Hugues Mercier

Hugues Mercier
Université de Neuchâtel | UniNE · Institut de mathématiques (IMA)

About

45
Publications
6,940
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
520
Citations

Publications

Publications (45)
Article
We design, describe and implement a statistical engine to analyze the performance of gymnastics judges with three objectives: (1) provide constructive feedback to judges, executive committees and national federations; (2) assign the best judges to the most important competitions; (3) detect bias and persistent misjudging. Judging a gymnastics routi...
Article
This article highlights the tension that lies between the General Data Protection Regulations (GDPR’s) security and minimization principles. The implementation of state-of-the-art technologies, such as entanglement or blockchains, offers promising opportunities for data controllers to guarantee the security of the data they process, particularly in...
Preprint
Full-text available
Permissioned blockchains are supported by identified but individually untrustworthy nodes, collectively maintaining a replicated ledger whose content is trusted. The Hyperledger Fabric permissioned blockchain system targets high-throughput transaction processing. Fabric uses a set of nodes tasked with the ordering of transactions using consensus. A...
Preprint
Judging a gymnastics routine is a noisy process, and the performance of judges varies widely. In collaboration with the F\'ed\'eration Internationale de Gymnastique (FIG) and Longines, we are designing and implementing an improved statistical engine to analyze the performance of gymnastics judges during and after major competitions like the Olympic...
Preprint
The monitoring of judges and referees in sports has become an important topic due to the increasing media exposure of international sporting events and the large monetary sums involved. In this article, we present a method to assess the accuracy of sports judges and estimate their bias. Our method is broadly applicable to all sports where panels of...
Preprint
National bias in sports judging is a well-known issue and has been observed in several sports: judges, in the aggregate, give higher marks to athletes of the same nationality. In this work, we study the national bias of international gymnastics judges during the 2013-2016 Olympic cycle. As opposed to prior work, our analysis leverages the intrinsic...
Article
We present STEP-archives, a novel and practical data archival architecture where an attacker who wants to censor or tamper with a data object must cause obvious collateral damage to a large number of other objects in the system. We use MDS erasure codes to entangle unrelated data blocks and provide redundancy against storage failures, which results...
Article
Full-text available
We consider the problem of reliable epidemic dissemination of a rumor in a fully connected network of~$n$ processes using push and pull operations. We revisit the random phone call model and show that it is possible to disseminate a rumor to all processes with high probability using $\Theta(\ln n)$ rounds of communication and only $n+o(n)$ messages...
Conference Paper
Full-text available
We consider the problem of reliable gossip/epidemic dissemination in a network of n processes using push and pull algorithms. We generalize the random phone call model so that processes can refuse to push a rumor or answer pull requests. With this relaxation, we show that it is possible to disseminate a rumor to all processes with high probability...
Conference Paper
The exponential growth of data produced, the ever faster and ubiquitous connectivity, and the collaborative processing tools lead to a clear shift of data stores from local servers to the cloud. This migration occurring across different application domains and types of users---individual or corporate---raises two immediate challenges. First, out-so...
Article
Full-text available
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale distributed applications running across multiple administrative domains. Pub/sub allows event-based information dissemination based on constraints on the nature of the data rather than on pre-established communication channels. It is a natural fit for deployment in...
Chapter
Erasure codes have been widely used over the last decade to implement reliable data stores. They offer interesting trade-offs between efficiency, reliability, and storage overhead. Indeed, a distributed data store holding encoded data blocks can tolerate the failure of multiple nodes while requiring only a fraction of the space necessary for plain...
Conference Paper
Content-based publish/subscribe (pub/sub) is an appealing information dissemination paradigm for distributed systems. Consumers of data subscribe to a pub/sub service, typically offered through a distributed broker overlay, and indicate their interests as constraints over the information content. Publishers generate the information flow, which the...
Conference Paper
The ordering of events is a fundamental problem of distributed computing and has been extensively studied over several decades. From all the available orderings, total ordering is of particular interest as it provides a powerful abstraction for building reliable distributed applications. Unfortunately, deterministic total order algorithms scale poo...
Article
Content-based publish/subscribe provides a loosely-coupled and expressive form of communication for large-scale distributed systems. Confidentiality is a major challenge for publish/subscribe middleware deployed over multiple administrative domains. Encrypted matching allows confidentiality-preserving content-based filtering but has high performanc...
Conference Paper
Soft source decoders, in conjunction with error correcting channel codes, can be used to improve the error resilience of digital communication systems based on variable length codes. In this paper, we present a novel approach to reduce the complexity of maximum a posteriori variable length decoders implemented on a bit-symbol trellis. The decoding...
Conference Paper
Content-based routing is widely used in large-scale distributed systems as it provides a loosely-coupled yet expressive form of communication: consumers of information register their interests by the means of subscriptions, which are subsequently used to determine the set of recipients of every message published in the system. A major challenge of...
Conference Paper
Content-based publish/subscribe is an attractive paradigm for designing large-scale systems, as it decouples producers of information from consumers. This provides extensive flexibility for applications, which can use a modular architecture. Using this architecture, each participant expresses its interest in events by means of filters on the conten...
Conference Paper
Content-based publish/subscribe is an appealing paradigm for building large-scale distributed applications. Such applications are often deployed over multiple administrative domains, some of which may not be trusted. Recent attacks in public clouds indicate that a major concern in untrusted domains is the enforcement of privacy. By routing data bas...
Article
We study the capacity of discrete memoryless channels with synchronization errors and additive noise. We first show that with very large alphabets, their capacity can be achieved by independent and identically distributed input sources, and establish proven tight lower and upper capacity bounds. We also derive tight numerical capacity bounds for ch...
Conference Paper
We study the capacity of discrete memoryless channels with synchronization errors and additive noise. We show that with very large alphabets, their capacity can be achieved by i.i.d. input sources, and prove tight lower and upper capacity bounds. An interesting result is that as long as the input sequences are not completely deleted, the capacity o...
Article
Full-text available
We present a comprehensive survey of error-correcting codes for channels corrupted by synchronization errors. We discuss potential applications as well as the obstacles that need to be overcome before such codes can be used in practical systems.
Conference Paper
This correspondence studies convolutional codes for channels with deletion errors. We show that the Viterbi decoding algorithm can be modified to correct deletion errors and prove that it is able to find the closest codeword from the received sequence. The computational complexity of the algorithm is comparable to the complexity of the original Vit...
Article
In this paper, we analyze the effect of the wormhole attack on shortest-path routing protocols for wireless ad hoc networks. Using analytical and simulation results, we show that a strategic placement of the wormhole when the nodes are uniformly distributed can disrupt/control on average 32% of all communications across the network. We also analyze...
Article
In the interactive communication model, two parties and possess respective private but correlated inputs and , and wants to learn from while minimizing the communication required for the worst possible input pair . Our contribution is the analysis of four nonzero-error models in this correlated data setting. In the private coin randomized model, bo...
Article
We consider the problem of finding the number of subsequences when deleting symbols from a string. We present a framework to find closed-form expressions for the number of subsequences, and use it to prove the first explicit formulas for and the first formulas for nonbinary alphabets. We also present the first efficient algorithm to compute the num...
Conference Paper
Full-text available
The cognitive radio (CR) technology will allow a group of potential users to identify and access available spectrum resources provided that the interference to the users for whom the band has been licensed is kept below a prescribed level. However, this research area is at a very immature stage because various research challenges have to be address...
Conference Paper
Cognitive radio is an innovative technology proposed to increase spectrum usage by allowing dynamic allocation of the unused spectrum in changing environments. Cognitive users monitor the spectrum and are allowed to use it as long as it does not interfere with the primary users to whom it has been licensed. In this paper, we describe how some well...
Conference Paper
The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing protocols. Using analytical and simulation results, we show that a strategic placement of the wormhole can disrupt on average 32% of all communications across the network. W...
Conference Paper
In the interactive communication model, two distant parties possess correlated inputs such as strings of bits, and the goal is for one party to learn his interlocutor's input while minimizing the communication. Our main contribution is to analyze the power of randomization in this correlated data setting. We show that the deterministic, amortized d...
Article
Full-text available
Emerging demands for high data rate services and high spectral efficiency are the key driving forces for the con-tinued technology evolution in wireless communications. Third generation (3G) mobile communication systems have already been commercially deployed in certain parts of the world to meet the initial demand for high data rate packet-based s...
Article
Synchronization is a problem of fundamental importance for a wide range of practical communication systems including reading media, multi-user optical channels, synchronous digital communication systems, packet-switched communication networks, distributed computing systems, etc. In this thesis I study various aspects of communication over channels...

Network

Cited By

Projects

Project (1)