Skip to main content

Showing 1–21 of 21 results for author: Laurent, M

Searching in archive cs. Search in all archives.
.
  1. Polymorphic Type Inference for Dynamic Languages

    Authors: Giuseppe Castagna, Mickaël Laurent, Kim Nguyen

    Abstract: We present a type system that combines, in a controlled way, first-order polymorphism with intersectiontypes, union types, and subty**, and prove its safety. We then define a type reconstruction algorithm that issound and terminating. This yields a system in which unannotated functions are given polymorphic types(thanks to Hindley-Milner) that can express the overloaded behavior of the functions… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Journal ref: Proceedings of the ACM on Programming Languages, In press, 8 (POPL), pp.40

  2. arXiv:2310.01006  [pdf, other

    cs.SE cs.CR cs.CY

    Comparative Analysis of Technical and Legal Frameworks of Various National Digial Identity Solutions

    Authors: Montassar Naghmouchi, Maryline Laurent, Claire Levallois-Barth, Nesrine Kaaniche

    Abstract: National digital identity systems have become a key requirement for easy access to online public services, specially during Covid-19. While many countries have adopted a national digital identity system, many are still in the process of establishing one. Through a comparative analysis of the technological and legal dimensions of a few selected national digital identity solutions currently being us… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

    Comments: 29 pages, 4 tables, 5 labled figures, 3 figures within table 1 as illustration, 51 references

  3. Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy

    Authors: Nathanaël Denis, Maryline Laurent, Sophie Chabridon

    Abstract: The Internet of Things brings new ways to collect privacy-sensitive data from billions of devices. Well-tailored distributed ledger technologies (DLTs) can provide high transaction processing capacities to IoT devices in a decentralized fashion. However, privacy aspects are often neglected or unsatisfying, with a focus mainly on performance and security. In this paper, we introduce decentralized u… ▽ More

    Submitted 9 June, 2023; originally announced June 2023.

    Journal ref: IEEE Internet of Things Journal, 2023, pp.1-1

  4. SPOT: Secure and Privacy-preserving prOximiTy protocol for e-healthcare systems

    Authors: Souha Masmoudi, Nesrine Kaaniche, Maryline Laurent

    Abstract: This paper introduces SPOT, a Secure and Privacy-preserving prOximity based protocol for e-healthcare systems. It relies on a distributed proxy-based approach to preserve users' privacy and a semi-trusted computing server to ensure data consistency and integrity. The proposed protocol ensures a balance between security, privacy and scalability. As far as we know, in terms of security, SPOT is the… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: 15 pages

    Journal ref: IEEE Access, vol. 10, pp. 106400-106414, 2022

  5. arXiv:2205.05243  [pdf, ps, other

    cs.NI

    Enabling Fast and Flexible Distributed Deep Learning with Programmable Switches

    Authors: Heng Pan, Penglai Cui, Zhenyu li, Ru Jia, Penghao Zhang, Leilei Zhang, Ye Yang, Jiahao Wu, Jianbo Dong, Zheng Cao, Qiang Li, Hongqiang Harry Liu, Mathy Laurent, Gaogang Xie

    Abstract: Deep learning has been used in a wide range of areas and made a huge breakthrough. With the ever-increasing model size and train-ing data volume, distributed deep learning emerges which utilizes a cluster to train a model in parallel. Unfortunately, the performance is often far from linear speedup due to the communication overhead between cluster nodes. To address this challenge, this paper design… ▽ More

    Submitted 10 August, 2022; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: 13 pages, 18 figures

  6. arXiv:2201.00231  [pdf

    cs.CR cs.DC

    An automatized Identity and Access Management system for IoT combining Self-Sovereign Identity and smart contracts

    Authors: Montassar Naghmouchi, Hella Kaffel, Maryline Laurent

    Abstract: Nowadays, open standards for self-sovereign identity and access management enable portable solutions that are following the requirements of IoT systems. This paper proposes a blockchain-based identity and access management system for IoT -- specifically smart vehicles -- as an example of use-case, showing two interoperable blockchains, Ethereum and Hyperledger Indy, and a self-sovereign identity m… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: extended version of a paper published in The 14th International Symposium on Foundations and Practice of Security, FPS 2021, 8-10 December 2021

    MSC Class: 68M14 (Primary) 68M25 (Secondary) ACM Class: C.2.2; C.2.4

  7. Personal information self-management: A survey of technologies supporting administrative services

    Authors: Paul Marillonnet, Maryline Laurent, Mikaël Ates

    Abstract: This paper presents a survey of technologies for personal data self-management interfacing with administrative and territorial public service providers. It classifies a selection of scientific technologies into four categories of solutions: Personal Data Store (PDS), Identity Manager (IdM), Anonymous Certificate System and Access Control Delegation Architecture. Each category, along with its techn… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Journal ref: Journal of Computer Science and Technology, 2021

  8. arXiv:2109.11340  [pdf, other

    cs.CR

    A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy

    Authors: Seryne Rahali, Maryline Laurent, Souha Masmoudi, Charles Roux, Brice Mazeau

    Abstract: This paper proposes a new recommendation system preserving both privacy and utility. It relies on the local differential privacy (LDP) for the browsing user to transmit his noisy preference profile, as perturbed Bloom filters, to the service provider. The originality of the approach is multifold. First, as far as we know, the approach is the first one including at the user side two perturbation ro… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

    Comments: Accepted for publication in the 15th IEEE International Conference on Big Data Science and Engineering (BigDataSE 2021)

  9. arXiv:2105.06575  [pdf, other

    cs.LO

    Merit and Blame Assignment with Kind 2

    Authors: Daniel Larraz, Mickaël Laurent, Cesare Tinelli

    Abstract: We introduce two new major features of the open-source model checker Kind 2 which provide traceability information between specification and design elements such as assumptions, guarantees, or other behavioral constraints in synchronous reactive system models. This new version of Kind 2 can identify minimal sets of design elements, known as Minimal Inductive Validity Cores, which are sufficient to… ▽ More

    Submitted 13 May, 2021; originally announced May 2021.

  10. Recommending Podcasts for Cold-Start Users Based on Music Listening and Taste

    Authors: Zahra Nazari, Christophe Charbuillet, Johan Pages, Martin Laurent, Denis Charrier, Briana Vecchione, Ben Carterette

    Abstract: Recommender systems are increasingly used to predict and serve content that aligns with user taste, yet the task of matching new users with relevant content remains a challenge. We consider podcasting to be an emerging medium with rapid growth in adoption, and discuss challenges that arise when applying traditional recommendation approaches to address the cold-start problem. Using music consumptio… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: SIGIR 2020

  11. arXiv:2004.10952  [pdf, other

    cs.CR

    Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption

    Authors: Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan

    Abstract: For better data availability and accessibility while ensuring data secrecy, organizations often tend to outsource their encrypted data to the cloud storage servers, thus bringing the challenge of keyword search over encrypted data. In this paper, we propose a novel authorized keyword search scheme using Role-Based Encryption (RBE) technique in a cloud environment. The contributions of this paper a… ▽ More

    Submitted 22 April, 2020; originally announced April 2020.

  12. Revisiting Occurrence Ty**

    Authors: Giuseppe Castagna, Victor Lanvin, Mickaël Laurent, Kim Nguyen

    Abstract: We revisit occurrence ty**, a technique to refine the type of variables occurring in type-cases and, thus, capturesome programming patterns used in untyped languages. Although occurrence ty** was tied from its inceptionto set-theoretic types-union types, in particular-it never fully exploited the capabilities of these types. Here weshow how, by using set-theoretic types, it is possible to deve… ▽ More

    Submitted 12 February, 2022; v1 submitted 12 July, 2019; originally announced July 2019.

  13. arXiv:1807.06808  [pdf

    cs.DL

    A data-supported history of bioinformatics tools

    Authors: Levin Clément, Dynomant Emeric, Gonzalez Bruno J, Mouchard Laurent, Landsman David, Hovig Eivind, Vlahovicek Kristian

    Abstract: Since the advent of next-generation sequencing in the early 2000s, the volume of bioinformatics software tools and databases has exploded and continues to grow rapidly. Documenting this evolution on a global and time-dependent scale is a challenging task, limited by the scarcity of comprehensive tool repositories. We collected data from over ~23,000 references classified in the OMICtools database,… ▽ More

    Submitted 18 July, 2018; originally announced July 2018.

    Comments: 9 pages

  14. arXiv:1708.05417  [pdf, ps, other

    cs.CR cs.ET

    Serverless Protocols for Inventory and Tracking with a UAV

    Authors: Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette

    Abstract: It is widely acknowledged that the proliferation of Unmanned Aerial Vehicles (UAVs) may lead to serious concerns regarding avionics safety, particularly when end-users are not adhering to air safety regulations. There are, however, domains in which UAVs may help to increase the safety of airplanes and the management of flights and airport resources that often require substantial human resources. F… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

    Comments: 11 pages, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)

  15. arXiv:1701.00806  [pdf, other

    cs.DM math.CO

    A Structural Characterization for Certifying Robinsonian Matrices

    Authors: Monique Laurent, Matteo Seminaroti, Shin-ichi Tanigawa

    Abstract: A symmetric matrix is Robinsonian if its rows and columns can be simultaneously reordered in such a way that entries are monotone nondecreasing in rows and columns when moving toward the diagonal. The adjacency matrix of a graph is Robinsonian precisely when the graph is a unit interval graph, so that Robinsonian matrices form a matrix analogue of the class of unit interval graphs. Here we provide… ▽ More

    Submitted 3 January, 2017; originally announced January 2017.

    Comments: 21 pages, 1 figure

    MSC Class: 05C50; 05C75; 68R10; 68R05

  16. arXiv:1601.03521  [pdf, other

    cs.DM math.CO

    Similarity-First Search: a new algorithm with application to Robinsonian matrix recognition

    Authors: Monique Laurent, Matteo Seminaroti

    Abstract: We present a new efficient combinatorial algorithm for recognizing if a given symmetric matrix is Robinsonian, i.e., if its rows and columns can be simultaneously reordered so that entries are monotone nondecreasing in rows and columns when moving toward the diagonal. As main ingredient we introduce a new algorithm, named Similarity-First-Search (SFS), which extends Lexicographic Breadth-First Sea… ▽ More

    Submitted 19 December, 2016; v1 submitted 14 January, 2016; originally announced January 2016.

    Comments: 35 pages, 5 figures

  17. arXiv:1504.06586  [pdf, other

    cs.DM math.OC

    A Lex-BFS-based recognition algorithm for Robinsonian matrices

    Authors: Monique Laurent, Matteo Seminaroti

    Abstract: Robinsonian matrices arise in the classical seriation problem and play an important role in many applications where unsorted similarity (or dissimilarity) information must be reordered. We present a new polynomial time algorithm to recognize Robinsonian matrices based on a new characterization of Robinsonian matrices in terms of straight enumerations of unit interval graphs. The algorithm is simpl… ▽ More

    Submitted 19 December, 2016; v1 submitted 24 April, 2015; originally announced April 2015.

    Comments: 30 pages, 7 figures

  18. arXiv:1407.2801  [pdf, other

    math.OC cs.DM

    The quadratic assignment problem is easy for Robinsonian matrices with Toeplitz structure

    Authors: Monique Laurent, Matteo Seminaroti

    Abstract: We present a new polynomially solvable case of the Quadratic Assignment Problem in Koopmans-Beckman form $QAP(A,B)$, by showing that the identity permutation is optimal when $A$ and $B$ are respectively a Robinson similarity and dissimilarity matrix and one of $A$ or $B$ is a Toeplitz matrix. A Robinson (dis)similarity matrix is a symmetric matrix whose entries (increase) decrease monotonically al… ▽ More

    Submitted 13 December, 2014; v1 submitted 10 July, 2014; originally announced July 2014.

    Comments: 15 pages, 2 figures

  19. arXiv:1205.2040  [pdf, other

    math.CO cs.DM math.OC

    Forbidden minor characterizations for low-rank optimal solutions to semidefinite programs over the elliptope

    Authors: Marianna Eisenberg-Nagy, Monique Laurent, Antonios Varvitsiotis

    Abstract: We study a new geometric graph parameter $\egd(G)$, defined as the smallest integer $r\ge 1$ for which any partial symmetric matrix which is completable to a correlation matrix and whose entries are specified at the positions of the edges of $G$, can be completed to a matrix in the convex hull of correlation matrices of $\rank $ at most $r$. This graph parameter is motivated by its relevance to th… ▽ More

    Submitted 9 January, 2014; v1 submitted 9 May, 2012; originally announced May 2012.

    Comments: 33 pages, 8 Figures. In its second version, the paper has been modified to accommodate the suggestions of the referees. Furthermore, the title has been changed since we feel that the new title reflects more accurately the content and the main results of the paper

  20. arXiv:1204.0734  [pdf, other

    math.OC cs.DM math.CO

    A new graph parameter related to bounded rank positive semidefinite matrix completions

    Authors: Monique Laurent, Antonios Varvitsiotis

    Abstract: The Gram dimension $\gd(G)$ of a graph $G$ is the smallest integer $k\ge 1$ such that any partial real symmetric matrix, whose entries are specified on the diagonal and at the off-diagonal positions corresponding to edges of $G$, can be completed to a positive semidefinite matrix of rank at most $k$ (assuming a positive semidefinite completion exists). For any fixed $k$ the class of graphs satisfy… ▽ More

    Submitted 3 April, 2012; originally announced April 2012.

    Comments: 31 pages, 6 Figures. arXiv admin note: substantial text overlap with arXiv:1112.5960

  21. arXiv:0812.2563  [pdf, ps, other

    cs.SC math.AC

    A Sparse Flat Extension Theorem for Moment Matrices

    Authors: Monique Laurent, Bernard Mourrain

    Abstract: In this note we prove a generalization of the flat extension theorem of Curto and Fialkow for truncated moment matrices. It applies to moment matrices indexed by an arbitrary set of monomials and its border, assuming that this set is connected to 1. When formulated in a basis-free setting, this gives an equivalent result for truncated Hankel operators.

    Submitted 15 December, 2008; originally announced December 2008.