Skip to main content

Showing 1–9 of 9 results for author: Géraud-Stewart, R

Searching in archive cs. Search in all archives.
.
  1. A forensic analysis of the Google Home: repairing compressed data without error correction

    Authors: Hadrien Barral, Georges-Axel Jaloyan, Fabien Thomas-Brans, Matthieu Regnery, Rémi Géraud-Stewart, Thibaut Heckmann, Thomas Souvignet, David Naccache

    Abstract: This paper provides a detailed explanation of the steps taken to extract and repair a Google Home's internal data. Starting with reverse engineering the hardware of a commercial off-the-shelf Google Home, internal data is then extracted by desoldering and dum** the flash memory. As error correction is performed by the CPU using an undisclosed method, a new alternative method is shown to repair a… ▽ More

    Submitted 29 September, 2022; originally announced October 2022.

    Comments: 28 pages, modified version of paper that appeared originally at Forensic Science International: Digital Investigation

    Journal ref: Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817

  2. arXiv:2106.10971  [pdf, ps, other

    cs.IT cs.DS

    Near-Optimal Pool Testing under Urgency Constraints

    Authors: Éric Brier, Megi Dervishi, Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav

    Abstract: Detection of rare traits or diseases in a large population is challenging. Pool testing allows covering larger swathes of population at a reduced cost, while simplifying logistics. However, testing precision decreases as it becomes unclear which member of a pool made the global test positive. In this paper we discuss testing strategies that provably approach best-possible strategy - optimal in t… ▽ More

    Submitted 21 June, 2021; originally announced June 2021.

  3. arXiv:2006.11634  [pdf, other

    math.DS cs.FL

    A Fractional $3n+1$ Conjecture

    Authors: Éric Brier, Rémi Géraud-Stewart, David Naccache

    Abstract: In this paper we introduce and discuss the sequence of \emph{real numbers} defined as $u_0 \in \mathbb R$ and $u_{n+1} = Δ(u_n)$ where \begin{equation*} Δ(x) = \begin{cases} \frac{x}{2} &\text{if } \operatorname{frac}(x)<\frac{1}{2} \\[4px] \frac{3x+1}{2} & \text{if } \operatorname{frac}(x)\geq\frac{1}{2} \end{cases} \end{equation*} This sequence is reminiscent of the famous Collatz sequence, and… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

  4. arXiv:2006.07246  [pdf, ps, other

    math.DS cs.FL math.CO

    The Look-and-Say The Biggest Sequence Eventually Cycles

    Authors: Éric Brier, Rémi Géraud-Stewart, David Naccache, Alessandro Pacco, Emanuele Troiani

    Abstract: In this paper we consider a variant of Conway's sequence (OEIS A005150, A006715) defined as follows: the next term in the sequence is obtained by considering contiguous runs of digits, and rewriting them as $ab$ where $b$ is the digit and $a$ is the maximum of $b$ and the run's length. We dub this the "look-and-say the biggest" (LSB) sequence. Conway's sequence is very similar ($b$ is just the run… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

  5. arXiv:2006.06837  [pdf, ps, other

    math.DS cs.FL math.CO

    Stuttering Conway Sequences Are Still Conway Sequences

    Authors: Éric Brier, Rémi Géraud-Stewart, David Naccache, Alessandro Pacco, Emanuele Troiani

    Abstract: A look-and-say sequence is obtained iteratively by reading off the digits of the current value, grou** identical digits together: starting with 1, the sequence reads: 1, 11, 21, 1211, 111221, 312211, etc. (OEIS A005150). Starting with any digit $d \neq 1$ gives Conway's sequence: $d$, $1d$, $111d$, $311d$, $13211d$, etc. (OEIS A006715). Conway popularised these sequences and studied some of thei… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

  6. arXiv:2006.02353  [pdf, ps, other

    cs.GT

    At Most 43 Moves, At Least 29: Optimal Strategies and Bounds for Ultimate Tic-Tac-Toe

    Authors: Guillaume Bertholon, Rémi Géraud-Stewart, Axel Kugelmann, Théo Lenoir, David Naccache

    Abstract: Ultimate Tic-Tac-Toe is a variant of the well known tic-tac-toe (noughts and crosses) board game. Two players compete to win three aligned "fields", each of them being a tic-tac-toe game. Each move determines which field the next player must play in. We show that there exist a winning strategy for the first player, and therefore that there exist an optimal winning strategy taking at most 43 move… ▽ More

    Submitted 6 June, 2020; v1 submitted 3 June, 2020; originally announced June 2020.

  7. arXiv:2005.04740  [pdf, ps, other

    cs.DS

    Approaching Optimal Duplicate Detection in a Sliding Window

    Authors: Rémi Géraud-Stewart, Marius Lombard-Platet, David Naccache

    Abstract: Duplicate detection is the problem of identifying whether a given item has previously appeared in a (possibly infinite) stream of data, when only a limited amount of memory is available. Unfortunately the infinite stream setting is ill-posed, and error rates of duplicate detection filters turn out to be heavily constrained: consequently they appear to provide no advantage, asymptotically, over a… ▽ More

    Submitted 10 May, 2020; originally announced May 2020.

  8. arXiv:2005.02940  [pdf, other

    cs.AI cs.DM q-bio.QM

    Optimal Covid-19 Pool Testing with a priori Information

    Authors: Marc Beunardeau, Éric Brier, Noémie Cartier, Aisling Connolly, Nathanaël Courant, Rémi Géraud-Stewart, David Naccache, Ofer Yifrach-Stav

    Abstract: As humanity struggles to contain the global Covid-19 infection, prophylactic actions are grandly slowed down by the shortage of testing kits. Governments have taken several measures to work around this shortage: the FDA has become more liberal on the approval of Covid-19 tests in the US. In the UK emergency measures allowed to increase the daily number of locally produced test kits to 100,000. Chi… ▽ More

    Submitted 11 May, 2020; v1 submitted 6 May, 2020; originally announced May 2020.

  9. arXiv:1908.03819  [pdf, other

    cs.CR

    RISC-V: #AlphanumericShellcoding

    Authors: Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache

    Abstract: We explain how to design RISC-V shellcodes capable of running arbitrary code, whose ASCII binary representation use only letters a-zA-Z, digits 0-9, and either of the three characters: #, /, '.

    Submitted 10 August, 2019; originally announced August 2019.

    Comments: 25 pages, originally published at WOOT'19