Recursos de colección

ORBi Open Repository and Bibliography (301.662 recursos)

In may 2007, the ULg's Administrative Board (joined in June 2007 by the FUSAGx) decided to create an institutional repository and defined a strong institutional self-archiving policy to increase the visibility, accessibility and impact of the University's publications (Board's decision). This decision led to the official launch, in November 2008, of the ORBi platform including both the Academic Bibliography and the Institutional Repository of the Wallonia-Europe University Academy.

Engineering, computing & technology => Computer science

Mostrando recursos 1 - 20 de 64

  1. Towards a system of concepts for Family Medicine. Multilingual indexing in General Practice/ Family Medicine in the era of Semantic Web

    Jamoulle, Marc
    UNIVERSITY OF LIÈGE, BELGIUM Executive Summary Faculty of Medicine Département Universitaire de Médecine Générale. Unité de recherche Soins Primaires et Santé Doctor in biomedical sciences Towards a system of concepts for Family Medicine. Multilingual indexing in General Practice/ Family Medicine in the era of SemanticWeb by Dr. Marc JAMOULLE Introduction This thesis is about giving visibility to the often overlooked work of family physicians and consequently, is about grey literature in General Practice and Family Medicine (GP/FM). It often seems that conference organizers do not think of GP/FM as a knowledge-producing discipline that deserves active dissemination. A conference is organized, but not much is done with the knowledge shared at these meetings. In turn, the knowledge...

  2. TOWARDS A DECISION SUPPORT TOOL FOR 3D VISUALISATION: APPLICATION TO SELECTIVITY PURPOSE OF SINGLE OBJECT IN A 3D CITY SCENE

    Neuville, Romain; Pouliot, Jacynthe; Poux, Florent; Hallot, Pierre; De Rudder, Laurent; Billen, Roland
    Peer reviewed

  3. Fuzzy-Logic Controlled Genetic Algorithm for the Rail-Freight Crew-Scheduling Problem

    Khmeleva, E.; Hopgood, Adrian; Tipi, L.; Shahidan, M.
    Peer reviewed

  4. MODEL FOR REASONING FROM SEMANTICALLY RICH POINT CLOUD DATA

    Poux, Florent; Poux, Florent; Neuville, Romain; Neuville, Romain; Hallot, Pierre; Hallot, Pierre; Billen, Roland; Billen, Roland
    Peer reviewed

  5. Two Newton methods on the manifold of fixed-rank matrices endowed with Riemannian quotient geometries

    Absil, Pierre-Antoine; Amodei, Luca; Meyer, Gilles
    Peer reviewed

  6. Development, dissemination, and applications of a new terminological resource the Q-Code taxonomy for professional aspects of General Practice / Family Medicine.

    Jamoulle, Marc; Resnick, Melissa; Grosjean, Julien; Ittoo, Ashwin; Cardillo, Elena; Vander Stichele, Robert; Darmoni, Stefan; Vanmeerbeek, Marc
    Peer reviewed

  7. An Observation-Based Middlebox Policy Taxonomy

    Edeline, Korian; Donnet, Benoît
    Peer reviewed

  8. Through the Wormhole: Tracking Invisible MPLS Tunnels

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît
    Peer reviewed

  9. Discovering Routers in Load-balanced Paths

    Grailet, Jean-François; Donnet, Benoît
    Peer reviewed

  10. BIGMOMAL - Big Data Analytics for Mobile Malware Detection

    Wassermann, Sarah; Casas, Pedro
    Mobile malware is on the rise. Due to their popularity, smartphones represent an attractive target for cybercriminals, especially regarding unauthorized access to private user data; smartphones incorporate a lot of sensitive information about users, even more than a personal computer. Indeed, besides personal information such as documents, accounts, passwords, contacts, etc., smartphone sensors centralize other sensitive data such as user location, physical activities, etc. In this paper, we study the problem of malware detection in smartphones, using supervised machine learning models and big data analytics frameworks. Using a publicly available dataset for smartphone data analysis (the SherLock data collection, see...

  11. BIGMOMAL - Big Data Analytics for Mobile Malware Detection

    Wassermann, Sarah; Casas, Pedro
    Mobile malware is on the rise. Due to their popularity, smartphones represent an attractive target for cybercriminals, especially regarding unauthorized access to private user data; smartphones incorporate a lot of sensitive information about users, even more than a personal computer. Indeed, besides personal information such as documents, accounts, passwords, contacts, etc., smartphone sensors centralize other sensitive data such as user location, physical activities, etc. In this paper, we study the problem of malware detection in smartphones, using supervised machine learning models and big data analytics frameworks. Using a publicly available dataset for smartphone data analysis (the SherLock data collection, see...

  12. Anycast on the Move - A First Look at Mobile Anycast Performance

    Wassermann, Sarah; Rula, John P.; Bustamante, Fabian
    Service providers rely on replication to improve service performance and reliability, placing instances in multiple locations and redirecting clients to nearby copies. Anycast is a common mechanism used for redirecting clients in a variety of domains from naming to CDNs and video streaming. IP anycast offers a method for making a service IP address available to a routing system from several locations at once, and clients' requests are directed based on BGP routing policies. For operators, IP anycast offers an economic, scalable, and simple approach to replicated services; BGP provides considerable robustness, adapting to changes in service and network availability....

  13. Anycast on the Move - A First Look at Mobile Anycast Performance

    Wassermann, Sarah; Rula, John P.; Bustamante, Fabian
    Service providers rely on replication to improve service performance and reliability, placing instances in multiple locations and redirecting clients to nearby copies. Anycast is a common mechanism used for redirecting clients in a variety of domains from naming to CDNs and video streaming. IP anycast offers a method for making a service IP address available to a routing system from several locations at once, and clients' requests are directed based on BGP routing policies. For operators, IP anycast offers an economic, scalable, and simple approach to replicated services; BGP provides considerable robustness, adapting to changes in service and network availability....

  14. Anycast on the Move - A First Look at Mobile Anycast Performance

    Wassermann, Sarah; Rula, John P.; Bustamante, Fabian
    Service providers rely on replication to improve service performance and reliability, placing instances in multiple locations and redirecting clients to nearby copies. Anycast is a common mechanism used for redirecting clients in a variety of domains from naming to CDNs and video streaming. IP anycast offers a method for making a service IP address available to a routing system from several locations at once, and clients' requests are directed based on BGP routing policies. For operators, IP anycast offers an economic, scalable, and simple approach to replicated services; BGP provides considerable robustness, adapting to changes in service and network availability....

  15. Anycast-based DNS in Mobile Networks

    Wassermann, Sarah
    Anycast offers a method for making a service IP address available to a routing system from several locations at once. It is used today to provide important services, such as naming and content delivery, in an economic, scalable, and simple to operate manner. The appeal and clear benefits of anycast to service providers have motivated a number of recent experimental studies on its potential performance impact. All studies have, to the best of our knowledge, focused on wired networks, despite the growing dominance of mobile as the most common and sometimes only form of Internet access. In this thesis, we...

  16. A Combining Approach to Cover Song Identification

    Osmalsky, Julien
    This thesis is concerned with the problem of determining whether two songs are different versions of each other. This problem is known as the problem of cover song identification, which is a challenging task, as different versions of the same song can differ in terms of pitch, tempo, voicing, instrumentation, structure, etc. Our approach differs from existing methods, by considering as much information as possible to identify cover songs. More precisely, we consider audio features spanning multiple musical facets, such as the tempo, the duration, the harmonic progression, the musical structure, the relative evolution of timbre, among others. In order to...

  17. 3D Point Clouds in Archaeology: Advances in Acquisition, Processing and Knowledge Integration Applied to Quasi-Planar Objects

    Poux, Florent; Neuville, Romain; Van Wersch, Line; Nys, Gilles-Antoine; Billen, Roland
    Peer reviewed

  18. Improving QoE Prediction in Mobile Video through Machine Learning

    Casas, Pedro; Wassermann, Sarah
    Peer reviewed

  19. The LNQ25 and ELN PVT Metrics Exhibit a Good Sensitivity to Sleep Deprivation and are Independent from the Subject

    Latour, Philippe; Van Droogenbroeck, Marc
    Peer reviewed

  20. Réalisation d’un webGIS reprenant les principales propriétés d’Arcelor Mittal en province de Liège

    Renson, P; Devillet, Guénaël

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.