INRIA a CCSD electronic archive server
Not a member yet
    120044 research outputs found

    An inquiry into Search Engine Neutrality: the case of movements against police violence in France and the U.S.

    No full text
    International audienceThe digital transformation has revolutionized information consumption, with search engines playing a pivotal role in shaping user access to diverse media. Employing algorithms, these engines influence content visibility and aggregate news sources, significantly molding public opinion. As gatekeepers of information, search engines impact media outlet visibility, affecting online traffic, revenue, and journalistic diversity. In breaking news and societal issues, search engines expedite information dissemination, influencing initial narratives. Understanding their role is crucial for transparency and user access to diverse information. Focusing on movements against police violence, our paper conducts a comparative analysis across 12 search engines for terms "Black Lives Matter" and "Justice pour Adama". Our innovative methodology identifies biases in information diversity, providing insights into the dynamics shaping visibility of societal issues.</div

    Knock-Knock: Black-Box, Platform-Agnostic DRAM Address-Mapping Reverse Engineering

    No full text
    International audienceModern Systems-on-Chip (SoCs) employ undocumented linear address-scrambling functions to obfuscate DRAM addressing, which complicates DRAM-aware performance optimizations and hinders proactive security analysis of DRAM-based attacks; most notably, Rowhammer. Although previous work tackled the issue of reversing physical-to-DRAM mapping, existing heuristic-based reverse-engineering approaches are partial, costly, and impractical for comprehensive recovery. This paper establishes a rigorous theoretical foundation and provides efficient practical algorithms for black-box, complete physical-to-DRAM address-mapping recovery.We first formulate the reverse-engineering problem within a linear algebraic model over the finite field GF(2). We characterize the timing fingerprints of row-buffer conflicts, proving a relationship between a bank addressing matrix and an empirically constructed matrix of physical addresses. Based on this characterization, we develop an efficient, noise-robust, and fully platform-agnostic algorithm to recover the full bankmask basis in polynomial time, a significant improvement over the exponential search from previous works. We further generalize our model to complex row mappings, introducing new hardware-based hypotheses that enable the automatic recovery of a row basis instead of previous human-guided contributions.Evaluations across embedded and server-class architectures confirm our method's effectiveness, successfully reconstructing known mappings and uncovering previously unknown scrambling functions. Our method provides a 99% recall and accuracy on all tested platforms. Most notably, Knock-Knock runs in under a few minutes, even on systems with more than 500GB of DRAM, showcasing the scalability of our method. Our approach provides an automated, principled pathway to accurate DRAM reverse engineering

    Correctly rounded evaluation of a function: why, how, and at what cost?

    No full text
    The two accompanying files are: - The SageMath code computing upper bounds for the hardness to round of exp, trigonometric and hyperbolic functions over the firstfew binades surrounding 1;- the LACoR library that implements the BH algorithm for computing upper bounds on the hardness to roundInternational audienceThe goal of this article is to give a survey on the various computational and mathematical issues and progress related to the problem of providing efficient correctly rounded elementary functions in floating-point arithmetic. We also aim at convincing the reader that a future standard for floating-point arithmetic should require the availability of a correctly rounded version of a well-chosen core set of elementary functions. We discuss the interest and feasibility of this requirement

    Internal control of the transition kernel for stochastic lattice dynamics

    No full text
    International audienceIn [5], we have designed impulsive and feedback controls for harmonic chains with a point thermostat. In this work, we study the internal control for stochastic lattice dynamics, with the goal of controlling the transition kernel of the kinetic equation in the limit. A major novelty of the work is the introduction of a new geometric combinatorial argument, used to establish paths for the controls

    Algorithms and Lower Bounds for the Maximum Overlap of Two Polygons Under Translation

    No full text
    International audienceA fundamental problem in shape matching and geometric similarity is computing the maximum area overlap between two polygons under translation. For general simple polygons, the best-known algorithm runs in O((nm)2log(nm))O((nm)^2 \log(nm)) time [Mount, Silverman, Wu 96], where nn and mm are the complexities of the input polygons. In a recent breakthrough, Chan and Hair gave a linear-time algorithm for the special case when both polygons are convex. A key challenge in computational geometry is to design improved algorithms for other natural classes of polygons. We address this by presenting an O((nm)3/2log(nm))O((nm)^{3/2} \log(nm))-time algorithm for the case when both polygons are orthogonal. This is the first algorithm for polygon overlap on orthogonal polygons that is faster than the almost 30 years old algorithm for simple polygons. Complementing our algorithmic contribution, we provide kk-SUM lower bounds for problems on simple polygons with only orthogonal and diagonal edges. First, we establish that there is no algorithm for polygon overlap with running time O(max(n2,nm2)1ε)O(\max(n^2,nm^2)^{1-\varepsilon}), where mnm\leq n, unless the kk-SUM hypothesis fails. This matches the running time of our algorithm when n=mn=m. We use part of the above construction to also show a lower bound for the polygon containment problem, a popular special case of the overlap problem. Concretely, there is no algorithm for polygon containment with running time O(n2ε)O(n^{2-\varepsilon}) under the 33-SUM hypothesis, even when the polygon to be contained has m=O(1)m=O(1) vertices. Our lower bound shows that polygon containment for these types of polygons (i.e., with diagonal edges) is strictly harder than for orthogonal polygons, and also strengthens the previously known lower bounds for polygon containment. Furthermore, our lower bounds show tightness of the algorithm of [Mount, Silverman, Wu 96] when m=O(1)m=O(1)

    Toughness Properties of Arbitrarily Partitionable Graphs

    No full text
    International audienceDrawing inspiration from a well-known conjecture of Chv\'atal on a toughness threshold guaranteeing graph Hamiltonicity, we investigate toughness properties of so-called arbitrarily partitionable (AP) graphs, which are those graphs that can be partitioned into arbitrarily many connected graphs with arbitrary orders, and can be perceived as a weakening of Hamiltonian and traceable graphs. In particular, we provide constructions of non-AP graphs with toughness about 54\frac{5}{4}, \textit{i.e.}, in which, when removing the vertices of any cut-set SS, the number of resulting connected components is at most about 45S\frac{4}{5} |S|. We also consider side related questions on graphs that can be partitioned arbitrarily into only a few connected graphs (with arbitrary orders). Among other things, we prove that not all 11-tough graphs can always be partitioned into four connected graphs this way. As going along, we also raise several other questions and problems of interest on the topic

    Nondeterminism in Interactive Markov Chains, with Application to the Erlangen Mainframe

    No full text
    International audienc

    The Harmonious Coloring Game

    No full text
    International audienceA harmonious k-coloring of a graph G is a 2-distance proper k-coloring of its vertices such that each edge is uniquely identified by the colors of its endpoints. Here, we introduce its game version: the harmonious coloring game. In this two-player game, Alice and Bob alternately select an uncolored vertex and assigns to it a color in {1,...,k} with the constraint that, at every turn, the set of colored vertices induces a valid partial harmonious coloring. Alice wins if all vertices are colored; otherwise, Bob wins. The harmonious game chromatic number χhg(G)\chi_{hg}(G) is the minimum integer k such that Alice has a winning strategy with kk colors. In this paper, we prove the PSPACE-hardness of three variants of this game. As a by-product, we prove that a variant introduced by Chen et al. in 1997 of the classical graph coloring game is PSPACE-hard even in graphs with diameter two. We also obtain lower and upper bounds for χhg(G)\chi_{hg}(G) in graph classes, such as paths, cycles, grids and forests of stars

    A graph discretization of vector Laplacian

    No full text
    International audienc

    59,760

    full texts

    120,049

    metadata records
    Updated in last 30 days.
    INRIA a CCSD electronic archive server is based in France
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇