Skip to main content

Showing 1–8 of 8 results for author: Maillé, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:1808.00958  [pdf, ps, other

    cs.IR cs.SI stat.AP

    Evaluating search engines and defining a consensus implementation

    Authors: Ahmed Kamoun, Patrick Maillé, Bruno Tuffin

    Abstract: Different search engines provide different outputs for the same keyword. This may be due to different definitions of relevance, and/or to different knowledge/anticipation of users' preferences, but rankings are also suspected to be biased towards own content, which may prejudicial to other content providers. In this paper, we make some initial steps toward a rigorous comparison and analysis of sea… ▽ More

    Submitted 2 August, 2018; originally announced August 2018.

  2. arXiv:1604.04579  [pdf, ps, other

    cs.GT

    Competition Between Regulation-Providing and Fixed-Power Charging Stations for Electric Vehicles

    Authors: Wenjing Shuai, Patrick Maillé, Alexander Pelov

    Abstract: This paper models a non-cooperative game between two EV charging stations. One is a fixed-power charging station purchasing electricity from the grid at wholesale price and reselling the energy to EV owners at a higher retail price; the other is regulation-providing and varies the recharging power level of its clients to provide regulation services to the grid, so its profit comes from both EV own… ▽ More

    Submitted 15 April, 2016; originally announced April 2016.

  3. arXiv:1604.03324  [pdf, other

    cs.GT cs.NI

    Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: A surveillance game

    Authors: Duc-Tuyen Ta, Nhan Nguyen-Thanh, Patrick Maille, Phillippe Ciblat, Van-Tam Nguyen

    Abstract: Primary User Emulation Attack (PUEA), in which attackers emulate primary user signals causing restriction of secondary access on the attacked channels, is a serious security problem in Cognitive Radio Networks (CRNs). An user performing a PUEA for selfishly occupying more channels is called a selfish PUEA attacker. Network managers could adopt a surveillance process on disallowed channels for iden… ▽ More

    Submitted 19 April, 2016; v1 submitted 12 April, 2016; originally announced April 2016.

    Comments: 6 pages; Globecom'16

  4. arXiv:1602.07615  [pdf, ps, other

    cs.NI cs.GT

    Content Providers Volunteering to Pay Network Providers: Better than Neutrality?

    Authors: Patrick Maillé, Galina Schwartz

    Abstract: This paper studies the effects on user welfare of imposing network neutrality, using a game-theoretic model of provider interactions based on a two-sided market framework: we assume that the platform--the last-mile access providers (ISPs)--are monopolists, and consider content providers (CPs) entry decisions. All decisions affect the choices made by users, who are sensitive both to CP and ISP inve… ▽ More

    Submitted 24 February, 2016; originally announced February 2016.

  5. Charging Electric Vehicles in the Smart City: A Survey of Economy-driven Approaches

    Authors: Wenjing Shuai, Patrick Maillé, Alexander Pelov

    Abstract: Electric Vehicles (EVs), as their penetration increases, are not only challenging the sustainability of the power grid, but also stimulating and promoting its upgrading. Indeed, EVs can actively reinforce the development of the Smart Grid if their charging processes are properly coordinated through two-way communications, possibly benefiting all types of actors. Because grid systems involve a la… ▽ More

    Submitted 15 January, 2016; originally announced January 2016.

  6. arXiv:1304.5677  [pdf, ps, other

    cs.NI cs.GT

    Efficiency or fairness: managing applications with different delay sensitivities in heterogeneous wireless networks

    Authors: Vladimir Fux, Patrick Maillé, Jean-Marie Bonnin, Nassim Kaci

    Abstract: In the current intensively changing technological environment, wireless network operators try to manage the increase of global traffic, optimizing the use of the available resources. This involves associating each user to one of its reachable wireless networks; a decision that can be made on the user side, in which case inefficiencies stem from user selfishness. This paper aims at correcting tha… ▽ More

    Submitted 20 April, 2013; originally announced April 2013.

    Comments: Work presented at the WoWMoM 2013 conference

  7. arXiv:1202.2888  [pdf, other

    cs.SI

    Exploiting the `Web of Trust' to improve efficiency in collaborative networks

    Authors: Shreyas Sekar, Patrick Maillé

    Abstract: Maintaining high quality content is one of the foremost objectives of any web-based collaborative service that depends on a large number of users. In such systems, it is nearly impossible for automated scripts to judge semantics as it is to expect all editors to review the content. This catalyzes the need for trust-based mechanisms to ensure quality of an article immediately after an edit. In this… ▽ More

    Submitted 13 February, 2012; originally announced February 2012.

  8. arXiv:1010.5128  [pdf, ps, other

    cs.NI

    TCP over low-power and lossy networks: tuning the segment size to minimize energy consumption

    Authors: Ahmed Ayadi, Patrick Maillé, David Ros

    Abstract: Low-power and Lossy Networks (LLNs), like wireless networks based upon the IEEE 802.15.4 standard, have strong energy constraints, and are moreover subject to frequent transmission errors, not only due to congestion but also to collisions and to radio channel conditions. This paper introduces an analytical model to compute the total energy consumption in an LLN due to the TCP protocol. The model a… ▽ More

    Submitted 25 October, 2010; originally announced October 2010.

    Comments: TELECOM Bretagne Research Report