service Function Chaining (SFC), operators expect networks to support flexible services beyond the mere...
September 01, 2018
A Two-level Intrusion Detection System for Industrial...
Industrial Control Systems (ICS) can be defined as any systems used to monitor and control industrial processes, such as the ones in power plants or water treatment facilities. They are typically...