3DGraph / Spring 2013 - 3-D and virtual imaging (analysis and synthesis)
- The goal of this course is to introduce the students to the main concepts and techniques used in computer graphics and image synthesis and analysis.
- 3D object modelling and advanced visualization methods are studied.
- Specialized hardware used to speed up these computations are described with focus on specialized systems used in virtual reality applications.
- The application domains related to 3D and Virtual imaging are scientific and information visualization, CAD, flight simulation, games, advertising and movie special effects.
AlgoDesign / Spring 2013 - Applied Algorithm Design
- The goals of this course are 1) to survey the foundations of the design and analysis of algorithms; 2) to provide a practical understanding of complexity theory and algorithmics; 3) to provide an in-depth understanding of selected problems at theforefront of research explorations in the design and analysis of algorithms.
- Most of the excercises and examples are drawn from problems related to networking and distributed systems, such as peer-to-peer systems. More traditional cases are also covered in the Lectures.
ATMM / Fall 2013 - Advanced topics in multimedia
- In this course, we will discuss contemporary research problems in multimedia. The content of the course will change from year to year and will reflect the current research interests of the Eurecom faculty.
ATWireless / Fall 2013 - Advanced topics in wireless communications
- This course presents recent research developments in the area of wireless communications.
- We emphasize promising techniques to be used at the physical and MAC layers allowing a significant increase in the network's spectral efficiency (Bit/Sec/Hz).
- In particular, we describe 1) space-time (multiple antenna) signal processing techniques such as MIMO techniques, and 2) adaptive coding and modulation.
- We also look at joint adaptive MIMO coding/modulation design.
- We illustrate the impact of these advanced techniques on the overall network's performance.
Clouds / Spring 2013 - Distributed Systems and Cloud Computing
- The goal of this course is to provide a comprehensive view on recent topics and trends in distributed systems and cloud computing.
- We will discuss the software techniques employed to construct and program reliable, highly-scalable systems.
- We will also cover architecture design of modern datacenters and virtualization techniques that constitute a central topic of the cloud computing paradigm.
- The course is complemented by a number of lab sessions to get hands-on experience with Hadoop and the design of scalable algorithms with MapReduce.
Coding / Spring 2013 - Chanel coding theory
- In today's communications world channel coding underlies the physical layer of all major communication systems. For example: algebraic block coding (Reed-Solomon codes) are used in the CD and DVD standards, convolutional codes are widely used in wireless systems such as GSM,IS-95 and LANs (IEEE 802.11), trellis coded modulation is used in line modems and low-density parity check codes (LDPC) will be used to combat packet losses in future internet content distribution networks.
- This course provides an introductory but thorough background in modern coding theory and covers both classical coding theory (block and convolutional codes), coding for bandlimited channels (Coded Modulation) and the modern theory of randomlike codes with iterative decoding (LDPCs, Turbo Codes).
CompArch / Fall 2013 - Modern computer architecture
High performance Processors : Hardware/software interaction, instruction set design, memory system design, multi-processors, process and processors synchronization, bus design. Particular constraints in embedded contexts.
DigiCom / Fall 2013 - Digital communications
- This course covers the fundamentals for the analysis and design of physical layer digital communication systems.
- It serves as the basic building block for understanding modern mathematical procedures that enable communication via different physical media (e.g. radio, twisted-pair wireline, coaxial cable, fiber-optical).
- Both the deterministic and random characterizations of common transmit signal and noise processes are covered as well as optimal receivers and their performance using different digital signalling methods.
DistAlg / Fall 2013 - Distributed Algorithms
- The course includes topics in distributed and concurrent algorithms. The focus is on algorithms in message passing model for networked distributed systems.
- In addition, the course also covers fundamental concepts of distributed algorithms in shared memory model, relevant in the context of modern multicore architectures.
DSMWare / Spring 2013 - Distributed software and middleware
- Middleware consists of the software and services on which a network application programmer relies that are provided on top of the network layer. The knowledge of distributed software design and the appropriate use of middleware are recognized as part of the software engineering culture in the industry, especially for Internet applications.
- The goal of this course is to provide a broad overview of engineering techniques for the development of distributed software based on classical bare socket programming and on today's state-of-the-art middleware.
- The course first describes how distributed software can be modularly designed using object-oriented techniques and design patterns. Object-oriented middleware platforms like CORBA, Java RMI, and EJB are then thoroughly described. Mobile code platforms, which provide a new form of middleware, are also introduced. Services and interfaces required for the deployment of these platforms are finally addressed.
- The course will be accompanied by some significant design and programming labs.
ElecDesign / Spring 2013 - Electronic design for Communications
- This course provides and overview of different enabling hardware technologies for real-time processing applied to embedded systems.
- It is a companion course to "Signal Processing Technologies" and mandatory in the "Real-time and Embedded systems" track.
- Software and hardware aspects, system integration, design and validation tools are studied.
- The main goal is to reach a sufficient level of understanding to design alone a prototype system embedding one or several hardware operators for the processing and a micro-processor, plus its peripherals, for the control. A hands-on approach is taken, with the aid of state-of-the-art laboratory equipment.
- During the final project the students design an actual prototype on a FPGA-based prototyping board, design the embedded software, connect the board to a host PC and test their application. Examples of past projects: hardware accelerator for a cryptographic enciphering algorithm, or for an image processing one, ...
EmSim / Fall 2013 - Emulation and simulation methodologies
Communication solutions for ITS must be evaluated for performance and benefits on ITS. Although field trials or operational tests are the most important final test before commercial deployment, cost, logistic and safety concerns make simulation and emulation studies the preferred choice for flexible tests of communication solutions for ITS. Yet, simulation and emulation platforms, if employed using incorrect methodologies, may lead to inaccurate results.
This module teaches the fundamentals of simulation and emulation methodologies providing guidance on how to design a performance evaluation campaign, set up a test scenario, select the appropriate models, level of granularity, metrics for statistical correctness, and discuss the differences between simulation and emulation platforms and how to use them for accurate performance evaluation of communications for ITS.
Details of each section:
- Fundamentals of Discrete Event Simulations (DES) - we describe here basics of DES and how complex simulators are built on them.
- Model-based Representation - we cover in this section the various models that need to be included in a DES, from communication and networking, to mobility and data traffic, and describe the methodology to model them correctly.
- Application-based Granularity Requirements - We describe here the different granularity level of the model-based evaluation, from bit-level, packet-level, to system-level evaluation, and their appropriate selection as a function of the application requirements.
- Fundamentals on Random Numbers - Random numbers play a crucial role in DES-based evaluations. We describe various approaches, and pitfalls to avoid.
- Fundamentals on Statistical Tools for Performance Evaluation - Performance evaluations require a correct methodology for statistical correctness of the results. We provide in this section the basics of statistics that can be used in simulation and emulation studies .
- Simulation vs. Emulations and- We cover the fundamental differences between simulation and emulation platforms, and describe their assets and drawbacks.
- Case study -We introduce two widely known simulation platforms and one emulation platform that can be used for the evaluation of communications for ITS, and describe their features and take them as case-study for exemplary ITS scenarios.
Forensics / Spring 2013 - Cyber-crime and Computer Forensics
- This course serves as a continuation of System and Network Security. The idea is to present different approaches to analyse and detect malware and to deal with compromised machines.
- Because the class will feature a number of programming exercises, students are required to have programming experience.
FormalMet / Spring 2013 - FormalMethods-Formal specification and verification of systems
- This course aims to give students the fundamentals of formal methods for specifying and verifying systems.
- Emphasis is placed on practical use of the notions encountered.
G_Theory / Fall 2013 - Applied Game Theory
- This course is an introduction to game theory and its algorithmic aspects. Ideas such as dominance, backward induction, Nash equilibrium, evolutionary stability, commitment, credibility, asymmetric information, adverse selection, and signaling are discussed and applied to games played in class and to examples drawn from economics, politics and computer science in general.
HWSec / Spring 2013 - Security of Security hardware
- Embedded applications with strong security requirements use sophisticated cryptographic algorithms and protocols. These algorithms and protocols are usually considered resistant against cryptanalysis. Inside the complete system they are implemented either in software or hardware form. Unfortunately, at least for the designers of such systems, any computation is eventually performed by a piece of hardware (microprocessor or hardware dedicated accelerator) and every hardware device leaks symptoms of its activity (power consumption, electromagnetic emanations, computation time, etc.) An attacker can use such side channels to retrieve embedded secrets. She can also inject and exploit faults by modifying the power supply, the clock frequency, using a laser or even by modifying the structure of the device. Other attack classes target communication busses on electronic board and have already been successfully used against game consoles and other consumer equipments.
- This course offers a survey of several known hardware attacks. For each of them the conditions of success are explained and some counter measures are proposed.
- The main goal is to initiate the students into such threats, give them hints about the possible counter measures and prepare them to design more secure systems.
- Lectures are complemented by two lab sessions dedicated to timing and power consumption attacks. During the labs the students will experiment the impressive efficiency of these attacks and will try to protect the security target with counter measures.
ImCompress / Fall 2013 - Image and video Compression and Processing
- This course presents progressive coverage of Image and Video Compression and Processing.
ImSecu / Spring 2013 - Imaging for security applications watermarking & biometrics
- Watermarking : Watermarking allows owners or providers to hide an invisible and robust message inside a digital Multimedia document, mainly for security purposes such as owner or content authentication. There is a complex trade-off between the different parameters : capacity, visibility and robustness.
- Biometrics : The security fields uses three different types of authentication : something you know, something you have, ore something you are : a biometric. Common physical biometrics includes fingerprints, hand geometry ; and retina, iris or facial characteristics. Behavioural characters include signature, voice. Ultimately, the technologies could find their strongest role as intertwined and complementary pieces of a multifactor authentication system. In the future biometrics is seen playing a key role in enhancing security, residing in smart cards and supporting personalized Web e-commerce services. Personalization through person authentication is also very appealing in the consumer product area.
- This course will focus on enabling technologies for Biometrics, with a particular emphasis on person verification and authentication based on or widely using image/video processing.
InfoTheo / Fall 2013 - Information theory
- Since 1948, the year of publication of Shannon's landmark paper "A mathematical theory of communications", Information theory has paved the ground for the most important developments of today's information/communication world.
- Information theory studies the ultimate theoretical limits of source coding and data compression, of channel coding and reliable communications via channels, and provides the guidelines for the development of practical signal-processing and coding algorithms.
- This course covers Information theory at an introductory level.
- The practical implications of theoretical results presented are put in evidence through examples and case studies.
InternetApp / Fall 2013 - Internet applications
IS / Spring 2013 - Intelligent systems
- The objective of this course is to give student a solid background on techniques for classification and learning. The relationship with intelligence is that those techniques are often useful to build effective models in situations where no optimal solution in known, for example fraud detection in credit card usage. The resulting systems can be considered as having some kind of intelligent behaviour.
MathEng / Fall 2013 - Basics Mathematical Methods for Engineers
- This course aims to present a treatment of mathematical methods suitable for engineering students who are interested in the rapidly advancing areas of signal analysis, processing, filtering and estimation. Significant current applications relate to speech and audio, music, wired and wireless communications, instrumentation, multimedia, radar, sonar, control, biomedicine, transport and navigation.
- The course presents a study of analogue systems as a pre-requisite to material relating to sampled-data systems.
- The objective is to assist the student in gaining confidence in working with the frequency or transform domain for the analysis or characterisation of signals and systems. The final part of the course aims to introduce at a more mathematical level the concepts of probability, random processes and the analysis of random signals, correlation and spectral density.
MMIR / Fall 2013 - Multimedia indexing and retrieval
- While search engines such as Google are extremely efficient for huge databases of text documents, searching for image and video information is still a research challenge.
- The objective of this course is to study some of the problems and techniques that are involved in the construction of multimedia search engines.
MMTech / Spring 2013 - Multimedia technology
- The aim of this course is to provide an overview of the audio/video acquisition, storage and display systems, which are main components of multimedia systems.
MobAdv / Spring 2013 - Mobile Advanced Networks
- The course MobAdv would interest students who want to learn emerging adhoc wireless networks including mesh, sensor, vehicular, and delay-tolerent networks as well as the fundamental building blocks used in the current state-of-the-art architectures, protocols, and algorithms. It is designed to stimulated students' critical thinking and analysis through discussions on open research issues and depth case study.
- It covers mainly the candidate applications and the network layer by giving for each one of them the proposed protocols and techniques and standardization and research efforts.
- This course starts by presenting a brief introduction on graph-based network modelling followed by broadcasting, (Geo-)routing, and multicasting techniques. Then different topology control algorithms and network clustering schemes are described. Impact of different mobility and traffic patterns on the performance of protocols are analyzed and compared. Finally, advanced topics such as cross-layer design, QoS support and node cooperation are discussed.
MobCom / Fall 2013 - Mobile communication techniques
- To provide a fundamental understanding of mobile communication systems.
- The course will seek to describe the key aspects of channel characteristics/modeling, of communication techniques, and to describe the application of these techniques in wireless communication systems.
- The course will cover recent research developments, such as opportunistic communications, basic aspects of MIMO communications, and OFDMA.
- Specific topics will include basic properties of multipath fading, diversity techniques, multiple access and interference management, fundamental capacity exposition and opportunistic communications.
MobIP / Spring 2013 - Mobile Networking
- This module addresses the mobility management in IP Networks (Internet or private networks). In particular the various mobility schemes based on IPv6 are detailed.
MobMod / Spring 2013 - Mobility Modeling
- The module teaches the state-of-the art of the modeling techniques for vehicular mobility. The objectives are first to describe the challenges of close-to-reality modeling of vehicular mobility, illustrate the impact of mobility on communication and networking, as well as the benefit of close-to-reality of vehicular mobility modeling to design efficient ITS applications.
- This module covers the various modeling approaches, from vehicular flow modeling (at micro-, meso- and macroscopic level), to large-scale vehicular traffic modeling (Origin-Destination matrix, Trip and Path planning). This module concludes with a description and a survey of simulators related to the previously described models, and available to the ITS community for a multi-scale realistic vehicular mobility modeling.
Details of each section:
Vehicular Flow Modeling – Vehicular flow models describe the movement of individual vehicles, typically as a function of their internal state, as well as of that of neighboring vehicles. These models represent microscopic-level car-to-car interactions and have been studied since the 50's. In this section, we present the history and state-of-art in vehicular flow modeling.
- Objectives to the students: understanding the basics of vehicular flow modeling, and gaining a comprehensive and systematical view on the vast literature on the topic.
Vehicular Traffic Modeling – When targeting a comprehensive and realistic representation of vehicular mobility, microscopic-level car-to-car interactions are only one part of the solution. Indeed, it is well known that vehicles follow macroscopic-level patterns determined by the nature of roads and by the habits of drivers. Thus, in this section we describe the various approaches to model such large-scale traffic behaviors, from random mobility to activity-based trip generation and agent-based modeling.
- Objectives to the students: getting introduced to an underrated aspect of mobility, and understanding how it is typically dealt with in vehicular networking research.
Vehicular Traffic Simulators – Microscopic- and macroscopic-level models have been implemented, over the last 20 years, in vehicular traffic simulators. Initially expensive proprietary tools developed for transportation research, these simulators have recently been adapted to the needs of networking research, with the development of open source tools capable of interacting with network simulators. In this section, we present a taxonomy of traffic simulators for vehicular networking research, with a focus on the interactions between mobility and network simulators.
- Objectives to the students: gaining a complete view on the available vehicular traffic simulators, and understanding their strengths and weaknesses.
MobServ / Fall 2013 - Mobile application and services
- The course MobServ would interest students who want to get a big picture of mobile application ecosystem and hands-on on design and development for emerging mobile platform including Android, iOS, and PhoneGap/WebOS. It focuses on problem solving and design skills through studio-based learning (SLB) and lab sessions as well as a challenge project where you invent and build your own mobile application.
- It targets the description of new emerging technologies and tools used to design and implement multimedia applications for smartphones taking into account the technical constraints relative to storage capacity, processing capacity, display screen, communication interfaces, as well as user context and profile.
- This course starts by presenting a mobile application and platform landscape and their evolution followed by Android, iOS, and PhoneGap/WebOS basics combined with mini lab sessions. Then fundamentals of each platform are detailed through guided lab sessions and interactive discussions. Platform trends, market, and business model are explained. Finally, advanced topics such as location-based service, geo-social service, offline capable apps, UI/UX design are given.
MobSys / Fall 2013 - Mobile communication systems
- The purpose of this course is to present a series of mobile systems in their entirety to synthesize the knowledge gained in more fundamental courses, to explore current and emerging standards and to follow the evolution of various mobile services.
MobWat / Spring 2013 - Wireless Access Technologies
- This module teaches the state-of-the art techniques for wireless access.
- This module will address wireless access issues in the context of vehicular communication for Intelligent Transportation Systems (ITS).
- The interested students will learn the challenges of accessing a wireless network, how to address the impact of mobility, how to differentiate various types of message and deal with the QoS, understand the impact of distance, transmission policies or the environment on the communication quality, and finally how wireless access technologies could improve the future ITS.
- This module puts experimentations to the center and will schedule 3 lab sessions for 4 lectures.
NetEcon / Fall 2013 - Network Economics
- The course will introduce a number of topics in economic analysis of networks and network-based services.
- The basic method used will be game theory. The basics of game theory will be assumed to be known and the course will focus on applications to network economics.
- The main goal is to show how game-theory is used to analyze economics problems in networks, with a focus on modern research topics in network economics.
NetMod / Fall 2013 - Network Modeling
- Some of the most interesting systems in today's cyber-world are large networks with complex structure and dynamics. Some examples are the Internet (wired and wireless), online social networks (e.g. Facebook, Twitter), peer-to-peer networks (e.g. Skype, BitTorrent), wireless mesh and sensor networks, etc.
- This course will teach students how to analyze (a) the structure of large networks, and (b) the performance of dynamic processes over these networks (e.g. routing, broadcasting, searching, virus spread).
- The end goal is to understand the common underlying properties and their implications for the design of efficient algorithms for large networks.
- The course consists of three main parts (stochastic processes, complex network models, dynamics over networks) each comprising 3-4 modules. Each module will first introduce the necessary analytical background (e.g. markov chains, scale-free graphs), and then present an application of this theory to a real networking problem drawn from diverse topics in networking (e.g. network traffic analysis, mobility modeling, etc.).
Netw_I / Fall 2013 - Introduction to computer networking and internet
- This course provides a broad overview of computer networking, covering the application layer, transport layer, network layer, and link layers.
- It covers basic concepts in computer networking as well as the prominent Internet protocols.
- It is intended for students who have had no previous course in computer networking.
Netw_II / Spring 2013 - Internetworking architectures and protocols
Optim / Fall 2013 - Fundamentals of Optimisation
- Convex optimization is broadly applied to many technical and non-technical fields and provides a powerful set of tools for the design and analysis of communication systems and signal processing algorithms.
- This course addresses basic concepts and main techniques in linear, non-linear and convex optimization.
- Special emphasis is devoted to exemplify their applications to telecommunications problems with the objective of developing the skills and background needed to recognize, formulate, and solve optimization problems.
- The course aims to introduce Eurecom students to fundamental concepts as duality and KKT conditions, widely utilized techniques as linear and geometric programming and unconstrained optimization algorithms, but also to more advanced techniques, which have been widely applied in wireless communications nowadays, namely, second order cone programming and semi definite programming.
OS / Fall 2013 - Operating systems
- This course tackles both fundamental and practical key aspects of operating systems for real-time embedded applications (applications performing video, managing mobile phones, etc.).
- At first, the course focuses on operating systems fundamental issues. More specifically, the use of hardware architectures on which operating systems run shall be explained: use of memory, use of hard drives, use of USB ports, etc.
- Secondly, timing issues inherent to embedded applications are addressed: how can an operating system offer a support to help applications producing their computations at given dates.
Perf / Spring 2013 - Performance evaluation of computer systems
- The objective of the course is to provide students with simple and efficient methods to analyze the performance of a system.
- Although studied methods rely on mathematical analysis (which will be sketched), the focus will be on the understanding of the methods and the situations in which they can be used (which methods should you use, what to expect, etc.).
- The first part of the course will be dedicated to analysis of performance data (from simulations or experiments); the second part will be dedicated to performance modeling.
- Examples of applications will be given in computer networks, computer systems and in other engineering areas.
PlanIFR / Spring 2013 - Infrastructure Planning
- Intelligent transport systems require wireless communication infrastructure to provide the required connectivity to users and vehicles. Such connectivity is based on heterogeneous access technologies (LTE, WLAN, IEEE 802.11p) and on inter-vehicular communication or vehicular-to-infrastructure communication over single or multiple hops.
- One key component remains to have a sufficient radio coverage provided by communication infrastructures, in particular for ITS applications requiring a global and/or large-scale connectivity, or to leverage the initial low penetration of the ITS communication technologies. Normal radio coverage may be typically provided by a cellular network, although one particularity of wireless networks for ITS is that a full and continuous coverage is neither required nor optimal, as a large majority of ITS applications are based on geo-localized services. Radio coverage, and as such, the deployment of communication infrastructure should be adapted to ITS applications requirements, and to the radio coverage and vehicular mobility contexts, with the aim of a joint user/operator satisfaction. An optimal distribution of communication infrastructure is indeed expected to play a critical role in the success of ITS applications.
- The objective of this course is therefore to learn innovative methods and algorithms to optimize radio coverage for ITS (the user satisfaction) on the one hand, and on the other hand, to optimally dimension the size of the required communication infrastructure (the operator satisfaction) by minimizing them but distributing them in key locations with respects to ITS applications.
PlanTP / Spring 2013 - Transportation Planning
- The objective of wireless communications in ITS is to improve the occupancy of the road infrastructure, public, and private transportations. Notably, federating various transportation means in multi-modal transportation solutions is estimated to play a critical role to reduce traffic jams and commuting time in the upcoming years.
- The major role of wireless communication is to provide and ease the exchange of the required fresher and more precise information to find the optimal selection of the transportation mean(s). It is therefore critical to understand the mechanisms behind public transportation planning (routes, time table, volumes), or private transportation planning (logistics, traffic, etc.), including their interactions, in order to evaluate how and where vehicular wireless communication could help to optimize them. The objective of this course is therefore to provide students with basic knowledge in transport planning, with a particular focus on dynamic methods and multi-modal transport modeling.
Radio / Spring 2013 - Radio engineering
- This course treats the subject of modern radio engineering and includes typical RF architectures and their characterizations, modeling, prediction and simulation of radio-wave propagation, cellular planning, systems-level aspects of modern radio network design.
- Three practical lab sessions using typical RF equipment and measurement tools are offered.
SecAppli / Spring 2013 - Security applications in networking and distributed systems
This course presents the main applications of secure communication mechanisms in the area of computer networks and distributed systems.
The course covers network security approaches based on firewalls, cryptographic security protocol suites designed for the data exchange and network control components of Internet, wireless security protocols, and security solutions for cellular and mobile network architectures.
SecCom / Fall 2013 - Secure communications
This course provides a broad introduction to cryptography and communication security mechanisms based on cryptography. The course covers fundamental aspects such as security evaluation criteria and the mathematical constructs underlying cryptographic primitives as well as applied aspects like the design of major encryption and hashing algorithms, details of security mechanisms relying on cryptography such as data encryption, integrity, digital signature, authentication, key management, and public-key infrastructures.
SigTech / Spring 2013 - Signal processing technologies
- This course provides an overview of different enabling technologies for real-time signal processing applied to communication systems.
- The basic implementation technology behind areas such as, wireless communication devices, audiovisual devices, media players, PC-based multimedia, soft modems (software radio), video gaming will be covered.
- A hands-on approach is taken, with the aid of state-of-the-art laboratory equipment, to expose students to the real-time hardware and software aspects of modern signal processing architectures.
- The topics covered span conversion technologies (A/D, D/A), bus architectures and data acquisition systems, embedded DSP processors, PC-based DSP architectures and implementations, real-time operating systems (RTOS) aspects and system-on-chip (SoC) architectures. Specially design laboratory sessions are supported by introductory lectures on the particular area under study.
SoftDev / Fall 2013 - Software development methodologies
- The course aims at providing students with a common knowledge about the concepts of programming and software development in a Unix-like environment. In particular, the course will focus on practical techniques of program development for small-scale projects produced by individuals or small groups.
SP4COM / Spring 2013 - Signal Processing for Communications
- The goal of this course is to cover a number of complements to the treatment of physical layer procedures in a wide variety of modem technologies.
- The details of the adaptation of a number of basic digital communication techniques to some specific communication problems are elaborated. Such details involve for instance multi-rate echo cancellation for full duplex operation on twisted pair telephone lines, synchronization and equalization techniques in a variety of single and multi-carrier systems, fixed point implementation issues of a number of basic algorithms.
- The extra systems to be covered include xDSL, gigabit Ethernet, powerline systems and DAB/DVB broadcasting.
Speech / Spring 2013 - Speech and audio processing
- Give the students a general knowledge of the most important communication mode : speech.
- Speech is used to communicate with machines this is speech recognition. Machine can generate artificial speech : this is speech synthesis. Speech must be compressed for two different reasons : reduce the memory required in storage systems and allow low bit rate transmission (f.i in GSM systems). Speech can also be used in biometrics : speaker identification and verification. In the media, speech and soundtracks as well as recorded work sessions can be automatically analyse and speech is a part of the indexing applications.
SSP / Fall 2013 - Statistical signal processing
- The proper treatment of modern communication systems requires the modelling of signals as random processes.
- Often the signal description will involve a number of parameters such as carrier frequency, timing, channel impulse response, noise variance, interference spectrum.
- The values of these parameters are unknown and need to be estimated for the receiver to be able to proceed.
- Parameters may also occur in the description of other random analysis of communication networks, or in the descriptions of sounds and images, or other source signals.
- This course provides an introduction to the basic techniques for estimation of a finite set of parameters, of a signal spectrum or of one complete signal on the basis of a correlated signal optimal filtering).
- Finally, we consider a prototype parameter estimation problem: sinusoids in noise.
Stand / Fall 2013 - Standardization activities
- Over the past years, wireless communication for ITS went over important standardization efforts. It remains yet very hard to gather a global vision of the different aspects and roles, as standardization is conducted as a function of various countries and on different protocol stacks (IETF for IPv6, IUT for the frequencies, IEEE for the 802.11p and WAVE, ETSI/ISO for the higher protocol stacks). The knowledge of available protocols and standards as well as their inter-relations in ITS is important to design innovative ITS applications and to to develop the required communication system.
- The objective of this course is to provide a global and coherent view of ITS standardization activities in major standardization institutions or industry consortia, such as the IEEE, the ETSI, the ISO, the IETF and the SAE. The course will also illustrate the similarities and differences between different approaches in Europe, the US, and the rest of the world.
Stat / Fall 2013 - Statistical data analysis
- The goal of the course is to provide students with simple and efficient statistical methods to analyze data. Such methods are of crucial importance in many situations as they allow to answer questions such as: 'Is this performance improvement significant?', 'What is the uncertainty on that result?', 'How can I predict a new output of my system based on measurements?', 'Which factors have a significant impact on the performance of my system?', and many more.
- Mathematical analysis underlying the presented methods will be sketched, but the main focus will be on the understanding of the methods and the situations in which they can be used (which method to use, what to expect, etc.).
- The course will present generic methods working for data from any application and not a specific domain of application. Examples will be given in different areas (computer networks, engineering, etc.).
SysSec / Fall 2013 - System and Network Security
- Internet security has become part of everyday life where security problems impact practical aspects of our lives. Even though there is a considerable corpus of knowledge about tools and techniques to protect networks, information about what are the actual vulnerabilities and how they are exploited is often not well understood. The course aims to make the students gain a basic understanding about real world security issues and countermeasures. Another of the goals of this course is to teach students to think as an attacker, this state of mind will later help to design secure systems and avoid common pitfalls.
- The course introduces the students to all the basic concepts of system security in the areas of host, network, and web security. The class has a very practical spin. A number of challenge-like homework assignment are used to force the student to practice on the low level aspects of the concept presented during the lectures. Therefore, prior experience in basic programming (C) as well as knowledge of basic concepts in operating systems and networks is recommended.
- The following topics are covered in this course:
- Windows and Unix Security Basics
- Race Conditions
- Memory Corruption, Exploitation and Modern Countermeasures
- Trusted Computing
- Web Security
- Wireless Security
- Network Security
- Testing for Security
- Smartphones Security
- Introduction to Malware
TraffEEc / Spring 2013 - Emission and Traffic Efficiency
- Intelligent transport systems are expected to bring a positive impact on the environment. Yet, a specific design and evaluation methodology will be required, especially when considering vehicles dynamics on the generated pollution. One key aspect is the need for pollution and energy consumption models that will be able to represent the positive or negative impact of urban traffic on the environment.
- In this course, we will present the divers methods and models available in the critical domains of pollutant emission models, noise models, and electric or fossil energy consumption models. We will illustrate their usage in conjunction with ITS solutions on typical use cases, such as dynamic navigation and electro-mobility.
UMLEmb / Fall 2013 - UML for Embedded Systems
- This course tackles the development of an embedded system, from its requirements defined by a client until its implementation.
- This development includes a requirement analysis phase, a system design phase, a simulation phase before its implementation. UML (Unified Modeling Language) is gaining a wide importance and acceptance in the industry as a graphical language for supporting development cycles.
- Thus, this course studies the use of UML for analysis and design of real-time embedded systems. More specifically, it focuses on how to model and then validate constraints specific to those systems, and more particularly real-time constraints such as deadlines.
WebInt / Fall 2013 - Human-computer interaction for the Web: interaction design and user evaluation
- Human's computer interaction (HCI) is the study of interaction between people (users) and computers. It is often regarded as the intersection of computer science, behavioural sciences, design and several other fields of study.
- In this course, we will focus on designing and evaluating interfaces for interacting with multimedia data on the web.
- The main goal of this course is therefore to teach students how to sketch and build novel interactive systems without intensive programming and engineering knowledge, using simple tools, few trick and lots of imagination.
WebSem / Spring 2013 - An Introduction to Semantic Web technologies
- The Semantic Web is an evolving extension of the World Wide Web in which the semantics of information and services on the web is defined, making it possible for the web to understand and satisfy the requests of people and machines to use the web content. It derives from W3C director Sir Tim Berners-Lee's vision of the Web as a universal medium for data, information, and knowledge exchange. This course is a guided tour for a number of W3C recommendations allowing to represent (RDF/S, OWL, SKOS, RIF), query (SPARQL) and extract (RDFa, GRDDL) knowledge on the web.
- It aims at presenting the underlying logical formalisms of these languages, their syntax and semantics.
- We will also present the problems of modelling and aligning ontologies on the web.
- Finally, we will show how the linked data movement contributes to the so-called Web 3.0 vision.