Search Results - "Riveill, Michel"
-
1
What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms
Published in Frontiers in big data (30-10-2020)“…Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent…”
Get full text
Journal Article -
2
An Architecture to Support the Collection of Big Data in the Internet of Things
Published in 2014 IEEE World Congress on Services (01-06-2014)“…The Internet of Things (IoT) relies on physical objects interconnected between each others, creating a mesh of devices producing information. In this context,…”
Get full text
Conference Proceeding -
3
A delta‐oriented approach to support the safe reuse of black‐box code rewriters
Published in Journal of software : evolution and process (01-08-2019)“…Large‐scale corrective and perfective maintenance is often automated thanks to rewriting rules using tools such as Python2to3, Spoon, or Coccinelle. Such tools…”
Get full text
Journal Article -
4
At the Cross-Roads between Human-Computer Interaction and Model Driven Engineering
Published in The Journal of systems and software (01-05-2014)Get full text
Journal Article -
5
Scalable Architectures to Support Sustainable Advanced Information Technologies
Published in 2022 IEEE International Conference on Cluster Computing (CLUSTER) (01-09-2022)“…Advanced computing resources are requested by different interest groups, with the acceleration of digital transformation generated both by the pandemic and by…”
Get full text
Conference Proceeding -
6
FLCAP: Federated Learning with Clustered Adaptive Pruning for Heterogeneous and Scalable Systems
Published in 2023 International Joint Conference on Neural Networks (IJCNN) (18-06-2023)“…In this paper, we address the challenge of efficient local training on heterogeneous data in Federated Learning, where devices have limited computation and…”
Get full text
Conference Proceeding -
7
AnoRand: A Semi Supervised Deep Learning Anomaly Detection Method by Random Labeling
Published 28-05-2023“…Anomaly detection or more generally outliers detection is one of the most popular and challenging subject in theoretical and applied machine learning. The main…”
Get full text
Journal Article -
8
Human action recognition based on 3D skeleton part-based pose estimation and temporal multi-resolution analysis
Published in 2016 IEEE International Conference on Image Processing (ICIP) (01-09-2016)“…Human action recognition is a challenging field that have been addressed with many different classification techniques such as SVM or Random Decision Forests…”
Get full text
Conference Proceeding -
9
Domain-specific long text classification from sparse relevant information
Published 23-08-2024“…Large Language Models have undoubtedly revolutionized the Natural Language Processing field, the current trend being to promote one-model-for-all tasks…”
Get full text
Journal Article -
10
Managing a Software Ecosystem Using a Multiple Software Product Line: A Case Study on Digital Signage Systems
Published in 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications (01-08-2014)“…With the advent of Web 2.0, the growth of developer teams and user communities increases the number of software ecosystems: software platforms developed and…”
Get full text
Conference Proceeding -
11
Multiple Inputs Neural Networks for Medicare fraud Detection
Published 11-03-2022“…Medicare fraud results in considerable losses for governments and insurance companies and results in higher premiums from clients. Medicare fraud costs around…”
Get full text
Journal Article -
12
Autoregressive based Drift Detection Method
Published 11-06-2023“…In the classic machine learning framework, models are trained on historical data and used to predict future values. It is assumed that the data distribution…”
Get full text
Journal Article -
13
WComp middleware for ubiquitous computing: Aspects and composite event-based Web services
Published in Annales des télécommunications (01-04-2009)“…After a survey of the specific features of ubiquitous computing applications and corresponding middleware requirements, we list the various paradigms used in…”
Get full text
Journal Article -
14
Autoregressive based Drift Detection Method
Published in 2022 International Joint Conference on Neural Networks (IJCNN) (18-07-2022)“…In the classic machine learning framework, models are trained on historical data and used to predict future values. It is assumed that the data distribution…”
Get full text
Conference Proceeding -
15
Cloud computing, security and data concealment
Published in 2011 IEEE Symposium on Computers and Communications (ISCC) (01-06-2011)“…Cloud computing is a new paradigm providing software and hardware resources according to the customers' needs. However, it introduces new security risks such…”
Get full text
Conference Proceeding -
16
Machinery Anomaly Detection using artificial neural networks and signature feature extraction
Published in 2023 International Joint Conference on Neural Networks (IJCNN) (18-06-2023)“…Machine learning models are increasingly being used in predictive maintenance. However, due to the complexity of vibration and audio signals used in fault…”
Get full text
Conference Proceeding -
17
-
18
Adaptation Mechanism based on Service-Context Distance for Ubiquitous Computing
Published in International journal of computers, communications & control (2012)“…Service adaptation is one of the main research subjects in Ubiquitous Computing. Dynamic service adaptation, at runtime, is necessary for services that cannot…”
Get full text
Journal Article -
19
Low response time context awareness through extensible parameter adaptation with ORCA
Published in Annales des télécommunications (01-08-2012)“…Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user…”
Get full text
Journal Article -
20
Multiple Inputs Neural Networks for Fraud Detection
Published in 2022 International Conference on Machine Learning, Control, and Robotics (MLCR) (01-10-2022)“…This study aims to use artificial neural network based classifiers to predict fraud, particularly that related to health insurance. Medicare fraud results in…”
Get full text
Conference Proceeding