Canal-U

Mon compte

Résultats de recherche

Nombre de programmes trouvés : 160
Conférences

le (1h8m54s)

Theoretical Foundations for Runtime Monitoring

Runtime monitoring/verification is a lightweight technique that complements other verification methods in a multi-pronged approach towards ensuring software correctness. The technique poses novel questions to software engineers: it is not easy to see which specifications are amenable to runtime monitoring, and it is not clear which monitors perform the required runtime analysis correctly. In this talk, I will present a theoretical framework that can be used to provide answers to those questions. I will view monitorability as a spectrum: the fewer monitor guarantees are required, the more properties become monitorable. I will then present a monitorability hierarchy ...
Voir la vidéo
Conférences

le (1h4m32s)

CoNeCo: Concurrency, Networks and Coinduction

In recent years, concurrent Kleene algebra (CKA), an extension of Kleene Algebra (KA) that includes concurrent composition as a first-class citizen, has been proposed by Hoare et al. as a setting to study the algebraic properties of concurrent composition as an operator on programs.  Orthogonally, based on KA, Foster et al proposed NetKAT, a domain-specific language that can be used to program and verify policies of Software Defined Networks. in this talk, we will show how to develop a concurrent extension of NetKAT based on CKA, which supports expressing and verifying the concurrent filtering of packets — on the same ...
Voir la vidéo
Conférences

le (1h10m48s)

The Legacy of Rudolph Kalman

In 1960 Rudolph Kalman published what is arguably the first paper to develop a systematic, principled approach to the use of data to improve the predictive capability of mathematical models. As our ability to gather data grows at an enormous rate, the importance of this work continues to grow too. The lecture will describe this paper, and developments that have stemmed from it, revolutionizing fields such space-craft navigation, weather prediction, oceanography and oil recovery; the lecture will also describe new application domains such as climate modeling, medical imaging and machine learning. Some mathematical details will be also provided, but limited to simple concepts such as optimization and iteration; the ...
Voir la vidéo
Conférences

le (1h7m1s)

Reasoning over large-scale biological systems with heterogeneous and incomplete data

Data produced by the domain of life sciences in the next decade are expected to be highly challenging. In addition to scalability issues which are shared with other applications domains, data produced in life sciences have very specific characteristics: multi-scale, incomplete, heterogeneous but somehow interdependent. This makes data-mining methods less efficient than expected to assist knowledge discovery. An example of such limitations is the study of biological systems in molecular and cellular biology, which cannot be uniquely identified with the data at hand. In this talk, we will introduce a strategy to study biological systems in the ...
Voir la vidéo
Conférences

le (1h43m57s)

Majority judgment: a new voting method

The traditional theory of social choice offers no acceptable solution to the problems of how to elect, to judge, or to rank. The classical model —transforming the “preference lists” of individuals into a “preference list” of society— is fundamentally flawed in both theory and practice. We propose a more realistic model where voters evaluate the candidates in a common language of ordinal grades. This small change leads to an entirely new theory and method: « majority judgment ». It is at once meaningful, resists strategic ...
Voir la vidéo
Conférences

le (1h19m16s)

Les premiers photons : les saisir, les faire parler

La collaboration « Planck » de l’Agence Spatiale Européenne a récemment publié une carte plein-ciel du rayonnement fossile cosmologique. Cette image est presque littéralement une « photo instantanée » de notre Univers aux premiers temps de sa formation, la plus vieille image du monde. Elle confirme avec éclat et approfondit la théorie du Big Bang, notre meilleur scénario pour l’origine et la formation de l’Univers.  Dans cet exposé, je rappellerai les grandes lignes de la théorie du Big Bang, décrirai le satellite Planck et le traitement des ...
Voir la vidéo
Conférences

le (47m25s)

Knowledge transfer and human-machine collaboration for training object class detector

Object class detection is a central area of computer vision. It requires recognizing and localizing all objects of predefined set of classes in an image. Detectors are usually trained under full supervision, which requires manually drawing object bounding-boxes in a large number of training images. This is tedious and very time consuming.  In this talk I will present two recent techniques for reducing this effort. In the first part I will explore a knowledge transfer scenario: training object detectors for target ...
Voir la vidéo
Conférences

le (1h4m38s)

Biological Networks Entropies: examples in neural, genetic and social networks

The networks used in biological applications at different scales (molecular, cellular and populational) are of different types, genetic, neuronal, and social, but they share the same dynamical concepts, the notion of intercation graph G(J) associated to their Jacobian matrix J, and also the concepts of frustrated nodes, positive or negative circuits of G(J), kinetic energy, entropy, attractors, structural stability, etc...are relevant and useful for studying the dynamics and the robustness of these systems.We will give some general results available for both continuous and discrete biologial networks and then, give some specific applications (a neural network involved in the memory evocation, ...
Voir la vidéo
Conférences

le (1h14m31s)

A l’écoute du bruit – L’imagerie par corrélations croisées

Les techniques d’imagerie classiques utilisent des ondes pour sonder un milieu inconnu et sont employées pour des applications médicales (échographie) ou géophysiques (séismologie) par exemple. Ces ondes sont émises par des réseaux de sources et après propagation dans le milieu elles sont enregistrées par des réseaux de récepteurs.   Ces techniques sont généralement mises en défaut lorsqu’on les utilise dans des milieux diffusants contenant des inhomogénéités aléatoires, car les signaux cohérents venant des réflecteurs à imager et enregistrés par les réseaux ...
Voir la vidéo

 
FMSH
 
Facebook Twitter Google+
Mon Compte