Séminaire Algorithmique : Djamel Eddine Amir (LISN, Univ. Paris-Saclay) « Computability of Compact Spaces »

Sciences 3- S3 351

The topological properties of a set have a strong impact on its computability properties. A striking illustration of this idea is given by spheres, closed manifolds and finite graphs without endpoints: if a set X is homeomorphic to a sphere, a closed manifold or such a graph, then any algorithm that semicomputes X in some … Continue reading Séminaire Algorithmique : Djamel Eddine Amir (LISN, Univ. Paris-Saclay) « Computability of Compact Spaces »

Maxime Bérubé – LAB404 et investigation numérique dans le métavers

Sciences 3- S3 351

Les cybercriminels, qu’il s’agisse de fraudeurs ou d’auteurs d’intimidations et de menaces en ligne, adaptent constamment leurs méthodes aux évolutions technologiques. Les environnements virtuels, ou « métavers », illustrent particulièrement bien cette dynamique en ouvrant la voie à de nouvelles formes d’escroqueries et de comportements malveillants. Ces espaces numériques combinant interactions sociales et transactions dématérialisées … Continue reading Maxime Bérubé – LAB404 et investigation numérique dans le métavers

Séminaire Algorithmique : Geoffroy Caillat-Grenier (LIRMM, Univ. Montpellier), « From combinatorics of graphs to communication complexity in algorithmic information theory »

Sciences 3- S3 351

Several connexions between information theory and combinatorics of graphs have been explored in the last decades. Following this path, we use tools from spectral graph theory to show impossibility results in information theoretic cryptography. We place ourselves in the Kolmogorov complexity framework. After a short introduction to algorithmic information theory and secret key agreement, we … Continue reading Séminaire Algorithmique : Geoffroy Caillat-Grenier (LIRMM, Univ. Montpellier), « From combinatorics of graphs to communication complexity in algorithmic information theory »

Séminaire algorithmique : Béatrice Bérard (LIP6, Sorbonne Univ.), « The reachability problem for Polynomial Interrupt Timed Automata»

Sciences 3- S3 351

Hybrid automata form an expressive model to describe systems combining continuous and discrete evolution modes. However, most verification problems are undecidable for this model. We recall the particular case of Timed Automata where the reachability problem is PSPACE-complete. We introduce the class of Interrupt Timed Automata featuring special clocks called stopwatches that can be suspended. … Continue reading Séminaire algorithmique : Béatrice Bérard (LIP6, Sorbonne Univ.), « The reachability problem for Polynomial Interrupt Timed Automata»

Abderrahmane Nitaj – The last decade of the RSA cryptosystem

Sciences 3- S3 351

NIST recently released a publication related to the transition to Post-Quantum Cryptography which specifies that most of the public key classical cryptosystems, especially RSA will be officially deprecated by 2030 and banned after 2035. In this talk, I will review the limits of the main cryptanalytical attacks on RSA, and present two new variants of … Continue reading Abderrahmane Nitaj – The last decade of the RSA cryptosystem

Séminaire Image : « Mathematical foundations of a level-set-based shape convex hull identification algorithm », Carole Le Guyader

ENSICAEN - Batiment F - Salle F-200 6 Bd Maréchal Juin , Caen

Nous aurons le plaisir d'écouter Carole Le Guyader, Laboratoire LMI, INSA Rouen. Elle donnera un séminaire IMAGE le jeudi 6 février 2025 à 14h15 en salle de séminaire F-200. Titre : "Mathematical foundations of a level-set-based shape convex hull identification algorithm" Résumé : In this work, we introduce a proper mathematical framework to analyse a … Continue reading Séminaire Image : « Mathematical foundations of a level-set-based shape convex hull identification algorithm », Carole Le Guyader

Séminaire Algorithmique : « Enumeration Classes Defined by Circuits », Arnaud Durand (IMJ, Univ. Paris-Diderot)

Sciences 3- S3 351

Enumerating is the task of generating all solutions associated with an instance of a computational problem. We refine the complexity landscape for enumeration problems by introducing very low classes defined by using Boolean circuits as enumerators. We locate well-known enumeration problems, e.g., from graph theory, Gray code enumeration, and propositional satisfiability in our classes. In … Continue reading Séminaire Algorithmique : « Enumeration Classes Defined by Circuits », Arnaud Durand (IMJ, Univ. Paris-Diderot)

Pascal Marchand – A la recherche des signes complotistes en ligne: exploration et expérimentation par la textométrie.

Sciences 3- S3 351

On se situera à l’intersection des sciences de données et des sciences cognitives pour qualifier formellement les rhétoriques et représentations mobilisées dans les commentaires en ligne sur la vaccination. Le corpus (135 620 textes, 5 481 450 occurrences et 53 835 formes lexicales) fait d'abord l’objet d’une classification hiérarchique descendante (CDH). Pour l’interpréter, on mobilise … Continue reading Pascal Marchand – A la recherche des signes complotistes en ligne: exploration et expérimentation par la textométrie.

Séminaire algorithmique : Vincent Jugé (LIGM, Univ. G. Eiffel, Paris Est), « Write-efficient updates for AVL trees »

Sciences 3- S3 351

Balanced binary search trees are a common data structure for implementing ordered sets, with three kinds of queries: checking whether a given value belongs to the set, inserting a value, and deleting a value; the two latter queries require updating the data structure. Some implementations, like red-black trees or weak AVL trees, allow efficient update … Continue reading Séminaire algorithmique : Vincent Jugé (LIGM, Univ. G. Eiffel, Paris Est), « Write-efficient updates for AVL trees »

Laura Luzzi – Finite blocklength secrecy analysis of polar and Reed-Muller codes in binary erasure wiretap channels

Sciences 3- S3 351

Physical layer security aims to exploit the randomness of noisy channels in order to enhance security through coding and signal processing techniques. Unlike cryptography, it does not place any limitations on the adversary's computational power, but relies on an asymmetry in the channel quality between the legitimate users and the adversary. In this talk, we … Continue reading Laura Luzzi – Finite blocklength secrecy analysis of polar and Reed-Muller codes in binary erasure wiretap channels

Séminaire Image : « Balancing Accuracy and Efficiency in Budget-Aware Early-Exiting Neural Networks », Youva Addad

ENSICAEN - Batiment F - Salle F-200 6 Bd Maréchal Juin , Caen

Nous aurons le plaisir d'écouter Youva Addad, doctorant de l'équipe Image. Il donnera un séminaire IMAGE le jeudi 13 mars 2025 à 14h en salle de séminaire F-200. Titre : "Balancing Accuracy and Efficiency in Budget-Aware Early-Exiting Neural Networks" Résumé : Deep learning models have achieved remarkable success, but they often come with high computational … Continue reading Séminaire Image : « Balancing Accuracy and Efficiency in Budget-Aware Early-Exiting Neural Networks », Youva Addad