Information and Communication Technology 2012 Académie universitaire Louvain
AL INFORMATION AND COMMUNICATION TECHNOLOGY 2012
The Académie universitaire Louvain (AL) is a university consortium composed of the following three academic institutions: University of Namur (FUNDP), University faculties of Saint-Louis, Brussels (FUSL) and Université catholique de Louvain (UCL).
In this particular case, this brochure « ICT » has been prepared by the Research Administration Departments of the FUNDP and the UCL only, with the valuable help of a peer review committee composed of:
UÊ Ê ÀÊ ,V >À`Ê i>ÕvÀÌ]Ê 1 Ê qÊ Õ>Ê -iVÌÀ]Ê ÃÌÌÕÌÊ >}>}iÊ iÌÊ Communication (IL&C) UÊ Ê*Àv°Ê"ÛiÀÊ >ÛiÌÕÀi]Ê1 ÊqÊ-ViViÊ>`Ê/iV }ÞÊ-iVÌÀ]ÊÃÌÌÕÌiÊ of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM) UÊ Ê*Àv°Ê*iÀÀiÊ>ÃÌÀiâ]Ê1 ÊqÊÕ>Ê-iVÌÀ]ÊÃÌÌÕÌÊ>}>}iÊiÌÊ Õ cation (IL&C) UÊ Ê*Àv°Ê À>XÃÊ ÕÃÃ]Ê 1 ÃÊ qÊ Õ>Ê -iVÌÀ]Ê ÕÛ>Ê -V Ê vÊ Management (LSM) UÊ Ê*Àv°Ê iÀ>À`Ê >iâ]Ê 1 Ê qÊ Õ>Ê -iVÌÀ]Ê ÕÛ>Ê ÀÕ}Ê ,iÃi>ÀV Ê Institute (LDRI) UÊ Ê*Àv°Ê >Ê>LÀ>]Ê1 *ÊqÊ>VÕÌÞÊvÊ «ÕÌiÀÊ-ViVi]Ê*,i - Ê,iÃi>ÀV Ê Centre UÊ Ê*Àv°Êi> >ÀiÊ>VµÕiÌ]Ê1 *ÊqÊ>VÕÌÞÊvÊ «ÕÌiÀÊ-ViViÃÊVÕÃÊ ,iÃi>ÀV ÊÀÕ« UÊ Ê*Àv°Ê Êii]Ê1 ÊqÊ i`V>Ê-iVÌÀ]ÊÃÌÌÕÌÊ`iÊÀiV iÀV iÊiÝ«jÀiÌ>iÊ et clinique (IREC) UÊ Ê*Àv°Ê V iÊ6iÀiÞÃi]Ê1 ÊqÊ-ViViÊ>`Ê/iV }ÞÊ-iVÌÀ]ÊÃÌÌÕÌiÊvÊ Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM)
7Ì ÊÌ iÊVÌÀLÕÌÊv\Ê-jL>ÃÌiÊ`>Ê1 ®]Ê iÀ>À`Ê iÌÀiLiÕÀÊ1 *®]Ê ÀÃÌiÊÕÞÌÊ1 ®]Ê Sandrine Tichon (UCL), Alain Tondeur (UCL-Mons)
Cover: © Mike Kiev - fotolia.com
Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY
Foreword
Ê£nÓ]ÊÌ iÊÌÌiÊvʺ >ÊvÊÌ iÊ9i>À»]Ê`iÛiÀi`ÊLÞÊ/iÊ>}>âiÊ >ÃÊÌÊLiiÊ>Ü>À`i`ÊÌÊ>Ê«iÀÃÊLÕÌÊÌÊ>Ê machine: the computer. Slightly later on, the computer manufacturer Sun promoted the idea that “the network was the computer”. Nowadays, we are used to terms like “pervasive computing”, “ubiquitous computing”, “cloud V«ÕÌ}»]Ê>`ʺ>LiÌÊÌi}iVi»]ÊÌÊVÌiÊ>ÊviÜ°Ê/ iÃiÊ>ÀiÊÕÃÌÊÃiÛiÀ>Ê`V>ÌÃÊÌ >ÌÊvÀ>ÌÊÌiV }iÃÊ >ÀiÊiÛiÀÞÜ iÀiÊÊÕÀÊvi°Ê"iÊV>ÊiÛiÊvÕÀÌ iÀÊV>ÊÌ >ÌÊÜÌ ÕÌÊÌ iÃiÊÌiV }iÃ]ÊÕÀÊ`iÀÊÃViÌiÃÊVÕ`Ê not function properly. In fact, would it be imaginable to live or even to survive without mobile phones, access to the internet, sophisticated machines at hospitals and electronic payments?
ÊÌ ÃÊVÌiÝÌ]ÊÌ ÃÊLÀV ÕÀiÊ«ÀiÃiÌÃÊÌ iÊÀiÃi>ÀV ÊV`ÕVÌi`ÊÊvÀ>ÌÊ>`ÊVÕV>ÌÊÌiV }iÃÊÃ`iÊ the “Académie universitaire Louvain”, by the Université catholique de Louvain and the University of Namur. As will be appreciated by the reader, the brochure does not focus only on the technologies themselves but also encompasses work on its impact on society. In doing so, we follow the humanistic approach of the two universities which aims at not only developing science but also at being concerned with its role in our everyday life. As a result, our research has generated many spin-off companies and has created strong links with regional technological centers, such as Multitel and Cetic, with industrial clusters, like Infopole and Twist, as well as with many research laboratories in the world.
The brochure is structured in 13 chapters and tackles various domains, such as society and law, human computer interaction, bioinformatics, micro and nano-technologies1, applied electromagnetism, electronic circuits, signal and >}iÊ«ÀViÃÃ}]ÊiÌÜÀÃ]ÊVÀÞ«Ì}À>« Þ]ÊÃiVÕÀÌÞ]ÊVÌÀ]Ê«Ìâ>Ì]Ê>À}iÊ}À>« Ã]Ê } «iÀvÀ>ViÊV«ÕÌ}]Ê machine learning, artificial intelligence, natural language processing, software engineering, programming, formal methods, databases and information systems. This multitude of research activities demonstrates a strong, dynamic and international presence of the “Académie universitaire Louvain” in the field of information and communication ÌiV }iðÊÃÊÃÕV ]ÊÌ iÊ>ÊvÊÌ ÃÊLiÌÊÃÊÌÊ«ÀÛ`iÊÌ iÊÀi>`iÀÊÜÌ Ê>ÊÕ«Ì`>ÌiÊÛiÜÊvÊÌ ÃÊiÝ«iÀÌÃiÊ>`Ê will undoubtedly ease its transfer to industry and society.
i> >ÀiÊ>VµÕiÌ Chairman of the Peer-review Committee
1 Detailed in the brochure “Nanotechnologies 2011”.
3 4 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY
Content
A. COMMUNICATION SYSTEMS AND B. SOFTWARE ENGINEERING, NETWORKS PROGRAMMING SYSTEMS AND FORMAL METHODS
A.1 - Cellular and wireless access networks 11
B.1 - Software Evolution 27 °Ê- 1 , °Ê -]Ê°Ê"< " A.2 - SIP-based Communication Networks and
Services 13 B.2 - Context-Sensitive Software 29
°Ê- 1 , °Ê -]Ê-°Ê" < <
A.3 - Internet protocols 15 B.3 - Software Variability 31
"°Ê " 6 /1, °Ê -]Ê°Ê"< "]Ê-°Ê" < <
A.4 - Management and operation of IP networks 17 B.4 - Programming Languages and Distributed
Computing 33 "°Ê " 6 /1, *°Ê6 Ê,"9 A.5 - Signal processing and Information theory for
Wired Communications (DSL and PLC) 19 B.5 - Coordination and mobile languages 35
°Ê"16 18]Ê°Ê6 ",* ° °Ê +1 /]Ê°Ê
A.6 - Satellite Communications 21 B.6 - Program analysis and verification 37
°Ê" -/ -]Ê °Ê6 " , 6 , 7°Ê6 ""
A.7 - Wireless Communications 23 B.7 - Evolution / Software Product Line
Engineering 39 °Ê"16 18]Ê °Ê" -/ -]Ê°Ê6 ",* ]Ê °Ê , 9 *°Ê 9 -]Ê*°9°Ê- " -]Ê°Ê* ,,"1
A.8 - Antenna technology 25
B.8 - Requirements Engineering 41 °Ê , 9 ]Ê °Ê6 " , 6 ,]Ê°Ê19 ]Ê°*°Ê,- *°Ê 9 -]Ê*°9°Ê- " -]Ê-°Ê1 ,]Ê°Ê1, /
5 B.9 - Real-Time System Verification 43 B.18 - Multi-Agent Systems Architectures 61
*°9°Ê- " - °Ê"*]Ê9°Ê71/ /
B.10 - Service Engineering 45 B.19 - Software Quality – Software Measurement 63
°Ê "1 "1< ]Ê° °Ê " ]Ê-°Ê1 ,]Ê°Ê1, /]Ê*°Ê/, °Ê ,]Ê°Ê -/18
B.11 - Communities of Web services 47 *°Ê/, C. INFORMATION SYSTEMS AND DATABASES B.12 - Information System Evolution 49
°Ê 6 ]Ê°°Ê 1/]Ê*°9°Ê- " -]Ê*°Ê 9 - C.1 - Intelligent Decision Support Systems 65
° °Ê +1 /]Ê°Ê B.13 - Security / Identity and Access Management in complex software environments 51 C.2 - Information Management, Knowledge ° °Ê " Extraction and Business Intelligence 67
I. LINDEN B.14 - Model Driven Engineering / Domain Specific
Modelling Languages 53 C.3 - Web Information Systems and 6°Ê ,/ Technologies 69
°Ê "1 "1< ]Ê°°Ê 1/]Ê*°Ê/, B.15 - Model Driven Engineering /
Software Architecture 55 C.4 - E-Health Information Systems 71 6°Ê ,/]Ê°Ê 6 *°Ê/, ]Ê°°Ê 1/]Ê*°9°Ê- " -]Ê°Ê 6 ]Ê6°Ê ,/]Ê ° °Ê " ]Ê°,°Ê ," 18 B.16 - Formal Analysis and Verification of Computer
Systems 57 C.5 - Special Purpose Database Engineering 73
°Ê* 1, °°Ê 1/]Ê °Ê" /]Ê,°Ê6 - / ]Ê°,°Ê ," 18
B.17 - Model-Driven Requirements Engineering 59 C.6 - Database Reverse Engineering 75
°Ê6 Ê -7 , °°Ê 1/]Ê6°Ê ,/]Ê°Ê 6
6 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY
C.7 - Database Design 77 E. LARGE GRAPHS AND NETWORKS
°°Ê 1/]Ê6°Ê ,/]Ê°Ê 6 E.1 - Classification, analysis and clustering of
C.8 - Business IT Alignment 79 graphs and networks 93
°Ê -/18]Ê °Ê* // *°°Ê -]Ê6°Ê " ]Ê° °Ê 6 ]Ê°Ê , 8]Ê,°Ê1 ,-]Ê 9°Ê -/ ,"6]Ê*°Ê6 Ê "",
C.9 - Business Modelling 81 E.2 - Graphs and network algorithms for mobile °Ê"*]Ê9°Ê71/ / telecommunication 95
6°Ê " ]Ê*°Ê6 Ê "", C.10 - E-Business Applications 83
°Ê"*]Ê9°Ê71/ / E.3 - Space and time in large-scale social
networks 97
,°Ê "// D. ELECTRONIC CIRCUITS AND SYSTEMS
E.4 - Multi-modal freight transport network
D.1 - Digital circuits and systems 85 modelling 99
°Ê , ]Ê° °Ê /]Ê,°8°Ê-/ ,/]Ê °Ê " °Ê"1,+1 ]Ê °Ê 1/
D.2 - Wireless autonomous smart sensor networks 87 F. SIGNAL AND IMAGE PROCESSING °Ê , ]Ê°*°Ê,- ]Ê °Ê , 9 ]Ê°Ê6 ",* ]Ê° °Ê /]Ê °Ê "]Ê°Ê, -]Ê °Ê" -/ -]Ê,°8°Ê-/ ,/ F.1 - Sparse Signal Reconstructions for Optical
D.3 - Green electronics: SOI technology and ultra- Imaging 101 low-power design 89 *°Ê /" ]Ê °Ê +1 -]Ê °Ê Ê 6 - "17 ,]Ê °Ê ", /]Ê °Ê + °Ê "]Ê °Ê , ]Ê° °Ê /
F.2 - Video signal analysis 103 D.4 - Software based hardening against radiation 91 °Ê Ê6 - "17 ,]Ê °Ê + °Ê"
7 F.3 - Stereo Image Compression 105 H.3 - Modelling, analysis and control of distributed
,°Ê ,<]Ê °Ê Ê6 - "17 ,]Ê °Ê + parameter systems 119 °Ê7 F.4 - Digital 2D, 3D and Stereo Image
Watermarking 107 H.4 - Process Modelling, Monitoring, Control and
,°Ê ,<]Ê °Ê + Real-Time Optimisation 121 °Ê "
G. CRYPTOGRAPHY AND INFORMATION SECURITY I. HUMAN-COMPUTER INTERACTION
G.1 - Information Security 109 I.1 - Cognitive Consequences of Technology 123
°Ê6" °-°Ê ", ]Ê/°Ê Ê- /]Ê*°Ê-/, <]Ê*°Ê6 ,
G.2 - Physical Security 111 I.2 - Interfaces for disabled 125
,°8°Ê-/ ,/ -°Ê ,
G.3 - Secure protocols 113 I.3 - Immersive Virtual Environment 127
"°Ê* , , °Ê 7, -]Ê °Ê +]Ê °Ê* - /]Ê*°Ê***"/
I.4 - Engineering of User Interfaces 129
H. DYNAMICAL SYSTEMS, CONTROL, °Ê 6 , " /]Ê °Ê "9 // ]Ê °Ê °Ê " < <Ê ,"-]Ê OPTIMIZATION ,°Ê/ -", ,"
H.1 - Optimisation: modelling and algorithms 115
*°°Ê -]Ê,°Ê 1,]Ê9°Ê -/ ,"6]Ê °Ê6 Ê696
H.2 - Multi-agent systems 117
°Ê , 8]Ê,°Ê1 ,-]Ê° °Ê 6
8 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY
J. MACHINE LEARNING, ARTIFICIAL K.2 - Machine learning for biomedical
INTELLIGENCE AND NATURAL applications 143 LANGUAGE PROCESSING °Ê6 , 9- ]Ê*°Ê 1*" /]Ê°Ê°Ê
J.1 - Automated analysis of foreign language K.3 - Medical imaging 145 learner writing and speech 131 °Ê +]Ê6°Ê "-]Ê°Ê +1 -]Ê°Ê -- -]Ê°Ê", Ê Ê86,9 -°Ê , ,]Ê 9°Ê -/ ]Ê -°Ê Ê " ]Ê °Ê +1 ]Ê °Ê 1 ,]Ê °Ê*+1"/
J.2 - Constraint Programming 133 L. ICT: SOCIETY AND LAW
9°Ê 6 L.1 - Impacts of hybrid pedagogical environments
J.3 - Graph Analysis and Web Mining 135 on learning and teaching quality 147
*°Ê 1*" /]Ê,°Ê"1--]Ê°Ê*,"// ]Ê °Ê- , - °Ê ,1 ]Ê,°Ê " +]Ê*°Ê , ,]Ê,°Ê ]Ê °Ê- /-
J.4 - Machine learning: feature selection and L.2 - Ethical governance of information dimensionality reduction 137 technology 149
*°Ê 1*" /]Ê°Ê°Ê ]Ê °Ê6 , 9- ]Ê6°Ê7 ,/< *°Ê"1" ]Ê-°Ê, 9]Ê°Ê - /
J.5 - From noisy to standard written language – L.3 - Privacy By Design 151 statistical rewrite, correction and alignment °Ê" / ,-]Ê °Ê Ê/ ,7 ]Ê° °Ê6 Ê9- methods 139
,°Ê 1",/ L.4 - Telecommunications Regulation 153
,°Ê+1 ]Ê° °Ê ,/]Ê°Ê Ê-/,
K. BIOMEDICAL ENGINEERING & L.5 - Social Networking Sites 155 BIOINFORMATICS °Ê ]Ê °Ê" / ,-]Ê°*°Ê " 9
K.1 - Statistical methods for the analysis of microarray data 141 L.6 - Policy and legal issues of the Internet 157
°°Ê]Ê °Ê +]Ê °Ê ,<//"]Ê°Ê ,"- ]Ê°Ê," ,/ -°Ê 1-" ,]Ê °Ê Ê/ ,7 ]Ê °Ê " / ,"]Ê9°Ê*"1 /]Ê,°Ê+1
9 L.7 - E-Health: Legal aspects 159 M.3 - Web-based environments for English use in
°Ê ,6 ]Ê° °Ê6 Ê9- professional and academic settings 175 -°Ê, ,]Ê °Ê*+1"/
L.8 - E-Archiving and Records Management 161
°Ê " / ,"]Ê °Ê "1 M.4 - A world-wide computing grid for LHC data analysis 177
L.9 - Copyright and the Internet 163 °Ê ,1 "]Ê*°Ê ]Ê6°Ê /,
-°Ê 1-" ,]Ê °Ê ,]Ê °Ê " M.5 - UCL Crypto Group 179
L.10 - Legal Aspects of Cloud Computing 165 "°Ê* , ,]Ê,°8°Ê-/ ,/
*°Ê1, /]Ê° °Ê6 Ê9- ]Ê°*°Ê " 9 M.6 - Wallonia ELectronics and COmmunications
L.11 - E-Government 167 MEasurements A facility making a bridge from molecules to °Ê Ê/ ,7 ]Ê °Ê" / ,-]Ê °Ê ,6 ]Ê °Ê "1 signals 181
L.12 - Technology Assessment & Governance 169 °Ê19
°Ê, ]Ê °Ê" / ,-]Ê°,"16,"9 M.7 - Decision aid models for Supply Chain and
Operations Management 183
*°Ê, ]Ê*°Ê 6 ,]Ê*°Ê- ]Ê°-°Ê/ , <]Ê °Ê6 Ê696 M. FACILITIES (CENTERS AND PLATEFORMS) M.8 - Molecular Imaging, Radiotherapy, and
Oncology 185 M.1 - Calcul Intensif et de Stockage de Masse 6°Ê , ", ]Ê *°Ê - /]Ê -°Ê 69 ,]Ê ,°Ê ,]Ê -°Ê *17 -]Ê (CISM) 171 °Ê ,]Ê°Ê "]Ê8°Ê /-]Ê°Ê°Ê ]Ê °Ê-/ ,* ]Ê6°Ê "
/°Ê 1/ ]Ê °Ê6 Ê, / , ]Ê°Ê- ]Ê °Ê, "- M.9 - Other research institutes, centres and
groups 187
M.2 - Interuniversity Scientific Computing
Facility 173
°*°Ê6 ," ]Ê °Ê * ]Ê"°Ê *,-]Ê°Ê ,, ]Ê*°Ê ]Ê °Ê*°Ê6 , 1/ , ]Ê,°Ê71/ /]Ê°Ê7"1/ ,-
10 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 1
Cellular and wireless access networks
SENIOR SCIENTIST: X >ÕÀiÌÊ- 1 ,
Research Field and Subjects Partnership
/ iÊÀiÃi>ÀV ÊÕÌÊÛiÃÌ}>ÌiÃÊÌ iÊ«>VÌÊvÊViÕ>ÀÊÎÉ-*ÊÊ X Université catholique de Louvain, Louvain-la-Neuve (Belgium) {É/ ®Ê >`Ê ÜÀiiÃÃÊ 7 8®Ê >VViÃÃÊ iÌÜÀÃÊ Ê *Ê ÌÀ>vwV°Ê X Universita Federico II, Naples (Italy) This involves the characterisation of the traffic flows and the X Aalborg University, Aalborg (Denmark) modelling of the system behaviour, in order to build up vanilla test beds emulating radio-based access networks in line with ÃÌ>`>À`Ã>ÌÊLÌ ÊÊ ÌÀÊ>`Ê >Ì>É1ÃiÀÊ*>iî° Main Equipment
The availability of such test beds enables the evaluation of the X Three computing nodes part of the worldwide PlanetLab +Õ>ÌÞÊ vÊ Ý«iÀiViÊ vÊ i`ÕÃiÀÊ >««V>ÌÃÊ Ü iÊ vviÀi`Ê testbed through a radio-based connection. X Ê7 8Ê>VViÃÃÊ«ÌÊÜÌ Ê */ÊiÝ«iÀiÌ>ÊViVi
/ iÊÀiÃi>ÀV ÊÕÌÊ >ÃÊ>ÃÊ}>Ì iÀi`ÊiÝ«iÀÌÃiÊÊV >À>VÌiÀÃ}Ê the end-user performance of such access networks. Products and Services
Characterisation and performance analysis of cellular and wireless Representative References access networks
X - 1 ,Ê °]Ê " Ê °]Ê /" Ê °]Ê *iÀvÀ>ViÊ Evaluation of Indoor Internet Access over a Test LTE Mini-Network, KEYWORDS 7* ½££Ê qÊ 7ÀiiÃÃÊ *iÀÃ>Ê ÕÌi`>Ê ÕV>ÌÃ]Ê -* 2011. LTE 7 8 X /" Ê °]Ê - 1 ,Ê °]Ê "vviÀ}Ê -ÌÀi>}Ê ,>ÌiÊ Testbed `>«Ì>ÌÊÌÊ Ê i`>Ê*>ÞiÀÃ]Ê ÊÓ䣣ÊqÊ7Àà «Ê Emulation ÊÌÊ/«VÃÊÊ ÕÌi`>Ê iÛiÀÞÊÌ ®]Ê2011. X /" Ê°]Ê- 1 ,Ê°]Ê i>ÃÕÀ}ÊÌ iÊ+ ÊvÊ-ÌÀi>}Ê -iÃÃÃ]Ê - 6/¿änÊ qÊ -Þ«ÃÕÊ Ê ÕV>ÌÃÊ >`Ê CONTACT 6i VÕ>ÀÊ/iV }ÞÊÊÌ iÊ iiÕÝ]Ê2008. Laurent SCHUMACHER X 6 ,*9* Ê°]Ê- 1 ,Ê°]Ê ÕÌÃÌÀi>Ê*À«ÀÌ>Ê [email protected] Tel. 32 (0)81 72 49 80 (secretary: 49 66) >ÀÊ *>ViÌÊ -V i`Õ}Ê Ê - *]Ê - 6/¿änÊ qÊ -Þ«ÃÕÊ Ê ÕV>ÌÃÊ >`Ê 6i VÕ>ÀÊ /iV }ÞÊ Ê Ì iÊ iiÕÝ]Ê
2008. WEB SITE http://www.fundp.ac.be/en/inf/irs/page_view/ presentation.html Funding
F.R.S.-FNRS, European (FP6), Wallonie.
11 12 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 2
SIP-based Communication Networks and Services
SENIOR SCIENTIST: X >ÕÀiÌÊ- 1 ,
Research Field and Subjects Representative References
SIP, whose acronym stands for Session Initiation Protocol, X ,"9Ê °]Ê - 1 ,Ê °]Ê -*Ê "ÛiÀ>`Ê ÌÀÊ /iÃÌLi`\Ê is a signalisation protocol enabling the establishment, the iÃ}]Ê Õ`}Ê >`Ê 6>`>ÌÊ /iÃÌÃ]Ê ¿££Ê qÊ ÃÕiÀÊ configuration, the update and the closing of communication Communications and Networking Conference, 2011. sessions like voice calls, instant messaging, videoconferencing, X 71/9Ê °°]Ê - 1 ,Ê °]Ê «iiÌ>ÌÊ >`Ê etc. SIP is the lingua franca of nowadays communicating *iÀvÀ>ViÊ vÊ >Ê *Ó*-*Ê ÃÌÀLÕÌi`Ê *ÀÝÞÉ,i}ÃÌÀ>À]Ê applications. -/¿äÇÊ qÊ ÌiÀ>Ì>Ê viÀiViÊ Ê iÝÌÊ iiÀ>ÌÊ Mobile Applications, Services and Technologies, 2007. As of today, SIP is natively used in a communication framework X 9Ê -°]Ê - 1 ,Ê °]Ê , ,-Ê °]Ê -iVÕÀÃ>ÌÊ V>i`Ê*Ê ÕÌi`>Ê-ÕLÃÞÃÌiÊ -®°Ê"À}>Þ]Ê -Ê >ÃÊLiiÊ of SIP Presence notifications thanks to the Belgian electronic developed within cellular network standardisation to ease the `iÌÌÞÊV>À`]Ê -/¿äÇÊqÊÌiÀ>Ì>Ê viÀiViÊÊ iÝÌÊ design and deployment of new value-added services. IMS helps to iiÀ>ÌÊ LiÊ ««V>ÌÃ]Ê -iÀÛViÃÊ >`Ê /iV }iÃ]Ê overcome the proprietary, vertically integrated service paradigm 2007. that has slowed down innovation in the Telco world for so many years. It aims at enabling a web-like service development (i.e. download and play) on communication terminals. Funding
SIP and IMS are very elegant solutions to deploy new IP-based F.R.S.-FNRS, Wallonie. telecommunication services. Thanks to numerous Requests For Comments (RFC), their standard description is quite detailed, but deployments quickly reveal significant shortcomings. Among Partnership them, one finds scalability, flow regulation and interoperability. /7Ê Ê ÀÃV Õ}ÃâiÌÀÕÊ /iiÕ>ÌÊ7i]Ê 6iiÊ Investigation of scalability in the orders of magnitude that (Autriche) really matter, typically thousands of nodes and more, cannot be «iÀvÀi`ÊÜÌ Ê>Ê`i`V>Ìi`ÊV«ÕÌiÀÊ«iÀÊ`i°Ê6ÀÌÕ>Ã>ÌÊ enables to reach this goal by emulating the behaviour of a Main Equipment significant number of competing nodes on a single computer. Three computing nodes part of the worldwide PlanetLab testbed To investigate interoperability, one should build an ecosystem populated with implementations from several vendors. Without >}Ê >ÌÊ Ài«À`ÕV}Ê ÃÕV Ê >Ê ÀV Ê iVÃÞÃÌiÊ >ÃÊ ÕÃÊ "«iÊ -Ê *>Þ}ÀÕ`]Ê Ì iÊ ÀiÃi>ÀV Ê ÕÌÊ Û>ÀÃiÃÊ iÝÃÌ}Ê VÌ>VÌÃÊ with industrial partners to gather implementations of their products in a single environment and to interface them with complementary open source systems.
13 KEYWORDS SIP IMS "ÛiÀ>` Testbed
CONTACT Laurent SCHUMACHER [email protected] Tel. 32 (0) 81 72 49 80 (secretary: 49 66)
WEB SITE http://www.fundp.ac.be/en/inf/irs/page_view/pre- sentation.html
14 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 3
Internet protocols
SENIOR SCIENTIST: X "ÛiÀÊ " 6 /1,
Research Field and Subjects X " Ê°]Ê-1 <Ê °Ê>`Ê " 6 /1, Ê"°]Ê«iiÌ}Ê Ì iÊ V>ÌÀÉ Ê -i«>À>ÌÊ *ÀÌV\Ê iÃ}Ê >`Ê Ý«iÀiVi°Ê During the last twenty years, the Internet evolved from a research Computer Networks, 55(4):948-958, March 2011. network that was only used by universities to become a global X ,,Ê-°]Ê," Ê°Ê>`Ê " 6 /1, Ê"°]Ê«iiÌ>ÌÊ >`Ê «iÀÛ>ÃÛiÊ iÌÜÀ°Ê / iÊ ÌiÀiÌÊ ÃÊ LÕÌÊ Õ«Ê Ì iÊ / *É*Ê >`Ê iÛ>Õ>ÌÊ vÊ Ì iÊ - ÈÊ «ÀÌVÊ Ê Ì iÊ ÕÝÊ iÀi°Ê protocol suite. This protocol suite is not static. New protocols Computer Communications, 2011. ÀÊiÝÌiÃÃÊÌÊÌ iÊiÝÃÌ}ÊiÃÊ>ÀiÊ`iÛi«i`]ÊÌiÃÌi`Ê>`]Ê X , 1Ê °]Ê ,,Ê -°]Ê *1 / Ê °]Ê , Ê °]Ê vÀÊÌ iÊÃÌÊÃÕVViÃÃvÕÊiÃ]ÊÃÌ>`>À`âi`Ê>`Ê`i«Þi`ÊÊÌ iÊ 7- Ê °Ê >`Ê 9Ê °]Ê «ÀÛ}Ê `>Ì>ViÌiÀÊ global Internet. «iÀvÀ>ViÊ >`Ê ÀLÕÃÌiÃÃÊ ÜÌ Ê ÕÌ«>Ì Ê / *°Ê- " Ê 2011, Toronto, Canada, August 2011. The main challenge in this R&D activity is to propose new X 6 Ê Ê- , Ê6°]Ê, "-Ê*°Ê>`Ê " 6 /1, Ê"°]Ê «ÀÌVÃÊÀÊiÝÌiÃÃÊÌ >ÌÊiVÕÌiÀÊ«ÀLiÃÊÌ >ÌÊV>ÌÊLiÊ *Ê``*>Ì Ã\Ê/ iÊ-V>}É*iÀvÀ>ViÊ/À>`ivvÃ°Ê ÊÕÀ>Ê ÃÛi`ÊLÞÊÕÃ}ÊiÝÃÌ}Ê«ÀÌVðÊ/ iÊ*ÊiÌÜÀ}Ê>LÊÜÌ Ê on Selected Areas in Communications, 28(8):1299 - 1307, Ì iÊ / Ê ÃÌÌÕÌiÊ >ÃÊ >VVÕÕ>Ìi`Ê >Ê ÌÊ vÊ iÝ«iÀiViÊ Ê "VÌLiÀÊ2010. designing, improving and implementing protocols, notably in X " 6 /1, Ê"°]Ê--Ê °Ê>`Ê, "-Ê*°]ÊV iÛ}Ê Ì iÊiÌÜÀÊ>`ÊÌÀ>ëÀÌÊ>ÞiÀÃÊvÊÌ iÊ/ *É*ÊÃÕÌi°Ê/ iÊ>LÊ -ÕLxäÊ ÃiV`ÃÊ,iVÛiÀÞÊ1«Ê *Ê*iiÀ}ÊÊ>ÕÀiÃ°Ê participates in all activities related to new Internet protocols. É Ê /À>Ã>VÌÃÊ Ê iÌÜÀ}]Ê £xx®\££ÓÎÊ Ê ££Îx]Ê These activities start with the design of new Internet protocols, "VÌLiÀÊ2007. LÕÌÊ >ÃÊ VÕ`iÊ Ì iÊ `iÛi«iÌÊ vÊ `iÃÊ ÌÊ >>ÞâiÊ Ì iÊ X , "-Ê*°Ê>`Ê " 6 /1, Ê"°]ÊÛ`}ÊÌÀ>ÃiÌÊ«ÃÊ performance of a particular protocol or the development of `ÕÀ}ÊÌ iÊVÛiÀ}iViÊvÊÃÌ>ÌiÊÀÕÌ}Ê«ÀÌVÃ°Ê É Ê open-source reference implementations. The lab also actively Transactions on Networking, 15(6):1280-1932, December 2007. «>ÀÌV«>ÌiÃÊÌÊÃÌ>`>À`â>ÌÊvÊ«ÀÌVÃÊÜÌ ÊÌ iÊÌiÀiÌÊ Engineering Task Force (IETF) and maintains strong cooperations with vendors of network equipment and network operators. Awards
In the transport layer, recent significant research results include " " ÊÓääÇÊLiÃÌÊ«>«iÀÊ>Ü>À` an active participation in the specification of Multipath TCP and the development of the first reference implementation in Ì iÊÕÝÊiÀi°ÊÊÌ iÊiÌÜÀÊ>ÞiÀ]ÊÌ iÊ>LÊ >ÃÊ>ÊÀiV}Ãi`Ê Funding iÝ«iÀÌÃiÊÊÌ iÊ`iÛi«iÌÊ>`ÊÌÕ}ÊvÊÀÕÌ}Ê«ÀÌVÃ°Ê It has also actively contributed to the development of the IPv6 The work on Internet protocols has been funded by the EC in ÃÌL>Ãi`Ê ÕÌ }Ê ÃÕÌÊ Ã È®Ê >`Ê Ì iÊ V>ÌÀÉ ÃiÛiÀ>Ê*ÇÊ«ÀiVÌÃ]ÊLÕÌÊ>ÃÊLÞÊ°,°-° ,-]Ê,]Ê7>iÊ>`Ê Identifier Separation Protocol (LISP). also directly by industry.
Representative References Partnership
X " 6 /1, Ê "°]Ê «ÕÌiÀÊ iÌÜÀ}\Ê *ÀV«iÃ]Ê X Cisco Systems Protocols and Practice, 2011. X }i X ,,Ê-°]Ê*- Ê °Ê>`Ê " 6 /1, Ê"°]Ê ÕÌ*>Ì Ê/ *\Ê X University College London ÀÊ/ iÀÞÊÌÊ*À>VÌVi°Ê*Ê iÌÜÀ}]Ê6>iV>]Ê >ÞÊ2011. X Université de Liège
15 Products and Services KEYWORDS Network Architecture and Design UCL researchers have contributed to various open-source Network Protocols implementations including:
CONTACT à ÈÊ\Ê ÌÌ«\ÉÉ°v°ÕV°>V°LiÉÃ È Olivier BONAVENTURE */ *ÊÕÝÊ\Ê ÌÌ«\ÉÉ°v°ÕV°>V°LiÉ«ÌV« "ÛiÀ° >ÛiÌÕÀiJÕVÕÛ>°Li "«i-*Ê\Ê ÌÌ«\ÉÉÜÜÜ°«ië°À} Tel. 32 (0)10 47 90 12
WEB SITES http://inl.info.ucl.ac.be http://www.uclouvain.be/icteam
16 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 4
Management and operation of IP networks
SENIOR SCIENTIST: X "ÛiÀÊ " 6 /1,
Research Field and Subjects Representative References
During the last decade the Internet Protocol (IP), sometimes X 6 6 ,Ê°]Ê6-- "Ê-°]Ê* -- ,Ê °]Ê, "-Ê*°Ê>`Ê associated with MultiProtocol Label Switching (MPLS), became " 6 /1, Ê "°]Ê -i>iÃÃÊ iÌÜÀ7`iÊ *Ê }À>ÌÃ°Ê the de-facto standard protocol to carry any type of data in *ÀVii`}ÃÊvÊÌ iÊÓä££Ê Ê- " Ê viÀiVi]Ê/ÀÌ]Ê enterprise and service provider networks. IP is now used to Canada, Aug. 2011. support Internet services, but also voice, video, gaming, and X /," Ê 6 /Ê ]Ê 6 Ê 9°]Ê " 6 /1, Ê "°Ê >`Ê various types of applications that depend on computing and , "-Ê *°]Ê /À>vwVÊ }iiÀ}Ê vÀÊ ÕÌ«iÊ -«>}Ê /ÀiiÊ storage resources in datacenter. Despite their importance, many Protocol in Large Data Centers. ITC 2011 23rd International IP networks are still managed and configured manually. This Teletraffic Congress, San Francisco, USA, September 2011. is not optimum and frequently causes problems that affect all X ,"9Ê °Ê >`Ê " 6 /1, Ê "°]Ê *Ài«>À}Ê iÌÜÀÊ users of the network. Large networks cannot continue to be Vw}ÕÀ>ÌÃÊ vÀÊ *ÛÈÊ ÀiÕLiÀ}°Ê ÌiÀ>Ì>Ê ÕÀ>Ê vÊ managed and configured manually. They must be controlled Network Management, Wiley InterScience, 19(5):415-426, by a specialised software that interacts with all the networking -i«Ì"VÌÊ2009. equipments. X 6 6 ,Ê°]Ê*, " Ê°Ê>`Ê " 6 /1, Ê"°]Ê/Ü>À`ÃÊ This research activity develops algorithms and techniques that Û>`>Ìi`Ê iÌÜÀÊ Vw}ÕÀ>ÌÃÊ ÜÌ Ê Õ>À`°Ê *ÀV°Ê vÊ enable network management platforms to better control the Internet Network Management Workshop 2008, pages 1-6, «iÀ>ÌÊ vÊ Ì iÊ iÌÜÀ°Ê /À>vwVÊ i}iiÀ}Ê ÃÊ >Ê iÝ>«iÊ "À>`]Ê1-]Ê"VÌLiÀÊ2008. of the benefits of using software to configure the network. X , "-Ê*°]Ê- Ê °Ê>`Ê " 6 /1, Ê"°]Ê ÃÀÕ«Ì Based on measurements collected in the network, another vÀiiÊÌ«}ÞÊÀiVw}ÕÀ>ÌÊÊ"-*Ê iÌÜÀÃ°Ê Ê " " ]Ê iÝ«iÀÌÃiÊ Ì >ÌÊ >ÃÊ LiiÊ `iÛi«i`Ê ÜÌ Ê Ì ÃÊ >VÌÛÌÞÊ ÃÊ >Ê Anchorage, USA, May 2007. optimisation algorithm. This algorithm determines the best X , "-Ê *°]Ê "-/ Ê *°°]Ê , Ê °Ê >`Ê " 6 iÌÜÀÊVw}ÕÀ>ÌÊÌ >ÌÊiiÌÃÊÌ iÊ«iÀvÀ>ViÊLiVÌÛiÃÊ /1, Ê"°]ÊÛ`}Ê`ÃÀÕ«ÌÃÊ`ÕÀ}Ê>Ìi>ViÊ«iÀ>ÌÃÊ vÊÌ iÊiÌÜÀ°ÊÊÃiV`ÊiÝ>«iÊÃÊÌ iÊÕÌÃ>ÌÊvÊÃvÌÜ>ÀiÊ Ê *Ê ÃiÃÃÃ°Ê Ê /À>Ã>VÌÃÊ Ê iÌÜÀÊ >`Ê -iÀÛViÊ engineering techniques to produce network configurations Management, 4(3):1-11, 2007. whose properties are known and that can be validated before Li}Ê ÃÌ>i`Ê Ã`iÊ Ì iÊ iÌÜÀ°Ê Ê Ì À`Ê iÝ>«iÊ ÃÊ Ì iÊ development of innovative techniques to enable a network to Awards be reconfigured without causing traffic disruptions and losing «>ViÌÃ°Ê Ì iÀÊ iÝ>«iÊ ÃÊ Ì iÊ ÃÕ««ÀÌÊ vÊ "«iyÜÊ Ê " " ÊÓääÇÊLiÃÌÊ«>«iÀÊ>Ü>À` networking equipment from various vendors. This will clearly lead to new network management and operation techniques. These techniques are also taught in the advanced networking Funding courses at UCL to encourage students to automate their network management and operations problems by using / ÃÊÀiÃi>ÀV Ê >ÃÊLiiÊvÕ`i`ÊLÞÊÌ iÊ ÊÊÃiÛiÀ>Ê*ÇÊ«ÀiVÌÃ]Ê appropriate software. but also by F.R.S.-FNRS, FRIA, Wallonie and also directly by industry.
17 Partnership KEYWORDS iÌÜÀÊ"«iÀ>ÌÃ X France Telecom Network management Network monitoring X Alcatel-Lucent X ÌiÀiÌÊÌ>ÌÛiÊ>«>
X University of Roma Tre CONTACT X Université de Liège Olivier BONAVENTURE "ÛiÀ° >ÛiÌÕÀiJÕVÕÛ>°Li Tel. 32 (0)10 47 90 12 Products and Services
WEB SITES 6>ÀÕÃÊÃvÌÜ>ÀiÊÌÃÊ >ÛiÊLiiÊ`iÛi«i`ÊÌÊ`i]ÊÌÀ>vwVÊ http://inl.info.ucl.ac.be engineer and configure networks, e.g.: http://www.uclouvain.be/icteam X Õ>À`\Ê iÌÜÀÊ w}ÕÀ>ÌÊ->vi}Õ>À`]Ê ÌÌ«\ÉÉ°v° ÕV°>V°LiÉ X *ÊÃÕ>ÌÀ]Ê ÌÌ«\ÉÉVL}«°ÃÕÀVivÀ}i°iÌÉ X /"/ ÊÌÀ>vwVÊi}iiÀ}ÊÌLÝ]Ê ÌÌ«\ÉÉÌÌi°v°ÕV°>V°Li
18 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 5
Signal processing and Information theory for Wired Communications (DSL and PLC)
SENIOR SCIENTISTS: X jÀiÊ"16 18 X ÕVÊ6 ",*
Research Field and Subjects X 1 Ê °]Ê"16 18Ê°]Ê6 ",* Ê°]Ê7/ Ê*°]Ê -Ê°]Ê* / ,-Ê °]ʺ"ÊÃ}>ÌÃiÊÀ>ÌÊ>ÃÃÃÌi`ÊVÀÃÃÌ>Ê Wired communications have become rather popular with the channel estimation in downstream DSL systems”, IEEE Trans. On advent of DSL technologies. These technologies will still evolve Signal Processing, vol. 58, No. 4, pp. 2327-2338, April 2010. in the future while other technologies are being considered, like X "16 18Ê °]Ê Ê °]Ê 1 Ê °]Ê -Ê °]Ê Ì iÊ«ÜiÀiÊVÕV>ÌÃÊ* ®°Ê7 iÊÃÕÌÃÊiÝÃÌÊvÀÊ * / ,-Ê °]Ê 6 ",* Ê °]Ê ºÊ - ,>ÃÃÃÌi`Ê VÀÃÃÌ>Ê both DSL and PLC, there is room for further optimisation, like channel estimation technique”, International Conference on coordination, fair resource allocation among users, adaptability, ÕV>ÌÃÊ ½ä®]Ê ÀiÃ`i]ÊiÀ>Þ]ÊÕiÊ2009, 5 pp. etc. X Ê °]Ê "16 18Ê °]Ê >`Ê 6 ",* Ê °]Ê “Enhancement of the iterative spectrum balancing qÊ >ÀÊÕÌÕÃiÀÊÀiÃÕÀViÊ>V>Ì\ÊvÀ>ÌÊÌ iÀÞ >}ÀÌ Ê vÀÊ «ÜiÀÊ >V>ÌÊ Ê -Ê ÃÞÃÌiû]Ê Ê L>Ê DSL and PLC can be looked at in the framework of multiple access, /iiVÕV>ÌÃÊ viÀiVi]Ê " " Ê Óään]Ê iÜÊ broadcast and interference channels. An important issue when "Ài>Ã]Ê1-]Ê««°Ê£x]Ê ÛiLiÀÊ2008. several users communicate simultaneously is the fair resource X -,/ ,Ê /°]Ê "16 18Ê °Ê >`Ê 6 ",* Ê °]Ê allocation among users. Different fairness criteria can be defined, “Balanced capacity of wireline multiuser channels with which lead to different solutions, bit rates, etc. In the framework individual power constraints”, IEEE Trans. on Communications, of cross layer design, research is conducted in this area. Û°ÊxÈ]Ê °]Ê««°ÓxÎÈ]ÊÈ]ÊÕiÊ2008. X 6 ,-Ê °]Ê"16 18Ê°Ê>`Ê6 ",* Ê°]ʺ ÌÊ>`Ê qÊ -}>ÊVÀ`>ÌÊ>`ÊVÀÃÃÌ>ÊV>Vi>Ì «ÜiÀÊ >V>ÌÊ vÀÊ }`«ÕÌÊ «Ìâ>ÌÊ Ê V`i`Ê «>À>iÊ Crosstalk has become one of the main sources of degradation ÃÕLV >iÃÊ ÜÌ Ê ,+»]Ê IEEE Trans. on Signal Processing, vÀÊ -ÊVÕV>ÌðÊÜiÛiÀ]ÊÌ iÊiÃÊÌ >ÌÊ>ÀiÊVÌ>i`Ê vol. 56, No. 8, August 2008, pp. 3652-3661 in a common bundle and that interfere with each other are also X "16 18Ê°Ê>`Ê6 Ê ,Ê6 Ê°°]ʺ ÀÀÀÊÃ}Êvii`L>VÊ often handled by the same equipment at the central office. Signal >ÃÊ >Ê >ÌiÀ>ÌÛiÊ ÌÊ «ÌÃÊ vÀÊ Ì iÊ ÌÀ>V}Ê vÊ 8/Ê ÌÀ>ÃviÀÊ processing on the signals sent over the different lines is thus vÕVÌÃÊÊ`ÜÃÌÀi>Ê6 -»]ÊEURASIP Journal on Applied possible to compensate or pre-compensate the interference. Signal Processing (Special issue on Advanced Signal Processing Research focuses on methods to obtain the required accurate Techniques for Digital Subscriber Lines), 2006. channel estimates in order to perform these compensations, as ÜiÊ>ÃÊÜ>ÞÃÊÌÊÌÊÌ iÊV«iÝÌÞÊvÊÌ iÊÛiÀ>ÊÃÞÃÌi° Patents qÊ -«iVÌÀÕÊ>>}iiÌ Smart usage of the spectrum among the users is another way X “Determining channel matrices by correlated transmissions to to decrease the impact of crosstalk on DSL systems. Several `vviÀiÌÊV >iû]Ê1-Ê«>ÌiÌÊ1-ÓäänÉä£ääxn° «ÌÃ>ÌÊiÌ `ÃÊ>ÀiÊÛiÃÌ}>Ìi`ÊÊÌ ÃÊVÌiÝÌ]ÊvVÕÃ}Ê X “Multiband detector”, patent CN1224291, 1999. ÊÃÕÌÃÊÜÌ ÊÌi`ÊV«iÝÌÞ° X “Method and arrangement to determine a clock timing error in a multi-carrier transmission system”, US patent US200215007 X º"«ÌÃi`Ê LÌÊ >V>ÌÊ >`>«Ìi`Ê vÀÊ 6 -»]Ê 1-Ê «>ÌiÌÊ Representative References US2003130824, 2003.
X "16 18Ê °]Ê 6 Ê ,Ê 6 Ê °°]Ê º`>«ÌÛiÊ «ÀiV`}Ê for downstream crosstalk precancelation in DSL systems using sign-error feedback”, IEEE Trans. On Signal Processing, vol. 58, °ÊÈ]Ê««°ÊΣÇÎΣÇ]ÊÕiÊ2010.
19 Awards KEYWORDS Wired communications
X Siemens 2002 biennal Award from the belgian NSF Spectrum management Signal processing vÀ>ÌÊ>`Ê ÕV>ÌÃÊÌiV }iî]Ê°ÊÕÛi>ÕÝ]Ê Multiuser systems °Ê iÀÞV]Ê°Ê6>`i`À«iÆ Detection estimation X V>ÌiÊ iÊÓääxÊÜ>À`ÊÌÊ/°Ê->ÀÌi>iÀÊ>`Ê°ÊÕÛi>ÕÝÊvÀÊ the work on “Transmission over powerline communications” `ÀiVÌi`ÊLÞÊ°Ê6>`i`À«iÆ CONTACTS X ÊiÜÊÓääÈÊ°Ê6>`i`À«i® Luc VANDENDORPE [email protected] Tel. 32 (0) 10 47 23 12 Partnership Jérôme LOUVEAUX iÀi°ÕÛi>ÕÝJÕVÕÛ>°Li X Stanford University, USA Tel. 32 (0) 10 47 88 86 X Delft Technical University X Alcatel WEB SITE X Research Contracts from Wallonie, IWT, Alcatel, Broadcom. www.uclouvain.be/en-icteam.html
Products and Services
-* ÊÀiÌi`ÊÃ}>Ê«ÀViÃÃ}ÊÌLÝ
Main Equipment
X }Ì>ÊÃ>«}ÊÃVÃV«iÊ£ÈÊâÊ>>}ÊL>`Ü`Ì ]ÊnäÊ ->ÉÃÊqÊÓÊV >iî X *Ê-}>Ê}iiÀ>ÌÀÊ£äÊ âÊ 7®]ÊÕ«ÊÌÊÓ°{Êâ
20 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 6
Satellite Communications
SENIOR SCIENTISTS: X >Õ`iÊ" -/ - X >iiÊ6 " , 6 ,
Research Field and Subjects Representative References qÊ `iÃÊvÊÌÕÀLÕiÌÊ>Ìë iÀi X ",/" Ê °]Ê ,"Ê 6°]Ê "1,"",-Ê °]Ê The team has maintained for 20 years a well-established "1 , Ê*°]Ê," ,-Ê °]Ê1 Ê°]Ê,6Ê °]Ê6 " , position in modelling tropospheric scintillation on earth-satellite 6 ,Ê °]Ê "-/ Ê°]Ê ,/ Ê°]Ê -/ /Ê°] Review of links. Emphasis is put on the analysis and modelling of the prediction methods for low-elevation aerospace systems and random amplitude variations of microwave signals based on iÜÊ>V iÛiiÌÃ]Ê 1 *ÊÓ䣣]Ê««°ÊÎÎÎqÎÎÇ]Ê2011. -½ÃÊ Ã>ÌiÌiÊ "Þ«ÕÃÊ Li>VÊ i>ÃÕÀiiÌÃ°Ê Ê ÃÌ>ÌÃÌV>Ê X " / ,"6 ,"-Ê °]Ê " -/ -Ê °]Ê * , < method using radiosonde data has been developed to predict " / Ê °]Ê *, /" , ,Ê ,°]Ê 9 Ê /°]Ê , Ê °]Ê scintillation effects on slant paths. The outputs of the Numerical 6 " , 6 ,Ê °] Stationarity study of Land Mobile Weather Prediction models are envisaged to provide inputs Satellite channel in view of developing a time series generator, to the software that simulates the propagation through the Õ *ÊÓ䣣]Ê««°ÊÎÇÎqÎÇ{£]Ê2011. turbulent troposphere. A similar model is developed to calculate X 6 " , 6 ,Ê °]Ê" -/ -Ê °]Ê " / ," the radar backscattering of wake vortices detection. 6 ,"-Ê °]Ê6 Ê , Ê,°]Ê Ê ,Ê°, Scintillation prediction using improved pre-processed radiosounding data, qÊ ,>Ê>`ÊViÊ i«>ÀÃ>ÌÊ `i} Õ *ÊÓää]Ê««°ÊÎn{qÎnx£]Ê2009. The focus is on electromagnetic modelling of rain and ice X ",/" Ê °]Ê -/ /Ê °]Ê ,< "Ê °]Ê ,, Ê °]Ê depolarisation, and on comparison with measured time series 6 " , 6 ,Ê °]Ê " / ,"6 ,"-Ê °]Ê and long-term statistics. WENDLAND D., MARTELLUCCI A.,ÊL>ÊÀV ÛiÊvÊ«À«>}>ÌÊ measurements for satellite communication systems, EuCAP qÊ Ê «iÀvÀ>ViÊ «Ài`VÌÊ vÀÊ Ì iÊ >`Ê LiÊ Ã>ÌiÌiÊ Óää°Ê««°ÊÎÈÓÎqÎÈÓÇ]Ê2009. (LMS) channel X *, " Ê°]Ê" -/ -Ê °]Ê ,/ 1 Ê°]Ê Ý«iÀiÌ>Ê A variety of specific prediction methods for personal satellite >ÃÃiÃÃiÌÊ vÊ >Ìë iÀVÊ `i«>Àâ>ÌÊ >ÌÊ >Ê >`Ê 6Ê L>`Ê communication networks have been applied, starting from a L>Ãi`ÊÊ"Þ«ÕÃÊ>`ÊÌ>Ã>ÌÊ«À«>}>ÌÊV>«>}Ã]Ê Õ *Ê physical description of tropospheric and surface environmental 2006, 2006. mechanisms. Furthermore, an improved method has been `iÛi«i`Ê ÌÊ iÝÌÀ>VÌÊ Ì iÊ «>À>iÌiÀÃÊ vÊ >Ê ÌÜÃÌ>ÌiÊ >ÀÛÊ `iÊvÀÊ -ÊV >i°Ê>Û}ÊÌ iÊ«>À>iÌiÀÃ]ÊÌiÊÃiÀiÃÊV>Ê Awards be generated for system simulation. £ÓäääÊ Ê >ÀVÊ*ÀiÕÊÜ>À`Ê °Ê"iÃÌ}iÃ]Ê °Ê6> i qÊ «iiÌ>ÌÊ >`Ê «ÀÛiiÌÊ vÊ /1,Ê `iÃÊ vÀÊ nacker et al.) interferences and coordination area / ÃÊ>VÌÛÌÞÊ >ÃÊÕÃÌÊÃÌ>ÀÌi`ÊÊÌ iÊvÀ>iÜÀÊvÊ>Ê -ÊVÌÀ>VÌÊ on the development of a software that predicts the effects of the troposphere, the ionosphere, the environment and interferences on communication systems (RAPIDS II software).
21 Funding KEYWORDS Satellite communications
X 5 ESA contracts Tropospheric scintillation Tropospheric depolarisation X / >iÃÊÀÊ-ÞÃÌiÊ- -,Ê1]Ê*Ç® Earth-satellite channel modelling ,>`>ÀÊL>VÃV>ÌÌiÀ}ÊvÊÜ>iÊÛÀÌiÝ
Partnership CONTACTS
X IRM, Belgium Claude OESTGES X " , ,/]ÊÀ>Vi [email protected] Tel. 32 (0) 10 47 89 98 X 1Û°ÊvÊ6}]Ê*ÀÌÕ}> X 1 ]Ê ÀÜ>Þ Danielle VANHOENACKER-JANVIER X DLR >ii°6> i>ViÀJÕVÕÛ>°Li X Politecnico de Milano, Italy Tel. 32 (0) 10 47 23 04
Participation in WEB SITE X "-/ÊänäÓÊVÌÊVV >À® http://www.uclouvain.be/icteam X iÌÜÀÊvÊ Ý«iÀÌÃÊÊ*À«>}>Ì
Products and Services
X "Þ«ÕÃÊ iÝ«iÀiÌÊ `>Ì>L>ÃiÊ >ÌÊ £Ó°x]Ê ÓäÊ >`Ê ÎäÊ âÊ (including scintillation and depolarisation data) X Development of a new version of RAPIDS II
22 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 7
Wireless Communications
SENIOR SCIENTISTS: X jÀiÊ"16 18 X >Õ`iÊ" -/ - X ÕVÊ6 ",* X Christophe CRAEYE
Research Field and Subjects L>Ãi`ÊÃÞÃÌiðÊ>iÊÌ iÀÞÊÃÊiÊvÊÌ iÊvÀ>iÜÀÃÊÜ V ÊÃÊ iÝ«Ìi`ÊÌÊ«ÌÃiÊV>ÌÊvÀ>Ì° 7ÀiiÃÃÊVÕV>ÌÃÊ >ÛiÊLiViÊ>ÊÛiÀÞÊiÝVÌ}Ê>Ài>ÊÜÌ Ê Ì iÊÃÕVViÃÃÊvÊ- ]Ê1 /-]Ê7Ê>`ÊÃiÃÀÊiÌÜÀÃ°Ê ÛiÊvÊ qÊ 1ÌÀ>7`iÊ >` some maturity has been reached, new challenges are still to be Research on Ultra-Wide Band (UWB) focuses on the channel faced, such as the support of higher bit rates and throughput, modelling and on the communication techniques, such as time- the increase of mobility, the interoperability of different reversal and accurate localisation via advanced signal processing. ÌiV }iÃÊ >`Ê Ì iÊ >ÌÕÀÃ>ÌÊ vÊ V«iÌÃ°Ê "Ê Ì«Ê of current systems with known topologies, new paradigms are qÊ `Þ iÌÀVÊ ÕV>Ìà >ÃÊVÕÀÀiÌÞÊiÝ«Ài`ÊÃÕV Ê>ÃÊVÀÃÃ>ÞiÀÊ`iÃ}]ÊÀi>Þ}Ê>`Ê Channel models and algorithms are developed for body-centric cooperative strategies, and cognitive radio. applications, including healthcare and motion capture systems. qÊ `Û>Vi`Ê/À>ViÛiÀÊ iÃ} qÊ Ìi>ÊÌiV }Þ Multi-cell communications are an emerging concept which Numerical simulation of antennas and antenna arrays (narrow-band offers many degrees of freedom. Attention is paid to centralise and ultra-wideband). Design and characterisation of such antennas. and distribute coder and decoders across cells, robust against i>ÀÊwi`Ê>}}Ê>`ÊLi>vÀ}ÊiÌÜÀÃÊqÊsee A8. channel uncertainties. qÊ 7ÀiiÃÃÊ >iÊ >À>VÌiÀÃ>Ì Representative References This activity deals with the measurement and the modelling of wireless transmissions, including cellular, vehicular and body- X 1Ê °]Ê - ,Ê °]Ê , 9 Ê °]Ê Ê " ,Ê *°Ê >`Ê area networks, with a particular focus on multi-link aspects " -/ -Ê °]ÊÊ>>ÞÌV>Ê`i}ÊvÊ«>Àâi`ÊÌiÛ>À>ÌÊ (multi-node, multi-cell). on-body propagation channels with dynamic body scattering, EURASIP Journal on Wireless Communications and Networking, qÊ ÕÌÊ "Ê ÕV>ÌÊ-ÞÃÌià 12 p., March 2011. / iÊ ÀiÃi>ÀV Ê «ÀiVÌÃÊ Ê ÕÌÊ ÕÌ«i«ÕÌÊ ÕÌ«i X " -/ -Ê °]Ê < Ê °]Ê ,Ê °]Ê -/" Ê *°]Ê "ÕÌ«ÕÌÊ "®Ê VÕV>ÌÃÊ VÛiÀÊ V >iÊ `i}Ê / , ,Ê°]Ê*1,Ê °]Ê Ý«iÀiÌ>Ê V >À>VÌiÀâ>ÌÊ and measurements, together with the development of space- and modeling of outdoor-to-indoor and indoor-to-indoor ÌiÊ Ã}>}Ê ÌiV µÕiÃÊ Ì >ÌÊ iÝ«ÌÊ Ì iÊ Ã«iVÌÀ>Ê ivwViVÞÊ distributed channels, IEEE Trans. Veh. Tech., vol. 57, No. 5, >`Û>Ì>}iÊvÊë>Ì>ÊÕÌ«iÝ}Ê>`ÊÌ iÊÀLÕÃÌiÃÃÊvÊi}i ««°ÊÓÓxÎqÓÓÈx]ÊÕiÊ2010. beamforming. X , 1 Ê "°]Ê " " Ê 6° °]Ê 6 Ê *°]Ê " -/ -Ê °]Ê ÃÌ>Ì>ÀÞÊ >ÀÀÜL>`Ê "Ê ÌiÀÛi ViÊ qÊ " ®Ê ÕV>ÌÃÊ-ÞÃÌià V >iÊ V >À>VÌiÀâ>ÌÊ Ê Ì iÊ xÊ âÊ L>`]Ê IEEE Trans. Veh. " Ê ÃÊ Ì iÊ VÕÀÀiÌÊ ÌiV }ÞÊ VÃ`iÀi`Ê vÀÊ >ÞÊ iÜÊ Tech°]ÊÛ°ÊxÇ]Ê °Ê{]Ê««°ÊÓääÇqÊÓä£x]Ê«ÀÊ2010. standards. Research focuses on resource (bit, power, carrier) X - Ê °Ê °]Ê 6 ",* Ê °]Ê "Ê ,i>ÞÊ `iÃ}Ê vÀÊ >V>ÌÊ ÃÌÀ>Ìi}iÃÊ vÀÊ ÕÌÕÃiÀÊ " ]Ê «ÃÃLÞÊ VÕ`}Ê multipoint-to-multipoint communications with imperfect cognitive setups. channel state information, IEEE Transactions on Signal Processing]ÊÛ°ÊxÇ]Ê °ÊÇ]Ê««°ÊÓÇnxÓÇÈ]ÊÕÞÊ2009. qÊ «iÀ>ÌÛiÊVÕV>Ìà X 6 ,-Ê °]Ê "16 18Ê °Ê >`Ê 6 ",* Ê °]Ê LÕÌÊ Cooperation is a new paradigm that receives a lot of attention Ì iÊ `ÛiÀÃÌÞÊ Ê VÞVVÊ «ÀiwÝi`Ê Ã}iÊ V>ÀÀiÀÊ ÃÞÃÌiÃÊ ÛÌi`Ê in the aim to increase coverage. Different strategies are paper), Physical Communication, vol. 1, No. 4, pp. 266-276, ÛiÃÌ}>Ìi`ÊÊ*Ó*Ê>`ÊÕÌÕÃiÀÊÃVi>ÀÃ]ÊVÕ`}ÊvÀÊ" Ê December 2008.
23 X ,< /Ê °]Ê " -Ê °]Ê"// Ê6°]Ê79 ,- Ê°]Ê1- Ê °]Ê Products and Services " 9Ê °]Ê 6 ",* Ê °]Ê `i`i`Ê /ÕÀLÊ -ÞV Àâ>ÌÊÛÌi`Ê«>«iÀ®]ÊProceedings of the IEEE, vol. 95, Measurement campaigns (see Main Equipments). °ÊÈ]Ê««°Ê£ÓxxÊqÊ£ÓÇ£]ÊÕiÊ2007. X " -/ -Ê °]Ê , 8Ê °]ÊMIMO wireless communications: from real-world propagation to space-time code design, Main Equipments V>`iVÊ*ÀiÃÃ\Ê"ÝvÀ`]Ê2007. X 71/ /Ê 8°]Ê ,< /Ê °]Ê " Ê °]Ê "16 18Ê °Ê X 6iVÌÀÊ iÌÜÀÊ>ÞâiÀÃÊ{äÊ â££äÊâ® >`Ê6 ",* Ê°]Ê «>ÀÃÊvÊ Ê >Ãi`Ê}ÀÌ ÃÊ X 7`iL>`Ê >iÊ-Õ`iÀÃÊnäÊ âÊJÊ£°Êâ]ÊÓääÊ âÊ vÀÊ "Ê >iÊ ÃÌ>Ì]Ê IEEE Transactions on JÊΰnÊâ® Communications]ÊÛ°Êxx]Ê °Ê£]Ê««°ÊÓ£ÈÊqÊÓÓÈ]Ê>Õ>ÀÞÊ2007. X }Ì>Ê->«}Ê"ÃVÃV«iÊ£ÈÊâÊÌÀÕiÊ>>}ÊL>`Ü`Ì ]ÊnäÊ ->ÉÃÊÃ>«iÊÀ>ÌiÊÊÓÊV >iÃÊÀÊ{äÊ->ÉÃÊÃ>«iÊÀ>ÌiÊÊ{ÊV >iî
Awards KEYWORDS
X ÊiÜÊÓääÈÊ°Ê6>`i`À«i® Wireless communications Transceiver design X Óää{Ê Ê6i VÕ>ÀÊ/iV }ÞÊ-ViÌÞÊ i>Ê- i« iÀ`ÊÜ>À`Ê Adaptive signal processing °Ê"iÃÌ}iî "®Ê ÕÌ«i«ÕÌÊ ÕÌ«i"ÕÌ«ÕÌ X 7 " ³³Ê ®ÊLiÃÌÊÕÀ>Ê*>«iÀÊÜ>À`ÊÓ䣣 Cooperative communications X iÃÌÊ6i VÕ>ÀÊ/iV }ÞÊ viÀiViÊ*>«iÀÊÜ>À`Ê>ÊÓ䣣 Cognitive radio X iÃÌÊ 7 " Ê ®ÊÕÀ>Ê*>«iÀÊÜ>À`ÊÓääÈ Propagation X £ÓäääÊ Ê >ÀVÊ*ÀiÕÊÜ>À`Ê °Ê"iÃÌ}iÃÊet al.) Ultra-Wide Band (UWB)
Partnerships CONTACTS Jérôme LOUVEAUX iÀi°ÕÛi>ÕÝJÕVÕÛ>°Li X Stanford University, USA Tel. 32 (0) 10 47 88 86 X Eurecom Institute, France X Supelec, France Claude OESTGES X FTW, Austria [email protected] X University Roma Tre Tel. 32 (0) 10 47 89 98 X University di Pisa Luc VANDENDORPE X Technical University of Munich [email protected] Tel. 32 (0) 10 47 23 12 Participation in X 7 " ³³Ê iÌÜÀÊvÊ ÝViiViÊÊ7ÀiiÃÃÊ ÕV>Ìà Christophe CRAEYE X "-/Ê £ää{Ê>`Ê äÓÊVÌà [email protected] Tel. 32 (0) 10 47 23 11 Research Contracts from Wallonie and the EU.
WEB SITE http://www.uclouvain.be/icteam
24 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY A 8
Antenna technology
SENIOR SCIENTISTS: X Christophe CRAEYE X >iiÊ6 " , 6 , X Ã>LiiÊ19 X i>*iÀÀiÊ,-
Research Field and Subjects qÊ i>vÀ}ÊvÀÌi`à Multi-frequency front-ends comprising filters, low-noise Ìi>ÊÌiV }ÞÊÃÊ}iÌÌ}ÊiÝÌÀiiÞÊ`ÛiÀÃi]ÊÃViÊÜÀiiÃÃÊ >«wiÀÃ]Ê ÝiÀÃÊ >`Ê `>Ì>Ê >VµÕÃÌÊ LVÃÊ >ÛiÊ LiiÊ communications are become ubiquitous and since antennas developed for direction-finding and intrusion detection. Specific are being used for various detection functionalities. In those attention has been given to low-cost production, ease of `vviÀiÌÊ>««V>ÌÃ]ÊÌ iÊiÝ«iVÌi`Ê«À«iÀÌiÃÊvÊÌ iÊ>Ìi>Ê calibration and integration. hardware widely vary and their integration constraints become more and more stringent. This calls for new materials, new front- qÊ `ÞÀi>Ê iÌÜÀÊ>Ìi>à end electronics, new analysis techniques, and new fabrication Compact antennas have been developed for point-to-point >`Ê ÌiÃÌ}Ê ÌiV }iÃ°Ê "ÛiÀÊ Ì iÊ >ÃÌÊ `iV>`i]Ê «ÀÌ>ÌÊ communication along the human body. They are based on the developments have taken place at UCL in these complementary iÝVÌ>ÌÊ vÊ ÃÕÀv>ViÊ Ü>ÛiÃÊ «À«>}>Ì}Ê >}Ê Ì iÊ L`Þ>ÀÊ areas. interface. qÊ 7`iL>`Ê>Ìi>Ê>ÀÀ>Þà qÊ VÀ>V }ÊvÀÊ>Ìi>à Wideband antenna arrays have been developed for three main Use of micromachining technique to build up efficient millimeter- applications: radio-astronomy with focal-plane arrays ground- waves planar antenna in silicon technology. The etching of air penetrating radar and near-field imaging. Fast analysis methods cavities underneath the planar antenna greatly reduces the >ÛiÊ>ÃÊLiiÊ`iÛÃi`ÊvÀÊiÝÌÀiiÞÊ>À}iÊÀi}Õ>ÀÊ>ÀÀ>ÞÃ]Ê electromagnetic crosstalk between antenna arrays. iÊÌ ÃiÊiÛÃ>}i`ÊvÀÊÌ iÊ-µÕ>ÀiiÌiÀÊÀÀ>ÞÊÌiiÃV«i°Ê In all cases, the effects of mutual coupling are duly taken into account. Representative References qÊ iÌ>>ÌiÀ>Ê>Ìi>à X 6," Ê°]Ê-,-Ê,°]Ê , 9 Ê °]Ê "Ê°]Ê* , 6 Ê"°]Ê Beam steering using frequency-tunable metamaterial antennas ºÀ``i`Ê6Û>`Ê>Ìi>Êvii`ÊÃÞÃÌiÊvÀÊÌ iÊ ÀÌ iÀÊ ÀÃÃÊ has been realised in planar technology. A special transmission radio telescope,” Special Issue of the IEEE Trans. Antennas line is formed to operate as a compact leaky-wave antenna. *À«>}>Ì°Ê Ê iÝÌ}iiÀ>ÌÊ À>`Ê ÌiiÃV«iÃ]Ê Û°Ê x]Ê The direction of the main beam is controlled by frequency of ««°Ê£ÈÎÊqʣǣ]ÊÕiÊ2011. the feeding source, enabling backward to forward scanning. X " < <Ê °]Ê , 9 Ê °]Ê ºÌiÀ«>ÌÀÞÊ >VÀÊ >ÃÃÊ Metamaterials have also been designed for the collimation of Functions Analysis of non-periodic arrays,” IEEE Trans. Antennas ,Ê>}iÃÊ>Ü>ÞÊvÀÊÌ iÊ } ÊÃÌ>ÌVwi`Êâi° Propagat., vol. 59, pp. 3117-3122, Aug. 2011. X , 9 Ê °Ê>`Ê" < <"6 ,"Ê °]ʺÊÀiÛiÜÊÊ>ÀÀ>ÞÊ qÊ , Ê>Ìi>ÃÊ>`Ê>ÀÀ>Þà mutual coupling analysis”, Radio Science, 46, RS2012, April Low-profile RFID antennas have been designed, especially for 2011. on-metal applications. Localisation of passive RFID tags with X , " /Ê -°]Ê 19 Ê °]Ê ºi>ÞÊ 7>ÛiÊ ,>`>ÌÊ the help of phased arrays has been realised, as well as the Phenomena in Metamaterial Transmission Line based on interpretation of the received signals. «iiÌ>ÀÞÊ-«ÌÊ,}Ê,iÃ>ÌÀû]Ê VÀÜ>ÛiÊ>`Ê"«ÌV>Ê /iV }ÞÊiÌÌiÀÃ]ÊÛ°ÊxÎ]Ê °Ê]Ê««°ÊÓäÓxqÓäÓ]Ê-i«ÌiLiÀÊ qÊ iÌiÌiÀÜ>ÛiÊ«>>ÀÊ>Ìi>Ê>ÀÀ>Þà 2011. Antenna arrays have been developed for radar traffic control X // ,9Ê °]Ê -,-Ê ,°]Ê -"*Ê °]Ê "/Ê -°]Ê ÜÌ Ê`}Ì>ÊLi>vÀ}]ÊÊÌ iÊÓ{ÊâÊ- ÊL>`°Ê/ iÊ`iÃ}Ê CRAEYE C., “Modeling of an ultra-wideband antenna array of the array relies on accelerated analysis techniques, based on devoted to near-field imaging,” Proc. Loughborough Antennas an integral-equation approach. *À«>}>Ì°Ê v°]ÊÕ} LÀÕ} ]Ê1]Ê Û°Ê2010.
25 X ",/Ê°]Ê - ,Ê°]Ê,"+1 /Ê°]Ê , 9 Ê °]Ê" -/ -]Ê KEYWORDS “A body area propagation model derived from fundamental Antenna Arrays principles: analytical study and comparison with measurements”, Mutual coupling Wireless communications IEEE Trans. Antennas Propagat., vol. 58, pp. 503-514, Feb. 2010. Detection and sensing X , 1Ê8°]Ê,,9Ê °]Ê , 9 Ê °]ʺ/Ü>À`Ê>ÊÜÀii`ÕÊ Metamaterials endoscope for MRI imaging”, Metamaterials Journal, pp. 90-99, "VÌÊ2009. CONTACTS Christophe CRAEYE Partnerships [email protected] Tel. 32 (0) 10 47 23 11 X University of Cambridge X University of Siena Danielle VANHOENACKER-JANVIER X University of Sevilla [email protected] X Thalès Communication, Colombes Tel. 32 (0) 10 47 23 04 X 1ÛiÀÃÌÞÊvÊ À`i>ÕÝ X Aalto University Isabelle HUYNEN [email protected] X Royal Military Academy of Belgium Tel. 32 (0) 10 47 23 08 Research Contracts from Wallonie and the EU. Jean-Pierre RASKIN i>«iÀÀi°À>ÃJÕVÕÛ>°Li Products and Services Tel. 32 (0) 10 47 23 09
Antenna measurements, realisation of customised antennas for WEB SITES specific applications. http://www.uclouvain.be/icteam http://www.uclouvain.be/christophe.craeye http://www.uclouvain.be/danielle.vanhoenacker Main Equipments http://www.uclouvain.be/isabelle.huynen http://www.uclouvain.be/jean-pierre.raskin X 6>ÀÕÃÊ V>Ý>Ê ÃiÌÕ«Ã]Ê Ü>viÀÊ «ÀLiÊ ÃÌ>ÌÃÊ >`Ê 6iVÌÀÊ iÌÜÀÊ >ÞâiÀÃÊ Vw}ÕÀ>ÌÃÊ vÀÊ ÕÌ«ÀÌÊ Õ«Ê ÌÊ {Ê accesses) multi-parametric characterisation of devices X Anechoic chamber for electromagnetic testing of materials, devices and sensors X Broadband antennas and arrays X Channel sounders X RF hardware for wireless and ultra-wideband communications between sensors see full catalog list at: ÌÌ«\ÉÉÜÜÜ°ÕVÕÛ>°LiÉÜiVi The 7 " facility is a state-of-the-art technological platform providing multidisciplinary tools in the field of electrical and electromagnetic characterisation.
26 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 1
Software Evolution
SENIOR SCIENTISTS: X Ê - X }i>Ê"< "
Research Field and Subjects X "< "Ê °]Ê -Ê °]Ê -Ê °]Ê , 6"Ê °]Ê }Ê Source Code for Structural Regularities. Working Conference on Software systems have a natural tendency to require evolution ,iÛiÀÃiÊ }iiÀ}ÊÓä£ä]Ê««°ÊÓÓqΣ°Ê Ê «ÕÌiÀÊ-ViÌÞ]Ê throughout their life-time, due to a variety of reasons like 2010. changing requirements, adoption of new technology, software X "< "Ê °]Ê 7 , ,Ê °]Ê /À>V}Ê ViÃ¿Ê «ÀÌ°Ê >Ìi>ViÊ >`Ê LÕ}Ê wÝ}]Ê ÕÃiÊ vÊ Ì iÊ ÃvÌÜ>ÀiÊ LiÞ`Ê ÌÃÊ Proceedings of the 4rd International Workshop on Software À}>Ê }>Ã]Ê iÜÊ Ã} ÌÃ]Ê iÌV°Ê ÜiÛiÀ]Ê iÛÛ}Ê ÃvÌÜ>ÀiÊ Clones: IEEE Computer Society, 2010. is not straightforward, amongst others because important X -/,"Ê -°]Ê , 1Ê °]Ê -Ê °]Ê >}ÃÃÊ >`Ê -i knowledge about the systems (architectural and design Automatic Correction of Detected Design Inconsistencies in `iVÃÃ]ÊvÀÊiÝ>«i®ÊÌi`ÃÊÌÊ}iÌÊÃÌÊÛiÀÊÌi° Source Code. Proceedings of IWST’09, 11 pages. ACM, 2009. X , 1Ê °]Ê -Ê °]Ê -Ê °]Ê vÀV}Ê -ÌÀÕVÌÕÀ>Ê The RELEASeD research group investigates mechanisms, tools, ,i}Õ>ÀÌiÃÊ Ê -ÕÀViÊ `iÊ ÕÃ}Ê ÌiÃ6 °Ê ÌiÀ>Ì>Ê vÀ>ÃÃ]Ê >}Õ>}iÃÊ >`Ê iÌ `}iÃÊ ÌÊ ÃÕ««ÀÌÊ LiVÌ Conference on Automated Software Engineering 2008, oriented software developers during software maintenance and ««°Ê{Ç£q{ÇÓ°Ê Ê «ÕÌiÀÊ-ViÌÞÊ*ÀiÃÃ]Ê2008. evolution. In particular, it focuses on techniques to support: X -Ê °]Ê /"1,7 Ê /°]Ê ÛÕÌÊ ÃÃÕiÃÊ Ê Ã«iVÌ"ÀiÌi`Ê *À}À>}°Ê >«ÌiÀÊÊLʺ-vÌÜ>ÀiÊ ÛÕÌ»]Ê««°Ê£Çq X Source code mining: To discover evolution opportunities, for 224. Springer, 2008. ISBN 978-3-540-76439-7. iÝ>«iÊ «À}À>Ê Ài}Õ>ÀÌiÃÊ Ì >ÌÊ VÕ`Ê LiÊ ÌÀ>ÃvÀi`Ê ÌÊ X -Ê°]Ê -Ê°]Ê/" Ê*°]ÊÊ-ÕÀÛiÞÊvÊÕÌ>Ìi`Ê higher-level abstractions, or irregularities that should be corrected. Code-Level Aspect Mining Techniques. Transactions on Aspect- "ÀiÌi`Ê-vÌÜ>ÀiÊ iÛi«iÌÊ/"- ®]ÊÛ°Ê6]Ê««°Ê£{Îq£ÈÓ°Ê X Co-evolution of source code and its structural regularities: -«À}iÀ6iÀ>}]Ê -Ê{È{ä]Ê2007. To detect or avoid inconsistencies between program source code and higher-level design regularities, and resolve such inconsistencies when they are discovered, by proposing (semi-) Awards automated correction strategies. X / À`Ê *ÀâiÊ vÊ Ì iÊ /iV }ÞÊ Û>ÌÊ Ü>À`ÃÊ ÓääxÊ vÊ X The group also works on the analysis of implementation Ì iÊ ÕÀ«i>Ê->Ì>Ê1ÃiÀÊÀÕ«]Ê>Ü>À`i`ÊÌÊ`ÞÊiiÃ]Ê choices (such as code clones) and their impact on evolution. Àj`jÀVÊ *ÕµÕiÌÊ >`Ê Ê iÃÊ vÀÊ Ì iÀÊ `iÛi«iÌÊ vÊ ÌiÃ6 ÊÌ iÊÌiÃ>Ê6iÜÃÊ ÛÀiÌ®° To test its ideas the team develops prototypes that can analyse «iÃÕÀViÊÃvÌÜ>ÀiÊ«ÀiVÌÃ]ÊLÕÌÊÜiÊ>ÀiÊ«iÊÌÊÌiÃÌÊÌ iÊÊ large-scale industrial cases as well, as we did in the past with Funding ÕÀÊÀiÃi>ÀV ÊÊÌiÃ>ÊÛiÜÃÊÌiÃ6 ÊÌ®° X Centre de Recherche en Adaptabilité Logicielle. FRFC-FNRS ÀiÃi>ÀV Ê V>LÀ>ÌÊ LiÌÜiiÊ 1 " -]Ê 1 *Ê >`Ê 1 ]Ê Representative References funded by the Fonds de la Recherche Fondamentale Collective (FRFC-FNRS). X -/,"Ê -°]Ê Ê ,""6 ,Ê °]Ê -Ê °]Ê "< "Ê °]Ê -Ê °]Ê ½" /Ê /°]Ê >}Ã}Ê >`Ê ÀÀiVÌ}Ê iÃ}Ê X 6 -\Ê Õ`>iÌ>Ê ÃÃÕiÃÊ Ê -vÌÜ>ÀiÊ }iiÀ}\Ê Inconsistencies in Source Code with Logical Abduction. Elsevier `i}]Ê6iÀwV>ÌÊ>`Ê ÛÕÌÊvÊ-vÌÜ>Ài°Ê*Ê«ÀiVÌÊ ÕÀ>ÊÊ-ViViÊvÊ «ÕÌiÀÊ*À}À>}Ê- "®]ÊÇÈ£Ó®]Ê *ÈÉÎ]ÊvÕ`i`ÊLÞÊÌ iÊ i}>Ê-ViViÊ*VÞÊ -*"®° ««°Ê£££Îq££Ó]Ê2011.
27 Partnership KEYWORDS "LiVÌÀiÌi`Ê«À}À>} X 6ÀiÊ1ÛiÀÃÌiÌÊ ÀÕÃÃi]Ê-vÌÜ>ÀiÊ>}Õ>}iÃÊ>L Logic programming Programmer workbench X / iÊ"«iÊ1ÛiÀÃÌÞ]Ê «ÕÌ}Ê i«>ÀÌiÌ]Ê1 Maintainability Restructuring, reverse engineering, and reengineering Development tools Products and Services "LiVÌÀiÌi`Ê>}Õ>}ià Software maintenance X / iÊ ÌiÃ6 Ê ÌÊ i«ÃÊ ÃvÌÜ>ÀiÊ `iÛi«iÀÃÊ ÌÊ ÛiÀvÞÊ VvÀ>ViÊvÊ>ÊÃvÌÜ>ÀiÊÃÞÃÌi¿ÃÊÃÕÀViÊV`iÊÌÊÃÌÀÕVÌÕÀ>Ê CONTACTS regularities like architectural and design rules, and coding Kim MENS conventions. ° iÃJÕVÕÛ>°Li X Ê ÃÊ >Ê «ÀÌÌÞ«iÊ ÌÊ ÌÊ i«Ê ÃvÌÜ>ÀiÊ `iÛi«iÀÃÊ Tel. 32 (0) 10 47 91 11 diagnose and correct violations of inconsistencies with respect to structural source code regularities in source code, by inferring Angela LOZANO corrective actions from the design rules themselves and the }i>°â>JÕVÕÛ>°Li code over which these rules are verified. Tel. 32 (0) 10 47 34 14 X Proof-of-concept implementation, in Smalltalk, of a variety of source code mining tools such as Mendel and Clairvoyant. WEB SITES www.intensive.be http://soft.vub.ac.be/mendel www.info.ucl.ac.be/~alozano/clairvoyant.html http://released.info.ucl.ac.be moves.vub.ac.be www.evolumons.be/FRFC
28 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 2
Context-Sensitive Software
SENIOR SCIENTISTS: X Ê - X -iL>ÃÌ?Ê" < <
Research Field and Subjects X " 1-Ê °]Ê <Ê°]Ê "-/ <Ê*°]Ê Ê 1/ ,Ê7°]Ê " < <Ê -°]Ê -Ê °]Ê 6 "-Ê °]Ê 6 Ê 1/- Ê /°]Ê Today, software has become truly omnipresent. People are Language Engineering for Mobile Software. Chapter of being assisted proactively by software-intensive systems in >`LÊvÊ,iÃi>ÀV ÊÊ LiÊ-vÌÜ>ÀiÊ }iiÀ}\Ê iÃ}]Ê their daily activities, at home, at work and underway, through Implementation and Emergent Applications, 2011. ISBN 978- computing devices offering intuitive interaction modalities. 1615206551. ÜiÛiÀ]Ê ÃvÌÜ>ÀiÊ ÌiV }ÞÊ ÃÊ >}}}Ê Li `Ê ÌÊ `iÛi«Ê X 6 "-Ê°]Ê" < <Ê-°]Ê "-/ <Ê*°]Ê Ê 1/ ,Ê7°]Ê such software-intensive systems efficiently. The usefulness and ¿" /Ê/°]Ê -Ê°]Ê*Ài`V>Ìi`ÊiiÀVÊÕVÌÃ\Ê >L}Ê quality of delivered services could be improved considerably if ÌiÝÌ i«i`iÌÊ iÌ `Ê Ã«>ÌV °Ê iVÌÕÀiÊ ÌiÃÊ Ê devices were able to adapt their behaviour according to sensed «ÕÌiÀÊ-ViViÊÈ£{{]Ê-«À}iÀ6iÀ>}]Ê2010. changes in their surrounding environment, both at the physical X " < <Ê -°]Ê -Ê °]Ê <Ê °]Ê ÌiÝÌ"ÀiÌi`Ê >`Ê }V>Ê iÛiÃ°Ê / ÃÊ ÌiÀ«>ÞÊ LiÌÜiiÊ VÌiÝÌ>Ü>ÀiiÃÃÊ *À}À>}Ê ÜÌ Ê Ì iÊ LiÌÊ "LiVÌÊ -ÞÃÌi°Ê ÕÀ>Ê vÊ and dynamic software adaptability is a key to the construction 1ÛiÀÃ>Ê «ÕÌiÀÊ-ViVi]Ê£{Óä®\ÎÎäÇqÎÎÎÓ]Ê2008. of applications that are smart with respect to user needs. The X " < <Ê -°]Ê *À}À>}Ê Ê LiVi\Ê i>À}Ê 1«Ê vÀÊ ÛiÊ «>À>`}Ê vÊ VÌiÝÌÀiÌi`Ê ÃvÌÜ>ÀiÊ `iÛi«iÌÊ Þ>VÊ `>«Ì>ÌÊ ÌÊ ÌiÝÌ°Ê * Ê / iÃÃ°Ê j«>ÀÌiiÌÊ investigates software technologies that enable the development `¿}jiÀiÊ vÀ>̵Õi]Ê 1ÛiÀÃÌjÊ V>Ì µÕiÊ `iÊ ÕÛ>]Ê vÊÃÕV Ê } ÞÊ`Þ>VÊ>`ÊVÌiÝÌÃiÃÌÛiÊ>««V>Ìð "VÌLiÀÊ2008. X " < <Ê -°]Ê -Ê °]Ê 9 -Ê *°]Ê } ÞÊ Þ>VÊ In particular, with its research on the Ambience programming i >ÛÕÀÊ `>«Ì>LÌÞÊ Ì ÀÕ} Ê *ÀÌÌÞ«iÃÊ ÜÌ Ê -ÕLiVÌÛiÊ language, and derivative implementations in programming Multimethods. In Proceedings of the 2007 symposium on languages commonly used in industry, UCL’s RELEASeD research Þ>VÊ >}Õ>}iÃÊ qÊ «>Ê vÊ Ì iÊ ÓÓ`Ê Õ>Ê Ê }ÀÕ«Ê VÌÀLÕÌiÃÊ ÌÊ Ì iÊ iiÀ}}Ê ÀiÃi>ÀV Ê >Ài>Ê vÊ VÌiÝÌ -* Ê viÀiViÊÊ"LiVÌ"ÀiÌi`Ê*À}À>}]Ê-ÞÃÌi]Ê oriented programming, by studying: >}Õ>}iÃÊ >`Ê ««V>ÌÃÊ ""*-®]Ê ««°Ê ÇÇqnn]Ê "VÌLiÀÊ X the conception of adequate programming abstractions for 2007. `iÛi«}ÊVÌiÝÌÃiÃÌÛiÊÃvÌÜ>ÀiÆ X the implementation of such abstractions in established «À}À>}Ê>}Õ>}iÃÊiÊ"LiVÌÛi ]Ê>Û>]Ê->Ì>]Ê,ÕLÞ]Ê Funding >Û>ÃVÀ«ÌÆ X application domains and scenarios that could benefit from X 6>À ÀÕ\Ê6>À>LÌÞÊÊ-vÌÜ>ÀiÌiÃÛiÊ*À`ÕVÌÊ iÛi«iÌ°Ê ÃÕV ÊVÌiÝÌÀiÌi`ÊÌiV }ÞÆ ICT Impulse Program. Brussels Institute for Research and X Ì iÊÛ>`>ÌÊvÊÌ ÃÊÌiV }ÞÊÌ ÀÕ} ÊÀi>ÃÌVÊV>ÃiÊÃÌÕ`iÃÆ Û>ÌÊ "6,-®° X tools, techniques and methodologies to support the X 6 -\Ê Õ`>iÌ>Ê ÃÃÕiÃÊ Ê -vÌÜ>ÀiÊ }iiÀ}\Ê `iÛi«iÌÊvÊVÌiÝÌÃiÃÌÛiÊÃvÌÜ>ÀiÊ>««V>Ìð `i}]Ê6iÀwV>ÌÊ>`Ê ÛÕÌÊvÊ-vÌÜ>Ài°Ê*Ê«ÀiVÌÊ *ÈÉÎ]ÊvÕ`i`ÊLÞÊÌ iÊ i}>Ê-ViViÊ*VÞÊ -*"®°
Representative References Partnership X " < <Ê -°]Ê , "<"Ê °]Ê -Ê °]Ê <Ê °]Ê , /Ê ° °]Ê "18Ê °]Ê -ÕLiVÌÛi \Ê À}}Ê ÌiÝÌÊ 6ÀiÊ1ÛiÀÃÌiÌÊ ÀÕÃÃi]Ê-vÌÜ>ÀiÊ>}Õ>}iÃÊ>L to Mobile Platform Programming. Lecture Notes in Computer -ViViÊÈxÈÎ]Ê-«À}iÀÊ6iÀ>}]Ê««°ÊÓ{ÈqÓÈx]Ê2011.
29 Products and Services KEYWORDS Emerging technologies X AmbienceÊÃÊ>Ê«ÀvvVVi«ÌÊ>}Õ>}iÊvÀÊVÌiÝÌÀiÌi`Ê Ubiquitous computing Mobile environment programming, inspired primarily on Slate, Self, Smalltalk and Programming paradigms Lisp. Pervasive computing X Subjective-CÊ ÃÊ >Ê «ÀvvVVi«ÌÊ >}Õ>}iÊ iÝÌiÃÊ vÊ "LiVÌÛi ÊvÀÊVÌiÝÌÀiÌi`Ê«À}À>}ÊÊ««i½ÃÊ"-Ê platform. CONTACTS X Proof-of-concept implementations of languages, languages Kim MENS iÝÌiÃÃÊ ÀÊ VÌiÝÌÀiÌi`Ê vÀ>iÜÀÃÊ vÀÊ >}Õ>}iÃÊ iÊ ° iÃJÕVÕÛ>°Li Tel. 32 (0) 10 47 91 11 >Û>]Ê->Ì>]Ê,ÕLÞÊ>`Ê>Û>ÃVÀ«ÌÆÊÞiÌÊÌ iÀÊ>}Õ>}iÃÊ>ÞÊ be studied in the future. Sebastián GONZALEZ -°â>iâJÕVÕÛ>°Li Tel. 32 (0) 10 47 91 08
WEB SITES http://ambience.info.ucl.ac.be http://released.info.ucl.ac.be http://www.varibru.be http://moves.vub.ac.be
30 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 3
Software Variability
SENIOR SCIENTISTS: X Ê - X }i>Ê"< " X -iL>ÃÌ?Ê" < <
Research Field and Subjects X " < <Ê -°]Ê -Ê °]Ê 9 -Ê *°]Ê } ÞÊ Þ>VÊ i >ÛÕÀÊ `>«Ì>LÌÞÊ Ì ÀÕ} Ê *ÀÌÌÞ«iÃÊ ÜÌ Ê -ÕLiVÌÛiÊ Driven by customers that are increasingly cost-conscious and Multimethods. In Proceedings of the 2007 symposium on demanding, software-intensive product builders (i.e. companies Þ>VÊ >}Õ>}iÃÊ qÊ «>Ê vÊ Ì iÊ ÓÓ`Ê Õ>Ê Ê building a product with an important software component) -* Ê viÀiViÊÊ"LiVÌ"ÀiÌi`Ê*À}À>}]Ê-ÞÃÌi]Ê have to become customer intimate and compete on the basis >}Õ>}iÃÊ >`Ê ««V>ÌÃÊ ""*-®]Ê ««°Ê ÇÇqnn]Ê "VÌLiÀÊ vÊ}Û}ÊVÕÃÌiÀÃÊiÝ>VÌÞÊÜ >ÌÊÌ iÞÊii`°Ê ÕÃÌiÀÊÌ>VÞÊ 2007. and mass customisation are therefore business strategies adopted by a growing number of companies. This forces such companies to face several variability challenges with respect to Funding managing all the variants of their products. X 6>À ÀÕ\Ê6>À>LÌÞÊÊ-vÌÜ>ÀiÌiÃÛiÊ*À`ÕVÌÊ iÛi«iÌ°Ê To advance the state of the art in software variability, the ICT Impulse Program. Brussels Institute for Research and RELEASeD research group at UCL investigates, amongst others: Û>ÌÊ "6,-®° X Centre de Recherche en Adaptabilité Logicielle. FRFC-FNRS qÊ /iV µÕiÃÊÌÊ iÊ vÀÊ Û>À>LÌÞÊ ««ÀÌÕÌiÃÊ Ê «À}À>Ê ÀiÃi>ÀV Ê V>LÀ>ÌÊ LiÌÜiiÊ 1 " -]Ê 1 *Ê >`Ê 1 ]Ê code, in order to gradually transform a software system into a funded by the Fonds de la Recherche Fondamentale Collective ÃvÌÜ>ÀiÊv>ÞÆ (FRFC-FNRS). qÊ *À}À>}Ê>}Õ>}iÃÊ>`Ê>LÃÌÀ>VÌÃÊÌ >ÌÊÃÕ««ÀÌÊÀÕ time variability, in order to write programs that dynamically Partnership >`>«ÌÊ Ì iÀÊ Li >ÛÕÀÊ ÌÊ V >}}Ê VÌiÝÌÃ]Ê ÜÌ ÕÌÊ >``i`Ê ÃÕÀViÊV`iÊV«iÝÌÞ° X 6ÀiÊ1ÛiÀÃÌiÌÊ ÀÕÃÃi]Ê-vÌÜ>ÀiÊ>}Õ>}iÃÊ>L X >VÕÌjÃÊ 1ÛiÀÃÌ>ÀiÃÊ ÌÀi >iÊ `iÊ >Ê *>Ý]Ê *,i - Ê research center Representative References X Sirris, Software Engineering and ICT X 6ÀiÊ 1ÛiÀÃÌiÌÊ ÀÕÃÃi]Ê 7iLÊ EÊ vÀ>ÌÊ -ÞÃÌiÊ X "< "Ê °]Ê -Ê °]Ê -Ê °]Ê , 6"Ê °]Ê }Ê Engineering Lab Source Code for Structural Regularities. Working Conference on X 1ÛiÀÃÌjÊLÀiÊ`iÊ ÀÕÝiiÃ]Ê «ÕÌiÀÊEÊ iVÃÊ }iiÀ}Ê ,iÛiÀÃiÊ }iiÀ}ÊÓä£ä]Ê««°ÊÓÓqΣ°Ê Ê «ÕÌiÀÊ-ViÌÞ]Ê Department 2010. X "< "Ê °]Ê 7 , ,Ê °]Ê ÃÃiÃÃ}Ê Ì iÊ vviVÌÊ vÊ iÃÊÊ >}i>LÌÞ°ÊÌiÀ>Ì>Ê viÀiViÊ"Ê-vÌÜ>ÀiÊ Products and Services Maintenance 2008. X " < <Ê -°]Ê *À}À>}Ê Ê LiVi\Ê i>À}Ê 1«Ê vÀÊ Ambience and Subjective-C are proof-of-concept programming Þ>VÊ `>«Ì>ÌÊ ÌÊ ÌiÝÌ°Ê * Ê / iÃÃ°Ê j«>ÀÌiiÌÊ languages supporting run-time variability. `¿}jiÀiÊ vÀ>̵Õi]Ê 1ÛiÀÃÌjÊ V>Ì µÕiÊ `iÊ ÕÛ>]Ê "VÌLiÀÊ2008.
31 KEYWORDS Reusable Software Scalability Maintainability
CONTACTS Kim MENS ° iÃJÕVÕÛ>°Li Tel. 32 (0) 10 47 91 11
Angela LOZANO }i>°â>JÕVÕÛ>°LiÊ Tel. 32 (0) 10 47 34 14
Sebastián GONZALEZ -°â>iâJÕVÕÛ>°Li Tel. 32 (0) 10 47 91 08
WEB SITES http://ambience.info.ucl.ac.be http://released.info.ucl.ac.be http://www.varibru.be http://www.evolumons.be/FRFC
32 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 4
Programming Languages and Distributed Computing
SENIOR SCIENTIST: X *iÌiÀÊ6 Ê,"9
Research Field and Subjects Representative References
The Programming Languages and Distributed Computing X ",Ê°]Ê6 , " /Ê°Ê>`Ê6 Ê,"9Ê*°]ÊÊ `i * ®Ê ,iÃi>ÀV Ê ÀÕ«Ê >ÃÊ >ÃÊ }iiÀ>Ê Ì iiÊ ÌÊ VÀi>ÃiÊ Ì iÊ >Ãi`Ê ««À>V Ê vÀÊ ÃÌÀLÕÌi`Ê 1ÃiÀÊ ÌiÀv>ViÃ]Ê Ê - Ê iÝ«ÀiÃÃÛiiÃÃÊ vÊ «À}À>}Ê >}Õ>}iÃ]Ê ÜÌ Ê >Ê Ã«iV>Ê Symposium on Engineering Interactive Computer Systems (EICS focus on support for distributed computing. The research is a Ó䣣®]Ê*Ã>]ÊÌ>Þ]ÊÕi 2011. combination of theory and practice: new concepts are suggested X , 1-Ê °Ê >`Ê -Ê °]Ê `i}Ê Ì iÊ *iÀvÀ>ViÊ vÊ by development needs, which leads both to theoretical results ,} >Ãi`Ê /ÃÊÊÌ iÊ*ÀiÃiViÊvÊ iÌÜÀÊ``ÀiÃÃÊ/À>Ã>ÌÀÃ]Ê >`ÊÃÞÃÌiÊLÕ`}°Ê/ iÊÀiÃi>ÀV ÊÛi ViÊÃÊvÌiÊÌ iÊ â>ÀÌÊ 11th IFIP International Conference on Distributed Applications *À}À>}Ê-ÞÃÌiÊÃiiÊÜÜÜ°â>ÀÌâ°À}®]Ê>ÊvÕvi>ÌÕÀi`Ê and Interoperable Systems (DAIS 2011, part of DisCoTec 2011), `iÛi«iÌÊ «>ÌvÀÊ L>Ãi`Ê Ê Ì iÊ "âÊ ÕÌ«>À>`}Ê ,iÞ>Û]ÊVi>`]ÊÕi 2011. programming language. X 6 Ê,"9Ê*°]Ê/ iÊ / Ê««À>V ÊvÀÊ/i>V }Ê>`Êi>À}Ê / iÊ* Ê,iÃi>ÀV ÊÀÕ«Ê >ÃÊivvÀÌÃÊÊÌ iÊvÜ}Ê>Ài>Ã\ *À}À>}]Ê >«ÌiÀÊ xÊ Ê ÀâÃÊ Ê «ÕÌiÀÊ -ViViÊ qÊ *À}À>}Ê>}Õ>}iÃÊvÀÊÌi}iÌÊ`ÃÌÀLÕÌi`ÊÃÞÃÌià Research (ed. Thomas S. Clary), Nova Science Publishers, Inc, qÊ «ÕÌiÀÊ«À}À>}Êi`ÕV>Ì 6°ÊÓ]Ê««°Ê£ä££ÓÈ°]Ê>°Ê2011. qÊ >À}iÃV>iÊ `ÃÌÀLÕÌi`Ê ÃÞÃÌiÃÊ VÕ`}Ê «iiÀÌ«iiÀÊ >`Ê X -Ê °Ê>`Ê6 Ê,"9Ê*°]Ê iiÀiÌ\Ê Õ`}Ê-iv >>}}Ê cloud computing iViÌÀ>âi`Ê -ÞÃÌiÃÊ ÜÌ Ê ,i«V>Ìi`Ê /À>Ã>VÌ>Ê -ÌÀ>}i]Ê qÊ ÃÌÀ>ÌÊ«À}À>} ÌiÀ>Ì>Ê ÕÀ>Ê vÊ `>«ÌÛi]Ê ,iÃiÌ]Ê >`Ê ÕÌVÊ qÊ Õ>V«ÕÌiÀÊÌiÀv>Vià -ÞÃÌiÃÊ,-]ʣή]Ê««°Ê£Ó{®]ÊÕ°-i«° 2010. qÊ «ÕÌiÀ>`i`ÊÕÃVÊV«ÃÌ X 6 Ê ,"9Ê *°]Ê*À}À>}Ê *>À>`}ÃÊ vÀÊ ÕiÃ\Ê 7 >ÌÊ qÊ iÃ}}Ê>`ÊLÕ`}ÊV«iÝÊÃÞÃÌià ÛiÀÞÊ*À}À>iÀÊ- Õ`ÊÜ]Ê iÜÊ «ÕÌ>Ì>Ê*>À>`}ÃÊ Ê>ÀÊÌ iiÊvÀÊ* ÊÃÊ ÜÊÌÊ«À}À>ÊÌi}iÌÊ`ÃÌÀLÕÌi`Ê vÀÊ «ÕÌiÀÊ ÕÃV]Ê°ÊÃÃ>Þ>}Ê>`Ê°ÊiÀâÃÊi`ð®]Ê, É systems. The relationship between computing technology and i>ÌÕÀÊÀ>Vi]ÊÕi 2009. society is transitioning rapidly toward a new form of intimate X 6 Ê,"9Ê*°]Ê"ÛiÀV}Ê-vÌÜ>ÀiÊÀ>}ÌÞÊÜÌ ÊÌiÀ>VÌ}Ê interaction based on intelligent applications built with a Feedback Loops and Reversible Phase Transitions, First combination of large-scale distributed computing and large- ÌiÀ>Ì>Ê viÀiViÊ Ê 6ÃÃÊ vÊ «ÕÌiÀÊ -ViViÊ scale machine learning. Computing systems will learn to interact -än®]Ê`]Ê1]Ê-i«° 2008. with us at a level much closer to human senses and abilities. For X -Ê °Ê>`Ê6 Ê,"9Ê*°]Ê/ iÊ,i>Ýi`Ê,}\ÊÊ>ÕÌ/iÀ>ÌÊ iÝ>«i]Ê Ài>ÌiÊ >Õ`Ê >}Õ>}iÊ ÌÀ>Ã>ÌÊ ÕÃ}Ê i>À}Ê /«}ÞÊvÀÊ -ÌÀÕVÌÕÀi`Ê "ÛiÀ>ÞÊ iÌÜÀÃ]Ê ÕÀ>Ê vÊ *>À>iÊ to map between phoneme sequences in different languages) Processing Letters, 18(3), Sep. 2008. and creative problem solving (brute force search tamed by X 6 Ê,"9Ê*°Ê>`Ê, Ê-°]ÊConcepts, Techniques, and Models domain knowledge and learning algorithms) are coming soon, of Computer Programming, MIT Press, March 2004 (929 pages). in addition to many other abilities not yet clearly imagined. /À>Ã>ÌÃÊÊÀiV ]Ê>«>iÃi]Ê*à ]Ê>`Ê-«>à ° / iÊ * Ê ,iÃi>ÀV Ê ÀÕ«Ê >ÃÊ ÌÊ V>Ì>ÞÃiÊ Ì ÃÊ ÌÀ>ÃÌÊ LÞÊ building bridges between the different stakeholders: large-scale distributed computing (especially clouds and peer-to-peer), large- Awards scale machine learning, distributed algorithms, programming languages, and many areas of domain knowledge. X ÊÓ䣣]ÊÌ iÊV«>ÞÊÜi`}iÊ*>â>ÊÜ>ÃÊ>Ü>À`i`Ê i}>Ê -Ì>ÀÌÕ«ÊvÊÌ iÊ9i>ÀÊÓ䣣ÊLÞÊÌ iÊ >Ì> iÜÃÊÜ>À`ÃÊvÀÊ ÝViiVi°Ê / ÃÊV«>ÞÊÃÌ>ÀÌi`Ê>ÃÊ>Ê >ÃÌiÀ½ÃÊ«ÀiVÌÊLÞÊÌiÊ*iÀ`>iÃÊ >`Ê,>« >lÊ-VÝÊÊÌ iÊ* Ê,iÃi>ÀV ÊÀÕ«ÊÕiÊÓääÇ®°
33 X ÊÓ䣣]Ê ÀÃÊ i>ÃÊ>`Ê*iÌiÀÊ6>Ê,ÞÊÀiViÛi`ÊÌ iÊ>Ü>À`Ê Main Equipment vÀÊ iÃÌÊ*ÕLà i`ÊÕÀ>ÊÀÌViÊÊ,-ÊvÀÊÓä£äÊÊL>Ê ÕÀÌ ÊÕ>Ê ÝViiViÊÊ,iÃi>ÀV ÊÕÀ>ÊÜ>À`î° IBM Blade Cluster, departmental LAN clusters, PlanetLab X ÊÓää]Ê ÀÃÊ i>ÃÊÀiViÛi`ÊÌ iÊ iÃÌÊ*ÀiÃiÌ>ÌÊÜ>À`]Ê iÌÜÀ]ÊVÕ`ÊvÀ>ÃÌÀÕVÌÕÀiÃÊ>âÊ Ó]Ê,>Vë>Vi]ÊiÌV°®]Ê VÌÀ>Ê-Þ«ÃÕ]Ê8ÌÀii"-Ê-ÕiÀÊ-V ]Ê1ÛiÀÃÌÞÊvÊ LiÊV«ÕÌ}Ê`iÛViÃÊ`À`]Ê* iÉ*>`® "ÝvÀ`]Ê1]Ê-i«°ÊÓää°
Products and Services Funding X Programming languages and platforms for intelligent À>ÃÕÃÊ Õ`ÕÃÊ ÌÊ VÌÀ>ÌiÊ ®Ê Ó䣣Óä£È]Ê ÃiiÊ distributed systems ÜÜÜ°i``V°iÕ®]Ê ÕÀ«i>Ê 1Ê *x]Ê *È]Ê *Ç®]Ê 7>i]Ê X Applications and libraries for large-scale distributed systems Commercial subcontracting. X Applications and libraries for combinatorial optimisation based on constraint programming X Educational material for programming curriculum Partnership X Advanced tools and libraries for human-computer interfaces
X Distributed Systems Laboratory, Swedish Institute of Computer Science (SICS) (Sweden) KEYWORDS X ÃÌÌÕÌÊ `iÊ ,iV iÀV iÊ iÌÊ À`>ÌÊ VÕÃ̵ÕiÉ ÕõÕiÊ Computer programming (IRCAM) (France) Programming languages Constraint programming X Department of Microelectronics and Information Technology, Large-scale distributed systems ,Þ>ÊÃÌÌÕÌiÊvÊ/iV }ÞÊ/®Ê-Üi`i® Data-intensive computing X À>`<ÕÃiÌÃÌiV Ê iÀÊ < ®Ê Peer-to-peer computing iÀ>Þ® Cloud computing X Initiative pour la Recherche et Innovation sur le Logiciel Libre «iÝÊÃÞÃÌià (IRILL) et Université Paris Diderot (France) X iÌÀiÊ `½ ÝViiViÊ iÊ /iV }iÃÊ `½vÀ>ÌÊ iÌÊ `iÊ CONTACT Communication (CETIC) (Belgium) Peter VAN ROY X Euranova (Belgium) [email protected] X 6-*Ê,iÃi>ÀV ÊÀÕ«]Ê*ÌwV>Ê1ÛiÀÃ`>`Ê>ÛiÀ>>Ê>`Ê Tel. 32 (0) 485 42 46 77 1ÛiÀÃ`>`Ê`iÊ6>iÊ L>® X *ÈÊ*À}À>}Ê,iÃi>ÀV ÊÀÕ«]Ê1ÛiÀÃÌjÊ*iÀÀiÊiÌÊ >ÀiÊ Curie (France) WEB SITE X â>ÀÌÊ *À}À>}Ê ÕÌÞÊ "«i-ÕÀViÊ iÛi«iÀÃÊ http://pldc.info.ucl.ac.be and Users)
34 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 5
Coordination and mobile languages
SENIOR SCIENTISTS: X i> >ÀiÊ +1 / X Isabelle LINDEN
Research Field and Subjects X Ê °]Ê ,"Ê °]Ê 1 "<Ê °°]Ê +1 /Ê ° °]Ê Ê °Ê >`Ê *"* - 1Ê ,°]Ê -iVÕÀiÊ *Ó*Ê *À}À>}Ê Ê /«Ê Coordination languages are recognised as promising to deal of Tuple Spaces. Proceedings of the 17th IEEE International with a number of issues in agent-based and component-based Workshops on Enabling Technologies: Infrastructures for software construction where components need to coordinate Collaborative Enterprises (WETICE), pp. 54-59, 2008. themselves. X +1 /Ê ° °Ê >`Ê Ê °]Ê À`>Ì}Ê ÌiÝÌ aware Applications in Mobile Ad-hoc Noteworks. In T. Braun, Ê Ì iÊ " 1-Ê ÀiÃi>ÀV Ê }ÀÕ«]Ê ÃÕV Ê >Ê >}Õ>}i]Ê V>i`Ê >V ]Ê °ÊÃÌ>Ì>Ã]Ê-°Ê >ÃVÊ>`Ê °Ê7ÕvvÊi`î]Ê*ÀVii`}ÃÊvÊ has been designed. Its main characteristics are the use of a the first ERCIM workshop on eMobility, pp. 107-118, 2007. tuple space shared by processes and communication between X Ê °Ê >`Ê +1 /Ê ° °]Ê "Ê Ì iÊ Ý«ÀiÃÃÛiiÃÃÊ vÊ processes in an asynchronous manner through that space. This is Timed Coordination via Shared Dataspaces. Electronic Notes in believed to model conveniently current distributed systems like Theoretical Computer Science, Elsevier, vol. 180 (2), pp 71-89, those based on the web or on the cloud computing paradigm. 2007.
6>ÀÕÃÊiÝÌiÃÃÊ >ÛiÊLiiÊÃÌÕ`i`]ÊvÀÊÃÌ>ViÊÌÊ`i>ÊÜÌ Ê temporal data and conditional access. Recently, mobile and ad Funding hoc networks have been addressed. These are networks that are formed in an opportunistic way by mobile devices that X FSR travel from site to site, coming accidentally close enough to X Wallonie iÊ>Ì iÀÊÌÊVÕV>Ìi°ÊÛiÊÌ >ÌÊÌ iÊÕLiÀÊvÊÃÕV Ê devices is constantly growing, the design of applications that support this kind of mobility is recognised as an important Partnership VViÀÊÊÌ iÊVÕÀÀiÌÊÀiÃi>ÀV °ÊÊÌ ÃÊVÌiÝÌ]Ê>Ê«ÀÌ>ÌÊ >ëiVÌÊÃÊÌ iÊ«ÃÃLÌÞÊvÊ>«Õ>Ì}ÊVÌiÝÌÕ>ÊvÀ>ÌÊ X University of Pisa, Italy in a reactive way. In order to be useful in such a setting, the >V ÊVÀ`>ÌÊ`iÊÃÊLi}ÊiÝÌi`i`ÊÌÊ>ÜÊvÀÊLiÌÌiÀÊ VÌiÝÌÊ>>}iiÌÊ>`ÊvÀÊ«ÀL>LÃÌVÊiÛiÌÃÊÌi}À>Ì° KEYWORDS Coordination Such coordination languages are studied from different Component-based systems Mobility «iÀëiVÌÛiÃ\Ê Ãi>ÌVÃ]Ê iÝ«ÀiÃÃÛiiÃÃÊ ÃÃÕiÃ]Ê «À}À>}Ê Ad hoc networks methodologies, language design and implementation.
CONTACTS Representative References Jean-Marie JACQUET Jv°vÕ`«°>V°Li X +1 /Ê ° °Ê >`Ê Ê °]Ê ÕÞÊ LÃÌÀ>VÌÊ `iÃÊ >`Ê Tel. 32 (0) 81 72 50 01 Refinements as Tools to Compare Agents in Timed Coordination Isabelle LINDEN Languages. Theoretical Computer Science, Elsevier, vol. 410 [email protected] (2-3), pp. 221-253, 2009. Tel. 32 (0) 81 72 49 87
35 36 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 6
Program analysis and verification
SENIOR SCIENTIST: X 7Ê6 ""
Research Field and Subjects Representative References
Program analysis is the research field comprising the study of X 9 ,Ê ,°Ê >`Ê 6 ""Ê 7°]Ê *À«iÀÊ À>Õ>ÀÌÞÊ vÀÊ techniques that collect useful properties about the behaviour ÌVÊ -iVÌÃÊ Ê VÕÀÀiÌÊ *À}À>Ã°Ê Ê °Ê 6`>Ê i`°®Ê iÝ LÌi`ÊLÞÊ>Ê«À}À>ÊLÞÊ>>ÞÃ}Ê«ÀiviÀ>LÞÊÊ>ÊV«iÌiÞÊ Preproceedings of the 21st International Symposium on Logic- >ÕÌ>ÌVÊÜ>Þ®ÊÌÃÊ`>Ì>Ê>`ÉÀÊVÌÀÊyÜ° based Program Synthesis and Transformation, 2011. X "-Ê °Ê >`Ê 6 ""Ê 7°]Ê Clones in Logic programs ÊÌ iÊ" 1-ÊÀiÃi>ÀV Ê}ÀÕ«]Ê>ÊÃÕLÃÌ>Ì>Ê>ÕÌÊvÊ>ÌÌiÌÊ and how to detect them. Ê°Ê6`>Êi`°®Ê*Ài«ÀVii`}ÃÊvÊÌ iÊ is devoted to the analysis, transformation and verification of 21st International Symposium on Logic-based Program Synthesis programs, in particular for programs written in a declarative and Transformation, 2011. language. Since these languages have a simple structure and X 9 ,Ê ,°]Ê 6 Ê -- Ê °]Ê 6 Ê °Ê >`Ê are usually defined by means of a small but formal semantics, 6 ""Ê 7°]Ê Declarative Workflows to Efficiently Manage it makes it effectively easier to construct semantics-preserving Flexible and Advanced Business Processes. In Proceedings of the program transformations and to devise analyses that are 12thÊÌiÀ>Ì>Ê Ê-* Ê-Þ«ÃÕÊÊ*ÀV«iÃÊ>`Ê both safe (in the sense that the analysis results are a correct Practice of Declarative Programming (PPDP) 2010, pp. 209-218, >««ÀÝ>ÌÊ vÊ Ì iÊ «À}À>½ÃÊ Ãi>ÌVÃ®Ê >`Ê «ÀiVÃiÊ °i°Ê ACM, 2010. ÀiÌ>}Ê>Ê>ÝÕÊvÊÕÃivÕÊvÀ>Ì®°ÊÊ«>ÀÌVÕ>À]ÊÌ iÊ X ,6 Ê °]Ê- ,6 ,-Ê /°Ê >`Ê 6 ""Ê 7°]Ê Towards a following themes are pursued: framework for constraint-based test case generation. in D. De Schreye (ed). Logic-based Program Analysis and Transformation, qÊ *À}À>Ê >>ÞÃÃÊ vÀÊ `iÛi«}Ê VVÕÀÀiÌÊ `iV>À>ÌÛiÊ -ÊÈäÎÇ]Ê-«À}iÀ6iÀ>}]Ê2009. programs, in which the focus is on developing static program analyses for detecting application-level race conditions and granularity control of atomic sections. Funding qÊ iÊ `iÌiVÌÊ >`Ê >ÕÌ>ÌVÊ Àiv>VÌÀ}Ê Ê `iV>À>ÌÛiÊ programs. Clones in a program refer to program fragments X `ÃÊ`iÊ>Ê,iV iÀV iÊ-ViÌwµÕiÊ ,-É,® that are redundant in the sense that they implement or share X Fonds Spécial de Recherche (FSR) a functionality that is already present in some other program fragment. An analysis has been developed in logic programs to identify the clones whose outputs can be used to automatically KEYWORDS drive a number of programs refactoring that aim at removing Program analysis such redundancy in the program. Program understanding Clone detection qÊ /iÃÌÊ`>Ì>Ê}iiÀ>ÌÊvÀÊ`>Ì>L>ÃiÊÌiÃÛiÊ>««V>ÌðÊ/ iÊ Automatic refactoring idea behind test data generation is to automate the generation Test input generation of a suitable set of inputs with respect to which a program can be Concurrent program analysis ÌiÃÌi`°ÊÊvÀ>iÜÀÊ >ÃÊLiiÊ`iÛi«i`ÊÊÌ iÊ" 1-ÊÀiÃi>ÀV Ê group in order to generate test data that are parameterised with respect to a given coverage criterion. It is currently investigated CONTACT Ü iÌ iÀÊ>`Ê ÜÊÌ iÊvÀ>iÜÀÊV>ÊLiÊiÝÌi`i`ÊÊÀ`iÀÊÌÊ Wim VANHOOF deal with applications whose data is recorded in a relational [email protected] database. Tel. 32 (0) 81 72 49 77
37 38 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 7
Evolution / Software Product Line Engineering
SENIOR SCIENTISTS: X *>ÌÀVÊ 9 - X *iÀÀi9ÛiÃÊ- " - X iÃÊ* ,,"1
Research Field and Subjects Proceedings of the 32nd International Conference on Software Engineering (ICSE 2010), Cape Town, South Africa, Proceedings, Software Product Line Engineering (SPLE) is of interest to any «>}iÃÊÎÎxqÎ{{]Ê ]Ê2010. company that develops a line of software products or services X 9 -Ê *°]Ê - " -Ê *°9°]Ê /,18Ê ° °]Ê that are similar, but also customised for specific clients or " / *-Ê 9°]Ê /1 6 1-Ê ,°]Ê -- Ê °]Ê Û>Õ>Ì}Ê market segments. Developing and maintaining efficiently such Formal Properties of Feature Diagram Languages, in IET Software software families require specific tools and concepts, since the ÕÀ>]ÊÛÕiÊÓ]ÊÃÃÕiÊÎ]Ê««°ÊÓn£ÎäÓ]Ê2008. ones of classical software engineering are designed with a single X - " -Ê *°9°]Ê 9 -Ê *°]Ê /,18Ê ° °Ê >`Ê product in mind. For instance, an error detected in one product " / *-Ê 9°]Ê iiÀVÊ Ãi>ÌVÃÊ vÊ vi>ÌÕÀiÊ `>}À>Ã°Ê should be analysed to discover all products affected, and correct «ÕÌiÀÊ iÌÜÀÃ]Êx£Ó®\{xÈq{Ç]Ê2007. the problem for all products at once. X /< ,Ê °]Ê 9 -Ê *°]Ê *"Ê °]Ê - " -Ê *°9°]Ê -6Ê°]Ê Ã>L}Õ>Ì}ÊÌ iÊ VÕiÌ>ÌÊvÊ6>À>LÌÞÊÊ The introduction of SPLE can bring important benefits to -vÌÜ>ÀiÊ*À`ÕVÌÊiÃ\ÊÊ-i«>À>ÌÊvÊ ViÀÃ]ÊÀ>â>ÌÊ ÃvÌÜ>ÀiÊ`iÛi«iÀðÊÀÊÃÌ>Vi]ÊiÜiÌÌ*>V>À`ÊÀi«ÀÌi`Ê>Ê and Automated Analysis. In Proceedings of the 15th IEEE four-fold increase of development productivity, and a ten-fold International Conference on Requirements Engineering (RE’07), decrease of the number of defects. Cummins, Inc., reported a pp. 243-253, 2007. 50-fold reduction of time-to-market. Furthermore, introducing X - " -Ê *°9°]Ê 9 -Ê *°]Ê /,18Ê ° °]Ê i>ÌÕÀiÊ a product line brings commercial advantages and thus higher Diagrams: A Survey and a Formal Semantics. In Proceedings margins, by targeting customer needs very precisely while of the 14th IEEE International Conference on Requirements offering a large portfolio of products at a reduced cost. Engineering (RE’06), pages 139-148, 2006.
The main tool we propose for managing a product line is Feature `i}]Ê >Ê ÌiV µÕiÊ ÌÊ iÝ«VÌÞÊ >`Ê V«>VÌÞÊ `VÕiÌÊ Funding features and their legal combinations. Feature models are the basis for efficient variability management, quality assurance and 7>i]Ê ÕÀ«i>Ê ÃÃ]Ê -*"]Ê >µÕiÊ >Ì>iÊ`iÊ automated product derivation. Belgique, FEDER, F.R.S.-FNRS
Representative References Partnership
X -- Ê °]Ê "1 ,Ê +°Ê >`Ê 9 -Ê *°]ÊÊ ÌiÝÌL>Ãi`Ê X Academic: University of Duisburg-Essen, INRIA, University of >««À>V ÊÌÊvi>ÌÕÀiÊ`i}\Ê-ÞÌ>ÝÊ>`ÊÃi>ÌVÃÊvÊ/6°ÊÊ Waterloo (Canada), University of Sevilla Science of Computer Programming, Special Issue on Software X `ÕÃÌÀÞ\Ê"Vj]Ê-«>ViLi]Ê / ÛÕÌ]Ê`>«Ì>LÌÞÊ>`Ê6>À>LÌÞ]ÊÇÈ£Ó®\££Î䣣{Î]Ê2011. X -- Ê°]Ê 9 -Ê*°]Ê- " -Ê*°9°Ê>`Ê 9Ê°]Ê Symbolic model checking of software product lines. In 33rd Products and Services International Conference on Software Engineering (ICSE 2011), 7>]ÊÕÕ]Ê>Ü>]Ê*ÀVii`}Ã]Ê«>}iÃÊÎÓ£qÎÎä°Ê ]Ê X Training, coaching, consulting 2011. X /ÃÊ/-]Ê/6]Ê 7® X -- Ê °]Ê 9 -Ê *°]Ê - " -Ê *°9°]Ê 9Ê °Ê X ,iÃi>ÀV ÊÌÀ>ÃviÀÊ«ÀiVÌà >`Ê ,- Ê °°]Ê `iÊ V iV}Ê ÌÃÊ vÊ ÃÞÃÌiÃ\Ê vwViÌÊ verification of temporal properties in software product lines. In
39 KEYWORDS Software Product Lines Software Reuse
CONTACTS Patrick HEYMANS [email protected] Tel. 32 (0) 81 72 52 75
Pierre-Yves SCHOBBENS [email protected] Tel. 32 (0) 81 72 49 90
WEB SITE http://www.fundp.ac.be/precise/
40 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 8
Requirements Engineering
SENIOR SCIENTISTS: X *>ÌÀVÊ 9 - X *iÀÀi9ÛiÃÊ- " - X -Ìj« >iÊ1 , X Û>Ê1, /
Research Field and Subjects X 18Ê °]Ê Ê °Ê°Ê °Ê>`Ê 9 -Ê*°]Ê >}Ê it all up: getting on the act to improvise creative requirements, Requirements Engineering (RE) is concerned with what in Proceedings of the 18th IEEE International Requirements Information Systems should do, and how well, rather than Engineering Conference (invited mini-tutorial at RE’10), Sydney, how]Ê ÌiV V>Þ]Ê Ì iÞÊ >ÀiÊ «iiÌi`°Ê ÕÃÌÊ iÊ >ÀV ÌiVÌÃÊ Australia, 2010. draw plans of buildings, requirements engineers draw “plans” X 1 18Ê °]Ê -Ê °Ê °]Ê -- Ê °]Ê 9 -Ê *°]Ê of software based on stakeholders’ needs, resources and Workflow-driven Product Derivation (Invited Talk), in First constraints. International Workshop on Product Line Requirements }iiÀ}Ê>`Ê+Õ>ÌÞÊ*, +¿£ä®]Ê ÃÃi]ÊiÀ>ÞÊÕiÊÎä]Ê >ÞÃiÃÊvÊ«ÀiVÌÊv>ÕÀiÃÊ >ÛiÊà ÜÊÌ >ÌÊÀiµÕÀiiÌÃÊ«>ÞÊ 2010. >Ê ViÌÀ>Ê ÀiÊ Ê «ÀiVÌÊ ÃÕVViÃÃÊ >LÛiÊ Î䯮°Ê / ÃÊ ÃÊ i>ÃÞÊ ÌÊ X 1, /Ê °]Ê ", Ê °]Ê , -/Ê °]Ê 9"*"1"-]Ê /iV i\Ê understand, since this is the first step upon which all others /Ü>À`ÃÊ >Ê iÜÊ iiÀ>ÌÊ vÊ ,iµÕÀiiÌÃÊ `i}Ê depend. The cost of correcting requirements errors increases up >}Õ>}iÃÊÜÌ Ê>Ã]Ê*ÀiviÀiViÃ]Ê>`ÊVÃÃÌiVÞÊ>`}]Ê to a hundred times as the development proceeds. It is therefore in Proceedings of the 18th IEEE International Requirements ÛÌ>]Ê LÕÌÊ `vwVÕÌ]Ê ÌÊ >ÝÃiÊ Ì iÊ µÕ>ÌÞÊ vÊ ÀiµÕÀiiÌÃÊ Engineering Conference (RE’10), Sydney, Australia, 2010. documents. X "" 9Ê °]Ê 9 -Ê *°]Ê /1 6 1-Ê ,°]Ê 6ÃÕ>Ê ÃÞÌ>ÝÊ does matter: improving the cognitive effectiveness of the i* Since requirements are where software originates, RE is also visual notation, in Requirements Engineering, volume 5, issue a creative discipline. The requirements engineer must act as a 2 (Springer), and in Proceedings of the 17th IEEE International facilitator among stakeholders, guiding them to “invent” the ,iµÕÀiiÌÃÊ }iiÀ}Ê viÀiViÊ , ¿ä®]Ê Ì>Ì>]Ê right software for them. RE consequently requires an unusual iÀ}>]Ê1-]Ê««°Ê£Ç££näÊ iÃÌÊ«>«iÀÊ>Ü>À`®Ê2009. ÝÊvÊÃvÌÊ>`Ê >À`ÊÃð X 1, /Ê°]Ê 9"*"1"-Ê°]Ê1 ,Ê-°]Ê>ÞÃÃÊvÊ ÕÌ *>ÀÌÞÊ }ÀiiiÌÊ Ê ,iµÕÀiiÌÃÊ 6>`>Ì]Ê Ê *ÀVii`}ÃÊ iÞ`ÊÕÀÊ}iiÀ>ÊiÝ«iÀÌÃiÊÊÌ iÊ, Ê`ÃV«i]ÊÌ iÊ*,i - Ê of the 17th IEEE International Requirements Engineering Research Centre has gained international recognition in viÀiViÊ, ¿ä®]ÊÌ>Ì>]ÊiÀ}>]Ê1-Ê2009. specialties like requirements for software product lines, X 18Ê °Ê >`Ê Ê °Ê °Ê °]Ê / i>ÌiÀÊ «ÀÛÃiÀÃÊ requirements visualisation, goal-oriented requirements as well ÜÊÌ iÊ,iµÕÀiiÌÃÊ>i]Ê ÊÃvÌÜ>Ài]ÊÛ°ÊÓx]Ê °Êx]Ê as collaboration and creativity techniques for requirements. «°ÊÈnqÈ]Ê2008. "ÕÀÊ V>LÀ>ÌÃÊ ÜÌ Ê `ÕÃÌÀÞÊ VÕ`iÊ ViÀÌvÞ}Ê ÌÀ>}Ã]Ê X -- Ê °]Ê 9 -Ê *°]Ê - " -Ê *°9°]Ê 7 >Ì¿ÃÊ V>V }]ÊVÃÕÌ}Ê>`ÊÀiÃi>ÀV ÊÌÀ>ÃviÀÊ«ÀiVÌÃÊÊ>Ê>Ài>ÃÊ in a Feature? A Requirements Engineering Perspective, of RE. in Proceedings of the 11th International Conference on Õ`>iÌ>Ê ««À>V iÃÊ ÌÊ -vÌÜ>ÀiÊ }iiÀ}Ê - ¿än®]Ê collection LNCS, volume 4961, pp. 16-30, 2008. Representative References
X 18Ê °]Ê 9 -Ê *°Ê >`Ê -6Ê °]Ê ÃVÛiÀ}Ê Awards -ÕÃÌ>>LÌÞÊ ,iµÕÀiiÌÃ\Ê Ê Ý«iÀiViÊ ,i«ÀÌ]Ê Ê ,iµÕÀiiÌÃÊ }iiÀ}\Ê Õ`>ÌÊ vÀÊ -vÌÜ>ÀiÊ +Õ>ÌÞÊ Best paper award at 17th IEEE International Conference on , -+½Ó䣣®]Ê«°Ê£qÎÎ]Ê2011. Requirements Engineering (RE’09)
41 Funding KEYWORDS Requirements 7>i]Ê ÕÀ«i>Ê ÃÃ]Ê -*"]Ê >µÕiÊ >Ì>iÊ`iÊ Business Analysis Software engineering Belgique, FEDER, F.R.S.-FNRS Software Product Lines Collaboration
Partnership
CONTACTS X V>`i>\Ê ÌÞÊ 1ÛiÀÃÌÞÊ `®]Ê 1ÛiÀÃÌÞÊ vÊ "ÌÌ>Ü>]Ê Patrick HEYMANS University of Toronto, University of Trento [email protected] X `ÕÃÌÀÞ\Ê"ÌVÃ]ÊiÃViÌ]Ê9iÜ Tel. 32 (0) 81 72 52 75
Pierre-Yves SCHOBBENS [email protected] Products and Services Tel. 32 (0) 81 72 49 90
X Certifying training, coaching, consulting WEB SITE http://www.fundp.ac.be/precise/
42 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 9
Real-Time System Verification
SENIOR SCIENTIST: X *iÀÀi9ÛiÃÊ- " -
Research Field and Subjects Funding
Many computer-based systems are critical: their failure could F.R.S.-FNRS endanger lives or cause huge financial losses. It is therefore worth to submit them to thorough validation and verification. At the PReCISE Research Centre, we consider formal validation by Partnership model checking, since this technique is already well accepted in the digital electronic industry due to its high level of automation X SPACEBEL >`ÊÌÃÊiÝ >ÕÃÌÛiiÃÃ°Ê ÃÌÊvÊÌ iÃiÊVÀÌV>ÊÃÞÃÌiÃÊ>ÀiÊÀi> X Université catholique de Louvain Ìi\ÊÌ iÞÊÕÃÌÊÀi>VÌÊÜÌ ÊÌ} ÌÊ`i>ÞÊVÃÌÀ>ÌðÊ6iÀwV>ÌÊ X 1ÛiÀÃÌjÊLÀiÊ`iÊ ÀÕÝiià can then be performed by comparing a model of the system X Université de Liège (ULg) (including its real-time aspects) with its implementation. Any X University of Aalborg, Denmark mismatch will be reported as a failed test case, e.g. a timed sequence. Introducing model-checking in product development has been reported to strongly increase reliability and decrease Products and Services testing cost. Consultancy for verification, modelling.
Representative References KEYWORDS
X Ê °9°]Ê - " -Ê *°9°]Ê * // ,--" Ê *°]Ê 6iÀvÞ}Ê 6iÀwV>Ì functional behaviors of automotive products in EAST-ADL2 using Embedded systems Real-time, reliability 1***",/]ÊÊÎäÌ ÊÌiÀ>Ì>Ê viÀiViÊÊ «ÕÌiÀÊ Model checking ->viÌÞ]Ê,i>LÌÞÊ>`Ê-iVÕÀÌÞÊ- " *®]Ê >«iÃ]ÊÌ>Þ]Ê-i«ÌÊ 19-21, 2011. X -- Ê °]Ê 9 -Ê *°]Ê - " -Ê *°9°]Ê 9Ê °]Ê CONTACT Symbolic Model Checking of Software Product Lines, in 33rd Pierre-Yves SCHOBBENS International Conference on Software Engineering, ICSE 2011, [email protected] pp. 321-330 May 21-28, 2011. Tel. 32 (0) 81 72 49 90 X ",/<Ê6 Ê°]Ê 9Ê°]Ê- " -Ê*°9°]Ê ÃÌÀLÕÌi`Ê ÛiÌÊ
VÊÕÌ>Ì>\Ê ÝÌi`i`Ê>LÃÌÀ>VÌ]ÊÊ ÊÓ䣣]ÊViVÌÊ WEB SITE LNCS, volume 6807, pp. 250-263, 2011. http://www.fundp.ac.be/en/precise X 1 18Ê°]Ê 9 -Ê*°]Ê- " -Ê*°9°]Ê -Ê °Ê°]Ê DERIDDER D., Supporting Multiple Perspectives in Feature-based Configuration, in Software and Systems Modeling (SoSyM), 2011. X " / *-Ê 9°]Ê -6Ê °]Ê - " -Ê *°9°]Ê 9 -Ê *°]Ê -ÞÌ mÃiÊ`iÊ`>}À>iÃÊ`¿jÌ>ÌÃÊ«>ÀÊV>ÃÃiÊDÊ«>ÀÌÀÊ`iÊ`>}À>iÃÊ de séquence, in Technique et Science Informatiques, 2007.
43 44 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 10
Service Engineering
SENIOR SCIENTISTS: X >i`Ê "1 "1< X i> lÊ " X -Ìj« >iÊ1 , X Û>Ê1, / X * ««iÊ/,
Research Field and Subjects Representative References
Achieving increased automation requires open, distributed, X 1, /Ê°]Ê ", Ê°]Ê , -/Ê °Ê °]Ê 9"*"1"-Ê°]Ê/Ü>À`ÃÊ service-oriented systems capable of multi-criteria driven, dynamic >Ê iÜÊiiÀ>ÌÊvÊ,iµÕÀiiÌÃÊ `i}Ê>}Õ>}iÃÊÜÌ Ê adaptation for appropriate response to changing operating >Ã]Ê *ÀiviÀiViÃ]Ê >`Ê VÃÃÌiVÞÊ >`}°Ê , ]Ê ««°Ê ££x conditions. A service is a self-describing and self-contained 124, 2010. `Õ>ÀÊ>««V>ÌÊ`iÃ}i`ÊÌÊiÝiVÕÌiÊ>ÊÜi`iÌi`ÊÌ>Ã]Ê X "-,6,Ê °]Ê /,Ê °]Ê "< Ê °]Ê /, Ê * °]Ê and that can be described, published, located, and invoked >Þâ}Ê ÕÌiÃÊ vÊ 7iLÊ -iÀÛViÃÊ 1Ã}Ê ViÌÛiÃ°Ê over a network. Services are offered by service providers, that ÌiÀ>Ì>ÊÕÀ>ÊvÊ7iLÊ-iÀÛViÃÊ,iÃi>ÀV ]ÊÛÕiÊÇ]ÊÃÃÕiÊ is, organisations that ensure service implementations, advertise 3, pages 30-51, 2010. service descriptions, and provide related technical and business X 1, /Ê °]Ê ,-- -Ê °]Ê 1 ,Ê -°]Ê Ê V«Ài iÃÛiÊ support. µÕ>ÌÞÊ `iÊ vÀÊ ÃiÀÛViÀiÌi`Ê ÃÞÃÌiÃ°Ê -vÌÜ>ÀiÊ +Õ>ÌÞÊ ÕÀ>ʣǣ®]Ê««°ÊÈxn]Ê2009. To interact with the service-oriented system, stakeholders submit X 9Ê9°]Ê1, /Ê°]Ê1 ,Ê-°]Ê"1--Ê-°]Ê ÌÕ>ÞÊ service requests. Satisfying a service request usually involves i>À}Ê"«Ì>ÊV>ÌÃÊvÊ-iÀÛViÃÊÌÊ/>ÃÃ°Ê Ê/°Ê-iÀÛViÃÊ service composition, that is, the identification of appropriate Computing 1(3), pp. 141-154, 2008. ÃiÀÛViÃÊ >`Ê Ì iÀÊ VÀ`>Ìi`Ê iÝiVÕÌ°Ê ,iëÃLÌÞÊ vÀÊ X -1 , Ê -°]Ê /, Ê * °]Ê , ,Ê ° °]Ê service composition can either be delegated to humans or to "-/ "1Ê°°]Ê ,Ê<°]Ê"ÊÌ iÊ >ViiÌÊvÊ * Ê autonomous agents. Service-orientation is an attractive approach }iÃÊvÀÊ-ivi>}Ê «ÃÌiÊ7iLÊ-iÀÛViðÊ-Þ«ÃÕÊ ÌÊÌ iÊi}iiÀ}ÊvÊV«iÝÊ`iViÌÀ>Ãi`ÊvÀ>ÌÊÃÞÃÌiÃ°Ê on Applications of and the Internet (SAINT), IEEE, pp. 33-39, Among the main reasons, one finds the fact that services are 2008. designed to be modular and interoperable, that open service- X ,Ê <°]Ê - Ê °]Ê /, Ê * °]Ê ,Ê °]Ê oriented systems are designed to accept entry and participation 1-/ ,Ê -°]Ê -// / Ê -°]Ê /Ü>À`ÃÊ >Ê ÌiÝÌL>Ãi`Ê of previously unknown services, that services can be designed Multi-Type Policy Approach for Web Services Composition, Data >ÃÊ ÌiÀv>ViÃÊ ÌÊ i}>VÞÊ ÃÞÃÌiÃ]Ê iÌV°Ê "ÛiÀ>]Ê ÃiÀÛViÀiÌi`Ê >`ÊÜi`}iÊ }iiÀ}Ê ®]ÊÛÕiÊÈÓ]ÊÃÃÕiÊÓ]Ê««°ÊÎÓÇ architectures increasingly enable organisations to make their 351, 2008. vÀ>ÌÊ ÌiV }ÞÊ vÀ>ÃÌÀÕVÌÕÀiÃÊ /®Ê yiÝLi]Ê v>VÌ>Ì}Ê X /,Ê°]Ê ,Ê<°]Ê - Ê°]Ê/, Ê* °]ÊÊ for instance IT change management and IT outsourcing. argumentation framework for communities of Web services. IEEE Intelligent Systems, volume 22, issue 6, pp. 75-83, 2007. Engineering service-oriented systems efficiently is a critical VViÀÊ >ÌÊ «ÀiÃiÌÊ LÌ Ê Ê ÀiÃi>ÀV Ê >`Ê `ÕÃÌÀÞ°Ê iÞÊ Ì«VÃÊ studied in the PReCISE Research Centre are: Funding qÊ ,iµÕÀiiÌÃÊi}iiÀ}ÊvÀÊÃiÀÛViÀiÌi`ÊÃÞÃÌià X FUNDP qÊ "Ì}iÃÊvÉvÀÊÃiÀÛViÀiÌi`ÊÃÞÃÌià X Banque Nationale de Belgique qÊ -iÀÛViÀiÌi`Ê>ÀV ÌiVÌÕÀi X 7>i ÀÕÝiiÃÊÌiÀ>Ì> qÊ -iÀÛViÊ ÀiVi`>Ì]Ê >`>«Ì>ÌÊ EÊ V«ÃÌÊ >ÌÊ ÀÕÊ X F.R.S.-FNRS time X EU (FP7) qÊ +-ÊÌÀÞ]ÊÀi«ÕÌ>ÌÊ>ÃÃiÃÃiÌ qÊ «iÀ>ÌÊLiÌÜiiÊÃiÀÛViÃÊVÌÀ>VÌÊEÊ«ViÃÊLiÌÜiiÊ «>ÀÌiÃÊÆÊÃiÀÛViÊÃÕLÃÌÌÕÌÊ>`ÊÃiiVÌ® qÊ ÕÌ ÀÃ>ÌÊ>`ÊÌÀÕÃÌÊÊÃiÀÛViÀiÌi`ÊÃÞÃÌiÃ
45 Partnership KEYWORDS Service-oriented computing
X Concordia University, Montréal, Canada Requirements engineering Decision-support X University of Lyon 1, France Service selection X <>Þi`Ê1ÛiÀÃÌÞ]Ê ÕL>]Ê1 Service composition X /iV V>Ê1ÛiÀÃÌÞÊvÊ6i>]ÊÕÃÌÀ> Reputation X University of Trento, Italy +-Ê ÌÀ} X 6`>viÊÀÕ«]Ê ØÃÃi`Àv]ÊiÀ>Þ Authentication Authorisation
Products and Services CONTACTS Mohamed BOUKHEBOUZE X Methods for requirements engineering of service-oriented >i`°LÕ iLÕâiJvÕ`«°>V°Li systems Tel. 32 (0) 81 72 49 65 X +Õ>ÌÞÊVÀÌiÀ>ÊvÀÊÌ iÊiÛ>Õ>ÌÊvÊÃiÀÛViÀiÌi`ÊÃÞÃÌià X Assessment of industrial methods and processes for service- Jean-Noël COLIN oriented systems engineering i>i°VJvÕ`«°>V°Li Tel. 32 (0) 81 72 52 74 X Training in best practices in, and advanced technologies for service-oriented systems engineering Stéphane FAULKNER X Decision methods for service selection [email protected] X Reputation-driven service recommendation algorithms Tel. 32 (0) 81 72 48 77
Ivan JURETA Û>°ÕÀiÌ>JvÕ`«°>V°Li Tel. 32 (0) 81 72 48 88
Philippe THIRAN [email protected] Tel. 32 (0) 81 72 53 01
WEB SITES http://www.fundp.ac.be/en/precise http://webapps.fundp.ac.be/wsc/
46 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 11
Communities of Web services
SENIOR SCIENTIST: X * ««iÊ/,
Research Field and Subjects To address the aforementioned questions, the researchers studied and validated the appropriateness of empowering The W3C defines a Web service as a software system having 7iLÊ ÃiÀÛViÃÊ ÜÌ Ê iÝÌÀ>Ê V>«>LÌiÃÊ Ì ÀÕ} Ê Ì iÊ ÕÃiÊ vÊ an interface described in a machine-processing format and agents. As such, they abstract Web services and communities designed to support machine-to-machine interactions over a >ÃÊ >}iÌÃÊ Ì >ÌÊ >ÀiÊ V>«>LiÊ ÌÊ i}>}iÊ Ê V«iÝÊ «iÀ>ÌÃÊ network such as the Internet. ÃÕV Ê>ÃÊ>À}ÕiÌ>ÌÊi°}°]ÊÌÊVÛViÊ>Ê7iLÊÃiÀÛViÊÊ>Ê community), negotiation (e.g., to identify a trade-off between As the number of Web services through the Internet continues Web services rewards and penalties), and making decisions to increase, the needs for discovering and engaging these Web (e.g., to select the appropriate Web service in response to a ÃiÀÛViÃÊÊÀiÊV«iÝÊ>`ÊV«iÌiÊLÕÃiÃÃÊÃÕÌÃÊ>ÀiÊ user’s request). stressed out, leading to very rich settings for market competition.
Ê Ì ÃÊ VÌiÝÌ]Ê Ì iÊ *,i - Ê ÀiÃi>ÀV Ê ViÌÀiÊ «À«Ãi`]Ê >}Ê Representative References with partners, the notion of community of Web services to gather Web services having the similar functionalities (e.g., X "-,6,Ê °]Ê--Ê °]Ê /,Ê°]Ê/, Ê* °]Ê flight booking and travel reservation) in the same “virtual” Ê >iÊ / iÀiÌVÊ ««À>V Ê vÀÊ >Þâ}Ê Ì iÊ vwViVÞÊ vÊ Ã«>ViÊ«iÀÌÌ}ÊÌÊVÀi>ÌiÊ«ViÌÃÊvÊiÝ«iÀÌÃi° Web Services in Collaborative Networks. In Proceedings of the 8th IEEE International Conference on Services Computing (SCC Using communities offers many advantages that range from 2011), 2011. facilitating the discovery of Web services since they are all in the X "-,6,Ê °]Ê /,Ê°]Ê "< Ê°]Ê/, Ê* °]Ê"Ê same place, to enhancing the composition since Web services the Reputation of Agent-based Web Services. In Proceedings can be substituted and tasks can be delegated within the same of the Twenty-Fourth AAAI Conference on Artificial Intelligence community, to enforcing the security since the community is £ä®]Ê«>}iÃÊ£ÎxÓq£ÎxÇ]Ê2010. in charge of checking the credentials of the members before X "-,6,Ê °]Ê /,Ê °]Ê "< Ê °]Ê /, Ê * °]Ê }Ê >`Ê `ÕÀ}Ê Ì iÀÊ ÃÌ>ÞÊ Ê Ì iÊ VÕÌÞÊ >`]Ê >ÃÌÊ LÕÌÊ >Þâ}Ê ÕÌiÃÊ vÊ 7iLÊ -iÀÛViÃÊ 1Ã}Ê ViÌÛiÃ°Ê Ê not least, maintaining a “healthy” group of Web services by ÌiÀ>Ì>ÊÕÀ>ÊvÊ7iLÊ-iÀÛViÃÊ,iÃi>ÀV ]ÊÛÕiÊÇ]ÊÃÃÕiÊ iiVÌ}Ê vÀÊ Ì iÊ VÕÌÞÊ Ì ÃiÊ Ì >ÌÊ `Ê ÌÊ «iÀvÀÊ >ÃÊ 3, pages 30-51, 2010. iÝ«iVÌi`ÊÀÊÃLi >Ûi° X ,Ê<°]Ê-1 , Ê°]Ê/, Ê* °]Ê - Ê °Ê >`Ê /,Ê°]ÊÊ>««À>V ÊÌÊi}iiÀÊVÕÌiÃÊvÊÜiLÊ The developments done to bear this notion are around the services - concepts, architecture, operation, and deployment. In following questions: ÌiÀ>Ì>ÊÕÀ>ÊvÊ ÕÃiÃÃÊ,iÃi>ÀV ]ÊÛÕiÊx]ÊÃÃÕiÊ{]Ê qÊ ÜÊÌÊëiVvÞÊ>`ÊÀi«ÀiÃiÌÊVÕÌiÃÊvÊ7iLÊÃiÀÛViÃÊ pages 1- 21, 2009. ÜÌ ÊÀiëiVÌÊÌÊiÝÃÌ}Ê7Î ÊÃÌ>`>À`ÃÉëiVwV>Ìö X /,Ê°]Ê ,Ê<°]Ê - Ê°]Ê/, Ê* °]ÊÊ qÊ ÜÊÌÊëiVvÞÊ>`Ê>>}iÊ7iLÊÃiÀÛViÃÊÊ>ÊVÕÌÞ¶ argumentation framework for communities of web services. qÊ ÜÊÌÊ>iÊ>Ê7iLÊÃiÀÛViÊÃiiVÌÊÌ iÊVÕÌÞÊÌ >ÌÊÃÕÌÃÊ Ê ÊÌi}iÌÊ-ÞÃÌiÃ]ÊÛÕiÊÓÓ]ÊÃÃÕiÊÈ]Ê«>}iÃÊÇxqnÎ]Ê ÌÊLiÌÌiÀ¶ÊÜÊÌÊVÛViÊ>Ê7iLÊÃiÀÛViÊÌÊÀi>Ê}iÀÊÊ>Ê 2007. VÕÌÞ¶Ê`]Ê ÜÊÌÊiiVÌÊ>Ê7iLÊÃiÀÛViÊvÀÊ>ÊVÕÌÞÊ for misbehavior? qÊ ÜÊÌÊiÛ>Õ>Ìi]ÊiÃÌ>Là ]Ê>`ÊvÃÌiÀÊÌÀÕÃÌÊ>}ÊÌ iÊ7iLÊ services in a community?
47 Funding KEYWORDS Reputation
X Banque Nationale de Belgique +- Cooperative Web Services X 7>i ÀÕÝiiÃÊÌiÀ>Ì> Recommendation Agent-based Web Services
Partnership CONTACT
X Concordia University, Montréal, Canada Philippe THIRAN X University of Lyon 1, France [email protected] Tel. 32 (0) 81 72 53 01 X <>Þi`Ê1ÛiÀÃÌÞ]Ê ÕL>]Ê1
WEB SITES Products and Services http://www.fundp.ac.be/en/precise http://webapps.fundp.ac.be/wsc/ X Web communities’ infrastructure X Web services selection and recommendation (reputation- driven) X Web services monitoring
48 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 12
Information System Evolution
SENIOR SCIENTISTS: X Ì ÞÊ 6 X i>ÕVÊ 1/ X *iÀÀi9ÛiÃÊ- " - X *>ÌÀVÊ 9 -
Research Field and Subjects X /, Ê *°]Ê 1/Ê °°]Ê "1 Ê °°Ê >`Ê - Ê D., Wrapper-based evolution of legacy information systems, An information system is developed to support the business ACM Trans. Soft. Eng. Methodol., 15(4): pp. 329-359, ACM processes of an organisation. Any change in the latter or in the Press, 2006. underlying technology requires corresponding changes in the X 6 Ê °]Ê 1/Ê °°]Ê ÌÀ>ÃvÀ>ÌÃÊ Ê >Ì>L>ÃiÊ information system. ««V>ÌÃÊ ÛÕÌ]Ê Ê iiÀ>ÌÛiÊ >`Ê /À>ÃvÀ>Ì>Ê PReCISE has studied this phenomenon for long and has Techniques in Software Engineering, Lecture Notes in Computer developed innovative solutions to maintain the quality of -ViVi]Ê6ÕiÊ{£{Î]Ê««°Ê{ä{Ó£]Ê-«À}iÀ6iÀ>}]Ê2006. information system’s in an ever changing world. X /, Ê*°]Êi}>VÞÊ`>Ì>L>ÃiÊvi`iÀ>Ì°ÊÊVLi`ÊvÀÜ>À` In the database realm, three aspects have been addressed. First, Reverse approach, PhD Thesis, University of Namur, 2003. the evolution of organisational requirements leads to changes in the database. Second, the inter-organisation reengineering often implies interoperability problems among independent Awards information systems. Third, the technology evolution requires platform migration. These aspects of the phenomenon have Price IBM 2011 been coped with through specific methodologies that are supported by components of the DB-MAIN CASE tools. Wrapper- based architectures have been designed to automatically control Funding the evolution of databases in order to minimise the impact of these changes on the application programs. These results are X Wallonie iÝ«Ìi`Ê>`Ê>Ì>i`ÊLÞÊëvvÊ,iÛi,°Ê/ iÞÊ>ÀiÊ>««i`ÊÊ X FEDER ÃiÛiÀ>Êi`ÕÃâiÊÌÊ>À}iÊV«>ið Information System Evolution can be modelled as the addition of features that can then be combined in many ways. Partnership
X ReveR s.a, Belgium. Representative References X CWI, Amsterdam.
X 6 Ê°]Ê ," 18Ê°°]Ê 1/Ê°°]ÊÊ Vi«ÌÕ>Ê Approach to Database Applications Evolution, in Proc. of Products and Services ,½Óä£ä]Ê -]Ê««°Ê£ÎÓÊÊ£{x]Ê-«À}iÀ6iÀ>}]Ê2010. X 6 Ê °]Ê -Ê /°]Ê 1/Ê °°]Ê >Ì>ÌiÃÛiÊ -ÞÃÌiÊ X Methodologies for database migration and evolution Evolution, IEEE Computer, pp. 110- 112, IEEE CS, 43(8), 2010. X DB-MAIN, a programmable data centered CASE platform X 6 Ê °]Ê *À}À>Ê >ÞÃÃÊ >`Ê /À>ÃvÀ>ÌÊ vÀÊ >Ì> X Software Product Line Methodology Intensive System Evolution, PhD Thesis, University of Namur, 2009. X 1/Ê°°]Ê 6 Ê°]Ê ,, Ê°]Ê Ê° °]Ê }À>ÌÊ of Legacy Information Systems, in Software Evolution. Mens, T. and Demeyer, S. (Eds), Springer, pp. 107-138, 2008. X Ê° °]Ê 1/Ê°°]Ê >Ì>L>ÃiÊ>««V>ÌÊiÛÕÌ\ÊÊ ÌÀ>ÃvÀ>Ì>Ê>««À>V ]Ê >Ì>Ê>`ÊÜi`}iÊ }iiÀ}]Ê 59(3): pp. 534-558, 2006.
49 KEYWORDS Database migration Database evolution CASE tool Software Product Lines
CONTACTS Anthony CLEVE [email protected] Tel. 32 (0) 81 72 52 78
Jean-Luc HAINAUT i>ÕV° >>ÕÌJvÕ`«°>V°Li Tel. 32 (0) 81 72 49 96
Pierre-Yves SCHOBBENS [email protected] Tel. 32 (0) 81 72 49 90
Patrick HEYMANS [email protected] Tel. 32 (0) 81 72 52 75
WEB SITES http://www.fundp.ac.be/en/precise http://info.fundp.ac.be/libd
50 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 13
Security / Identity and Access Management in complex software environments
SENIOR SCIENTIST: X i> lÊ "
Research Field and Subjects ÀiÃÕÀViÃÊ >`Ê i`>Ê ÌÊ iVÌÀVÊ i>Ì Ê ,iVÀ`Ê ÀÊ -V>Ê Network Information. Ü>`>ÞÃ]Ê V«iÝÊ ÃvÌÜ>ÀiÊ iÛÀiÌÃÊ >ÀiÊ LÕÌÊ LÞÊ Since a few years, the PReCISE Research Centre is active in the >ÃÃiL}Ê>`ÊÌi}À>Ì}ÊiÝÃÌ}ÊV«iÌÃÊ>`ÊÃÞÃÌiÃ°Ê field of Privacy Rights Management (PRM), which is a direct This integration may happen in a loose or tight manner. It application of this approach to the protection of user’s privacy. may cross organisation boundaries and may bridge different Main research activities are focusing on privacy-preserving ÌiV }iÃÊ >`Ê ÌiV V>Ê iÛÀiÌÃ°Ê -"]Ê ÜiLÊ ÃiÀÛViÃ]Ê access control in medical data and in mobile environment. widgets, portals are all meant at integrating heterogeneous Methodological aspects inspired from Privacy by Design are also components. included in the research spectrum. Ê ÃÕV Ê «ÌiÌ>ÞÊ >À}iÊ >`Ê V«iÝÊ iÛÀiÌÃ]Ê Ì iÊ questions of user and system authentication, as well as of authorisation, are keys to guarantee secure operation, system Representative References integrity as well as stakeholders’ satisfaction and trust. Beyond authentication, user and identity management becomes X /-Ê°]Ê ,Ê°]Ê9ÕÊ9°]Ê " Ê°Ê>`Ê 1- Ê °]Ê an issue because in such environments, a system may need PrimAndroid: Privacy Policy Modelling and Analysis for to give access to users that do not authenticate and are not Android Applications. In Proceedings of the IEEE International managed locally, but by a third party that needs to be trusted. Symposium on Policies for Distributed Systems and Networks *ÀÌVÃÊ iÊ - ]Ê "«i oÊ «ÀÛ`iÊ LÕ`}Ê LVÃÊ Ì >ÌÊ (POLICY 2011), Pisa, ««°Ê£Óq£ÎÓ]ÊÕiÊ2011. allow one to design higher-level protocols that are able to ÃÕ««ÀÌÊÃÕV ÊV«iÝÊÃVi>ÀðÊ/ ÃÊÃÊvÀÊÃÌ>ViÊÌ iÊiÝ>VÌÊ role of the PReCISE Research Centre within the iTEC EUN FP7 Funding «ÀiVÌ° Authorisation and access control deal with granting or denying X Ê*ÇÊ*ÀiVÌ\Ê/ access to resources. The rules that govern the authorisation X FUNDP Ceruna Doctoral scholarship `iVÃÃÊ >ÀiÊ vÌiÊ V«iÝ°Ê ÛiÊ >vÌiÀÊ Ì iÊ >VViÃÃÊ >ÃÊ LiiÊ granted, ensuring only acceptable use of the resources (also known as usage control) requires appropriate measures. Partnership Access control models allow one to formalise access rules, to further reason on those policies, to detect conflict or overlap X 6`>viÊÀÕ«]Ê ØÃÃi`Àv]Ê between rules, for instance. RBAC is a commonly used access X "«iÊ1ÛiÀÃÌÞ]Ê ÌÊiÞiÃ]Ê1 VÌÀÊ `i]Ê LÕÌÊ Û>ÀÕÃÊ iÝÌiÃÃÊ >ÀiÊ >ÃÊ Ü`iÞÊ Ã«Ài>`]Ê X 1ÛiÀÃÌÞÊvÊLiâ]Ê `i«i`}Ê Ê Ì iÊ VÌiÝÌÊ >`Ê ÀiµÕÀiiÌÃ]Ê iÊ *, Ê ÀÊ X Réseau Santé Wallon "À ° VViÃÃÊ>`ÊÕÃ>}iÊVÌÀÊ«ViÃÊii`ÊÌÊLiÊiÝ«ÀiÃÃi`ÊÊ>Ê interoperable way. By taking into account advanced conditions, Products and Services L}>ÌÃ]Ê >`Ê Ì iÀÊ ÌÞ«iÊ vÊ VÃÌÀ>ÌÃ]Ê ,} ÌÃÊ Ý«ÀiÃÃÊ >}Õ>}iÃÊ, îÊ>ÜÊiÊÌÊ`iÃVÀLiÊV«iÝÊ«ViÃÊÜ V Ê X iÛi«iÌÊ vÊ >Ê «iÃÕÀViÊ ÌLÝÊ vÀÊ " ,Ê «ViÃÊ >ÀiÊ `iÀÛi`Ê vÀÊ Ì iÊ >VViÃÃÊ VÌÀÊ `i°Ê 8 Ê ÀÊ " ,Ê evaluation and management >ÀiÊÜ`iÞÊÕÃi`ÊÃÌ>`>À`ÃÊÌ >ÌÊ«ÀÛ`iÊÃÕ««ÀÌÊvÀÊiÝ«ÀiÃÃ}Ê X Infosafe: Certificate in Information Systems Security various types of policies. Both need to be profiled according to Management Ì iÊ>VÌÕ>ÊV>Ãi]ÊLÕÌÊ>ÀiÊ}iiÀVÊ>`ÊiÝÌiÃLiÊiÕ} ÊÌÊLiÊ adapted to a wide range of application domains, from digital
51 KEYWORDS Authentication Access control Rights management Privacy ,} ÌÃÊiÝ«ÀiÃÃÊ>}Õ>}iÃ
CONTACT Jean-Noël COLIN i>i°VJvÕ`«°>V°Li Tel. 32 (0) 81 82 52 74
WEB SITE http://www.fundp.ac.be/en/precise/
52 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 14
Model Driven Engineering / Domain Specific Modelling Languages
SENIOR SCIENTIST: X 6ViÌÊ ,/
Research Field and Subjects Representative References
Model-driven engineering (MDE) aims at defining modelling X "- Ê °]Ê ,/Ê 6°]Ê /, Ê *°]Ê ÃÌÀLÕÌi`Ê languages, methods, and tools suitable for the precise and collaborative model editing framework for domain specic efficient representation of, and reasoning about, software- `i}Ê ÌÃ°Ê ÈÌ Ê Ê ÌiÀ>Ì>Ê viÀiViÊ Ê L>Ê intensive systems. Software Engineering. 2011. Models, methods and tools together form the so-called X " -/ / Ê °]Ê ,/Ê6°]Ê/, Ê*°]ÊÊ,iVV>ÌÊ software factories that aim at supporting the software Framework to Support Cooperative Work with DSML. First engineer and other stakeholders of the system over the entire International Workshop on Domain Engineering held in lifecycle, from requirements elicitation to implementation and VÕVÌÊÜÌ Ê - ¿äÊ viÀiVi°Ê2009. maintenance. This support facilitates all system-related tasks and X ,/Ê 6°]Ê 9 -Ê *°]Ê /Ü>À`ÃÊ ÀiÊ ÝÌiÃLiÊ decision-making involved in, among others, transformations, MetaCASE Tools. International Conference on Advanced ÛiÀwV>Ì]Ê«ÀÌÉiÝ«ÀÌ]ÊÀÕ`ÊÌÀ«Êi}iiÀ}]ÊÛÃÕ>Ã>Ì]Ê Information Systems Engineering CAISE. pp. 454-468, 2007. cooperation, integration, and versioning.
In addition to the software-centric activities, MDE studies Funding domain specific modelling languages (DSML) that are best suited for describing human and business activities in a precise X FSR and more efficient manner. Such models can give rise to X PReCISE domain ontologies that can be used to guide the acquisition X Banque Nationale de Belgique - BNB of information needed for model construction, and this over all «ÀiVÌÃÊÊ>Ê}ÛiÊ>««V>ÌÊ`>° Partnership DSML are now regarded as more appropriate for quickly generating quality software with a higher return on investment. X France Telecom Bretagne, France For several years, the PReCISE research group develops a tool X 1ÛiÀÃÌÞÊvÊ"ÌÌ>Ü>]Ê >>`> to quickly define such languages as naturally as possible: iÌ> " ° Products and Services The strengths of this tool are its ability to correlate modelling «>À>`}ÃÊ>`ÊÌÊ`iÊ>ÃÊivviVÌÛiÞÊ>ÃÊ«ÃÃLiÊ>Ê>ÝÕÊvÊ X iÌ> " \Ê>ÊÃvÌÜ>ÀiÊv>VÌÀÞÊvÀÊ`>ÊëiVwVÊ`i}Ê >ëiVÌÃÊvÊÌ iÊÃvÌÜ>Ài]ÊÌ iÊ>LÌÞÊÌÊ`iwiÊ>ÀLÌÀ>ÀÞÊV«iÝÊ languages. graphical representations without resorting to programming, X " \Ê>Ê`ÃÌÀLÕÌi`ÊV>LÀ>ÌÛiÊ`iÊi`Ì}ÊvÀ>iÜÀÊ >`ÊÌ iÊ«ÃÃLÌÞÊÌÊiÝÌi`ÊÌÊLÞÊ"-Ê«Õ}Ã°Ê iÌ> " ÊV>Ê (for EMF). provide a modelling environment tailored to the needs of the enterprise, scalable and completely customisable.
53 KEYWORDS Domain Specific Modelling Language Computer Supported Cooperative Work 6ÃÕ>Ê `i} MetaCASE V«ÃiÉ
CONTACT Vincent ENGLEBERT [email protected] Tel. 32 (0) 81 72 52 70
WEB SITES http://www.metadone.be http://www.fundp.ac.be/en/precise
54 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 15
Model Driven Engineering / Software Architecture
SENIOR SCIENTISTS: X 6ViÌÊ ,/ X Ì ÞÊ 6
Research Field and Subjects X *,,Ê °]Ê 6 Ê°]Ê Ê8°]Ê 1 Ê°]Êi>ÌÕÀiL>Ãi`Ê Composition of Software Architectures, in Proceedings of the The PReCISE Research Centre actively contributes to the field of 4th European Conference on Software Architecture (ECSA’10), software architecture by developing model-driven engineering LNCS 6285, 230-245, Springer, 2010. approaches, techniques and tools that support architecture X -" Ê°]Ê ,/Ê6°]Ê /1 6 1-Ê,°]ÊÊ>À}iÊ-V«iÊ design, analysis and evolution. Transformational Approach for Distributed Architecture Design in Second European conference on Software Architecture In support to software system design and evolution, PReCISE (ECSA’08). LNCS 5292. 2008. >ÃÊ LÕÌÊ >Ê ÌÀ>ÃvÀ>ÌÀiÌi`Ê iÌ `Ê Ý}Ê ÃvÌÜ>ÀiÊ architecture, requirement models and infrastructure models in order to design and evolve component-based information Funding systems. This method provides systematic, generic and reusable support for problem-to-solution traceability management Banque Nationale de Belgique - BNB and to system architecture composition and evolution. It links implementation alternatives and corresponding architectural Partnership models and it provides infrastructure-related constructs that are used to validate the architecture deployment on a given target X INRIA Lille infrastructure. X University of Nice Sophia-Antipolis
PReCISE also addresses the domain of architectural variability analysis with promising results. A reverse engineering approach KEYWORDS was developed to enable the automated identification and Architecture description language >>ÞÃÃÊvÊÌ iÊiÝÌiÃÊ«ÌÃÊÌ >ÌÊ>ÀiÊ iÀiÌÊÌÊ } ÞÊÀi® Model transformation Architecture variability management configurable software systems. The approach takes as input Architecture composition a system made up of a set plugins, each of which defines an Deployment >ÀV ÌiVÌÕÀiÊvÀ>}iÌ°ÊÌÊÌ iÊiÝÌÀ>VÌÃÊ>Ê>ÀV ÌiVÌÕÀ>Êvi>ÌÕÀiÊ Architecture design rationale `iÊiÝ«ÀiÃÃ}ÊÌ iÊV>ÌiÃÊ>`ÊÛ>À>LÌiÃÊÌ >ÌÊiÝÃÌÊ Middleware & services between all possible configurations of the system. Component-based software engineering
CONTACTS Representative References Vincent ENGLEBERT 6ViÌ° }iLiÀÌJvÕ`«°>V°Li X -" Ê °]Ê ,/Ê 6°]Ê /Ü>À`ÃÊ >`}Ê >ÀV ÌiVÌÕÀiÊ Tel. 32 (0) 81 72 52 70 design, variability and evolution with model transformations. In Proceedings of the 5th Workshop on Variability Modeling of Anthony CLEVE Software-Intensive SystemsÊ6> -ʼ££®]ÊÎ{n]Ê ]Ê2011. [email protected] Tel. 32 (0) 81 72 49 63 X ,Ê °]Ê 6 Ê °]Ê " /Ê *°]Ê , Ê *°]Ê 1 Ê °]Ê , Ê *°]Ê,iÛiÀÃiÊ }iiÀ}Ê ÀV ÌiVÌÕÀ>Ê i>ÌÕÀiÊ `iÃ°Ê th In Proceedings of the 5 European Conference on Software WEB SITE Architecture -½££®]Ê -ÊÈäÎ]ÊÓÓäqÓÎx]Ê-«À}iÀ]Ê2011. http://www.fundp.ac.be/en/precise
55 56 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 16
Formal Analysis and Verification of Computer Systems
SENIOR SCIENTIST: X >ÀiÃÊ* 1,
Research Field and Subjects Representative References
Computer programs continue to invade every inch of individuals, X " -Ê -°]Ê "*"1"1Ê °]Ê * 1,Ê °Ê >`Ê iÌiÀ«ÀÃiÃÊ>`ÊÃViÌiðÊ/ iÞÊii«Ê}iÌÌ}ÊÀiÊV«iÝÊ>`Ê FEARY M., A Formal Framework for Design and Analysis ÌiÀ`i«i`iÌ°ÊÕÃÌÊiÊLÕ`}ÊLÀ`}iÃÊÀÊÀViÌÃ]ÊLÕ`}Ê vÊ Õ> >V iÊ ÌiÀ>VÌ°Ê Óä££Ê Ê ÌiÀ>Ì>Ê dependable programs demands sound engineering principles Conference on Systems, Man, and Cybernetics, IEEE, 2011. grounded in rigorous mathematical foundations. The goal X 6 ,Ê 1 Ê °Ê >`Ê * 1,Ê °]Ê L}Ê *>ÀÌ>Ê vÊÌ iÊÕÛ>Ê6iÀwV>ÌÊ>LÊ6®ÊÃÊÌÊÛiÌÊ>`Ê«ÀÛiÊ "À`iÀÊ ,i`ÕVÌÊ >`Ê -ÞLVÊ `iÊ iV}Ê ÌÊ ÛiÀvÞÊ /Ê rigorous techniques for developing, analysing, transforming «À«iÀÌiÃ°Ê °Ê L>ÀÕ]Ê °Ê >ÛiÕ`]Ê °Ê â>]Ê >`Ê ,°Ê and synthesising models of programs and computing systems. à ]Êi`Ã]Ê >Ã>ÊÀ>Ê iÌ `ÃÊÓ䣣]Ê6ÕiÊÈÈ£ÇÊvÊ -]Ê -«À}iÀÊ6iÀ>}]Ê2011. / iÊ ÕÛ>Ê 6iÀwV>ÌÊ >LÊ 6®Ê ÃÊ >Ê ÀiÃi>ÀV Ê Ìi>Ê Ê Ì iÊ X * 1,Ê °]Ê, " Ê°Ê>`Ê ,/Ê°]ÊÊÀ>Ê>ÞÃÃÊ / Ê ÃÌÌÕÌiÊ >ÌÊ 1ÛiÀÃÌjÊ V>Ì µÕiÊ `iÊ ÕÛ>°Ê 6Ê of Requirements-Based Testing. ACM, ed, 2009 International investigates principles, tools and applications of formal analysis Conference on Software Testing and Analysis (ISSTA), Chicago, >`ÊÛiÀwV>ÌÊvÊV«ÕÌiÀÊÃÞÃÌiðÊ6ÊÜ>ÃÊvwV>ÞÊVÀi>Ìi`Ê IL, 2009. in 2010, but members of the team have been active in this field X " -Ê-°Ê>`Ê* 1,Ê °]ÊÊ ÃÕ>Ì >Ãi`Ê««À>V Ê at UCL since 2004. ÌÊÌ iÊ>ÞÃÃÊvÊÕ> «ÕÌiÀÊÌiÀ>VÌ°Ê*ÀVii`}ÃÊvÊ Ê- Ê-Þ«ÃÕÊÊ }iiÀ}ÊÌiÀ>VÌÛiÊ «ÕÌ}Ê / iÊ ÀiÃi>ÀV Ê >ÌÊ 6Ê >ÞÊ ÀiÛÛiÃÊ >ÀÕ`Ê Ì iÊ >ÕÌ>Ìi`Ê Systems (EICS 2009), Pittsburgh, PA, 2009. verification technique known as model checking, under X 6 ,Ê 1 Ê°Ê>`Ê* 1,Ê °]Ê L}Ê*>ÀÌ>Ê"À`iÀÊ different views and directions. As typical for such automated Reduction with Bounded Model Checking. Communicating software engineering disciplines, the work combines devising *ÀViÃÃÊ ÀV ÌiVÌÕÀiÃÊ ÓääÊ Ê 7/1ÎÓ]Ê 6ÕiÊ ÈÇÊ vÊ new methods and algorithms, implementing these algorithms VÕÀÀiÌÊ-ÞÃÌiÃÊ }iiÀ}Ê-iÀiÃ]Ê"-Ê*ÀiÃÃ]Ê2009. into actual software tools, and assessing and validating them on X " 1- "Ê °]Ê * 1,Ê °Ê >`Ê , " Ê °]Ê ÕÌ>ÌVÊ actual case studies and applications. Formalisms and languages 6iÀwV>ÌÊ vÊ Üi`}iÊ >`Ê /iÊ ÜÌ Ê Õ- 6°Ê ÓäÌ Ê used to represent systems and their properties are also studied, ÌiÀ>Ì>ÊÌÊ viÀiViÊÊÀÌwV>ÊÌi}iViÊ with connections to logic and automata theory. äÇ®]ÊÞ`iÀ>L>`]Ê`>]Ê2007.
ÀiÊ Ã«iVwV>Þ]Ê wi`ÃÊ vÊ ÌiÀiÃÌÊ vÊ 6Ê ÀiÃi>ÀV iÀÃÊ VÕ`iÊ symbolic and bounded model-checking, verification of human- Funding computer interaction, generation of enriched verification iÝ«>>ÌÃ]Ê ÛiÀwV>ÌÊ vÊ VVÕÀÀiÌÊ ÃÞÃÌiÃÊ >`Ê «>ÀÌ> X +-\Ê iÌÀiÊ`½}jiÀiÊiÌÊ+Õ>ÌjÊ`iÃÊ-ÞÃÌmiÃÊ ,]Ê order reduction, structural coverage criteria for specifications, 7>iÊÉÊ 1®]ÊÓääqÓä£{° temporal and epistemic logics, analysis of observability and X 6 -\Ê Õ`>iÌ>Ê ÃÃÕiÃÊ Ê ÃvÌÜ>ÀiÊ i}iiÀ}\Ê diagnosis, and verification of autonomous and intelligent `i}]Ê 6iÀwV>ÌÊ >`Ê ÛÕÌÊ vÊ -vÌÜ>Ài°Ê ÌiÀ systems. 1ÛiÀÃÌÞÊÌÌÀ>VÌÊ*iÊ i}ÕÊi`iÀ>ÊÛÌ®]ÊÓääÇqÓ䣣°
57 Partnership KEYWORDS -vÌÜ>ÀiÉ*À}À>Ê6iÀwV>Ì X NASA Ames Research Center (USA) Formal methods Model checking X ``iÃiÝÊ1ÛiÀÃÌÞÊ1® Reliability X Õ`>âiÊ ÀÕÊiÃÃiÀÊÌ>Þ® Design Tools and Techniques X CETIC (Belgium) Models of Computation X 1 *]Ê1]Ê1]Ê1 ]Ê1}]Ê1 Ã]Ê61 ° Logics of programs
Products and Services CONTACT Charles PECHEUR [email protected] 6Ê ÃÊ >Ü>ÞÃÊ }Ê vÀÊ ««ÀÌÕÌiÃÊ vÀÊ ÃViÌwVÊ >`Ê Tel. 32 (0) 10 47 87 79 industrial collaborations. In particular, pilot studies in applying innovative methods to real-life industrial applications provide an iÝViiÌÊ««ÀÌÕÌÞÊÌÊ>ÃÃiÃÃÊ>`Ê`iÃÌÀ>ÌiÊLiiwÌÃÊ>`Ê WEB SITE identify new challenges. http://lvl.info.ucl.ac.be
58 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 17
Model-Driven Requirements Engineering
SENIOR SCIENTIST: X ÝiÊÛ>Ê -7 ,
Research Field and Subjects X 6 Ê -7 , Ê °]Ê ,i>Ã}Ê LÕÌÊ ÌiÀ>ÌÛiÊ ,iµÕÀiiÌÃÊ "«ÌÃ°Ê Ê Conceptual Modeling: Foundations Requirements engineering (RE) is concerned with the elicita- and Applications, °Ê À}`>]Ê 6°Ê >Õ` À]Ê *°Ê À}]Ê °Ê 9ÕÊ ÌÊ vÊ Ì iÊ LiVÌÛiÃÊ ÌÊ LiÊ >V iÛi`Ê LÞÊ Ì iÊ ÃÞÃÌiÌLi]Ê `ð®]Ê-«À}iÀ6iÀ>}Ê -ÊxÈää]ÊÎnäÎÇ]Ê2009. Ì iÊ«iÀ>Ì>â>ÌÊvÊÃÕV ÊLiVÌÛiÃÊÌÊëiVwV>ÌÃÊvÊ X -Ê °]Ê 1Ê °]Ê,"1 "18Ê°]Ê6 Ê -7 , Ê°]Ê requirements and assumptions, the assignment of responsibilities >Þâ}Ê ÀÌV>Ê *ÀViÃÃÊ `iÃÊ Ì ÀÕ} Ê i >ÛÀÊ `iÊ for those specifications to agents such as humans, devices and Synthesis, Proc. ICSE’2009: 31th International Conference on software, and the evolution of such requirements over time Software Engineering]Ê6>VÕÛiÀ]Ê >ÞÊ£ÈÓ{]Ê2009. >`Ê >VÀÃÃÊ ÃÞÃÌiÊ v>iÃ°Ê iÌÌ}Ê } µÕ>ÌÞÊ ÀiµÕÀiiÌÃÊ X 6 Ê -7 , Ê°]Ê,iµÕÀiiÌÃÊ }iiÀ}\ÊÀÊ À>vÌÊ is difficult and critical. Poor requirements were recurrently to Discipline. Proc. FSE’2008: 16th ACM Sigsoft Intl. Symposium ÀiV}âi`ÊÌÊLiÊÌ iÊ>ÀÊV>ÕÃiÊvÊÃÞÃÌiÊv>ÕÀið on the Foundations of Software Engineering, Atlanta, November The UCL group in Louvain-la-Neuve has pioneered a systematic, 2008. goal-oriented approach to requirements engineering for X 1*" /Ê*°]Ê -Ê °]Ê 1Ê °]Ê6 Ê -7 , Ê°]Ê high-assurance systems. The target of this approach is a / iÊ+- Ê}ÀÌ Ê>`ÊÌÃÊ««V>ÌÊÌÊ-vÌÜ>ÀiÊ i >ÛÀÊ complete, consistent, adequate, and structured set of software Model Induction. Applied Artificial Intelligence]Ê6°ÊÓÓ]ÊÇÇ££x]Ê requirements and environment assumptions. 2008. The approach is model-based, and partly relies on the use of X 6 Ê -7 , Ê °]Ê }iiÀ}Ê ,iµÕÀiiÌÃÊ vÀÊ formal methods when and where needed to support RE-specific System Reliability and Security. In Software System Reliability Ì>ÃÃÊ ÃÕV Ê >ÃÊ }>Ê ÀiwiiÌ]Ê }>Ê «iÀ>Ì>â>Ì]Ê ÀÃÊ and Security]Ê °Ê ÀÞ]Ê°Ê ÀÕL>ÕiÀÊ >`Ê °°,°Ê >ÀiÊ i`ð®]Ê analysis, conflict management, and synthesis of behaviour /"Ê -iVÕÀÌÞÊ Ì ÀÕ} Ê -ViViÊ -iÀiÃÊ Ê \Ê vÀ>ÌÊ >`Ê models. ÕV>ÀÊ-iVÕÀÌÞ]Ê6°Ê°Ê"-Ê*ÀiÃÃ]Ê£ÈÓÎn]Ê2007. The software tools supporting this approach include model X *" -, Ê °]Ê --" /Ê*°]Ê " , <]Ê°°Ê,1/Ê°]Ê6 Ê animators, model checkers against goals and domain properties, -7 , Ê°]Ê >ÀÞÊ6iÀwV>ÌÊ>`Ê6>`>ÌÊvÊ Ãà `i`ÕVÌÛiÊ ÛiÀwiÀÃ]Ê >`Ê `ÕVÌÛiÊ `iÊ ÃÞÌ iÃâiÀÃÊ vÀÊ Critical Systems, Formal Methods in System Design]Ê 6°Ê Îä]Ê ÃVi>ÀÊiÝ>«ið No. 3, Springer, 233-247, 2007. ÕÀÀiÌÊ ÀiÃi>ÀV Ê ivvÀÌÃÊ >Ê >ÌÊ iÝ«>`}Ê Ì ÃÊ >««À>V Ê Ê >Ê number of directions including: qÊ / iÊ >>ÞÃÃÊ >`Ê i>VÌiÌÊ vÊ `iÃÊ vÊ Ã>viÌÞVÀÌV>Ê Awards medical processes (such as those involved in, e.g., cancer therapies). X Ê-}ÃvÌÊ"ÕÌÃÌ>`}Ê,iÃi>ÀV ÊÜ>À`]ÊÓään° qÊ / iÊ`i}Ê>`Ê>>ÞÃÃÊvÊ«ÀL>LÃÌVÊ}>ÃÊ>`ÊÀÃð X IEEE Most Influential Paper Award, International Requirements qÊ / iÊ VL>ÌÊ vÊ `iÊ V iV}Ê >`Ê «À«iÀÌÞÊ i>À}Ê Engineering Conference, 2011. for automated generation of risk conditions and model X ACM Sigsoft Distinguished Service Award. transformations resolving these. X ACM Fellow. X SWIFT Award.
Representative References
X 6 Ê -7 , Ê °]Ê Requirements Engineering: From System Goals to UML Models to Software Specifications°Ê °Ê Wiley & Sons, 682p., 2009.
59 Funding KEYWORDS Model-driven software engineering
X F.R.S.-FNRS >ÀiÌi`ÊÀiµÕÀiiÌÃÊi}iiÀ} Software specification X European Risk analysis X Wallonie Model synthesis X j`jÀ>ÌÊ7>iÊÊ ÀÕÝiiÃÊ, ® Model checking X IAP `ÕVÌÛiÊi>À}ÊvÀÊiÝ>«iÃ
Partnership CONTACT Axel VAN LAMSWEERDE >Ýi°Û>>ÃÜiiÀ`iJÕVÕÛ>°Li X «iÀ>Ê i}iÊ`Ê1®° Tel. 32 (0) 10 47 25 29 X 1ÛiÀÃÌÞÊ i}iÊ`Ê1®° X 1ÛiÀÃÌÞÊvÊ"Ài}Ê1-®° WEB SITE http://www.info.ucl.ac.be/~avl/
60 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 18
Multi-Agent Systems Architectures
SENIOR SCIENTISTS: X >ÕiÊ"* X Yves WAUTELET
Research Field and Subjects Representative References
}iÌ"ÀiÌ>ÌÊÃÊiiÀ}}Ê>ÃÊ>Ê«ÜiÀvÕÊiÜÊ«>À>`}ÊÊ X 6Ê-°]Ê71/ /Ê9°]Ê"*Ê °]ÊºÊ ÕÌ}iÌÊÀV ÌiVÌÕÀ>Ê computing. Concepts and techniques from the agent paradigm *>ÌÌiÀÊ vÀÊ 7À>««}Ê "vvÌ i- ivÊ «iÌû°Ê Ê - VÕ`Ê ÜiÊ LiÊ Ì iÊ vÕ`>ÌÃÊ vÀÊ Ì iÊ iÝÌÊ }iiÀ>ÌÊ vÊ -/Ê Ó䣣]Ê xÌ Ê -Ê Ì°Ê v°Ê Ê }iÌÊ >`Ê ÕÌ}iÌÊ mainstream information systems, which we might term “active -ÞÃÌiÃ\Ê/iV }iÃÊ>`Ê««V>ÌÃ]Ê >V iÃÌiÀ]Ê1]Ê -Ê computing”. ÈÈnÓ]Ê««°ÊÎÓ£ÎΣÊÕiÊÓÊÊÕÞÊ£]Ê2011. X "1,/ -Ê°]Ê1 ,Ê-°]Ê"*Ê °Ê>`Ê", Ê*°]ÊºÊ Information systems architectures have become the backbone Secure Architectural Description Language for BDI Multi-Agent of all kinds of organisations today. In almost every sector - Systems”. In International Journal of Web Intelligence and manufacturing, education, health care, government, and Agent Systems (WIAS), 8(1) pp. 99-122, 2010. businesses large and small - information systems are relied upon X 19 Ê /°]Ê "*Ê °Ê >`Ê * - , Ê °]Ê ºÊ iÛi«iÌÊ for everyday work, communication, information gathering, and À>iÜÀÊ vÀÊ «iÌ >Ãi`Ê }iÌ"ÀiÌi`Ê ÕÃiÃÃÊ `iVÃ>}°Ê 9iÌ]Ê Ì iÊ yiÝLÌiÃÊ Ê VÕÀÀiÌÊ ÌiV }iÃÊ Services”. In International Journal of Agent Software Engineering and methods have also resulted in poor performance, "- ®]ÊÎÊÓÉή]Ê««°ÊÎÓnÎÈÇÊ`iÀÃViVi]Ê2009. incompatibilities, and obstacles to change. As many organisations X "*Ê °]Ê ,- - ,-Ê °]Ê "1,/ -Ê °]Ê are reinventing themselves to meet the challenges of global , Ê°Ê>`Ê"< Ê°Ê `ð®]Ê}iÌÊ"ÀiÌi`ÊvÀ>ÌÊ competition and e-commerce, there is increasing pressure to -ÞÃÌiÃÊ 8]Ê -«À}iÀ]Ê ÓÎ£Ê «>}iÃ]Ê - \Ê ÇnÎx{äÇÇnÈ]Ê `iÛi«Ê>`Ê`i«ÞÊiÜÊÌiV }iÃÊÌ >ÌÊ>ÀiÊyiÝLi]ÊÀLÕÃÌ]Ê iÀ>Þ] 2008. >`ÊÀiëÃÛiÊÌÊÀ>«`Ê>`ÊÕiÝ«iVÌi`ÊV >}i°
Agent concepts hold great promise for responding to the Partnership new realities of active information systems. They offer higher level abstractions and mechanisms which address issues such X University of Toronto, Department of Computer Science as knowledge representation and reasoning, communication, X University of Trento, Department of Information and coordination, cooperation among heterogeneous and Communication Technology autonomous parties, perception, commitments, goals, beliefs, X 6>iV>Ê1ÛiÀÃÌÞÊvÊ/iV }Þ]Ê i«>ÀÌiÌÊvÊ «ÕÌiÀÊ ÌiÌÃ]ÊiÌV°Ê"ÊÌ iÊiÊ >`]ÊÌ iÊVVÀiÌiÊ«iiÌ>ÌÊ Science of these concepts can lead to advanced functionalities, e.g., in X University of Utrecht, Department of Computer Science inference-based query answering, transaction control, adaptive X Federal University of Pernambuco, Department of Computer workflows, brokering and integration of disparate information Science ÃÕÀViÃ]Ê >`Ê >ÕÌ>Ìi`Ê VÕV>ÌÊ «ÀViÃÃiÃ°Ê "Ê Ì iÊ X Center for Scientific and Technological Research - ITC-IRST other hand, their rich representational capabilities allow for ÀiÊv>Ì vÕÊ>`ÊyiÝLiÊÌÀi>ÌiÌÃÊvÊV«iÝÊÀ}>Ã>Ì>Ê processes, leading to more effective requirements analysis and architectural and detailed design.
The research work focuses on how agent concepts and techniques will contribute to the meeting of information systems architectures with today and tomorrow needs, especially in Ì iÊVÌiÝÌÊvÊÃiÀÛViÀiÌi`Ê>ÀV ÌiVÌÕÀiÃÊ>`ÊÜiLÊÃiÀÛViÃÊ development.
61 Products and Services KEYWORDS Architectural Patterns
X Agent-oriented modelling and design methods Software Design Design Patterns X `iÃÊ >`Ê >ÀV ÌiVÌÕÀiÃÊ vÀÊ >}iÌÀiÌi`É>VÌÛiÊ Multi-agent systems information systems Intelligent Systems X Novel information system technologies based on software agents
X Agent-based requirements engineering CONTACTS X Agent-oriented approaches to data integration Manuel KOLP X Agent orientation and e-services >Õi°«JÕVÕÛ>°Li X Agent orientation in web information systems Tel. 32 (0) 10 47 83 95 X Agent-oriented enterprise and business process modelling Yves WAUTELET X Agent communication languages for business communication [email protected] X "Ì}iÃÊ>`Ê>}iÌà Tel. 32 (0) 10 47 83 95 X Agent orientation and human computer interaction X ià ,/ -Ê}iÌÊ"ÀiÌi`Ê - Ê/ X SkwyRL framework for Agent Architectural Design WEB SITES X Consultancy http://www.isys.ucl.ac.be/ X Ý«iÀÌÃi http://www.isys.ucl.ac.be/skwyrl http://www.isys.ucl.ac.be/descartes X ÝiVÕÌÛiÊi`ÕV>Ì
62 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY B 19
Software Quality – Software Measurement
SENIOR SCIENTISTS: X >Ê , X VÊ -/18
Research Field and Subjects model “Doca” for documentation assessment. A Bayesian belief networks based model for web site evaluations is also As any engineering discipline, software specification, being investigated. development, operation, and maintenance require the application of disciplined and quantifiable approaches. This implies a systematic control of the quality for all the products Representative References being involved as well as the processes being followed. As any management discipline, software management X 61 ,Ê -°]Ê "1,/Ê °]Ê -,"1Ê °Ê >`Ê ,Ê °]Ê implies also such a systematic control of the quality for all the Automated Evaluation of Web Site Navigability: an Empirical products and processes being involved. Moreover, it implies the 6>`>ÌÊvÊ ÕÌiÛiÊ+Õ>ÌÞÊ `iÃ]ÊÊÕÀ>ÊvÊ-vÌÜ>ÀiÊ integration of quality management of systems within the global Maintenance and Evolution: Research and Practice, special quality management process of the organisation. issue, 2011. -vÌÜ>ÀiÊ +Õ>ÌÞÊ ÛÛiÃÊ vÕÀÊ iÛiÃÊ vÊ ÃÌÕ`Þ\Ê / iÊ +Õ>ÌÞÊ X 6 ,"- Ê °]Ê ,Ê °Ê >`Ê - 1Ê °]Ê /Ü>À`ÃÊ >Ê Management level where criteria are defined at the business `i iÌÀVÊ+Õ>ÌÞÊÃÃiÃÃiÌ]ÊÊ*ÀVii`}ÃÊvÊÌ iÊÓäÌ Ê iÛiÊ>VVÀ`}ÊÌÊ>ÊVÕÃÌiÀViÌÀVÊ>««À>V ÆÊ/ iÊ-vÌÜ>ÀiÊ International Workshop on Software Measurement (IWSM Process level where focus is put on software process modelling, 2010). iÛ>Õ>ÌÊ >`Ê «ÀÛiiÌÆÊ / iÊ -vÌÜ>ÀiÊ *À`ÕVÌÊ iÛiÊ X /1 6 1-Ê,°]Ê ,Ê °Ê>`Ê - 1Ê°]Ê6>`ÌÞÊvÊÌ iÊ where focus is put on the definition of quality indicators for VÕiÌ>ÌÊ Û>>LÌÞÊ `i\Ê Ý«iÀiÌ>Ê iwÌÊ vÊ Ì iÊ `vviÀiÌÊ ÃvÌÜ>ÀiÊ «À`ÕVÌÃÊ >`Ê Ì iÀÊ Ài>Ìà «ÃÆÊ `Ê +Õ>ÌÞÊÌiÀ«ÀiÌ>Ì]ÊÊ*ÀVii`}ÃÊvÊ/ iÊÓÓ`ÊÌiÀ>Ì>Ê the Software measurement level where metrics and measuring Conference on Advanced Information Systems Engineering methods are defined. - ¿£ä®]Ê««°ÊÓÎÈÓxä]Ê2010. *,i - Ê >VÌÛiÞÊ VÌÀLÕÌiÃÊ ÌÊ -vÌÜ>ÀiÊ +Õ>ÌÞÊ ÀiÃi>ÀV Ê X ,Ê °]Ê , Ê°]Ê"* <Ê ,/ Ê °°ÊEÊ- Ê°]Ê VÕÌÞÊvÜ}ÊÃiÛiÀ>Ê>ÝÃ\ Ê À>iÜÀÊ vÀÊ Ì iÊ iÃ}Ê >`Ê 6iÀwV>ÌÊ vÊ -vÌÜ>ÀiÊ qÊ ÌÊ Ì iÊ >>}iiÌÊ iÛi\Ê +Õ>ÌÞÊ VÀÌiÀ>Ê >ÀiÊ `iwi`Ê Ê i>ÃÕÀiiÌÊ iÌ `Ã]Ê Ê ÕÀ>Ê vÊ -ÞÃÌiÃÊ EÊ -vÌÜ>Ài]Ê the basis of customers’ specification limits. Control of those volume 81, issue 5, pp. 633-648, 2007. criteria is performed in order to guarantee the stability of X ,Ê °]Ê 8 , Ê-°]Ê -, -Ê° °]Ê*",/ Ê °Ê business processes. When processes are stable, opportunities and RENAULT A., Initiating software process improvement in of improvement can be studied through typical quality tools: ÛiÀÞÊÃ>ÊiÌiÀ«ÀÃiÃ\Ê Ý«iÀiViÊÜÌ Ê>Ê} ÌÊ>ÃÃiÃÃiÌÊÌ]Ê Pareto analysis, cause-effect diagrams, why-why analysis, etc. in Information & Software Technology, volume 50, issue 7-8, Ã]Ê ÃiÊ iÝ«iÀÌÃiÊ Ê ÃvÌÜ>ÀiÊ ViÀÌwV>ÌÊ >ÛiÊ LiiÊ pp. 763-771, 2007. developed, namely in the aeronautic domain (DoD-178B). qÊ ÌÊÌ iÊ*ÀViÃÃÊiÛiÊ\ÊÌ iÊiÃÌ>Là iÌÊvÊ>Ê-vÌÜ>ÀiÊ*ÀViÃÃÊ Model dedicated to Small & Medium Enterprises on basis of the Funding adaptation of classical software process models like CMMi. The "7*Ê ÃÊ ÕÃi`Ê >ÃÊ L>ÃÃÊ ÌÊ Ì iÊ VÕÀÀiÌÊ `iÛi«iÌÊ vÊ >Ê -"Ê X Wallonie ÃÌ>`>À`ÊvÀÊ- Ê-"Ó££ä®° X EC qÊ ÌÊÌ iÊ«À`ÕVÌÊ>`ÊÌ iÊi>ÃÕÀiiÌÊiÛiÃ\ÊÌ iÊ`iÛi«iÌÊ vÊ>Ê}iiÀVÊvÀ>iÜÀÊ +®Ê>Ü}ÊÌÊLÕ`Ê«>ÀÌVÕ>ÀÊ quality model for any specific uses on basis of a meta-model integrating different standards. qÊ "Ê Ì ÃÊ L>Ãi]Ê ÃiÛiÀ>Ê Ã«iVwVÊ µÕ>ÌÞÊ `iÃÊ >ÛiÊ LiiÊ `iÃ}i`\ÊÌ iÊ`iʺ+Õ>ûÊvÀÊ«iÊÃÕÀViÊÃÞÃÌiÃÆÊÌ iÊ
63 Partnership KEYWORDS -vÌÜ>ÀiÊ+Õ>ÌÞ X Université de Montréal Software Measurement Software Process Improvement X Ecole Polytechnique de Montréal Certification X CETIC Standards Empirical Software Engineering
Products and Services CONTACTS
X +\ÊiiÀVÊ+Õ>ÌÞÊÀ>iÜÀ Naji HABRA [email protected] X "7*\Ê*ÀViÃÃÊ `iÊvÀÊ- Tel. 32 (0) 81 72 49 95 X " \Ê+Õ>ÌÞÊ `iÊvÀÊ VÕiÌ>Ì X +Õ>"--\Ê+Õ>ÌÞÊ `iÊvÀÊ"«iÊ-ÕÀViÊ-ÞÃÌià Annick CASTIAUX >V°V>ÃÌ>ÕÝJvÕ`«°>V°Li Tel. 32 (0) 81 72 48 40
WEB SITE http://www.fundp.ac.be/en/precise
64 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 1
Intelligent Decision Support Systems
SENIOR SCIENTISTS: X i> >ÀiÊ +1 / X Isabelle LINDEN
Research Field and Subjects X 1 "18Ê °]Ê , "1,/Ê °]Ê Ê °]Ê ½ -Ê *°]Ê , <Ê °]Ê 7/ /Ê °]Ê ,/ 9Ê °]Ê 18Ê °]Ê Decision support systems are information systems designed "-* Ê °]Ê +1 /Ê ° °] Ê Ý«iÀÌÊ -vÌÜ>ÀiÊ vÀÊ ÕÌ to support all the phases of a user’s decision making process. layer Coatings Design in Surface Engineering. Material Science They have many applications in the society in many domains. Forum, vol. 595-598, 2008, pp. 583-591. Some systems propose tools with visual and data research facilities, but they leave the intelligence of the decision in the >`ÃÊvÊ`iV`iÀðÊ"Ì iÀÊÃÞÃÌiÃÊiL`ÞÊ>ÀÌwV>ÊÌi}iViÊ Funding techniques to propose advices that would typically be offered LÞÊiÝ«iÀÌð Wallonie: Winnomat, Wist 2 and plan Marshall.
Two intelligent decision support systems have been developed Ã`iÊÌ iÊVÕÃÊÀiÃi>ÀV Ê}ÀÕ«°Ê"ÊÌ iÊiÊ >`]ÊÌ iÊ Ý«i-ÕÀvÊ Partnership system answers the problem of conceiving novel products in metallurgy by planning various surface treatments. This X 1ÛiÀÃÌjÊLÀiÊ`iÊ ÀÕÝiiÃ]Ê*Àv°Ê °Ê i}Àiâ allows one to obtain a set of required properties while taking X 1 Ê Ã]Ê*Àv°Ê*°Ê>ÌÊ>`Ê °ÊiLà into account incompatibilities, environment constraints and X NSI IT Software and Services «À`ÕVÌÊVÃÌðÊ"ÊÌ iÊÌ iÀÊ >`]ÊÌ iÊ- *>-ÊÃÞÃÌiÊ >ÃÊ X iÌVÊÊ iÌÀiÊ`½ ÝViiViÊiÊ/iV }iÃÊ`iʽvÀ>ÌÊ LiiÊ VViÛi`Ê ÌÊ i«Ê Ì>ÝÊ VÃÕÌ>ÌÃ]Ê V«>ÞÊ ÀiÛÃiÀÃ]Ê et de la Communication patrimonial advisers of banks or solicitors to plan the inheritance X Smolinfo vÊ >Ê VÌÀ>VÌÀ]Ê Ê «>ÀÌVÕ>À]Ê >Ü}Ê Ì iÊ ÌÊ iÝ«ÀiÊ Ì iÊ X Trendy Foods Belgium various alternatives offered by the Belgian legislation and the European one. Products and Services -ViÊ Óä£ä]Ê >Ê iÜÊ «ÀiVÌ]Ê V>i`Ê Ê °i°]Ê ÕÃiÃÃÊ ÛiÌÊ Manager) aims to develop a new IT approach in order to X / iÊ Ý«i-ÕÀvÊÃvÌÜ>ÀiÊÃÞÃÌi >>}iÊÕiÝ«iVÌi`ÊiÛiÌÃÊÊÌ iÊVÌiÝÌÊvÊ}ÃÌVÃÊÜÀyÜÊ X The SEPLanS software system management. The framework supporting this approach will X The BEM inference engine associate an intelligent engine with a traditional workflow engine. KEYWORDS Decision support system Representative References Artificial Intelligence
X Ê °]Ê +1 /Ê ° °]Ê -/ 1Ê "°]Ê "-* Ê °]Ê Ý«iÀÌÃÊ CONTACTS Collaboration for Wealth and Estate Planning Using the SEPlanS Jean-Marie JACQUET *>ÌvÀ]Ê Ê *°Ê <>À>ÌjÊ >`Ê °Ê >À}>]Ê >LÀ>ÌÊ Ê ,i>Ê Jv°vÕ`«°>V°Li Environments, Lecture Notes in Business Information Processing, Tel. 32 (0) 81 72 50 01 2012. X DERBALI M., A Framework Proposal for Intelligent Isabelle LINDEN [email protected] >>}iiÌÊ vÊ 1iÝ«iVÌi`Ê iÝVi«ÌÃÊ Ê ÜÀyÜ]Ê Ê Tel. 32 (0) 81 72 49 87 *ÀVii`}ÃÊvÊÌ iÊ"Ê/ iÊ ÛiÊV>`iÞ]Ê««°ÊΣä]Ê2011.
65 66 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 2
Information Management, Knowledge Extraction and Business Intelligence
SENIOR SCIENTIST: X Isabelle LINDEN
Research Field and Subjects KEYWORDS Information Management Nowadays, companies do not lack information: data are used Üi`}iÊ ÝÌÀ>VÌ Business Intelligence and stored at any stages of the production process. Nevertheless, Data mining retrieving useful knowledge among them is a daily challenge. Social Network Analysis
For several years, various tools and methodologies have been `iÛi«i`Ê ÌÊ ÃÕ««ÀÌÊ Ì iÊ «ÀViÃÃÊ vÊ Üi`}iÊ iÝÌÀ>VÌÊ CONTACT ÕÌÊ vÊ Õ}iÊ >ÕÌÊ vÊ `>Ì>°Ê >Ì>Ê }Ê >`Ê "*Ê online Isabelle LINDEN analytical processing) analysis are probably the most well [email protected] known among them. More recently, Business Intelligence aims Tel. 32 (0) 81 72 49 87 to provide processes to transform data into knowledge at any decision level, from the most operational to the most strategic ones. This perspective involves, on the one hand, very technical >ëiVÌÃÊ>ÃÊ`>Ì>ÊiÝÌÀ>VÌ]ÊVi>}Ê>`ÊÃÌÀ>}i]Ê«ÌÃ>ÌÊ vÊÃi>ÀV Ê>`Ê>>ÞÃÃÊ>}ÀÌ °Ê"ÊÌ iÊÌ iÀÊ >`]ÊÌÊ >ÃÊ>Ê significant impact on the management policies in particular by the fact that many indicators become available.
The information management team of the management department has interest in both aspects. It focuses on their use vÀÊ`iVÃ>}]Ê>ÞÊÊÌ iÊ«>ÀÌVÕ>ÀÊVÌiÝÌÊvÊ->Ê >`Ê i`ÕÃâi`Ê ÌiÀ«ÀÃiÃÊ- ®°
Representative References
X / ,Ê°]Ê>ÞÃiÊiÌÊ Û>Õ>ÌÊ`iÃÊ-ÕÌÃÊ`iÊ ÕÃiÃÃÊ Ìi}iViÊ DÊ iÃÌ>ÌÊ `iÃÊ * Ê Ü>iÃ]Ê >ÃÌiÀÊ Ì iÃÃÊ FUNDP, 2011. X 1Ê -°]Ê "< ,Ê °]Ê -1 , Ê *°]Ê /Ê °]Ê Ê °]Ê Decision Support for ERP-based Production Management: a Business Intelligence Perspective, in Proceedings of the 15th IFIP 7Ên°ÎÊÌiÀ>Ì>Ê viÀiViÊÊ iVÃÊ-Õ««ÀÌÊ-ÞÃÌiÃ]Ê 2010.
Partnership
X 1ÛiÀÃÌÞÊvÊ*ÞÕÌ Ê1®
67 68 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 3
Web Information Systems and Technologies
SENIOR SCIENTISTS: X >i`Ê "1 "1< X i>ÕVÊ 1/ X * ««iÊ/,
Research Field and Subjects Representative References
The Web has changed the way information is accessed and X ,Ê °]Ê ,--Ê °]Ê /, Ê * °]Ê ÌiÝÌÜ>ÀiÊ Ã >Ài`°Ê ÀÊ iÝ>«i]Ê >ÞÊ V«>iÃÊ ÜÊ `i«i`Ê Ê Ì iÊ ÌiÀ>VÌÊ ««À>V Ê ÌÊ >`iÊ 1ÃiÀÃÊ V>Ê ÌiÝÌÃÊ Ê 7iLÊ Web for directly selling their products to their customers, or for 2.0. International Conference on Web Engineering, LNCS, developing distributed business-to-business processes inside or Springer, pp. 248-262, 2010. across the company. X , ,Ê ° ]Ê ,Ê 9°]Ê /, Ê * °]Ê ,Ê <°]Ê iÃ`iÃÊÌ iÊ7iL½ÃÊVÀiÊÌiV }ÞÊ/ Ê>`Ê//*®]ÊiÜÊ7iLÊ Towards a Unified Approach for Business Process Modeling technologies have emerged like: 1Ã}Ê ÌiÝÌ >Ãi`ÊÀÌv>VÌÃÊ>`Ê7iLÊ-iÀÛViÃ°Ê Ê- ]Ê Ê qÊ 8 ÊÌiV }iÃÊvÀÊiÝÌÀ>VÌ}]ÊÌÀ>ëÀÌ}]ÊÃi>ÀV }Ê>`Ê Computer Press, pp. 332-339, 2009. ÌÀ>ÃvÀ}Ê7iLÊ`>Ì>Æ X ,Ê °Ê ,--Ê °]Ê/, Ê* °]Ê/Ü>À`ÃÊ7iLÊ1Ã>LÌÞ\Ê qÊ 7iLÊ ÃiÀÛViÃÊ vÀÊ ÌiÀ«iÀ>LiÊ ÌiÀ>VÌÃÊ LiÌÜiiÊ *ÀÛ`}Ê 7iLÊ ÌiÌÃÊ VVÀ`}Ê ÌÊ Ì iÊ ,i>`iÀÃÊ ÌiÝÌÃ]Ê >V iÃÆ International Conference in User Modeling, Adaptation and qÊ -i>ÌVÊ 7iLÊ vÀÊ VÀi>Ì}Ê >Ê 7iLÊ ÜÌ Ê >Ê i>}Ê ÃÊ Ì >ÌÊ *iÀÃ>â>ÌÊ1 *®]Ê -]Ê-«À}iÀ]Ê««°Ê{ÈÇ{ÇÎ]Ê2009. machines can understand it. X - Ê-° °]Ê - Ê °]Ê Ê °]Ê ,Ê<°]Ê /, Ê* °]Ê"Ì}ÞÊ iÛi«iÌÊvÀÊÌ iÊ-i>ÌVÊ7iL\Ê>Ê Web Information Systems (WIS) use these Web technologies / Ê À >Ãi`Ê ,iÛiÀÃiÊ }iiÀ}Ê ««À>V °Ê ÕÀ>Ê Ê to retrieve information from data sources and deliver them to Web Engineering, Rinton Press, 6(2), pp. 143-164, 2007. Ì iÊ ÕÃiÀÃ°Ê ÕiÊ ÌÊ Ì iÀÊ V«iÝÊ ÀiµÕÀiiÌÃ]Ê Ì iÊ `iÃ}Ê vÊ X * Ê*°]Ê"1 Ê°]Ê/, Ê* °]Ê ÀÃÃ\ÊÊ"7Ê WIS is not a trivial task. Design methods provide guidelines Wrapper for Reasoning on Relational Databases, Conceptual vÀÊÌ iÊLÕ`}ÊvÊ7-ÊÃÊÌ >ÌÊÌ iÊV«iÝÌÞÊvÊÌ ÃÊ«ÀViÃÃÊ Modelling conference (ER), LNCS, Springer, pp. 502-517, 2007. can be handled. These methods rely on models that specify X -/ 6 ,/Ê °]Ê 1,- Ê ,°]Ê ÝÌÀ>VÌÊ `iÊ `jiÃÊ different aspects of WIS design like data integration, application ÃÕÀÊ ÌiÀiÌÊ >ÛiVÊ ,iÌÀÜiL]Ê Ê ÝÌÀ>VÌÊ iÌÊ }iÃÌÊ `iÃÊ interaction, navigation structure, user interface, user interaction, V>ÃÃ>ViÃÊ ½äÇ®]Ê,iÛÕiÊ`iÃÊ ÕÛiiÃÊ/iV }iÃÊ`iÊ presentation personalisation, etc. ½vÀ>Ì]Ê6ÕiÊ ]Ê«>}iÃÊ£n££nÓ]Ê2007.
The main aspects studied in the PReCISE research centre, include: Funding qÊ Ìi}À>ÌÊ vÊ Ì iÊ Õ}iÊ >ÕÌÊ vÊ vÀ>ÌÊ >Ài>`ÞÊ >Û>>LiÊ>ÞÊÊÀi>Ì>Ê`>Ì>L>ÃiîÊÊÌ iÊ7iLÊÆ X Wallonie qÊ 7iLÊ «ÀiÃiÌ>ÌÊ }iiÀ>ÌÊ VÕ`}Ê 7iLÊ vÀ>ÌÊ X 1 - " >`>«Ì>ÌÊÌÊ`iÛViÊV>«>LÌiÃÊ>`ÊÕÃiÀÊ«ÀiviÀiViîÊÆ qÊ 7iLÊ>««V>ÌÊÌiÀ>VÌÃÊVÕ`}Ê7iLÊÃiÀÛViÊÃiiVÌÊ and composition).
69 Partnership KEYWORDS Semantic Web
X Technical University of Delft, The Netherlands Personalisation Adaptation X Technical University of Eindhoven, The Netherlands 1ÃiÀÊVÌiÝÌ X University of Lyon 1, France Web services X IBM Research Lab, Bengalore, India Web presentation X <>Þi`Ê1ÛiÀÃÌÞ]Ê ÕL>]Ê1 X CETIC CONTACTS Mohamed BOUKHEBOUZE Products and Services >i`°LÕ iLÕâiJvÕ`«°>V°Li Tel. 32 (0) 81 72 49 65
X Techniques and tools for generating and adapting Web Jean-Luc HAINAUT presentations Jv°vÕ`«°>V°Li X Techniques and tools for composing Web services Tel. 32 (0) 81 72 49 96 X /iV µÕiÃÊ>`ÊÌÃÊvÀÊiÝÌÀ>VÌ}Ê`>Ì>ÊvÀÊÌ iÊ7iL Philippe THIRAN X /iV µÕiÃÊ>`ÊÌÃÊvÀÊÌi}À>Ì}ÊiÝÃÌ}Ê`>Ì>ÊÊÌ iÊ7iL [email protected] X Training in Web technologies Tel. 32 (0) 81 72 53 01
WEB SITE http://www.fundp.ac.be/en/precise
70 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 4
E-Health Information Systems
SENIOR SCIENTISTS: X * ««iÊ/, X i>ÕVÊ 1/ X *iÀÀi9ÛiÃÊ- " - X Ì ÞÊ 6 X 6ViÌÊ ,/ X i> lÊ " X iÀ>ViÊ ," 18
Research Field and Subjects X " / ,-Ê °]Ê* //Ê °]Ê,"1-- 1Ê°]Ê- " -Ê*°9°]Ê >ÞÃiÊ À}>Ã>ÌiiÊ iÌÊ }jiÀiÊ `iÃÊ iÝ}iViÃÊ \Ê PReCISE (research centre in information system engineering) has «Àj>>LiÃÊ DÊ ¿vÀ>ÌÃ>ÌÊ `iÃÊ ÃiÀÛViÃÊ `iÃÊ ÕÀ}iViÃ]Ê Ê `iÛi«i`Ê>Ê ÃÌVÊ>««À>V ÊÌÊii>Ì ÊvÀ>ÌÊÃÞÃÌiÃÊ ,/1,ÊÊ >ÕiÊ`¿vÀ>ÌÃ>ÌÊ`iÃÊÕÀ}iViÃÊ Ã«Ì>mÀiÃ]Ê -®° Presses universitaires de Louvain, pp. 13-53, 2003. A comprehensive healthcare model has been elaborated to VÛiÀÊÌ iÊ>ÊÀiµÕÀiiÌÃÊvÊÃÌÊii>Ì Ê-°ÊÌÊVÕ`iÃÊvÕÀÊ core subsystems, namely healthcare processes, information, Funding resources and organisation. It also includes five transverse >ëiVÌÃ\Ê ÃÌ>ViÃ]Ê Ìi]Ê «ÀÛ>VÞÉ>VViÃÃÊ VÌÀ]Ê iÛÕÌÊ >`Ê X Wallonie specialisation. A metadata repository has been developed to X FEDER store and process clinical care paths for cancer and diabetes and to serve as an interoperability platform for assisted home care control. This ontological approach also serves as a basis for more Partnership specialised models, e.g. in mammology, pneumology, molecular pathogen identification, prosthetics, emergency medicine, etc. X CETIC These models are enriched with probabilistic reasoning rules X Institut NARILIS reflecting the latest medical evidence, to assist diagnostic and X CRIDS guidelines engineering. X Réseau Santé Wallon X ICTeam, UCL X Cliniques Universitaires St-Luc, UCL Representative References X µÕiÃÊ`iÊ Ì`i]Ê1 X Polymedis S.A. X 1/Ê °°]Ê ," 18Ê °°]Ê 6 Ê °]Ê i>Ì V>ÀiÊ X Palantiris Information System Modeling, Chapter in I. M. Miranda & M. M. X IBA ÀÕâ Õ >Ê `°®]Ê>`LÊvÊ,iÃi>ÀV ÊÊ /ÃÊvÀÊi>Ì V>ÀiÊ and Social Services: Developments and Applications, 2012. X 1/Ê°°]Ê ," 18Ê°°]Ê 6 Ê°]Ê >ÃiÊ`iÊ`miÃÊ Products and Services «ÕÀÊiÃÊÌjÀ>ÀiÃÊ`iÊÃÃ]Ê,>««ÀÌÊÌiV µÕi]Ê«ÀiÌÊ- ]Ê 2010. X iiÀ>Ê VÕÃÌÃ>LiÊ i>Ì V>ÀiÊ `iÊ >`Ê «ÀÌ>LiÊ X "Ê °]Ê ,Ê -°]Ê "1< Ê °]Ê 7-" Ê °]Ê +Ê °]Ê healthcare metadata repository Ê °]Ê - " -Ê *°9°]Ê <9Ê °]Ê Ê °]Ê X ,iµÕÀiiÌÃÊ }iiÀ}Ê iÌ `}ÞÊvÀÊii>Ì ,-Ê-°Ê °]ÊÊÌÕÌÛiÊÌ>ÌÊ/LÝÊvÀÊ"«iÃÕÀViÊ Imaging Diagnosis, in Proc. IST-Africa, May 2007. X * //Ê °]Ê,"1-- 1Ê°]Ê" / ,-Ê °]Ê- " -Ê*°9°]Ê La rédaction du Cahier des Charges : Pour une méthodologie «ÕÀ`ÃV«>ÀiÊ iÌÊ «>ÀÌV«>ÌÛiÊ `¿jVÌ>ÌÊ `iÃÊ iÝ}iViÃ\Ê >«ÌÀiÊÎ]ÊÊ1À}iViÊ>ÕÝÊÕÀ}iViÃ]Ê*ÀiÃÃiÃÊ1ÛiÀÃÌ>ÀiÃÊ`iÊ Namur, Collection Les organisations : gestion, méthodes, cas. 2004.
71 KEYWORDS i>Ì V>ÀiÊ`i Workflow model Metadata repository Information privacy Medical guidelines Medical ontology Computer-assisted diagnostic Medical image annotation
CONTACTS Philippe THIRAN [email protected] Tel. 32 (0) 81 72 53 01
Jean-Luc HAINAUT Jv°vÕ`«°>V°Li Tel. 32 (0) 81 72 49 96
Pierre-Yves SCHOBBENS [email protected] Tel. 32 (0) 81 72 49 90
Anthony CLEVE [email protected] Tel. 32 (0) 81 72 52 78
Vincent ENGLEBERT [email protected] Tel. 32 (0) 81 72 52 70
Jean-Noël COLIN VJv°vÕ`«°>V°Li Tel. 32 (0) 81 72 57 24
Anne-France BROGNEAUX [email protected] Tel. 32 (0) 81 72 52 78
WEB SITES http://www.fundp.ac.be/en/precise http://info.fundp.ac.be/libd
72 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 5
Special Purpose Database Engineering
SENIOR SCIENTISTS: X i>ÕVÊ 1/ X >ÀiÊ" / X Àj`jÀVÊ6 - / X iÀ>ViÊ ," 18
Research Field and Subjects X ,"1-- 18Ê 8°]Ê 6 - / Ê °]Ê / Ê 6°]Ê iÊ «ÀiÌÊ +ÕiÌiiÌ°iÌÊ`>ÃÊ¿ ÃÌÀiÊ`iÊ>ÊÃÌ>ÌÃ̵ÕiÊÕ`V>ÀiÊLi}i]ÊÊ iÃ}Ê iÌ `ÃÊ vÀÊ ÃÌ>`>À`Ê `>Ì>L>ÃiÃÊ Ì >ÌÊ ÃÕ««ÀÌÊ "/*Ê ÀÃÌ>iÃi]Ê-°]Ê,ÕÃÃi>ÕÝ]Ê8°]Ê6iÃiÌ]Ê°Ê `î]Ê,iVÌÀiÊ "iÊÌÀ>Ã>VÌÊ«ÀViÃÃ}®ÊÃÞÃÌiÃÊ >ÛiÊLiiÊÃÌÕ`i`Ê>`Ê iÌÀiÊ VÀ}iÊ iÌÊ ÃÌÀi°Ê >ÌiÊ `iÊ ¿À`Ài]Ê ÕÃÌViÊ iÌÊ >««i`ÊvÀÊ`iV>`iðÊÜiÛiÀ]ÊÌ iÃiÊ>««À>V iÃÊv>Êà ÀÌÊÜ iÊ Politique criminelle en Belgique, Academia Press, 2005. coping with non standard databases. PReCISE has invested in X ," 18Ê°°]Ê 1/Ê°°]ÊVÌÛiÊ >Ì>L>ÃiðÊ,>««ÀÌÊ the study of three special purpose databases, namely active, w>Ê`ÕÊ«ÀiÌÊVÌÛiÊ >Ì>L>ÃiÃ]ÊÓÈxÊ«°]Ê2003. temporal and statistics databases. For each of them, it has X 1/Ê°°]Ê / Ê6°]ÊÌÀ`ÕVÌÊ«À>̵ÕiÊ>ÕÝÊL>ÃiÃÊ developed models, design methodologies and tools. de données temporelles, 116 p., novembre 2002. In the active database domain, the emphasis has been on X / Ê 6°]Ê 1/Ê °°]Ê 1`iÀÃÌ>`}]Ê iÛi«}]Ê Ã«iVvÞ}Ê V«iÝÊ VVi«ÌÕ>Ê Ìi}ÀÌÞÊ VÃÌÀ>ÌÃ]Ê >`Ê *ÀViÃÃ}Ê /i«À>Ê >Ì>L>ÃiÃ°Ê ,>««ÀÌÊ w>Ê `ÕÊ «ÀiÌÊ Ê }iiÀ>Ì}Ê -+Ê V`iÊ vÀÊ VÌÀ}Ê Ì iÃiÊ VÃÌÀ>ÌÃ°Ê TimeStamp, 974 p., 2002. Ê «>ÀÌVÕ>À]Ê ÀÕiÃÊ >ÛiÊ LiiÊ `iÛi«i`Ê vÀÊ iÝÌi`}Ê Ì iÊ X / Ê6°]Ê 1/Ê°°]Ê - Ê/Ê-Õ««ÀÌÊvÀÊ/i«À>Ê iÝ«ÀiÃÃÛiiÃÃÊvÊÀi>Ì>Ê`>Ì>L>ÃiÃÊÌÊiÝÃÌiViÊVÃÌÀ>ÌÃ]Ê Database Design, in Proc. of ER’01, LNCS 2224, pp. 208-224, Ài`Õ`>ViÃÊ >`Ê V«iÌiÊ iÀÌ>ViÊ VÃÌÀ>ÌÃÊ Ê -+Ó°Ê -«À}iÀ6iÀ>}]Ê2001. Specific DB-MAIN components have been developed for automatic code generation. All information systems include temporal or historical data. Funding ÜiÛiÀ]Ê `i}Ê >`Ê >>}}Ê Ì iÃiÊ `>Ì>Ê «ÃiÊ V«iÝÊ theoretical and practical problems. Comprehensive conceptual, X Wallonie logical and physical models have been elaborated, including X -*" transaction, valid and bitemporal dimensions. A CASE tool, based on DB-MAIN, has been developed to specify and generate active databases managing all the temporal dimensions. Partnership Õ}iÊ ÀiÃÕÀViÃÊ >ÛiÊ LiiÊ `iÛÌi`Ê ÌÊ Ì iÊ `iÛi«iÌÊ vÊ methods and tools to feed a statistics data warehouse with X ReveR s.a. data from heterogeneous sources, included poorly written X ]Ê1 paper documents. Special attention is paid to the evolution of X CETIC `iÃÃÊ >``ÉÀiÛiÉV >}iÊ `iÃÃÊ >`Ê `iÃÊ values). The tool also includes a user-friendly web-based query interface. These results have been successfully applied to penal Products and Services and economic statistics in several Belgian administrations. X Methodologies and tools for active database design X Methodologies and tools for temporal database design Representative References X +ÕiÌiiÌ°iÌ]Ê>Ê`>Ì>ÊÜ>Ài ÕÃiÊ>>}iiÌÊiÛÀiÌ
X / Ê 6°]Ê 6 - / Ê °]Ê 1/Ê °°]Ê ÌÀi«Ã>}iÊ iÌÊ iÝ«Ì>ÌÊ `iÊ `VÕiÌÃÊ ÕÌ`iÃiÃÊ jÛÕÌvÃÊ \Ê iÊ V>ÃÊ`iÃÊÌ>Li>ÕÝÊÃÌ>ÌÃ̵ÕiÃ]ÊÊ VÕiÌÊ ÕjÀµÕi]ÊÕjÀÊ spécial Entreposage de documents et données semi-structurées, iÀmÃ]Ê2007.
73 KEYWORDS Database design Active database Temporal migration Statistics database Data warehouse Data dematerialisation CASE tool
CONTACTS Jean-Luc HAINAUT Jv°vÕ`«°>V°Li Tel. 32 (0) 81 72 49 96
Claire LOBET [email protected] Tel. 32 (0) 81 72 49 91
Frédéric VESENTINI Ài`iÀV°6iÃiÌJÕVÕÛ>°Li Tel. 32 (0) 10 47 48 67
Anne-France BROGNEAUX [email protected] Tel. 32 (0) 81 72 52 78
WEB SITES http://www.fundp.ac.be/en/precise http://info.fundp.ac.be/libd
74 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 6
Database Reverse Engineering
SENIOR SCIENTISTS: X i>ÕVÊ 1/ X 6ViÌÊ ,/ X Ì ÞÊ 6
Research Field and Subjects X 1/Ê °°]Ê i}>VÞÊ >`Ê ÕÌÕÀiÊ vÊ >Ì>L>ÃiÊ ,iÛiÀÃiÊ }iiÀ}]Ê iÞÌi]Ê *ÀVii`}ÃÊ vÊ Ì iÊ £ÈÌ Ê 7À}Ê Most activities related to a database require a complete, viÀiViÊÊ,iÛiÀÃiÊ }iiÀ}]Ê7 , ¿ä®]Ê Ê «ÕÌiÀÊ precise and up to date documentation, notably its conceptual Society, 2009. schema that describes in detail the semantics of the database X 6 Ê °]Ê ,, Ê °Ê >`Ê 1/Ê °°]Ê >Ì>Ê ,iÛiÀÃiÊ structures. This is the case of application programming and of }iiÀ}ÊÕÃ}Ê-ÞÃÌiÊ i«i`iVÞÊÀ>« Ã]ÊÊ*ÀVii`}ÃÊ database maintenance, migration, evolution and integration of the 13th Working Conference on Reverse Engineering to mention a few. Unfortunately, such documentation is most (WCRE’06), pp. 157-166, IEEE Computer Society, 2006. often missing. To allow the processes mentioned above to be X /, Ê*°]Ê -/ 6 ,/Ê°]Ê 1/Ê°°Ê>`Ê"1 Ê°°]Ê performed efficiently, this documentation should be rebuilt Ê iiÀVÊ À>iÜÀÊ vÀÊ ÝÌÀ>VÌ}Ê 8 Ê >Ì>Ê vÀÊ i}>VÞÊ from various information sources, a process called database >Ì>L>ÃiÃ]Ê ÕÀ>Ê vÊ 7iLÊ }iiÀ}]Ê {ή\Ê ««°Ê ÓäxÓÓÎ]Ê reverse engineering. Rinton Press, 2005. The PReCISE Data Engineering group has been developing for X ,, Ê °]Ê *À}À>Ê V«Ài iÃÊ Ê `>Ì>L>ÃiÊ ÀiÛiÀÃiÊ two decades a comprehensive database reverse engineering engineering, PhD Thesis, University of Namur, 2003. methodology supported by the DB-MAIN CASE environment. X 1/Ê°°]ÊÌÀ`ÕVÌÊÌÊ >Ì>L>ÃiÊ,iÛiÀÃiÊ }iiÀ}]Ê >ÞÊ ÃV i>Ê VÃÌÀÕVÌÃÊ >ÀiÊ ÌÊ iÝ«VÌÞÊ `iV>Ài`Ê Ê Ì iÊ Technical report, 140 p., 2002. database DDL, so that special techniques have been designed ÌÊ iÝÌÀ>VÌÊ Ì ÃÊ «VÌÊ vÀ>ÌÊ vÀÊ ÃV i>Ã]Ê `>Ì>L>ÃiÊ contents, program source code and user interface, among Funding others. New application architectures, such as web-based applications, require dynamic analysis techniques. Wallonie These techniques and tools are quite general and have been used to recover the documentation of a wide variety of data structures, e.g., legacy databases, plain files, relational Partnership `>Ì>L>ÃiÃ]Ê LiVÌÀi>Ì>Ê `>Ì>L>ÃiÃ]Ê >Û>Ê V>ÃÃiÃÊ >`Ê 8 Ê documents. ReveR s.a. / iÊ ÀiÃÕÌÃÊ vÊ Ì ÃÊ ÀiÃi>ÀV Ê >ÀiÊ iÝ«Ìi`]Ê >Ì>i`Ê >`Ê VÌÕÕÃÞÊiÝÌi`i`ÊLÞÊëvvÊ,iÛi,° Products and Services
Representative References X Database reverse engineering methodologies for most data models X 6 Ê°]Ê 1,-- Ê°,°]Ê 1/Ê°°]Ê >Ì>L>ÃiÊ-i>ÌVÃÊ X DB-MAIN, a programmable data centered CASE platform ,iVÛiÀÞÊ Ì ÀÕ} Ê >ÞÃÊ ÃÊ vÊ Þ>VÊ -+Ê -Ì>ÌiiÌÃ]Ê Ê ÕÀ>ÊvÊ >Ì>Ê-i>ÌVÃ]Ê6°Ê86]Ê«>}iÃÊ£Îä£xÇ]Ê -ÊÊ 6720, Springer, 2011. X 1/Ê °°]Ê Vi«ÌÕ>Ê ÌiÀ«ÀiÌ>ÌÊ vÊ vÀi}Ê iÞÃ]Ê Technical report, 60 pages, May 2010. X 1/Ê °°]Ê ,, Ê °]Ê ,/Ê 6°]Ê ," Ê °]Ê Ê° °]Ê >Ì>L>ÃiÊ,iÛiÀÃiÊ }iiÀ}]ÊÊ VÞV«i`>ÊvÊ >Ì>L>ÃiÊ -ÞÃÌiÃ]Ê Õ]Ê °Ê >`Ê &âÃÕ]Ê /°Ê `î]Ê -«À}iÀ6iÀ>}]Ê 2009.
75 KEYWORDS Data engineering Database reverse engineering Program code analysis Transformational techniques CASE tool
CONTACTS Jean-Luc HAINAUT Jv°vÕ`«°>V°Li Tel. 32 (0) 81 72 49 96
Vincent ENGLEBERT [email protected] Tel. 32 (0) 81 72 52 70
Anthony CLEVE [email protected] Tel. 32 (0) 81 72 52 78
WEB SITES http://www.fundp.ac.be/en/precise http://info.fundp.ac.be/libd
76 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 7
Database Design
SENIOR SCIENTISTS: X i>ÕVÊ 1/ X 6ViÌÊ ,/ X Ì ÞÊ 6
Research Field and Subjects X , "9Ê,°]Ê,iÛiÀÃiÊ }iiÀ}Ê1ÃiÀ À>ÜÊÀL>Ãi`Ê Interfaces for Interactive Database Conceptual Analysis, PhD Data are at the core of modern information systems, so that / iÃÃ]Ê1ÛiÀÃÌÞÊvÊ >ÕÀ]Ê"VÌLiÀÊ2010. their quality is critical for all the components of these systems. X /, Ê °Ê >`Ê 1/Ê °°]Ê /À>ÃvÀ>ÌL>Ãi`Ê Poorly designed databases inevitably lead to costly maintenance Framework for the Evaluation and Improvement of Database and evolution of application programs. Though widely described Schemas, in Proc. of CAiSE’10, LNCS, pp. 317-331, Springer- for decades, database design methods still deserve further 6iÀ>}]Ê2010. development. Indeed, modern databases bring new challenges X 6 Ê°]Ê ," 18Ê°°]Ê 1/Ê°°]ÊÊ Vi«ÌÕ>Ê for which current methods appear too weak. Approach to Database Applications Evolution, in Proc. of Understanding and solving these challenges in a disciplined ,¿Óä£ä]Ê -ÊÈ{£Ó]Ê««°Ê£ÎÓÊÊ£{x]Ê-«À}iÀ6iÀ>}]Ê2010. way, well beyond the simplistic approaches described in most ÌiÝÌLÃ]Ê >ÀiÊ >}Ê Ì iÊ >Ê }>ÃÊ vÊ Ì iÊ >VÌÛÌiÃÊ vÊ Ì iÊ Data Engineering group of PReCISE. It has developed generic Funding database analysis and design methodologies, based on the transformational techniques that can be specialised to fit Wallonie `vviÀiÌÊ`>Ì>Ê`iÃÊ>`Ê`iÛi«iÌÊVÌiÝÌðÊÊ«>ÀÌVÕ>À]Ê it has developed solid techniques and methods for the following core processes: user-driven requirement acquisition and Partnership validation, schema integration, schema normalisation, schema quality evaluation and improvement, correct and complete ReveR s.a. conceptual schema translation into DBMS DDL. In addition, they are supported by the DB-MAIN CASE tool. / iÃiÊÀiÃÕÌÃÊ>ÀiÊiÝ«Ìi`Ê>`Ê>Ì>i`ÊLÞÊ,iÛi,]Ê>ÊëvvÊ Products and Services of PReCISE. These processes as well as their underlying concepts >ÀiÊ `iÃVÀLi`Ê Ê `iÌ>Ê Ê >Ê LÊ Q 1/]Ê Óä£ÓRÊ Ü V Ê ÃÊ X Methodologies for database design and evaluation intended to student and professional audience. X DB-MAIN, a programmable data centered CASE platform X Ê V«Ài iÃÛiÊ ÌiÝÌLÊ Ê >Ì>L>ÃiÊ `iÃ}Ê Q 1/]Ê Óä£ÓR Representative References X Training modules in Database design
X 1/Ê °°]Ê Bases de données - Concepts, utilisation et développement, 2e Edition, 1300 pages, Dunod, 2012. X , "9Ê ,°]Ê 1/Ê °°]Ê ÛÛ}Ê `ÕÃiÀÃÊ Ê >Ì>L>ÃiÊ iÃ}Ê qÊ / iÊ , "7Ê ««À>V ]Ê Ê ÌiÀ>Ì>Ê ÕÀ>ÊÊ «ÕÌiÀÊ-ViViÊ>`ÊvÀ>ÌÊ-ÞÃÌiÃ]Ê -Ê Publish., 2011. X /, Ê °]Ê 1/Ê °°]Ê +Õ>ÌÞÊ iÛ>Õ>ÌÊ >`Ê improvement framework for database schemas - Using defect Ì>ÝiÃ]Ê Ê *ÀV°Ê vÊ - ½££]Ê -]Ê «>}iÃÊ xÎÈxxä]Ê -«À}iÀ6iÀ>}]Ê2011.
77 KEYWORDS Database engineering Database quality Database design Transformational techniques CASE tool
CONTACTS Jean-Luc HAINAUT Jv°vÕ`«°>V°Li Tel. 32 (0) 81 72 49 96
Vincent ENGLEBERT [email protected] Tel. 32 (0) 81 72 52 70
Anthony CLEVE [email protected] Tel. 32 (0) 81 72 52 78
WEB SITES http://www.fundp.ac.be/en/precise http://info.fundp.ac.be/libd
78 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 8
Business IT Alignment
SENIOR SCIENTISTS: X VÊ -/18 X Michaël PETIT
Research Field and Subjects Representative References
Business IT-Alignment (BITA) is the set of activities ensuring X /1-Ê °]Ê * //Ê °]Ê 1 "-Ê °]Ê ,i >\Ê ,iëÃLÌÞÊ that the investments in IT as well as its usage are consistent Model Language to Align Access Rights with Business Process with the organisation’s business strategy, and effectively serves Requirements. Proceeding of the Fifth IEEE International Ì iÊÀ}>â>̽ÃÊLÕÃiÃÃÊÃÌÀ>Ìi}VÊLiVÌÛiðÊ/ ÃÊ>}iÌÊ Conference on Research Challenges in Information Science ÀiµÕÀiÃÊÌ >ÌÊÌ iÊ/Ê«ÀiVÌÃ]ÊvÀ>ÃÌÀÕVÌÕÀiÊ>`Ê>««V>ÌÃÊ>ÀiÊ Ê , -Ê Ó䣣®]Ê ÃiÀ]Ê Õ>`iÕ«i]Ê ÀiV Ê 7iÃÌÊ `iÃ]Ê defined and implemented by taking into account the business IEEE, ISBN 9-78142-448-67, Colette Rolland, Martine Collard strategy. Furthermore, it also views IT as a support to define i`ÌÀî]Ê««°Ê£äÇq££Ó]Ê2011. and enable new business models and innovate at the business X "1-Ê °]Ê * //Ê °]Ê < ,6"6 Ê °]Ê `i}Ê level. IT subsumes software, hardware and all other necessary Competition-driven Business Strategy for Business IT Alignment. information infrastructure in the broad sense (including e.g. In Advanced Information Systems Engineeing Workshops, Proc. >>}iiÌÊ vÊ /Ê V>«>LÌiÃ]Ê ÃiÀÛViÃÊ >`Ê «ÀiVÌî°Ê /Ê vÊÌ iÊÈÌ ÊÌiÀ>Ì>Ê7Àà «ÊÊ 1-iÃÃÉ/Ê}iÌÊ ÀiiÃÊÊÌ iÊ«ÀiÃiÊÌ >ÌÊ/ÊÃÊÛ>Õ>LiÊÞÊÌÊÌ iÊiÝÌiÌÊÌ >ÌÊÌÊ >`ÊÌiÀ«iÀ>LÌÞÊ 1-/ÊÓ䣣®Êi`ÊÊÓäÌ ÊÕiÊÓ䣣ÊÊ enables an organisation to meet its business goals. VÕVÌÊ ÜÌ Ê - ¿Óä££Ê ÓäÓ{Ê ÕiÊ Ó䣣®Ê `]Ê 1]Ê >iÊ->iÃÊ>`Ê"ÃV>ÀÊ*>ÃÌÀÊi`ÌÀî]ÊiVÌÕÀiÊ ÌiÃÊ The BITA research seeks to elaborate and evaluate reference Ê ÕÃiÃÃÊ vÀ>ÌÊ *ÀViÃÃ}Ê *®]-«À}iÀ]Ê 6°Ê nÎ]Ê models, techniques and methodologies that help to identify, ««°Ê£ÈqÓn]Ê2011. capture, visualise and analyse and improve: X "1-Ê °]Ê* //Ê °]Ê< ,6"6 Ê°]Ê/Ü>À`ÃÊ>Ê1wi`Ê qÊ ÕÃiÃÃÊÃÌÀ>Ìi}iÃ]ÊLÕÃiÃÃÊ`iÃÊ>`ÊLÕÃiÃÃÊÌÛ>ÌÃÆ Business Strategy Language: A Meta-model of Strategy Maps. In qÊ "À}>Ã>Ì>ÊvÀ>ÃÌÀÕVÌÕÀiÃÊVÕ`}ÊLÕÃiÃÃÊ«ÀViÃÃiÃ]Ê / iÊ*À>VÌViÊvÊ ÌiÀ«ÀÃiÊ `i}]Ê*ÀV°ÊvÊÌ iÊ/ À`Ê*Ê7Ê /Ê«ÀiVÌÃ]Ê/ÊvÀ>ÃÌÀÕVÌÕÀiÃÊ>`ÊÃiÀÛViÃo®Æ 8.1 Working Conference, PoEM 2010, Delft, The Netherlands, qÊ ÀÀië`iViÊ>`Ê>}iÌÊLiÌÜiiÊLÌ ° November 9-10, 2010. X 6 Ê " Ê *°]Ê "** ,"17 ,-Ê -°]Ê "6 , Ê -°]Ê The research in this field includes results on: *,"* ,Ê °Ê >`Ê ,-Ê °Ê i`ÌÀî]Ê iVÌÕÀiÊ ÌiÃÊ Ê ÕÃiÃÃÊ qÊ 1`iÀÃÌ>`}ÊvÊÃÌÀ>Ìi}VÊV`ÌÃÊv>ÛÕÀ}ÊÌ iÊÃÕVViÃÃÊ vÀ>ÌÊ*ÀViÃÃ}Ê *®]Ê-«À}iÀÊ6°ÊÈn]Ê«°ÊÓäxÊqÊÓ£È]Ê vÊ /Ê«ÀiVÌÃÊ ÀÌV>ÊÃÕVViÃÃÊv>VÌÀÃÊvÀÊ>}iÌ®Æ 2010. qÊ 1`iÀÃÌ>`}Ê Ì iÊ «>VÌÊ Ì >ÌÊ /Ê ÌÃÊ V>Ê vviÀÊ Ê Ì iÊ X Ê Ê-°]Ê --Ê*°9°]Ê* //Ê °]Ê -/18Ê°]Ê-ÌÀ>Ìi}VÊ >>}iiÌÊvÊÛ>ÌÊ>`ÊÜi`}iÆ ÕÃiÃÃÉ/Ê }iÌÊ ÕÃ}Ê >Ê `iÃ]Ê *ÀVii`}ÃÊ vÊ qÊ }}Ê À}>Ã>Ì>Ê ÀiëÃLÌiÃÊ >`Ê iÌiÀ«ÀÃiÊ BUSITAL, 2008. governance rules and constraints with ICT access control X -/18Ê °]Ê Üi`}iÊ LÕ`}Ê Ê Û>ÌÊ iÌÜÀÃ\Ê «ViÃÆ the impact of collaborative tools, Proceedings 7th European qÊ }}Ê iÌiÀ«ÀÃiÊ ÃÌÀ>Ìi}iÃÊ ÜÌ Ê /Ê ÃÕ««ÀÌÊ vÀÊ LÕÃiÃÃÊ viÀiViÊÊÜi`}iÊ >>}iiÌ]Ê Õ`>«iÃÌ]Ê-i«ÌiLiÀÊ ÀÕiÃÆ 2006. qÊ 1Ã}Ê}>Ê`iÃÊÌÊÀi«ÀiÃiÌÊ>`Ê>}ÊiÌiÀ«ÀÃiÊÃÌÀ>Ìi}iÃÊ ÜÌ ÊLÕÃiÃÃÊ>`ÊÛ>ÕiÊ`iÃÆ qÊ iw}Ê ÀV Ê >}Õ>}iÃÊ >`Ê Ì}iÃÊ vÀÊ `iÃVÀL}Ê iÌiÀ«ÀÃiÊÃÌÀ>Ìi}iÃÆ qÊ *ÀiVÌÊ «À}À>Ê >`Ê «ÀÌvÊ >>}iiÌÊ >`Ê LiiwÌÃÊ management.
79 Funding KEYWORDS Business-IT alignment *ÕLVÊ,iÃi>ÀV Ê iÌÀiÊiÀÊ/Õ`À]ÊÕÝiLÕÀ} Critical success factors Strategy IT architecture Üi`}iÊ>>}iiÌ Partnership Business Modelling Languages X *ÕLVÊ,iÃi>ÀV Ê iÌÀiÊiÀÊ/Õ`À]ÊÕÝiLÕÀ} ÛiÀ>Vi X i«>ÀÌiÌÊ vÊ «ÕÌiÀÊ >`Ê -ÞÃÌiÃÊ -ViViÃÊ -6®]Ê Responsibility Stockholm University, Sweden X >VÕÌjÊ`iÃÊ>ÕÌiÃÊ ÌÕ`iÃÊ iÀV>iÃÊ ®]Ê1ÛiÀÃÌjÊ`iÊ CONTACTS Lausanne, Suisse Annick CASTIAUX X Faculty of Information, University of Toronto, Canada >V°V>ÃÌ>ÕÝJvÕ`«°>V°Li Tel. 32 (0) 81 72 48 80
Products and Services Michaël PETIT [email protected] Tel. 32 (0) 81 72 52 59 X Ý«iÀÌÃiÊ Ê ÃÌÀ>Ìi}ÞÊ >`Ê LÕÃiÃÃÊ `iÊ `iwÌÊ >`Ê representation X Ý«iÀÌÃiÊÊ>}iÌÊiÛ>Õ>ÌÊ>`Ê«ÀÛiiÌ WEB SITE http://www.fundp.ac.be/en/precise
80 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 9
Business Modelling
SENIOR SCIENTISTS: X >ÕiÊ"* X Yves WAUTELET
Research Field and Subjects At the lowest level of granularity, Business modelling proposed information patterns and service patterns that represent the Business Modelling is concerned with analysing and “nitty-gritty” of business that an organisation must deal with Õ`iÀÃÌ>`}Ê Ì iÊ À}>Ã>Ì>Ê VÌiÝÌÊ ÜÌ Ê Ü V Ê on a day-to-day basis. When we move to an upper level, we find a software system will eventually function. It proposes LÕÃiÃÃÊ«>ÌÌiÀÃÊÊÌ iÊÝÊvÊ«À`ÕVÌÃÊ>`Ê>ÀiÌÃÊÌ >ÌÊyÜÊ organisational patterns motivated by organisational theories from organisational styles. The highest level of granularity is intended to facilitate the construction of business software Ì iÊÀ}>Ã>Ì>ÊÃÌÞiÃÊÌ >ÌÊ>``ÀiÃÃÊÌ iÊÝÊvÊÃVÌiV V>Ê models such as use cases models and is concerned with the VÌiÝÌÊ >`Ê À}>Ã>Ì>Ê VÃÌÀÕVÌÃ\Ê Ì iÞÊ >ÀiÊ >viÃÌ>ÌÊ evaluation of the patterns using desirable qualities or non of organisation invariants, layers of organisational constructs, functional requirements. À}>Ã>ÌÊ iVÕiÃ]Ê >`Ê V«iÝÊ >ÀÀ>}iiÌÃÊ vÊ molecules, the collection of which constitutes organisational Since the origins of civilisation, people have been designing, structures. participating in, and sharing the burdens and rewards of organisations. The early organisations were primarily military or Many organisational styles are fully formed patterns with definite governmental in nature. In the Art of War]Ê-ÕÊ/âÕÊ`iÃVÀLiÃÊ characteristics. In contrast, many other organisational styles are the need for hierarchical structure, communications, and ÌÊ ÛiÀÞÊ iÝ«VÌ]Ê Ì >ÌÊ Ã]Ê ÌÊ i>ÃÞÊ Ã«iVwi`]Ê «iÀ>Ì>Ãi`]Ê strategy. In the Politics, Aristotle wrote of governmental and measured. administration and its association with culture. To the would- be-leader, Machiavelli advocated in the Prince power over morality. The roots of organisational theories, then, can be Representative References traced to antiquity, including thinkers from around the world who studied alternative organisational structures. Such X " Ê /°/°°]Ê "*Ê °]Ê º>]Ê -vÌ}>Ê >`Ê +Õ>ÌÞÊ structures consist of stakeholders - individuals, groups, physical ,iµÕÀiiÌ»°Ê Ê °Ê «i]Ê °Ê À`iÀÊ `ð®\Ê -Ê Óä£äÊ Ê or social systems - that coordinate and interact with each other Proceedings of the 12th International Conference on Enterprise to achieve common goals. Today, organisational structures vÀ>ÌÊ -ÞÃÌiÃ]Ê 6ÕiÊ Î]Ê ÕV >]Ê *ÀÌÕ}>]Ê ««°Ê £ÎÓÓÊ are primarily studied by two disciplines: Organisation Theory, ÕiÊ2010. that describes the structure and design of an organisation and X " Ê /°/°°]Ê º+Õ>ÌÞ>Ü>ÀiÊ >}iÌÀiÌi`Ê vÀ>Ì Strategic Alliances that model the strategic collaborations of system development” PhD thesis, Louvain School of independent organisational stakeholders who have agreed to Management, Université catholique de Louvain, December, pursue a set of agreed upon business goals. 2010. X -/,"Ê °]Ê "*Ê °]Ê 1Ê °]Ê * , Ê °]Ê º i>}Ê ÜÌ Ê Both disciplines aim to identify and study organisational «iÝÌÞÊ1Ã}Ê Vi«ÌÕ>Ê `iÃÊ >Ãi`ÊÊ/À«Ã»°ÊÊ°Ê «>ÌÌiÀðÊ/ iÃiÊ>ÀiÊÌÊÕÃÌÊ`i}Ê>LÃÌÀ>VÌÃÊÀÊÃÌÀÕVÌÕÀiÃ]Ê À}`>]Ê6°Ê°Ê >Õ` À]Ê*°ÊÀ}]Ê °Ê-°Ê°Ê9ÕÊ `ð®\Ê Vi«ÌÕ>Ê rather they can be seen, felt, handled, and operated upon. They Modeling: Foundations and Applications. LNCS 5600 Springer, >ÛiÊ>Ê>viÃÌÊvÀÊ>`ÊiÊÊÌ iÊLiVÌÛiÊ`>ÊvÊÀi>ÌÞÊ pp. 335-362, 2009. as part of the concrete world. A pattern, however, is not solely X "*Ê °]Ê 1 ,Ê -°Ê >`Ê 71/ /Ê 9°]Ê º ÕÌ}iÌÊ >ÊÃiÌÊvÊiÝiVÕÌÊLi >ÛÕÀðÊ,>Ì iÀ]ÊÌÊiÝÃÌÃÊÊÛ>ÀÕÃÊvÀÃÊ *>ÌÌiÀÃÊvÀÊ"À}>â>Ì>Ê>ÞÃû]ÊÊ°ÊÕ>Ãi>À>Ê `°®]Ê at every stage of crystallisation (e.g., specification), and at every Global Implications of Modern Enterprise Information Systems: level of granularity in the organisation. The more manifest is Technologies and Applications]ÊÊ*ÕLà }]Ê >«°Ê6]Ê2008. its representation, the more the pattern emerges and becomes ÀiV}â>LiÊÊÜ iÌ iÀÊ>ÌÊ>Ê } ÊÀÊÜÊiÛiÊvÊ}À>Õ>ÀÌÞ°
81 X "*Ê °]Ê /1 Ê "Ê /°Ê >`Ê 1 ,Ê -°]Ê º-V> iÌÀVÊ KEYWORDS iÛi«iÌÊ vÊ ÕÌ}iÌÊ ÀV ÌiVÌÕÀiû°Ê Ê ÕÀ>Ê vÊ "À}>Ã>Ì>Ê*>ÌÌiÀà "À}>â>Ì>Ê «ÕÌ}Ê>`Ê iVÌÀVÊ iÀViÊ" ®]Ê Requirements engineering Business Modelling 18(2):150-175, Taylor and Francis, 2008. Use Case Models X "*Ê °Ê >`Ê 1 ,Ê -°]Ê º*>ÌÌiÀÃÊ vÀÊ "À}>â>Ì>Ê Non Functional Requirements Modeling”. In International Journal of Enterprise Information Information Modelling SystemsÊ -®]ÊÎή\£ÓÓ]Ê`i>ÊÀÕ«]Ê2007. Conceptual Modelling
Partnership CONTACTS Manuel KOLP >Õi°«JÕVÕÛ>°Li X University of Toronto, Department of Computer Science Tel. 32 (0) 10 47 83 95 X University of Trento, Department of Information and Communication Technology Yves WAUTELET X 6>iV>Ê1ÛiÀÃÌÞÊvÊ/iV }Þ]Ê i«>ÀÌiÌÊvÊ «ÕÌiÀÊ [email protected] Science Tel. 32 (0) 10 47 83 95 X University of Utrecht, Department of Computer Science X Federal University of Pernambuco, Department of Computer WEB SITES Science http://www.isys.ucl.ac.be/ http://www.isys.ucl.ac.be/skwyrl http://www.isys.ucl.ac.be/descartes Products and Services
X ià ,/ -Ê "À}>Ã>Ì>Ê `i}Ê - Ê /Ê /À«ÃÊ «ÀiVÌ® X -ÜÞ,ÊvÀ>iÜÀÊvÀÊ"À}>Ã>Ì>Ê `i} X Consultancy X Ý«iÀÌÃi X ÝiVÕÌÛiÊi`ÕV>Ì
82 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY C 10
E-Business Applications
SENIOR SCIENTISTS: X >ÕiÊ"* X Yves WAUTELET
Research Field and Subjects physical copies for each employee, a central server or email list can serve as an efficient method for distributing necessary E-business is a term used to describe businesses run on the information. Internet, or utilising Internet technologies to improve the productivity or profitability of a business. In a more general In the past few years, virtually all businesses have become, sense, the term may be used to describe any form of electronic to some degree or another, an e-business. The pervasiveness business - that is to say, any business which utilises a computer. of Internet technology, readily available solutions, and the / ÃÊÕÃ>}iÊÃÊÃiÜ >ÌÊ>ÀV >V]Ê ÜiÛiÀ]Ê>`ÊÊÃÌÊVÌiÝÌÃÊ repeatedly demonstrated benefits of electronic technology have iLÕÃiÃÃÊÀiviÀÃÊiÝVÕÃÛiÞÊÌÊÌiÀiÌÊLÕÃiÃÃið made e-business the obvious path. This trend continues with new technologies, such as Internet-enabled cell phones and The most common implementation of e-business is as an PDAs, and the trend of e-business saturation will most likely additional, or in some cases primary, storefront. By selling products continue for some time. and services online, an e-business is able to reach a much wider consumer base than any traditional brick-and-mortar store could ever hope for. This function of e-business is referred to as Representative References e-commerce, and the terms are occasionally used interchangeably. X /, Ê6°]Ê"*Ê °]Ê6 , " /Ê°]Ê71/ /Ê9°]ʺ1Ã}Ê An e-business may also use the Internet to acquire wholesale />ÃÊ>`Ê >Ì>Ê `iÃÊvÀÊ1ÃiÀÊÌiÀv>ViÊ iV>À>ÌÛiÊiiÀ>Ì»°Ê products or supplies for in-house production. This facet of Ê°Ê«i]Ê°Ê À`iÀÊ `ð®\Ê -ÊÓä£äÊÊ*ÀVii`}ÃÊvÊÌ iÊ e-business is sometimes referred to as e-procurement, and may 12th International Conference on Enterprise Information offer businesses the opportunity to cut their costs dramatically. -ÞÃÌiÃ]Ê6ÕiÊx]ÊÕV >]Ê*ÀÌÕ}>]Ê««°Ê£xx£Èä]ÊÕiÊ2010. Even many e-businesses which operate without an electronic X 6Ê-°]Ê71/ /Ê9°]Ê"*Ê °]ʺÊ*ÀViÃÃÊvÀÊ ÌÃÃiiVÌÊ storefront now use e-procurement as a way to better track and >`Ê Ã>ÌV iÃÊ >`}Ê Ê Ê >`ÀÛiÊ ««À>V »°Ê Ê manage their purchasing. ICAART 2010, Proceedings of the International Conference on }iÌÃÊ>`ÊÀÌwV>ÊÌi}iVi]Ê6>iV>]Ê-«>]Ê««°Ên£äÈ]Ê In addition to buying and selling products, e-business may also >Õ>ÀÞÊ2010. handle other traditional business aspects. The use of electronic X 71/ /Ê9°]Ê 9Ê9°]Ê Ê° °]Ê"*Ê °]ʺÊ*ÀViÃÃÊ V >ÌÊ>ÃÊ>ÊvÀÊvÊÌiV V>Ê>`ÊVÕÃÌiÀÊÃÕ««ÀÌÊÃÊ>ÊiÝViiÌÊ vÀÊ iÛi«}Ê`>«Ì>LiÊ>`Ê"«iÊ-iÀÛViÊ-ÞÃÌiÃ\Ê««V>ÌÊ iÝ>«iÊvÊÌ Ã°ÊÊiLÕÃiÃÃÊÜ V ÊÕÃiÃÊV >ÌÊÌÊÃÕ««iiÌÊÌÃÊ Ê -Õ««ÞÊ >Ê >>}iiÌ»°Ê Ê °Ê «i]Ê °Ê À`iÀÊ `ð®\Ê traditional phone support finds a system which saves incredible Enterprise Information Systems. Lecture Notes in Business amounts of time while providing opportunities unavailable Information Processing, Springer, pp. 564-576, 2009. through traditional support. By using virtual computer systems, X 19 Ê /°]Ê "*Ê °Ê >`Ê * - , Ê °]Ê ºÊ iÛi«iÌÊ vÀÊ iÝ>«i]Ê ÌiV V>Ê ÃÕ««ÀÌÊ «iÀ>ÌÀÃÊ V>Ê ÀiÌiÞÊ >VViÃÃÊ >Ê À>iÜÀÊ vÀÊ «iÌ >Ãi`Ê }iÌ"ÀiÌi`Ê ÕÃiÃÃÊ customer’s computer and assist them in correcting a problem. And Services”. In International Journal of Agent Software Engineering with the download of a small program, all pertinent information "- ®]ÊÎÊÓÉή]Ê««°ÊÎÓnÎÈÇÊ`iÀÃViVi]Ê2009. about the hardware and software specifications for a user’s X "1-- Ê -°]Ê 1 ,Ê -°]Ê ", Ê *°]Ê "*Ê °Ê >`Ê computer may be relayed to the support operator directly, without "1,/ -Ê°]ʺ,i>Ã}Ê>LÕÌÊ7}iÃÃÊÊ iÌÜÀÃÊvÊ having to walk a customer through personally collecting the data. Agent”. In Software Engineering for Large Multi-Agent Systems (SELMAS), (5):56-70, LNCS 5467, Springer, 2007. Using email and private websites as a method for dispensing X 19 Ê /°, A Methodological Framework for Developing internal memos and white sheets is another use of the Internet and Composing Business Services, PhD Thesis, Louvain School by e-business. Rather than producing time-intensive and costly of Management, UCLouvain, 2007.
83 Partnership KEYWORDS E-Business
X University of Toronto, Department of Computer Science Customer relationship Management E-Commerce X University of Trento, Department of Information and Web services Communication Technology Recommendation Systems X 1ÛiÀÃÌjÊLÀiÊ`iÊ ÀÕÝiiÃ]Ê i«>ÀÌiÌÊvÊ «ÕÌiÀÊ-ViVi Business to Business X University of Ancona, Department of Computer Science X -" Ê-°° CONTACTS Manuel KOLP Products and Services >Õi°«JÕVÕÛ>°Li Tel. 32 (0) 10 47 83 95
X Web recommendation system Yves WAUTELET X E-business solutions [email protected] X E-business patterns Tel. 32 (0) 10 47 83 95 X Web services X Agent-oriented services WEB SITES http://www.isys.ucl.ac.be/ http://www.isys.ucl.ac.be/skwyrl
84 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY D 1
Digital circuits and systems
SENIOR SCIENTISTS: X Denis FLANDRE X Jean-Didier LEGAT X François-Xavier STANDAERT X David BOL
Research Field and Subjects recently designed the first compact implementation of the new hash standard finalists SHA3. The impact of technology scaling UÊ Low-power digital electronics. At the Microelectronics on low power constraints has also been analysed. Laboratory, a wide expertise has been gained at each design – Image processing: thanks to collaborations with the image level from device to system, e.g.: processing lab of UCL, the first FPGA publications of JPEG2000 – Ultra-low-voltage devices and circuits have been studied for decoder and fingerprinting inserter were achieved. The high energy efficiency in applications such as biomedical and laboratory continues investigations on such topics combined wireless sensor nodes. A strong focus was set on achieving with cryptography, in order to meet the future Digital Cinema high reliability and increased speed performances. Both test requirements. structures (ring oscillators) and logic blocks (AES coprocessor) – Hardware security: UCL is a long standing leader in the analysis were demonstrated in nm-CMOS technologies. of physical security for cryptographic devices. Published works – Ultra-low-leakage logic and memories were proposed based include theoretical tools and models for the fair evaluation of on UCL patented building blocks to achieve up to 1000x physical security as well as concrete analysis and proposals of stand-by power reduction. countermeasures against side-channel and fault attacks. – Dynamic current-mode logic styles were intensively analysed UÊ Microprocessor design and advanced computer architecture. and new ones (Low-Swing Current-Mode Logic, Dynamic The topics are in the scope of signal processing, embedded Differential Swing-Limited Logic) were designed for several low- systems and general-purpose processors: power applications. – RISC architectures: the basic high performance processor – Novel full adder architectures: special logic styles like branch- architecture is well studied, simulated and used as baseline based logic and pass-gate allowed the implementation of architecture. hybrid high-performance low-power full adders. Moreover, – Systolic and DSP architectures: such architectures were a special multi-value signed-digit full adder using Ultra-Low- developed for high performances signal processing and Power diodes was designed and other versions using dynamic reconfigurable applications. Several optimised applications were current-mode logic styles are under development. validated such as image compression or wavelet transforms. – Asynchronous logic based on new completion techniques is – Superscalar processors: evolutions of this general-purpose under research for easy implementation in both ASIC and FPGA architecture have been proposed. In particular, a further EDA tool flows. parallelism extraction by a multithreaded execution model has – Low-power microcontrollers: thanks to the extensive use of been developed and validated. low power state-of-the-art techniques at gate and architectural – Parallel architectures: researches are carried out on instruction- levels, a low-power 80C51 microcontroller was designed. level parallel architectures such as EPIC (Explicit Parallel Both a high temperature and a deep-submicron version Instruction Computing) or VLIW architectures for intensive were manufactured to meet wide-range industry standards. computation in embedded systems. Coarse grain parallelism Moreover, a microcontroller System-on-Chip based on an and reprogrammable hardware by RISC ISA are also studied in MSP430 has been manufactured in nm-CMOS technology with the field of FPGA embedded applications. ultra-low-voltage operation for record low power consumption. UÊ FPGAs (Field Programmable Gates Arrays). The research focuses on cryptography, image processing and hardware Representative References security: – Cryptography: research on cryptographic implementations X BOL D. et al., A 25MHz 7μW/MHz Ultra-Low-Voltage has been a permanent activity at UCL. Different works have Microcontroller SoC in 65nm LP/GP CMOS for Low-Carbon investigated the hardware performances of various algorithms Wireless Sensor Nodes), in IEEE Int. Solid-State Circuits Conf. (DES, AES, RSA …). In particular, the UCL Crypto Group has (ISSCC), 2p., 2012.
85 X KERCKHOF S., DURVAUX F., VEYRAT-CHARVILLON N., Products and Services REGAZZONI F., MEURICE DE DORMALE G., STANDAERT F.-X., Low Cost FPGA Implementations of the SHA-3 Finalists, in the X Digital or mixed-signals ASIC design proceedings of CARDIS 2011, Lecture Notes in Computer Science, X Real-time systems vol 7079, pp. 115-132, Leuven, Belgium, September 2011, Springer. X FPGA Development X HOCQUET C., KAMEL D., REGAZZONI F., LEGAT J.-D., X Rapid prototyping FLANDRE D., BOL D., STANDAERT F.-X., Harvesting the potential X Dedicated parallel architectures of nano-CMOS for lightweight cryptography: An ultra-low-voltage 65 nm AES coprocessor for passive RFID tags, accepted for Springer J. Cryptographic Engineering, vol. 1, No. 1, pp. 79-89, 2011. Main Equipment X BOL D., Robust and energy-efficient ultra-low-voltage circuit design under timing constraints in 65/45nm CMOS (invited), in X Latest FPGA boards from Xilinx and Altera. MDPI J. Low-Power Electronics and Applications, vol. 1, No. 1, X Software tools: Eldo, Modelsim, Simplescalar, SystemC pp. 1-19, 2011. (Simulation); ISE, Symplify Pro, Synopsys and Encounter X RENAULD M., STANDAERT F.-X., VEYRAT-CHARVILLON N., (Synthesis); Cadence and Synopsys work suite (Design); EDK KAMEL D., FLANDRE D., A Formal Study of Power Variability (Embedded). Issues and Side-Channel Attacks for Nanoscale Devices, in the proceedings of Eurocrypt 2011, Lecture Notes in Computer Science, vol 6632, pp. 109-128, Tallinn, Estonia, May 2011, KEYWORDS Springer. Computer architecture X STANDAERT F.-X., MALKIN T.G., YUNG M., A Unified Digital circuits Digital systems Framework for the Analysis of Side-Channel Key Recovery FGPA Attacks, in the proceedings of Eurocrypt 2009, Lecture Notes in DSP Computer Science, vol 5479, pp 443-461, Cologne, Germany, Low-power Springer, April 2009. Parallel architecture X BOL D., AMBROISE R., FLANDRE D., LEGAT J.D., Interests and System-on-chip Limitations of Technology Scaling for Subthreshold Logic, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) CONTACTS SYSTEMS, 17 (10): 1508-1519, 2009. Denis FLANDRE X LEVACQ D., DESSARD V., FLANDRE D., Low leakage SOICMOS denis.fl[email protected] static memory cell with ultra-low power diode, IEEE Journal Of Tel. 32 (0) 10 47 81 35 Solid-State Circuits, 42 (3): 689-702, 2007. Jean-Didier LEGAT [email protected] Tel. 32 (0) 10 47 25 40 Patents François-Xavier STANDAERT X Low Swing Current Mode Logic Style. Provisional US patent [email protected] application n° 60/571,383 filed on 14th May 2004. Tel. 32 (0) 10 47 25 65 X Ultra Low Power Analog Basic Blocks. International PCT/ EP01/15023 filed on 17/12/2001. David BOL [email protected] X ULP basic blocks and their uses. “Continuation in Part” filed Tel. 32 (0) 10 47 21 48 in USA on June 23rd 2003 under reference no. 10/602,016. X Ultra-low-power circuit, dépôt européen 30.04.2007, Pub. No.: US 2009/0273356 Al (43), Nov. 5, 2009. WEB SITE www.uclouvain.be/en-352440.html
Partnerships
X EUROSOI: SOI technology, EU Network, FP6 (CISSOID, Philips, VTT, SOITEC…). X RECOPS: Euclid Eurofinder consortium investigating reconfigurable architectures. X CEA-Leti, ST Micro, INGP, ISEP, ENST, Dolphin Integration, France. X nSilition, IMEC, Belgium. X CSEM, Switzerland.
86 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY D 2
Wireless autonomous smart sensor networks
SENIOR SCIENTISTS: X Denis FLANDRE X i>*iÀÀiÊ,- X Christophe CRAEYE X ÕVÊ6 ",* X i> `iÀÊ / X >Û`Ê "Ê X Laurent FRANCIS X >Õ`iÊ" -/ - X À>XÃ8>ÛiÀÊ-/ ,/
Research Field and Subjects (i.e. Microelectronics, Telecommunications and Microwaves) of the Institute ICTEAM (Information Communication Technologies, A new domain fastly emerges from the general and continuous Electronics and Applied Mathematics). trend to incorporate ever more electronic functions in any system, from cars, planes or buildings to biomedical or consumer products. This new domain is more loosely defined Representative References by the inclusive association of such often-heard catchphrases >ÃÊ º«iÀÛ>ÃÛiÉÕLµÕÌÕÃÊ V«ÕÌ}»]Ê ºÌ }ÃÊ Ì >ÌÊ Ì »]Ê X 1Ê °]Ê - ,Ê °]Ê , 9 Ê °]Ê Ê " ,Ê *°Ê >`Ê º>LiÌÊ Ìi}iVi»]Ê ¼ÌiÀiÌÊ vÊ Ì }ûoÊ ÌÊ ÃÊ Ì iÊ LiÃÌÊ " -/ -Ê °]ÊÊ>>ÞÌV>Ê`i}ÊvÊ«>Àâi`ÊÌiÛ>À>ÌÊ V >À>VÌiÀâi`Ê LÞÊ >Ê ÃÌÀ}iÀÊ >`Ê ÀV iÀÊ VÕ«}Ê LiÌÜiiÊ Ì iÊ on-body propagation channels with dynamic body scattering, « ÞÃV>Ê ÜÀ`Ê >`Ê Ì iÊ vÀ>ÌÉVÕV>ÌÊ ÜÀ`°Ê EURASIP Journal on Wireless Communications and Networking / ÃÊÌÀi`ÊÜÊLiÊV >À>VÌiÀâi`ÊLÞÊÌ iÊ`i«ÞiÌÊvÊ>ÊÜ`iÊ (special issue: Towards the Connected Body: Advances in Body diversity of networks of autonomous microsystems, combining Communications), 12 p., March 2011. miniaturised sensors of electrical, physical, mechanical, X " +1 /ÊC., ÊD., , <<" ÊF., /Ê° °]ÊFLANDRE D., chemical or biological data, with signal processing and wireless "ÊD. and STANDAERT °8°]ʺ>ÀÛiÃÌ}ÊÌ iÊ«ÌiÌ>ÊvÊ> communication. Considering the immense application reservoir, "-ÊvÀÊ} ÌÜi} ÌÊVÀÞ«Ì}À>« Þ\ÊÊÕÌÀ>ÜÛÌ>}iÊÈxÊÊ ÃiÃÀÊiÌÜÀÃÊ>ÀiÊÕ`iÀÊVÃ`iÀ>LiÊÌiÀiÃÌÊ>`ÊiÝ«>ÃÊ AES coprocessor for passive RFID tags”, Springer J. Cryptographic in the R&D and industrial communities. Engineering, vol. 1, no. 1, pp. 79-89, 2011. X ,Ê °]Ê ,1,/Ê -°]Ê ,, Ê *°]Ê * * Ê ,°]Ê ", " The main challenge in this R&D orientation is not so much the - Ê°]Ê <Ê/°]Ê, -Ê°°]Ê , Ê °]Ê,- Ê°*°]Ê `Û`Õ>Ê `iÛViÊ Ê ÌÃiv]Ê vÀÊ Ü V Ê iÝÌÀiiÊ «iÀvÀ>ViÃÊ º >ÌÕÀâi`ÊÜÀiiÃÃÊÃiÃ}ÊÃÞÃÌiÊvÀÊÀi>ÌiÊLÀi>Ì Ê>VÌÛÌÞÊ >ÀiÊ }iiÀ>ÞÊ ÌÊ ÀiµÕÀi`]Ê iÝVi«ÌÊ vÀÊ Ì iÊ ÕÌÀ>ÜÊ iiVÌÀV>Ê ÀiVÀ`}»]Ê Ê-iÃÀÃÊÕÀ>]Ê£äÊ£®]Ê««°Ê£Çn£n{]Ê2010. power consumption, but it much more lies in the full system X /Ê °]Ê ,, Ê *°]Ê ,"11 /Ê °]Ê - ,Ê °]Ê miniaturisation, from energy sources to antennas. The new " -/ -Ê °]Ê , 9 Ê °]Ê , Ê °]Ê 6 ",* Ê ÀiÃi>ÀV Ê`ÀiVÌÃÊÌ iÀivÀiÊiÛÛiÊvÀÊ«ÕÀiÊ "-ÊÌÀ>ÃÃÌÀÊ L., “Testbed for IR-UWB based ranging and positioning: scaling to the incorporation of new functions (sensors, Ý«iÀiÌ>Ê«iÀvÀ>ViÊ>`ÊV«>ÀÃÊÌÊ , û]Ê7ÀiiÃÃÊ MEMS, energy scavengers…) on the silicon chips, in addition Pervasive Computing (ISWPC), 5th IEEE International Symposium ÌÊ Ì iÊ "-Ê VÀVÕÌÀÞ]Ê iLi``i`Ê ÃvÌÜ>Ài]Ê VÕV>Ì]Ê ÆÊ `i>]ÊÌ>Þ]ÊxÇÊ >ÞÊÓä£ä]Ê««°Ê£ÈÎq£Èn]Ê2010. antennas, channel modelling and security issues. With these X "1 /Ê °]Ê <Ê /°]Ê ,, Ê *°]Ê , Ê °]Ê Ài}>À`ÃÊÌÊiÜÊ>ÌiÀ>Ã]Ê-VÃÕ>ÌÀÊ-"®ÊÌiV }ÞÊ º iÌÜÀ}Ê -ÌÀ>Ìi}iÃÊ vÀÊ -ÌÀÕVÌÕÀ>Ê i>Ì Ê ÌÀ}Ê has already demonstrated promising compatibility and with Autonomous sensors”, Caneus Workshop (International performance properties for the co-integration of such new Collaborative Aerospace Development of Micro Nano- vÕVÌÃÊÜÌ Ê } µÕ>ÌÞÊ "-ÊVÀVÕÌÃ]Ê>ÌÊÌ iÊÜ>viÀÊiÛi°Ê/ iÊ technologies: From Concepts to Systems, NASA Ames Research -"ÊÃÕLÃÌÀ>ÌiÃÊ`ii`ÊÌÀÃV>ÞÊ>ÜÊiÊÌÊVLiÊ>ÊÌÃÊ Center, California, USA), 1-6 March 2009. well-known circuit advantages, of huge interest for the targeted applications (i.e. micropower consumption, harsh temperature or radiation environment resistance, RF operation…), with high- Patents performance sensors and MEMS free of the parasitics due to the bulk Si substrate or to off-chip connections. “Network Architecture For Wirelessly Interfacing Sensors At 1ÌÀ>Ê ÜÊ *ÜiÀ»]Ê *ÕL°Ê °\Ê 7"ÉÓääÉäÓÇÇ£]Ê ÌiÀ>Ì>Ê The UCL group dedicated to foster “innovation in wireless sensors ««V>ÌÊ °\Ê * /É *ÓääÉäxäÇÎ{]Ê *ÕLV>ÌÊ >Ìi\Ê networks” gathers many researchers in Electrical Engineering 30.07.2009, International Filing Date: 22.01.2009
87 Partnership KEYWORDS Communication
X IEMN, Lille, France. Electromagnetics -É - X IMEC, Leuven, Belgium. Sensors X CEA-LETI, France Micro-nano-electronics X CETIC, Belgium Networks X -]ÊÀ>ViÊ>`ÊiÀ>Þ Security
X *>ÀÌiÀÃÊÊ 1Ê iÌÜÀÃÊvÊ ÝViiVi]Ê*È]Ê*ÇÊ>`ʺÕ>À`>Ê CONTACT }iûÊ>}à «Ê«ÀiVÌÃ]Ê>ÃÊÜiÊ>ÃÊ«ÀiVÌÃÊvÀÊ7>iÊÌ iÊ ICTEAM /ELEN ÃV>i`Ê*iÃÊ`iÊV«jÌÌÛÌjo®° Tel. 32 (0) 10 47 25 97 [email protected]
Products and Services WEB SITES Design, simulation, fabrication and characterisation of integrated http://www.uclouvain.be/en-icteam.html ÃiÃÀÃ]Ê -É -]Ê iiVÌÀVÊ VÀVÕÌÃÊ >`Ê VÕV>ÌÊ http://www.winfab.be systems. https://sites.uclouvain.be/welcome/
Main Equipments
X Unique research- and service-oriented infrastructures in Wallonie: qÊ 7 Ê Vi>Ê ÀÃÊ £äääÊ 2) with all key micro-nano- fabrication technologies. qÊ 7 " ÊvÀÊiiVÌÀV>Ê>`ÊVÕV>ÌÊi>ÃÕÀiiÌð X -Õ>ÌÊ >`Ê «À}À>}Ê «>ÌvÀÃÊ -]Ê *]Ê -*]Ê Cadence, Mentor…)
88 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY D 3
ÀiiÊiiVÌÀVÃ\Ê-"ÊÌiV }ÞÊ>`ÊÕÌÀ>Ü«ÜiÀÊ design
SENIOR SCIENTISTS: X >Û`Ê " X Denis FLANDRE X i> `iÀÊ /
Research Field and Subjects X "Ê °]Ê "9 Ê -°Ê >`Ê ", Ê °]Ê º««V>Ì>Ü>ÀiÊ LCA of semiconductors: life-cycle energy of microprocessors The reduction of our energy consumption is a global challenge, from high-Performance 32nm CPU to ultra-low-power 130nm which has to be dealt with by all industry sectors in a common MCU”, In Proc. IEEE International Symposium on Sustainable effort. In the sector of electronics and integrated circuits (ICs), Systems and Technologies, 6p., 2011. Ì iÊ}ÀiiÊiiVÌÀVÃÊÌÀi`Êvi>ÌÕÀiÃÊÌÜÊ>ëiVÌÃ\Ê}Àii}Ê/ Ê X "-- /Ê °]Ê "Ê °]Ê *"--, +1/, , Ê °]Ê ,1 Ê °Ê electronics and greening BY electronics. The microelectronics >`Ê , Ê °]Ê º ÃÀÕ«ÌÛiÊ ÕÌÀ>Ü«ÜiÀÊ -"Ê "-Ê laboratory of UCL has been carrying out key research activities VÀVÕÌÃÊ ÌÜ>À`ÃÊ 7Ê i`V>Ê ÃiÃÀÊ «>Ìû]Ê Ê Proc. IEEE in both fields. International SOI Conference, 2p., 2010. X "Ê °]Ê , Ê °Ê>`Ê /Ê° °]ʺ >iÌiÀÊ "- /Ê Greening THE electronics effects on the minimum-energy point of sub-45nm subthreshold The research focuses on lowering energy consumption of logic—Mitigation at technology and circuit levels”, in ACM electronic devices through: Trans. Design Automation of Electronic Syst., vol. 16, no. 1, qÊ iÛi«iÌÊvÊ-VÃÕ>ÌÀÊ-"®ÊÌiV }ÞÆ pp. 2-26, 2010. qÊ -"Ê VÀVÕÌÊ `iÃ}\Ê vi>ÌÕÀ}Ê LiÃÌV>ÃÃÊ «>ÌiÌi`Ê VÀVÕÌÊ X BOL D., AMBROISE R., FLANDRE D. and LEGAT J.D., Interests blocks to achieve smart power management. Those blocks and limitations of technology scaling for subthreshold logic. allow drastic reduction of stand-by power consumption, which Ê/À>ðÊ6-Ê-ÞÃÌiÃÊ£ÇÊ£ä®]Ê£xän£x£]Ê2009. ÃÊ`ÕiÊÌÊi>>}iÊVÕÀÀiÌÊÊ>ÃV>iÊ "-Ê«ÀViÃÃið X BOL D., DE VOS J., FLANDRE D. and LEGAT J.D., Ultra-low- power high-noise-margin logic with undoped FD SOI devices. Greening BY electronics ÊÌ°Ê-"Ê v°]Ê2009. / iÊÌi>Ê >ÃÊ>ÊÃÌÀ}ÊiÝ«iÀÌÃiÊÜÌ ÊLÀi>Ì ÀÕ} Ê«>ÌiÌÃÊÊÕÌÀ> X BOL D., DE VOS J., FLANDRE D. and LEGAT J.D., Building low-power design of both analogue and digital functions towards ultra-low-power high-temperature digital circuits in standard energy-autonomous systems. The design aims at minimising high-performance SOI technology. Solid-State Electronics 52 both active energy and stand-by power, targeting all level of (12), 1939-1945, 2008. abstractions from technology development and circuit design to X GOSSET G., RUE B. and FLANDRE D., Very high efficiency system integration. These energy-autonomous systems can then 13.56 MHz RFID input stage voltage multipliers based on ultra- be used either to efficiently manage our energy consumption low power MOS diodes. IEEE Int. Conf. RFID, 134-140, 2008. (building heating or cooling, electricity production and delivery, X LEVACQ D., DESSARD V. and FLANDRE D., Low leakage SOI transportation) or to improve healthcare and human security. CMOS static memory cell with ultra-low power diode. Ê°Ê Solid-State Circuits 42 (3), 689-702, 2007.
Representative References Patents X "Ê °]Ê Ê6"-Ê°]Ê" +1 /Ê °]Ê "/ Ê°]Ê 1,618Ê°]Ê "9 Ê-°]Ê , Ê °Ê>`Ê /Ê° °]ʺÊÓx âÊ-ÕL£ÔÊ X 1ÌÀ>ÜÊ«ÜiÀÊL>ÃVÊLVÃÊ>`ÊÌ iÀÊÕÃiÃ]Ê* /É *ä£É£xäÓÎ]Ê Ç7É âÊ1ÌÀ>Ü6Ì>}iÊ VÀVÌÀiÀÊ- ÊÊÈxÊ*É ÕÀ«i>Ê«>ÌiÌ]Ê£ÇÉ£ÓÉÓä䣰 *Ê "-Ê vÀÊ Ü >ÀLÊ 7ÀiiÃÃÊ -iÃÀÊ `iû]Ê IEEE Int. X 1ÌÀ>ÜÊ«ÜiÀÊL>ÃVÊLVÃÊ>`ÊÌ iÀÊÕÃiÃ]Ê1-Óää{ÉääÓÈÇÈä]Ê Solid-State Circuits Conf.]Ê6°ÊxxÊ£®]Ê««°Ê{ä{£]ÊÓ«°]Ê2012. 1-Ê«>ÌiÌ]Ê£ÓÉäÓÉÓää{. X "Ê °]ʺ,LÕÃÌÊ>`ÊiiÀ}ÞivwViÌÊÕÌÀ>ÜÛÌ>}iÊVÀVÕÌÊ X 1ÌÀ>Ü«ÜiÀÊ VÀVÕÌ]Ê *ÓäänÉäxxÓÎ]Ê ÕÀ«i>Ê «>ÌiÌÊ `iÃ}ÊÕ`iÀÊÌ}ÊVÃÌÀ>ÌÃÊÊÈxÉ{xÊ "-»ÊÛÌi`®]ÊÊ * /]ÊÓÉä{ÉÓään. MDPI J. Low-Power Electronics and Applications, vol. 1, no. 1, X Network architecture for wirelessly interfacing sensors at ultra pp. 1-19, 2011. ÜÊ«ÜiÀ]Ê *ÓääÉäxäÇÎ{]Ê ÕÀ«i>Ê«>ÌiÌÊ* /]ÊÓÓÉä£ÉÓää.
89 Awards Products and Services
X Best paper award from the IEEE Int. Conf. Computer Design X -"Ê "-Ê>`Ê -Ê«ÀViÃÃ} ÓäänÊÌÊ °Ê "ÊiÌÊ>°ÊvÀÊAnalysis and minimization of practical X Characterisation of nanoelectronics devices energy in 45nm subthreshold logic circuits. X 1ÌÀ>Ü«ÜiÀÊVÀVÕÌÊ`iÃ}ÊiÝ«iÀÌÃi X iÃÌÊ«ÃÌiÀÊ>Ü>À`ÊvÀÊÌ iÊ ÊÌ°Ê-"Ê v°ÊÓäänÊÌÊ °Ê "Ê X Launch of various spin-off companies et al. for Sub-45nm fully-depleted SOI CMOS subthreshold logic for ultra-low-power applications. KEYWORDS Micro-nano-electronics Funding Integrated circuits Ultra-low power Energy consumption X Wallonie Circuit design X EU "-Ê«ÀViÃà X F.R.S.-FNRS Power management Sensors
Partnerships CONTACTS David BOL X >LÀ>ÌÊ ÜÌ Ê >ÀÊ ÌiÀ>Ì>Ê `ÕÃÌÀ>Ê i°}°Ê ]Ê [email protected] /- ]Ê ]Ê -/ ®Ê>`Ê >V>`iVÊ >VÌÀÃÊ Ê -"Ê ÌiV }iÃÊ Tel. 32 (0) 10 47 81 34 >`ÊVÀVÕÌÃ]ÊÌ ÀÕ} ÊÌ iÊ-"ÊVÃÀÌÕÊ-"Ê-«ÞÊÀiiiÀÊ initiative) Denis FLANDRE X *>ÀÌV«>ÌÊ ÌÊ ÕÀ«i>Ê ÃÌÀ>Ìi}VÊ VÃÀÌ>Ê -É denis.fl[email protected] Tel. 32 (0) 10 47 81 35 ]Ê - "É "-®Ê `iw}Ê ÀiÃi>ÀV Ê `ÀiVÌÃÊ Ê nanoelectronics Jean-Didier LEGAT X *>ÀÌiÀà «Ê ÜÌ Ê ÀiÃi>ÀV Ê «ÀiVÌÃÊ ÜÌ Ê ÕÀ«i>Ê ,E Ê i>``iÀ°i}>ÌJÕVÕÛ>°Li companies in nanoelectronics Tel. 32 (0) 10 47 25 68
Main Equipment WEB SITES www.dice.ucl.ac.be/greenelectronics www.soiconsortium.org X £äääÊ ÔÊ Vi>Ê ÀÊ v>VÌiÃÊ 7 ®Ê ÜÌ Ê >ÀÊ "-É www.nanotic.net MEMS processing equipments X >ÃÌÀi>Ê Ê ÌÃÊ >`Ê `iÃ}Ê ÌÃÊ vÀÊ >ÀÊ iÝÌiÀ>Ê "-ÊvÕ`Àià X {ääÊ ÔÊ V >À>VÌiÀÃ>ÌÊ >`Ê ÌiÃÌÊ v>VÌiÃÊ 7 " ®Ê vÀÊ nanoelectronics components from devices to systems
90 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY D 4
Software based hardening against radiation
SENIOR SCIENTIST: X >ÀVÊ"
Research Field and Subjects Funding
Radiations induce transient errors in electronic systems such X Wallonie, Skywin « Marshall Plan » program, Telecom and as computers. Protecting computers against radiation effects -J/Ê«ÀiVÌð is very important in satellites, launchers and other spacecrafts. X European Space Agency With the increasing miniaturisation of computer components, protection against radiations is becoming critical also in airplanes and increasingly on the ground too. Partnership The traditional approach to radiation hardening is hardware hardening by using less sensitive technologies, redundant X Thales-Alenia-Space-ETCA circuits and so on. X />Ê>LÀ>ÌÀÞ]ÊÀiLiÊÃÌÌÕÌiÊvÊ/iV }Þ / ÃÊ>««À>V ÊÃÊÌÊiÝ«iÃÛiÊvÀÊ>ÞÊ>««V>Ìð A few other researchers are working on software hardening by detecting and correcting some errors in software. They usually KEYWORDS work by program transformation. Fault tolerance The chosen approach is to consider transient errors as “normal” Checkpoint-restart events, and to design software in such a way that these errors } Ê>Û>>LÌÞ Design concept do not produce any effect. To achieve this, a few simple Software architecture hardware hardened circuits are needed and the software must Embedded systems be designed according to some very strict rules, as a sequence of atomic operations that are either performed entirely and without error or restarted. In this approach, all kinds of CONTACT malfunctions are taken into account, from computational errors Marc LOBELLE [email protected] to processors running mad. Tel. 32 (0) 10 47 32 74 This approach is possible because these radiation-induced transient faults are rare at the time rate of modern processors, so that only single errors must be considered during the processing of one atomic operation. Simulation and a proof of concept hardware system, in which all Ì >LiÊ`ÃÊvÊiÀÀÀÃÊÜiÀiÊiVÌi`]Êà Üi`ÊÌ iÊÃÕ`iÃÃÊ vÊÌ iÊ>««À>V °Ê/ iÊÃÞÃÌiÃÊ«iÀvÀi`ÊÌ iÀÊLÊy>ÜiÃÃÞÊÊ Ã«ÌiÊvÊÌ iÊÌÀ>ÃiÌÊiÀÀÀÃÊÌ >ÌÊÜiÀiÊiVÌi`° The limitation of the approach is that it is only applicable to specifically designed programs.
Representative References
X - Ê°]Ê -Ê °]Ê" Ê °]ÊÊÃvÌÜ>ÀiÊL>Ãi`Ê>««À>V Ê ÌÊi>ÌiÊ>Ê- 1ÊivviVÌÃÊvÀÊÃÃÊVÀÌV>Ê«À}À>Ã]ÊÓÊ , -ÊÓ䣣Ê-iÛ>Ê-i«ÌiLÀiÊ£ÉÓÎÊ2011.
91 92 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY E 1
Classification, analysis and clustering of graphs and networks
SENIOR SCIENTISTS: X Pierre-Antoine ABSIL X 6ViÌÊ " X i> >ÀiÃÊ 6 X ÕiÊ , 8 X ,>« >lÊ1 ,- X 9ÕÀÊ -/ ,"6 X *>ÕÊ6 Ê "",
Research Field and Subjects X Ê , "6 Ê °]Ê 6 Ê "", Ê *°]Ê ÌiÀ>ÌÛiÊ ÌiÀ}Ê Ê ,i«ÕÌ>ÌÊ -ÞÃÌiÃ]Ê - Ê ÕÀ>Ê vÊ >ÌÀÝÊ >ÞÃÃÊ >`Ê ÌÃÊ This research focuses on some of the most recent and Applications, vol.31(4), pp.1812-1834, 2010. fundamental computational challenges occurring in large X 1 ,-Ê ,°]Ê / iÊ ÌÊ -«iVÌÀ>Ê ,>`ÕÃ\Ê / iÀÞÊ >`Ê networks. It concentrates on questions related to the ««V>ÌÃ]Ê -«À}iÀ6iÀ>}]Ê iVÌÕÀiÊ ÌiÃÊ Ê ÌÀÊ >`Ê classification, visualisation, and stochastic analysis of large Information Sciences, 2009. networks. Theoretical and practical aspects of topics such as X " Ê6°]Ê -/ ,"6Ê9Õ°]Ê*Þ>ÌiÊV«ÕÌ>ÌÊvÊ `>Ì>}Ê vÊ ÌiÝÌÊ `VÕiÌÃ]Ê ÜiLÃi>ÀV }]Ê >>ÞÃÃÊ vÊ Ì iÊÌÊëiVÌÀ>ÊÀ>`ÕÃÊvÀÊÃiÊÃiÌÃÊvÊi}>ÌÛiÊ>ÌÀViÃ°Ê telephone, traffic and electricity networks, hierarchical reduction - Ê°Ê >ÌÀÝÊ>°Ê««°]Ê6°ÊΣή]ÊnÈxnÇÈ]Ê2009. of large scale networks, and analysis of dynamical properties of X -Ê *°°]Ê " 9Ê ,°]Ê - *1 , Ê ,°]Ê "«Ìâ>ÌÊ large networks, are being studied. }ÀÌ ÃÊ Ê >ÌÀÝÊ >v`Ã°Ê *ÀViÌÊ 1ÛiÀÃÌÞÊ *ÀiÃÃ]Ê Large networks are everywhere: telephone networks, the world- 2008. wide web, databases such as electronic dictionaries, power X , Ê °]Ê -/ ,"6Ê9Õ°Ê>`Ê6 Ê "", Ê*°]Ê"«Ìâ}Ê distribution networks, micro electro-mechanical systems, are all Ì iÊ VÕ«}Ê LiÌÜiiÊ ÌÜÊ ÃiÌÀVÊ «ÀiVÌÃÊ vÊ >ÌÀViÃ°Ê >À}iÊiÌÜÀÃÊÜÌ ÊÃiÌiÃÊÕ«ÊÌÊLÃÊvÊ`iðÊ"Ì iÀÊ - ÊÕÀ>Ê >ÌÀÝÊ>°Ê««°]ÊÎ䣮\ÎÓ{Î{x]Ê2008. iÝ>«iÃÊ VÕ`iÊ L}V>]Ê ÃV>Ê >`Ê w>V>Ê iÌÜÀÃ]Ê X , 8Ê °]Ê Ê °]Ê 91Ê °]Ê ,-" Ê ° °"°]Ê networks in the brain, transportation, gas and electricity " Ê6°]ÊÀ>ÌÊ,iÀ}>â>ÌÊLÞÊ*ÀÌÛiÊ"«iÀ>ÌÃÊ networks, etc. Ê ÀiVÌi`Ê À>« Ã]Ê Ê /À>Ã>VÌÃÊÊ ÕÌ>ÌVÊ ÌÀ]Ê The computing power and storage capacity have increased so 53(4):968-97, 2008. much in the last few decades that, today, they allow one to store X 91Ê °]Ê , 8Ê °Ê °]Ê Ê °]Ê ,-" Ê ° °"°]Ê and process such vast networks. It is now possible to cluster large " Ê 6° °]Ê / ÀiiÊ >`Ê } iÀÊ `iÃ>Ê >ÕÌÕÃÊ networks by their connection pattern, to evaluate the fragility formations: rigidity, persistence and structural persistence. vÊ>ÊiÌÜÀÊÜ iÊv>Vi`ÊÌÊ>ÊiÝÌiÀ>ÊiÛiÌ]ÊÌÊ`iÌvÞÊÀiÊ Automatica, 43(3):387-402, 2007. relevant nodes, to verify connectivity patterns, to evaluate how fast a disease spreads in a population by human contact, or a virus on a computer network, etc. Simulation, optimisation, Awards classification, information retrieval and representation of networks of up to millions of edges or nodes have all recently X - ÊiÀ}iÊ >Ìâ}Ê*Àâi]ÊÓäää become possible. X - Ê ÌÀÊ>`Ê-ÞÃÌiÊ/ iÀÞÊ*Àâi]ÊÓää£ Several algorithms have been developed. They have essentially a X ÊÌÊ,ÕLiÀÌÊ*ÀâiÊÓääx i>ÀÊV«iÝÌÞ]Ê>ÀiʵÕÌiÊivwViÌÊvÀÊ>À}iÊë>ÀÃiÊ}À>« ÃÊ>`Ê X IEEE Fellow 2006, SIAM Fellow 2009 scale well with the dimension of the graph. These algorithms >««ÀÝ>ÌiÊÌ iÊÃÕÌÊvÊ>ÊÛ>ÀiÌÞÊvÊ«ÀLiÃÊÀi>Ìi`ÊÌÊÌ iÊ classification, analysis and clustering of graphs and networks. Partnership
X Belgian Interuniversity Attraction Poles (PAI) on Dynamical Representative References -ÞÃÌiÃ]Ê ÌÀÊ>`Ê"«Ìâ>Ì X UCL Concerted Research Action (ARC) on Information X 6 Ê ° °]Ê 9,Ê -°]Ê ," Ê °]Ê -Ì>LÌÞÊ vÊ Retrieval in Time Evolving Networks À>« Ê ÕÌiÃÊ VÀÃÃÊ /iÊ -V>iÃ]Ê *ÀVii`}ÃÊ vÊ Ì iÊ X ÕÀ«i>Ê *ÇÊ «À}À>Ê 1 ,Ê Ý«iÀiÌ>Ê 1«`>ÌiiÃÃÊ National Academy of Sciences of the United States of America, Evolutive Routing) vol.107, pp.12755-12760, 2010.
93 KEYWORDS Clustering ÛiÝÊ«ÌÃ>Ì Data mining Information retrieval Large-scale graphs Networks
CONTACTS Pierre-Antoine ABSIL [email protected] Tel. 32 (0) 10 47 25 94
Vincent BLONDEL 6ViÌ° `iJÕVÕÛ>°Li Tel. 32 (0) 10 47 23 81
Jean-Charles DELVENNE i> >Àið iÛiiJÕVÕÛ>°Li Tel. 32 (0) 10 47 80 53
Julien HENDRICKX Õi°i`ÀVÝJÕVÕÛ>°Li Tel. 32 (0) 10 47 23 77
Raphaël JUNGERS ,>« >i°Õ}iÀÃJÕVÕÛ>°Li Tel. 32 (0) 10 47 80 02
Yurii NESTEROV [email protected] Tel. 32 (0) 10 47 43 48
Paul VAN DOOREN *>Õ°6> ÀiJÕVÕÛ>°Li Tel. 32 (0) 10 47 80 40
WEB SITE sites.uclouvain.be/networks/
94 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY E 2
À>« ÃÊ>`ÊiÌÜÀÊ>}ÀÌ ÃÊvÀÊLiÊ telecommunication
SENIOR SCIENTISTS: X 6ViÌÊ " X *>ÕÊ6 Ê "",
Research Field and Subjects Products and Services
Mobile telephone companies often have millions of customers Service provided to several telephone companies for network that are connected to each other through their calls. These analysis large networks are difficult to handle, optimise or even draw. Such tasks become much easier if one possesses a hierarchical ÀÊÀi`ÕVi`ÃâiÊÀi«ÀiÃiÌ>ÌÊvÊÌ iÊiÌÜÀÊÜ V Ê`iÃVÀLiÃÊ Representative References well the influence of the smaller scale behaviour. X " Ê 6°]Ê, -]Ê /" -Ê °]Ê ,i}ÃÊ >`Ê LÀ`iÀÃÊ vÊ ÜÊ V>Ê ÃÕV Ê >Ê Ã«iÀÊ Ài«ÀiÃiÌ>ÌÊ LiÊ vÕ`Ê >`Ê ÜÊ mobile telephony in Belgium and in the Brussels Metropolitan V>ÊÌ iÊiÌÜÀÊÃâiÊLiÊÀi`ÕVi`ÊÜ iÊÃÌÊii«}ÊÃiÊiÞÊ âi]Ê ÀÕÃÃiÃÊ-ÌÕ`iÃ]ÊÛ°Ê{Ó]Ê2010. features of the network? Several basic properties of a moderate X " Ê6°Ê °]Ê11 Ê°°]Ê "// Ê,°]Ê 6, Ê °]Ê ÃâiÊiÌÜÀÊ>ÀiÊi>ÃÞÊÌÊ>>ÞÃiÊÀÊV>ÊÃiÌiÃÊLiÊÀiV}Ãi`Ê >ÃÌÊ Õv`}Ê vÊ VÕÌiÃÊ Ê >À}iÊ iÌÜÀÃ]Ê ÕÀ>Ê by mere visual inspection. This is very difficult for networks of -Ì>ÌÃÌV>Ê iV >VÃ\Ê/ iÀÞÊ>`Ê Ý«iÀiÌ]Ê2008. millions of vertices. X "Ê ° °]Ê6 Ê "", Ê*°]Ê " Ê6° °]Ê iÃViÌÊiÌ `ÃÊ vÀÊi}>ÌÛiÊ>ÌÀÝÊv>VÌÀâ>Ì°ÊÊ ÕiÀV>Êi>ÀÊ}iLÀ>Ê In hierarchical representation, one tries to represent the network in Signals, Systems and Control, Lecture Notes in Engineering, in a more compact form by identifying substructures which can -«À}iÀÊ6iÀ>}]Ê2008. be used to analyse properties of the system or to represent it X Ê , "6 Ê °]Ê "6 Ê°]Ê6 Ê "", Ê*°]ÊyÕiViÊvÊ Ê >Ê ÀiÊ V«>VÌÊ vÀ°Ê Ê Ã«iÊ iÝ>«iÊ vÊ Ì ÃÊ ÃÊ >Ê >À}iÊ the outlinks of a page on its PageRank, Linear Algebra and its network of computer connections that contains local area Applications, vol. 429, P. 5-6, pp.1254-1276, 2008. iÌÜÀÃÊ>ÃÊÜiÀÊiÛiÊÃÕLÃÌÀÕVÌÕÀiðÊ"iÊVÕ`Ê>ÃÊ>ÃÃV>ÌiÊ X " Ê 6°]Ê 11 Ê °°]Ê , 8Ê °]Ê Ê substructures with circles of friends in a social network such as , "6 Ê °]Ê "// Ê ,°]Ê V>Ê i>`iÀÃÊ Ê À>`Ê groups of people that often call each other during a particular networks, Physical Review E, vol. 77, P. 036114, 2008. period of time. Identifying such substructures are combinatorial X "// Ê ,°]Ê " Ê 6°]Ê Ê , "6 Ê °]Ê 1 -Ê °]Ê V«iÝÌÞÊ«ÀLiÃÊÌ >ÌÊ >ÛiÊÌÊLiÊÃÛi`ÊÕÃ}Ê iÕÀÃÌVÃÊÌ >ÌÊ *, 1,Ê °]Ê - ", Ê <°]Ê 6 Ê "", Ê *°]Ê i}À>« V>Ê iÝ«ÌÊ>ÊÌ iÊiÌÜÀÊ«À«iÀÌiÃÊ>ÌÊ >`° dispersal of mobile communication networks, Physica A: Statistical Mechanics and its Applications, No. 387, pp. 5317- Another important problem is that of identifying leaders in 5325, 2008. social networks. They can be thought of as those people that will propagate the acquisition of a particular feature or contract related to mobile telephone communications. This is very Awards Ã>ÀÊÌÊÀ>}ÊÜiL«>}iÃÊÊ}i]Êw`}Ê>ÕÌ ÀÌiÃÊÊ>Ê hyperlinked environment, retrieving information from a database, X - Ê ÌÀÊ>`Ê-ÞÃÌiÊ/ iÀÞÊ*Àâi]ÊÓää£ or identifying synonyms in a dictionary. We have developed a X ÊÌÊ,ÕLiÀÌÊ*ÀâiÊÓääx general framework to identify similar nodes in two arbitrary X IEEE Fellow 2006, SIAM Fellow 2009 graphs. We are using this framework in order to find leaders in the graph of telephone calls using mobile telecommunication. }ÀÌ ÃÊV«ÕÌ}ÊÃÕV Êi>`iÀÃÊ >ÛiÊ>Êi>ÀÊV«iÝÌÞÊ>`Ê use modifications of the power method, which is quite efficient for large sparse graphs and scales well with the dimension of the graph.
95 Partnership KEYWORDS Circle of friends
X UCL Concerted Research Action (ARC) on Information Data mining Large-scale graphs Retrieval in Time Evolving Networks Mobile telephone communication X ÕÀ«i>Ê *ÇÊ «À}À>Ê 1 ,Ê Ý«iÀiÌ>Ê 1«`>ÌiiÃÃÊ Networks Evolutive Routing) Social networks X MIT Medialab
CONTACTS Vincent BLONDEL 6ViÌ° `iJÕVÕÛ>°Li Tel. 32 (0) 10 47 23 81
Paul VAN DOOREN *>Õ°6> ÀiJÕVÕÛ>°Li Tel. 32 (0) 10 47 80 40
WEB SITE sites.uclouvain.be/networks/
96 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY E 3
Space and time in large-scale social networks
SENIOR SCIENTIST: X ,i>Õ`Ê "//
Research Field and Subjects Representative References
Traditional methods of social science, such as typically small- X +1 , Ê °]Ê "// Ê,°]Ê"- -Ê °]Ê-/7 Ê °Ê>`Ê scale questionnaire-based approaches, increasingly get replaced ,"7 ,"/Ê °]Ê / iÊ *iÀÃ>ÌÞÊ vÊ *«Õ>ÀÊ >ViLÊ 1ÃiÀÃ°Ê by automated methods of data collection, which allow for Proceedings of the ACM Conference on Computer Supported completely different scales of analysis. This change of paradigm Cooperative Work, 2012. is driven by the emergence of pervasive technologies filling data- X - /"Ê-°]Ê "// Ê,°]Ê - ""Ê °Ê>`Ê "1-Ê°]Ê bases with information about our day-to-day life, in particular -Vë>Ì>Ê *À«iÀÌiÃÊ vÊ "iÊ V>ÌL>Ãi`Ê -V>Ê information about our friendship relations (e.g. Facebook) and Networks. Proceedings of the International AAAI Conference physical location (e.g. Foursquare). The combination of these on Weblogs and Social Media, 2011. two factors offers a groundbreaking opportunity to understand X "1-Ê °]Ê - /"Ê -°]Ê "// Ê ,°]Ê *" /Ê °Ê >`Ê >`ÊiÝ«ÌÊÌ iÊë>Ì>Ê«À«iÀÌiÃÊvÊÌ iÊÃV>ÊiÌÜÀÃÊ>ÀÃ}Ê - ""Ê °]ÊÊÌ>iÊvÊ>ÞÊVÌiÃ\ÊÕÛiÀÃ>Ê«>ÌÌiÀÃÊÊ Õ>Ê among online users, but also a potential window on real human ÕÀL>ÊLÌÞ°Ê>ÀÝÛ\££än°xÎxx]Ê2011. socio-spatial and temporal behavior. X 8* ,/Ê *°]Ê 6 -Ê /°-°]Ê " Ê 6° °Ê >`Ê "// Ê ,°]Ê Uncovering space-independent communities in spatial / iÊÃâiÊ>`ÊV«iÝÊ>ÌÕÀiÊvÊÌ iÊ`>Ì>ÊÀiµÕÀiÊÌ iÊ`iÛi«iÌÊ networks. PNAS 108, 7663-7668, 2011. of new algorithms in order to help users to navigate and find X -< Ê °]Ê "// Ê,°Ê>`Ê/1, ,Ê-°]Ê/À>`i]Ê yVÌÊ>`Ê relevant information in large-scale networks. The design of -iÌiÌÃ\Ê ÕÌÀi>Ì>Ê"À}>â>ÌÊvÊ>À}iÃV>iÊ-V>Ê efficient algorithms relies on the identification of regularities Networks. PNAS 107, 13636-13641, 2010. and patterns in the observed systems, and on the development X "// Ê,°]Ê " Ê6° °]Ê Ê , "6 Ê °]Ê1 -Ê °]Ê of mathematical models for the flows (of ideas, people, *, 1,Ê °]Ê- ", Ê<°Ê>`Ê6 Ê "", Ê*°]ÊÊ}À>ÛÌÞÊ`iÊ vÀ>Ì]ÊiÌV°®ÊÌ >ÌÊÌ>iÊ«>ViÊÊÌ iÊiÌÜÀ°Ê"ÕÀÊVÕÀÀiÌÊ for the geographical dispersal of mobile communication area of interest is the development of algorithms for spatially- networks. Physica A 387, 5317-5325, 2008. embedded and temporal networks, and the uncovering of X " Ê 6° °]Ê 11 Ê °°]Ê "// Ê ,°Ê >`Ê Ã«iÊiV >ÃÃÊiÝ«>}ÊLÃiÀÛ>ÌÃÊ>`iÊÊi«ÀV>Ê 6, Ê °]Ê>ÃÌÊÕv`}ÊvÊVÕÌiÃÊÊ>À}iÊiÌÜÀÃ°Ê systems, for instance: °Ê-Ì>Ì°Ê iV °]Ê*£äään]Ê2008. qÊ LiÊ« iÊiÌÜÀÃÊÊÀ`iÀÊÌÊiÝ«ÀiÊ ÜÊ « ÞÊ and geography affect the network architecture. qÊ "iÊV>ÌL>Ãi`Ê-V>Ê iÌÜÀÃÊÊÀ`iÀÊÌÊÛiÃÌ}>ÌiÊ Partnership the interplay between physical space and social network topology. X Research group on large graphs and networks, Université qÊ >À}iÃV>iÊ iÊ }>iÃ]Ê Ê À`iÀÊ ÌÊ iÝ«ÀiÊ Ì iÊ ÕÌ catholique de Louvain, Belgium dimensional nature of social interactions and, in particular, the X «ÕÌiÀÊ>L]Ê1ÛiÀÃÌÞÊvÊ >LÀ`}i]Ê1 organisation and dynamics of conflict. X ,iÃi>ÀV Ê }ÀÕ«Ê Ê «iÝÌÞÊ >`Ê iÌÜÀÃ]Ê «iÀ>Ê qÊ >ViLÊ>ÃÊ>ÊÜ`ÜÊÌÊLÃiÀÛiÊÌ iÊ«ÃÞV }V>Ê«ÀwiÊ i}iÊ`]Ê1 of online users and to identify which personality traits predict X IceLab, Umeå University, Sweden online popularity and migration. X BECS, Aalto University, Finland
97 KEYWORDS Large-scale Networks Mobility Social networks Space and time
CONTACT Renaud LAMBIOTTE [email protected] Tel. 32 (0) 81 72 49 28
98 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY E 4
Multi-modal freight transport network modelling
SENIOR SCIENTISTS: X >ÀÌÊ"1,+1 X V iÊ 1/
Research Field and Subjects Representative References
Most transports are analysing networks from a “link” point of X " , Ê "°]Ê "1,+1 Ê °Ê >`Ê , /6 Ê *°]Ê `>ëÌÊ view rather than from a “node” point of view. Even if some effects of climate change: The effect of low water levels on vÊ Ì iÊ `i>Ê ÌÊ ÃiÊ iÝÌiÌÊ ÜÌ Ê Ì iÊ `vviÀiÌÊ «iÀ>ÌÃÊ the competitive position of inland waterway transport in the «iÀvÀi`Ê>ÌÊÌ iÊ`iÃ]Ê°i°Ê>`}ÊÉÕ>`}]ÊÌÀ>à «iÌÊ ÀÛiÀÊ , iÊ >Ài>]Ê /À>ëÀÌ>ÌÊ ,iÃi>ÀV Ê ]Ê `\Ê £ä°£ä£ÈÉ° or simple transit, their output still targets mainly transport flows tra.2009.01.004, 2009. on the networks. X "1,Ê-°Ê>`Ê"1,+1 Ê °]Ê"«Ì>ÊÀ>À>`ÊVÌ>iÀÊ terminal locations on the European network,Transportation / iÊ " 1-ÊÃvÌÜ>ÀiÊ«>V>}i]ÊÜ V Ê«iiÌÃÊÌ iʺÛÀÌÕ>Ê Research E, vol. 45, pp 551-563, 2009. network” methodology developed at UCL Mons, aims at X ,-Ê °]Ê * Ê °]Ê ,-Ê °Ê >`Ê "1,+1 Ê °]Ê Ê w}Ê Ì >ÌÊ ii`\Ê ÌÊ ÃÊ >Ê °°-°Ê L>Ãi`Ê ÃvÌÜ>ÀiÊ `iÃ}i`Ê vÀÊ decision support system for intermodal transport policy, analysing multi-modal, multi-means and inter-modal freight £x{Ê«>}iÃ]Ê61 *ÀiÃÃ]Ê2008. transportation with all their interface operations. It is written in X "1,+1 Ê °Ê >`Ê "1,Ê -°]Ê µÕLÀÕÊ /À>vwVÊ >Û>Ê>`ÊÃÊV«iÌiÞÊ«iÊ>`ÊyiÝLiÊÌ ÀÕ} ÊÌ iÊiLi``i`Ê ÃÃ}iÌÊÊ>À}iÊ6ÀÌÕ>Ê iÌÜÀÃ]Ê«iiÌ>ÌÊÃÃÕiÃÊ scripting language. Moreover, it implements a detailed analytical >`ÊÌÃÊvÀÊ ÕÌ `>ÊÀi} ÌÊ/À>ëÀÌ]Ê ÕÀ«i>ÊÕÀ>Ê structure that allows an easy set-up of all kinds of parameters. of Transport and Infrastructure Research, vol. 6, n° 3, pp. 205- 228, 2006. " 1-Ê >ÃÊ LiiÊ >ÞÊ ÕÃi`Ê vÀÊ >>ÞÃ}Ê ÕÊ VÃÌÊ ÃÕÌÃÊ ÌÊ ÌÀ>ëÀÌ>ÌÊ yÜÃÊ ÛiÀÊ iÝÌiÃÛiÊ ÌiÀ>Ì>Ê networks. Actually, the initial motivation was to develop a Patents tool for evaluating the economic impacts of new transport infrastructures and policies, as cost savings constitute an Nodus is a trademark of ASBL Facultés Universitaires Catholiques important element. The software can also estimate various de Mons (now UCL Mons) under the registration number direct impacts which can be linked to transport operations, like 0787446 iiÀ}ÞÊVÃÕ«Ì]Ê>LÕÀÊVÃÌÊÀÊiÝÌiÀ>ÊVÃÌÃÊvÊ«ÕÌÊ and congestion. Funding During the recent years, it has also been used to determine the optimal locations for inter-modal container terminals or to X Belspo estimate the impact of climate change on waterborne transport X Wallonie on the Rhine river. X EC Framework programs
The latest refinements of the “virtual networks” methodology >iÃÊ ÌÊ «ÃÃLiÊ ÌÊ iÝ«VÌÞÊ Ì>iÊ À>Ü>ÞÊ ÃiÀÛViÃÊ iÃ]Ê Products and Services frequencies and stops) in the multi-modal networks. X Nodus software package X Digitised maps
99 KEYWORDS Transport networks Assignment - Multi-modal
CONTACTS Bart JOURQUIN >ÀÌ°ÕÀµÕJÕVÕÛ>ðLi Tel. 32 (0) 65 32 32 93
Michel BEUTHE [email protected] Tel. 32 (0) 65 32 33 96
100 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY F 1
-«>ÀÃiÊ-}>Ê,iVÃÌÀÕVÌÃÊvÀÊ"«ÌV>Ê>}}
SENIOR SCIENTISTS: X * ««iÊ /" X >ÕÀiÌÊ +1 - X ÀÃÌ« iÊ Ê6 - "17 , X >Ê ", / X iÌÊ +
Research Field and Subjects 86¸]Ê-* Ê"«ÌV>Ê }iiÀ}Ê>`Ê««V>ÌÃ]Ê->Ê i}]Ê ]Ê USA, 21-25 August 2011. These last ten years, a real revolution has occurred in the way X " < <Ê°]Ê +1 -Ê°]Ê"1 "1"Ê °Ê>`Ê /" Ê*°]Ê optical sensors are designed. The advent of increased computing º*À> Õ>Ê /6Ê ,iVÃÌÀÕVÌÊ Ê ,ivÀ>VÌÛiÊ iyiVÌiÌÀÞ»]Ê capabilities, together with recent numerical developments in -*,-££Ê 7Àà «Ê `LÕÀ} ]Ê -VÌ>`]Ê 1Ê Ê ÕiÊ ÓÇÎä]Ê the field of image processing, sparse signal representations and 2011). VÛiÝÊ«ÌÃ>Ì]Ê >ÛiÊ i«i`ÊLÀi>}ÊÌ iÊÃiVÕ>Àʺ ÞµÕÃÌ»Ê X +1 -Ê°]Ê " Ê °Ê°Ê>`Ê Ê °Ê°]ʺ iµÕ>Ìâ}Ê sampling prescription as well as some physical limitations. «ÀiÃÃi`Ê -iÃ}\Ê 7 iÊ "ÛiÀÃ>«}Ê >`Ê >ÕÃÃ>Ê º"LÃiÀÛ}»Ê ÃÊ ÌÊ >ÞÀiÊ ÃÞÞÊ vÊ Ài`iÀ}Ê `ÀiVÌÞÊ >Ê Constraints Combine”, IEEE Transactions on Information Theory, human readable image. More efficient imaging systems are 6°ÊxÇ£®]Ê««°ÊxxxÇ£]Ê2011. now possible by deeply integrating sensor design and image X 1 Ê °]Ê 7 Ê °]Ê " -Ê °]Ê "1 "1"Ê °Ê reconstruction algorithms for processing the raw sensor data. >`Ê /" Ê* °]ʺ"«ÌV>Ê`iyiVÌÊÌ}À>« ÞÊÜÌ Ê« >Ãi Following this principle, two UCL teams have merged their à vÌ}Ê-V iÀi»]Ê"«Ì°ÊiÌÌ°]Ê{ÎÊÓÓ®]ÊÎÇ{x]Ê2010. iÝ«iÀÌÃiÊ Ê À`iÀÊ ÌÊ `iÛi«Ê Û>ÌÛiÊ «ÌV>Ê ÃÞÃÌiÃ°Ê / iÊ X +1 -Ê °Ê >`Ê Ê 6 - "17 ,Ê °]Ê ¸Ê iiÌÀV>Ê >`Û>Ì>}iÃÊvÊÌ ÃÊV>LÀ>ÌÊ>ÀiÊÌÜv`°ÊÀÃÌ]ÊiÝÃÌ}Ê«ÌV>Ê -ÌÕ`ÞÊvÊ >ÌV }Ê*ÕÀÃÕÌÊ*>À>iÌÀâ≯]Ê-}>Ê*ÀViÃÃ}]Ê instruments stimulate the development of new reconstruction IEEE Transactions on [see also Acoustics, Speech, and Signal algorithms in order to improve their performance. Second, new *ÀViÃÃ}]Ê Ê /À>Ã>VÌÃÊ ]Ê 6°Ê xÈÇ®]Ê ««°Ê ÓnÎxÓn{nR]Ê optical instruments are designed following the capabilities of 2008. the processing algorithms. / iÊ wÀÃÌÊ ÀiÃi>ÀV Ê Ìi>Ê ÃÊ iÝ«iÀÌÊ Ê Ì iÊ `iÛi«iÌÊ vÊ destructive optical characterisation methods that take advantage Funding of the capability of light to interfere with itself. The second research team develops image processing and X 7>i]Ê-*7Ê7-/ÊÎ]Ê /,"/ reconstruction algorithms for inverse problem solving. Similarly X -*"Ê/ÕÀiÃÊÀ>Ì]Ê°,°-° ,-ÊÀiÃi>ÀV ÊÕ`} to the recent field of “Compressed Sensing”, these techniques >ÀiÊÃÌ>Lâi`ÊLÞÊ>ÃÃÕ}ʺë>ÀÃi»Ê>}iÊ`iÃÊÜ iÀiÊ>ÊviÜÊ vÕ`>iÌ>ÊL>ÃÃÊiiiÌÃÊi°}°]ÊÜ>ÛiiÌîÊ>««ÀÝ>ÌiÊÌ iÃiÊ Partnership LiVÌð As a first achievement of their work, these two research X `ÕÃÌÀ>ÊV>LÀ>ÌÊÜÌ Ê>L`>8Ê ÛiiÃ]Ê i}Õ® Ìi>ÃÊ >ÛiÊÃÕVViÃÃvÕÞÊ>««i`ÊÌ iÀÊ`iÛi«iÌÃÊÌÊ"«ÌV>Ê X 1ÛiÀÃÌjÊÝ >ÀÃiiÊÓÊÉÊ -]Ê ** ÊÀ>Vi Deflectometry for the accurate imaging of transparent X -ÜÃÃÊi`iÀ>ÊÃÌÌÕÌiÊvÊ/iV }ÞÊ *®]Ê-ÜÌâiÀ>`° materials, like bundles of optical fibres or multifocal intraocular iðÊ/ iÀÊvÀ>iÜÀÊw`ÃÊvÕÌÕÀiÊiÝÌiÃÃÊÊÛ>ÀÕÃÊwi`Ã]Ê ÃÕV Ê>ÃÊv>ÃÌÊ8,>ÞÊ>}}]Ê vV>Ê VÀÃV«ÞÊÊL}ÞÊ>`Ê Main Equipment hyperspectral imaging. X "«ÌV>ÊÃÌÀÕiÌ>Ì\Ê*ÕÃi`Ê>`Ê ÌÕÕÃÊ7>ÛiÊ>ÃiÀÃ]Ê Spectrometers, Fast Detectors and Cameras… Representative References
X +1 -Ê°]Ê" < <Ê°]Ê"1 "1"Ê °Ê>`Ê /" Ê*°]Ê º,ivÀ>VÌÛiÊ `iÝÊ >«Ê ÀiVÃÌÀÕVÌÊ Ê «ÌV>Ê `iyiVÌiÌÀÞÊ ÕÃ}ÊÌÌ>Û>À>ÌÊÀi}Õ>Àâ>Ì»]Êʸ7>ÛiiÌÃÊ>`Ê-«>ÀÃÌÞÊ
101 KEYWORDS Signal analysis, synthesis, and processing Inverse problems "«ÌVÃ
CONTACTS Philippe ANTOINE [email protected] Tel. 32 (0) 10 47 39 39
Laurent JACQUES >ÕÀiÌ°>VµÕiÃJÕVÕÛ>°Li Tel. 32 (0) 10 47 81 24
WEB SITES http://www.uclouvain.be/en-349732.html http://www.uclouvain.be/en-352446.html
102 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY F 2
Video signal analysis
SENIOR SCIENTISTS: X ÀÃÌ« iÊ Ê6 - "17 , X iÌÊ +
Research Field and Subjects X Ê Ê >`Ê Ê 6 - "17 ,Ê °]Ê *iÀÃ>âi`Ê *À`ÕVÌÊ vÊ >ÃiÌL>Ê 6`iÃÊ vÀÊ ÕÌÃiÃÀi`Ê >Ì>Ê The Image and Signal Processing (ISP) group of UCL has Õ`iÀÊÌi`Ê Ã«>ÞÊ,iÃÕÌ]Ê «ÕÌiÀÊ6ÃÊ>`Ê>}iÊ been conducting research in video analysis for more than 15 1`iÀÃÌ>`}]Ê -«iV>Ê ÃÃÕiÊ Ê ¸ ÕÌV>iÀ>Ê >`Ê ÕÌ Þi>ÀÃÊ Ê Ì iÊ VÌiÝÌÊ vÊ ÃÕÀÛi>ViÊ >««V>ÌÃÊ ÜÜÜ°>VV° `>Ê-iÃÀÊÕø]Ê££{]ÊÈ]ÈÈÇÈnä]Ê2010. eu), immersive human-computer interfaces (www.alterface. X Ê 6 - "17 ,Ê °]Ê 6,"Ê °]Ê ,"--, Ê *°]Ê com), and autonomous production of personalised video event 81Ê°+°]Ê/1Ê*°]Ê ÕÌV>iÀ>ÊvÀ>ÌÊ*ÀViÃÃ}Ê\ÊVµÕÃÌ]Ê summaries (www.keemotion.com). The group has been the Collaboration, Interpretation, and Production. Editorial of coordinator of EDCINE FP6-2005-IST-41, proposal n°38454, ëiV>ÊÃÃÕiÊÊ 1,-*ÊÕÀ>ÊÊ>}iÊ>`Ê6`iÊ*ÀViÃÃ}]Ê related to enhanced digital cinema, and of IST-FP6 SIMILAR, «°Ê£Ó°Ê`\ʣ䰣£xxÉÓä£äÉxÈäÓÇ]Ê ÛiLiÀÊ2010. >Ê >À}iÊ iÌÜÀÊ vÊ ÝViiViÊ `i>}Ê ÜÌ Ê ÕÌ`>Ê X 9Ê °]Ê ,Ê °Ê >`Ê Ê 6 - "17 ,Ê °]Ê interfaces. More recently, the group did initiate and coordinate Detection and Recognition of Sports(wo)men from Multiple Ì iÊ ÕÀ«i>Ê *ÇÊ * -Ê >ÃÊ ÜiÊ >ÃÊ Ì iÊ 7-/ÓÊ 7 " "Ê 6iÜÃ]ÊThird ACM/IEEE International Conference on Distributed >`Ê 7-/ÎÊ -*",/ Ê «ÀiVÌÃÊ vÊ 7>i°Ê / iÊ >ÃÌÊ ÌÜÊ ÜiÀiÊ Smart Cameras, Como, Italy, September 2009. dedicated to distributed and dynamic sensing for autonomous content production, and to the creation of content supporting interactive and personalised access, respectively. All the Patent «ÀiVÌÃÊÜiÀiÊ«ÃÌÛiÞÊÀiViÛi`ÊLÞÊÌ iÊÃViÌwVÊ>`Ê`ÕÃÌÀ>Ê community (e.g. see www.apidis.org for numerous publications Systems and methods for the autonomous production of and press releases). Furthermore, they appeared to be significant Û`iÃÊ vÀÊ ÕÌÃiÃÀi`Ê `>Ì>]Ê Ê *-*Ê *>ÌiÌÊ ««V>ÌÊ milestones towards the emergence of automatic content ääÇnÇä°äÊ*ÀÀÌÞÊ`>Ìi\ÊÓäääxäÇ®° production products (www.keemotion.com). Interestingly, the LiVÌÊ`iÌiVÌÊ>`ÊÌÀ>V}ÊÌiV }iÃ]ÊLÕÌÊ>ÃÊÌ iÊ>}iÊ reconstruction algorithms considered in surveillance and sport Funding >>ÞÃÃÊVÌiÝÌÃ]Ê>ÀiÊÜÊLi}ÊVÃ`iÀi`ÊÌÊLiÊiÝÌi`i`ÊÌÊ the biological and medical domain, e.g. to track moving cells or X ÕÀ«i\Ê*x]Ê*È]Ê*ÇÊ* -Ê>`Ê-6Î to reconstruct panoramic views in cytoscopy. X 7>i\Ê7-/ÓÊ7 " "]Ê7-/ÎÊ-*",/ X Belgian NFS
Representative References Partnership X - * Ê°]Ê Ê6 - "17 ,Ê °]Ê6 , 9 -/Ê*°Ê >`Ê +Ê °]Ê -V>>LiÊ i>ÌÕÀiÊ ÝÌÀ>VÌÊ vÀÊ >ÀÃiÌiÊ X V>`iV\Ê *]Ê+ 1]Ê1* ]Ê1*° * Ê ÓäääÊ >}iÊ >ÃÃwV>Ì]Ê Ê /À>Ã>VÌÃÊ Ê >}iÊ X Industrial: Mediapro, Alcatel-Lucent, ACIC. *ÀViÃÃ}]Ê6ÕiÊÓä]ÊÃÃÕiÊ]Ê««°ÊÓÈÎÈÊÊÓÈ{]Ê-i«Ì°Ê2011. X *>ÀÌÊvÊÌiÀ>Ì>ÊVÃÀÌ>Ê*ÇÊ«ÀiVÌî X Ê ]Ê 9Ê °]Ê Ê 6 - "17 ,Ê °Ê >`Ê *,-"/Ê*°]Ê ÕÌÃiÃÀi`Ê ÛÃÊ vÀÊ >ÕÌÕÃÊ «À`ÕVÌÊ vÊ«iÀÃ>âi`ÊÛ`iÊÃÕ>ÀÞ]ÊÊ Êº «ÕÌiÀÊ6ÃÊvÀÊ Multimedia Applications: Methods and Solutions” (Edited by ÕÊ7>}]Ê>Ê i}]Ê>`Ê- Õµ>}Ê>}®]ÊÊL>]Ê- £ä\Ê£ÈäÈääÓ{8]Ê-i«ÌiLiÀÊ2010.
103 Main Equipment KEYWORDS Segmentation
X Distributed network of cameras Detection Tracking X ÌÀÃi`Ê*/<ÊV>iÀ>Ã À>« L>Ãi`ÊVÕÃÌiÀ} Particle filters Multitier processing Products and Services */<ÊVÌÀ
X www.keemotion.com CONTACTS X www.alterface.com X www.acic.eu Christophe DE VLEESCHOUWER [email protected] Tel. 32 (0) 10 47 25 43
Benoît MACQ [email protected] Tel. 32 (0) 10 47 22 71
WEB SITES www.apidis.org www.fp7-sv3d.com
104 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY F 3
Stereo Image Compression
SENIOR SCIENTISTS: X ,ÞÊ ,< X ÀÃÌ« iÊ Ê6 - "17 , X iÌÊ +
Research Field and Subjects Funding
Reproducing a natural and real scene as we see in the real world X , ,9*/" ,ÊÊ7>i everyday is more and more popular. Stereoscopic and multi-view X BCRYPT - Belspo ÌiV µÕiÃÊ>ÀiÊÕÃi`ÊÌÊÌ ÃÊi`°ÊÜiÛiÀ]ÊÌ iÊv>VÌÊÌ >ÌÊÀiÊ information is displayed requires supporting technologies such as digital compression to ensure the storage and transmission of Partnership Ì iÊÃiµÕiViÃ°Ê Ý«Ì}ÊÌ iÊLVÕ>ÀÊ`i«i`iVÞÊ>ÜÃÊiÊ to achieve higher compression ratios. X "- 1iÕÛi In this work, the researchers focus on designing a lossless- to-lossy transform that reduces the inter- and intra-image redundancy in the stereo pair. This is done within a predictive KEYWORDS vÀ>iÜÀÊÌ >ÌÊV>ÊLiÊiÝÌi`i`ÊÌÊ* Óäää° Stereo Image This approach is inspired by the Lifting Scheme (LS). Aiming Wavelet transform Directional prediction to reduce the residual error, the team has first designed an Disparity map optimised filter for inter prediction, i.e. a local spatial filtering is * Óäää incorporated after disparity compensation. Second, a directional inter prediction is investigated. The predictor is adapted by iÝ«Ì}ÊV>ÊÀiÌ>ÌÊvÀ>ÌÊÌ >ÌÊ`iÌiÃÊÌ iÊ«Ì>Ê CONTACTS Ü>ÞÊvÊ«Ài`VÌÊvÀÊi>V Ê«Ýi°Ê>Þ]Ê>ÊÀiÃ`Õ>Ê-ÊÃÊ«À«Ãi`Ê Rony DARAZI to fit with the particularities of the transformed residue tuned ,Þ° >À>âJÕVÕÛ>°Li Tel. 32 (0) 10 47 87 01 by the disparity map. Benoît MACQ [email protected] Representative References
X 1 ,Ê° °Ê°]Ê ,<Ê,°]Ê +Ê °]Ê"«Ì>Ê«ÌV>ÊyÜÊ WEB SITES based disparity map estimation for lossless stereo image coding. www.tele.ucl.ac.be http://www.uclouvain.be/en-icteam.html Ê6ÃÕ>ÊvÀ>ÌÊ*ÀViÃÃ}Ê>`Ê ÕV>ÌÊ°ÊÊ*ÀV°Ê iVÌÀVÊ>}}ÊÓ䣣]Ê-E/É-* Ê2011. X ,<Ê,°]Ê"1< Ê°]Ê +Ê °]Ê`>«ÌÛiÊvÌ}Ê-V ii L>Ãi`ÊiÌ `ÊvÀÊÌÊV`}ÊÎ ÃÌiÀiÊ>}iÃÊÜÌ ÊÕ>ViÊ VÀÀiVÌÊ>`Ê«Ìâi`Ê«Ài`VÌ°ÊÊVÕÃÌVÃ]Ê-«iiV Ê>`Ê Signal Processing, ICASSP. IEEE International Conference on, 917-920, 2009.
105 106 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY F 4
Digital 2D, 3D and Stereo Image Watermarking
SENIOR SCIENTISTS: X ,ÞÊ ,< X iÌÊ +
Research Field and Subjects Representative References
The wide distribution of Digital Media is more and more suffering X ,<Ê ,°]Ê " / "Ê °]Ê 7 Ê °]Ê *, Ê °]Ê from the lack of content protection. Digital Watermarking is a +Ê °]Ê Ã«>ÀÌÞÊ Õ`i`Ê Ý LÌÊ 7>ÌiÀ>À}Ê vÀÊ Î Ê widely proposed solution to identify and prove the ownership of Stereo Images. In Security and Privacy in e-Societies, SECES. digital data. It is mostly used to detect malicious tampering of a ACM First International Workshop on, pages 1-8, 2011. digital data and to track illegal copies of copyrighted material. X " / "Ê °]Ê ,<Ê ,°]Ê , Ê °]Ê ," "Ê *°]Ê Part of the research work is related to the design of a +Ê °]Ê 1Ã}Ê vi>ÌÕÀiÊ «ÌL>Ãi`Ê iÝÌÀ>VÌÊ vÀÊ -/ Ê watermarking scheme for 2D, 3D stereo image, which can be 3D-mesh watermarking that withstands the cropping attack. integrated in the DCinema decoding pathway. The team has Ê i`>Ê ÀiÃVÃÊ >`Ê -iVÕÀÌÞÊ -E/É-* ]Ê Ê *ÀV°Ê iVÌÀVÊ `iÛi«i`Ê>Ê>`>«ÌÛiÊiÝ LÌÊÜ>ÌiÀ>À}ÊiÌ `Ê`ÕÀ}Ê Imaging, 2011. Ì iÊ`iV`}Ê« >Ãi°Ê/ ÃÊiÌ `ÊÃÊ+ L>Ãi`Ê>`ÊÃÊ`iÃ}i`Ê X ,<Ê,°]Ê1Ê,°]Ê +Ê °]Ê««Þ}Ê-«Ài>`Ê/À>ÃvÀÊ Ì iÀÊ ÌÊwÌÊÊÌ iÊ* ÓäääÊ`iV`}Ê««ii°Ê >Ãi`ÊÊÌ iÊ«À«iÀÌiÃÊ Modula- tion for 3D-mesh watermarking by using perceptual of the wavelets related to the human visual system, it defines models, Acoustics Speech and Signal Processing (ICASSP), IEEE >Ê «ÝiÜÃiÊ >Ã}Ê ÛiVÌÀÊ Ì >ÌÊ ÜÊ ÌÕiÊ Ì iÊ Ü>ÌiÀ>À}Ê International Conference on, pp.1742-1745, 2010. scheme by taking into consideration a number of constraints. X ,<Ê,°]Ê 1Ê*°]Ê +Ê °]Ê-iVÕÀiÊ>`Ê6->`>«ÌÛiÊ Ê iÝÌiÃÊ vÊ Ì iÊ Ó Ê iÝ LÌÜ>ÌiÀ>À}Ê ÃV iiÊ ÃÊ iÝ LÌÊ -«Ài>`Ê /À>ÃvÀÊ Ì iÀÊ `Õ>ÌÊ Ü>ÌiÀ>À}Ê applied to stereo images. A disparity guided watermarking for Digital Cinema. In Information Forensics and Security, WIFS. ÌiV µÕiÊÜÌ Ê>Ê«ÀÛi`Ê«iÀVi«ÌÕ>Ê>ÃÊÃÊiÝÌi`i`ÊÌÊwÌÊ First IEEE International Workshop on, 1-5, 2009. with the particularities of stereo.
Ì iÀÊ Ài>Ìi`Ê Ì«VÊ ÃÊ `}Ì>Ê Ü>ÌiÀ>À}Ê vÀÊ Î Ê LiVÌÃ°Ê Awards Perceptual properties are not immensely studied in 3D watermarking. The research team defines a perceptual model Best paper award, 2nd price by the Digital Watermarking based on the curvature and the roughness of the 3D mesh. This >ViÊ 7®Ê>`ÊÌ iÊ-E/É-* ÊÌiÀ>Ì>Ê viÀiViÊÊ perceptual mask is used to modulate the watermarking method. i`>ÊÀiÃVÃÊ>`Ê-iVÕÀÌÞÊ8ÊÓää° Another work focuses on two state-of-the-art techniques which offer different and complementary advantages, namely Ì iÊ+ L>Ãi`ÊÎ ÊÜ>ÌiÀ>À}Ê>`ÊÌ iÊvi>ÌÕÀiÊ«ÌL>Ãi`Ê Funding Ü>ÌiÀ>À}Ê ÃÞV Àâ>Ì°Ê / iÊ `i>Ê ÃÊ ÌÊ VLiÊ Ì iÃiÊ two techniques in such a way that the new watermarking X , ,9*/" ,ÊÊ7>i scheme would benefit from their advantages and compensate X BCRYPT - Belspo for their respective fragilities. These researches show that X TRACEA - Wallonie robustness against cropping and other common attacks is achieved, provided that at least one feature point as well as its corresponding local neighbourhood is retrieved.
107 KEYWORDS Ý LÌÊÜ>ÌiÀ>À} Blind 3D mesh + Disparity map Stereo Image * Óäää
CONTACTS Rony DARAZI ,Þ° >À>âJÕVÕÛ>°Li Tel. 32 (0) 10 47 87 01
Benoît MACQ [email protected]
WEB SITES www.tele.ucl.ac.be http://www.uclouvain.be/en-icteam.html
108 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY G 1
Information Security
SENIOR SCIENTIST: X `>ÃÊ6"
Research Field and Subjects Representative References
Information security is mostly addressed by the Information X 6" Ê °]Ê "Ê °]Ê , -Ê -°]Ê 1, "18Ê °]Ê -iVÕÀÌÞÊ ÀÕ«Ê Ê ÀiV \Ê ÀÕ«iÊ -jVÕÀÌjÊ `iÊ ½vÀ>ÌÊ ,/ Ê °]ÊÊÀ>iÜÀÊvÀÊ>Þâ}Ê, Ê ÃÌ>ViÊ Õ`}Ê Ê -®Ê >ÕV i`Ê >ÌÊ Ì iÊ 1 Ê Ê Óään°Ê 7Ì Ê L>V}ÀÕ`Ê vÀÊ Protocols. Journal of Computer Security - Special Issue on RFID computer science, electronics, and mathematics, the members System Security, 19(2):289-317, 2011. vÊ Ì iÊ -Ê >``ÀiÃÃÊ >ÞÊ >ëiVÌÃÊ vÊ vÀ>ÌÊ ÃiVÕÀÌÞ]Ê X 6" Ê°]Ê Ê °°]Ê, Ê ÃÌ>ViÊ Õ`}Ê*ÀÌVÃÊÜÌ Ê including applied cryptography. Ýi`Ê >i}iÃ°Ê ÕÀ>Ê vÊ IEEE Transactions on Wireless Communications. 10(5):1618-1626, 2011. The competences and activities in terms of information security X 6" Ê°]Ê ,* /Ê8°]Ê ,/ Ê °]Ê-ÌÀ}ÊÕÌ iÌV>ÌÊ concern the following topics. and Strong Integrity (SASI) is not that Strong. In Workshop on RFID Security - RFIDSec’10, Turkey, 2010. qÊ Security analysis of IT solutions: the activities consist in X 6" Ê°]Ê1 " Ê*°]Ê" - Ê* °]Ê-jVÕÀÌjÊvÀ>̵ÕiÊÊ analysing the design of IT solutions, especially the ones that ÕÀÃÊ iÌÊ iÝiÀVViÃÊ VÀÀ}jÃ]Ê -iV`iÊ j`ÌÊ Îä{Ê «>}iî°Ê are devoted to data confidentially and user authentication (for 6ÕLiÀÌ]Ê*>ÀÃ]ÊÀ>Vi]Ê2010. iÝ>«i\Ê ÌViÌ}Ê >««V>ÌÃ]Ê «ÕLVÊ ÌÀ>ëÀÌ>Ì]Ê `>Ì>Ê X 6" Ê°]Ê1, "18Ê °]Ê ,/ Ê/°]Ê7 iÊV«ÀÃi`Ê storage, medical applications, and anti-counterfeiting solutions). readers meet RFID. In Workshop on RFID Security - RFIDSec’09, Advises and help can also be provided for the design of secure Belgium, 2009. distributed architectures. X 6" Ê°]Ê1 " Ê*°]Ê" - Ê* °]Ê >À>VÌiÀâ>ÌÊ>`Ê improvement of time-memory trade-off based on perfect tables. qÊ Security analysis of RFID solutions: the UCL is world- ACM Transactions on Information and System Security - TISSEC, wide known for its competences in the field of RFID security 11(4), 2008. and privacy, including (but not limited to) authentication, user privacy, relay attacks, and pseudo-random generators. The UCL maintains the RFID Security and Privacy Lounge, a scientific Awards portal created in 2004 that references more than 600 research papers in the domain and that counts 800 members registered ««iÊ,iÃi>ÀV ÊEÊ/iV }ÞÊ-Õ««ÀÌÊ,/-®\Ê`>ÃÊ6" ° ÌÊÌ iÊ>}ÊÃÌ\Ê ÌÌ«\ÉÉÜÜÜ°>Ûi°iÌÉÀw`É qÊ Cryptanalytic time-memory trade-offs: these techniques Funding are essentially used to break the security of IT systems, for F.R.S.-FNRS, Wallonie. iÝ>«iÊÌÊÀiVÛiÀÊ«>ÃÃÜÀ`ÃÊ>`ÊVÀÞ«Ì}À>« VÊiÞðÊ/ iÊ-Ê is able to adapt this technique to specific problems and pre- compute suited tables, including tables in various languages. Partnership
Beyond their academic activities, the researchers who belong to X ,Ê, i«iÃÊÀ>Vi® the information security group are also concerned by industrial X *Ê-ÜÌâiÀ>`® needs and provide training, consulting, and auditing. They X /4 /Ê1 Ê/ÕÀiÞ® are also involved in industrial partnerships through research X ,ÛÀ>ÊÊ6À}Ê1ÛiÀÃÌÞÊ-«>® «ÀiVÌð X ParisTech (France)
109 Products and Services KEYWORDS Security
X Consultancy in information security Cryptographic protocols Radio frequency identification (RFID) X Privacy audit of IT solutions Contactless X Design & analysis of access control systems *ÀÝÌÞÊV iV X Training on RFID security and privacy Time-memory trade-off
CONTACT Gildas AVOINE `>ð>ÛiJÕVÕÛ>°Li Tel. 32 (0) 10 47 31 51
WEB SITE http://sites.uclouvain.be/security/
110 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY G 2
Physical Security
SENIOR SCIENTIST: X À>XÃ8>ÛiÀÊ-/ ,/
Research Field and Subjects Representative References
When a security device runs, its physical behaviour may leak X 7 Ê °]Ê -/ ,/Ê °8°]Ê Extractors Against Side- information regarding the operations being performed and the Channel Attacks: Weak or Strong?]ÊÊÌ iÊ«ÀVii`}ÃÊvÊ -Ê data being manipulated, including secret keys. 2011, Lecture Notes in Computer Science, vol. 6917, pp. 256- Physical attacks, or hardware attacks, aim at breaking a ÓÇÓ]Ê >À>]Ê>«>]Ê-i«ÌiLiÀÊ2011]Ê-«À}iÀ°ÊÊ ÝÌi`i`ÊÛiÀÃÊ cryptographic device by taking advantage of this information. Ê Ì iÊ ÕÀ>Ê vÊ ÀÞ«Ì}À>« VÊ }iiÀ}]Ê Û°Ê £]Ê ÕÊ Î]Ê Physical attacks are typically divided in 3 categories, depending pp. 231-241, Springer. on whether they work by: X , /Ê°]Ê -Ê,°]Ê- Ê°,°]Ê-/ ,/Ê°8°]Ê qÊ LÃiÀÛ}ÊÌ iÊ« ÞÃV>ÊiÀÞÊÀÊ`>Ì>ÊLÕÃiÃÊvÊÌ iÊ`iÛViÃ]Ê 7 - Ê °]ÊÊÀ>â>ÌÊvÊÌ iÊ-iVÕÀÌÞÊi>ÌÕÀiÃÊvÊ e.g. using an electronic microscope (probing attacks®Æ Physical Functions, in the proceedings of the IEEE Symposium qÊ Ì>«iÀ}ÊÜÌ ÊÌ iÊ`iÛViÊ`ÕÀ}ÊiÝiVÕÌÊÊÀ`iÀÊÌÊ`ÕViÊ Ê-iVÕÀÌÞÊ>`Ê*ÀÛ>VÞ]Ê««ÊÎÇ{£Ó]Ê">>`]Ê >vÀ>]Ê1-]Ê errors, in such a way that the erroneous output will leak information May 2011. about the secret parameters (fault induction attacks®Æ X 6 9,/ ,6" Ê °]Ê -/ ,/Ê °8°]Ê Generic Side- qÊ iÝ«Ì}ÊvÀ>ÌÊÀi>Ìi`ÊÌÊÌ iÊ« ÞÃV>ÊLi >ÛÕÀÊvÊÌ iÊ Channel Distinguishers: Improvements and Limitations, in device, such as running time, power consumption, or emitted the proceedings of Crypto 2011, Lecture Notes in Computer electromagnetic radiations (side-channel attacks). Science, vol 6841, pp 354-372, Santa Barbara, California, USA, Since their discovery in the 90’s, physical attacks have been taken August 2011, Springer. very seriously by the industry, as they may prove very practical in X 91Ê9°]Ê-/ ,/Ê°8°]Ê* , ,Ê"°Ê>`Ê91 Ê °]Ê*À>VÌV>Ê hampering the security of devices such as smart cards or security leakage-resilient pseudorandom generators, Proceedings of tokens. This topic has triggered a lot of research, both at the the 17th ACM conference on Computer and communications fundamental and applied level. ÃiVÕÀÌÞ]Ê«>}iÃÊ£{£q£x£]Ê ]Ê"VÌLiÀÊ2010. X -/ ,/Ê °8°]Ê Ê /°°]Ê 91 Ê °]Ê Ê 1wi`Ê A recent related topic is the concept of physically unclonable À>iÜÀÊ vÀÊ Ì iÊ >ÞÃÃÊ vÊ -`i >iÊ iÞÊ ,iVÛiÀÞÊ functions, or PUFs. A PUF is a function embedded in a Attacks, in the proceedings of Eurocrypt 2009, Lecture Notes in physical structure that consists of many random characteristics «ÕÌiÀÊ-ViVi]ÊÛÊx{Ç]Ê««Ê{{Î{È£]Ê }i]ÊiÀ>Þ]Ê originating from uncontrollable process variations during April 2009, Springer. manufacturing. PUFs are considered unclonable because it is iÝÌÀiiÞÊ `vwVÕÌÊ ÌÊ Ài«À`ÕViÊ Ì iÊ À>`Ê V >À>VÌiÀÃÌVÃÊ Ê another device. Among other applications, PUFs are a promising Awards tool for secure key storage, whereby the key becomes an integral part of the device’s structure: the device can reconstruct À>XÃ8>ÛiÀÊ-Ì>`>iÀÌÊÀiViÛi`ÊÌ iÊvÜ}Ê>Ü>À`Ã\ the key when needed by probing its physical structure, but this X Ê"ÕÌÃÌ>`}Ê`ÃÃiÀÌ>ÌÊ>Ü>À`]ÊÓää{ iÞÊV>ÌÊi>ÃÞÊLiÊÀi>`ÊLÞÊ>ÊiÝÌiÀ>ÊLÃiÀÛiÀ° X ÕÀ«i>Ê ,iÃi>ÀV Ê ÕVÊ , ®Ê -Ì>ÀÌ}Ê À>ÌÊ vÀÊ / iÊ 1 Ê ÀÞ«ÌÊ ÀÕ«Ê >ÃÊ LiiÊ >Ê «iiÀÊ Ê Ì iÊ ÃÌÕ`ÞÊ vÊ «ÀiVÌÊ ,-\Ê `iÛi«iÌÊ vÊ VVÀiÌiÊ L>ÃiiÌÃÊ vÀÊ these fields since their first appearance in the literature. The Ì iÊ iÝÌÊ }iiÀ>ÌÊ vÊ VÀÞ«Ì}À>« VÊ >}ÀÌ ÃÊ >`Ê Ì iÀÊ ÀÞ«ÌÊÀÕ«Ê >ÃÊLiiÊÛÛi`ÊÊÃÌÊÀiiÛ>ÌÊÌiÀ>Ì>Ê implementation «ÀiVÌÃÊÊÌ iÊwi`Êi°}°Ê ÕÀ«i>Ê«ÀiVÌÃÊ- , ]ÊÎ , ]Ê INSPIRED, ECRYPT, ECRYPT II). Throughout the year, the group >ÃÊ>VµÕÀi`Ê>ÊÌiÀ>Ì>ÞÊ>VÜi`}i`ÊiÝ«iÀÌÃiÊÊÌ iÃiÊ wi`Ã]ÊÜÌ ÊÀiÊÌ >ÊxäÊ«ÕLV>ÌÃÊÊÌiÀ>Ì>ÊÕÀ>ÃÊ and conferences.
111 Funding KEYWORDS Cryptography X ÕÀ«i\Ê/ *, -]Ê ,-]Ê /, Physical security Side-channel X Belgium: BCRYPT Cryptanalysis X 7>i\Ê *-Ã]Ê/, ]Ê- */ ]Ê "/ Physically unclonable functions PUF
Partnership CONTACT
X Member of the networks: François-Xavier STANDAERT [email protected] £°Ê ,9*/ÊÊ ÕÀ«i>Ê iÌÜÀÊvÊ ÝViiViÊÊ ÀÞ«Ì}Þ Tel. 32 (0) 10 47 81 41 2. LSEC information security cluster Î°Ê 1- -Ê>`Ê,- " *Ê}À>`Õ>ÌiÊÃV à {°Ê ,iÃi>ÀV Ê ÕÌÞʺ6i}iÊ /»]Ê`ÃÊ7iÌiÃV >««iÊ WEB SITE "`iÀâi]Ê>`iÀà http://www.uclouvain.be/crypto/
X Academia: Columbia University, INRIA, Massachusetts ÃÌÌÕÌiÊvÊ/iV }Þ]Ê]Ê /Ê<ÕÀV o
X `ÕÃÌÀÞ\Ê "À>}iÊ À>ViÊ /iiVÊ,E ]Ê -/Ê VÀiiVÌÀVÃ]Ê 8*]Ê/ >iÃo
Main Equipment
In order to analyse the power consumption of enciphering devices, the group has built a test bench made of a large L>`Ü`Ì Ê ÃVÃV«iÊ /iÌÀÝÊ / -Ç£ä{]Ê VVÊ }iiÀ>ÌÀÃÊ TaborElectronics WW1072 and Agilent 33250A and a customised board to plug the device in. The power supplies and clock can be finely controlled, and glitches can be inserted in those to check the chip fault-resistance. We also record its electro-magnetic radiations as an image of the local currents flowing in the silicium die, with near-field emission probes , `iE-V Ü>ÀâÊ<£x°
Products and Services
X Introductory to advanced training in physical security X Security evaluation and advice
112 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY G 3
Secure protocols
SENIOR SCIENTIST: X "ÛiÀÊ* , ,
Research Field and Subjects X 1 Ê-°]Ê, ,Ê-°Ê>`Ê* , ,Ê"°]Ê-Õ>ÌÊL>Ãi`Ê ÃiVÕÀÌÞÊÊÌ iÊ>««i`Ê«ÊV>VÕÕÃ]ÊÊ,°Ê>>Ê>`Ê°ÊÕ>À]Ê ÊÕiÀÕÃÊVÌiÝÌÃ]Ê`vviÀiÌÊiÌÌiÃÊii`ÊÌÊVÕV>ÌiÊÊ editor(s), Foundations of Software Technology and Theoretical À`iÀÊÌÊÀi>ÃiÊ>ÊÌ>ÃÊÌÞ°Ê/ ÃÊ} ÌÊLiÊvÀÊ>VViÃÃ}ÊëiVwVÊ «ÕÌiÀÊ -ViViÊ qÊ -// -Ê Óää]Ê iLâÊ ÌiÀ>Ì>Ê portions of a database, being granted access to some resources, Proceedings in Informatics, December 2009. negotiating a business arrangement, or running an election. X Ê -°]Ê 1-Ê °]Ê * , ,Ê "°]Ê - Ê °,°Ê >`Ê - 7 Ê°]Ê1ÛiÀÃ>ÞÊ «Ã>LiÊ-iVÕÀÌÞÊ>ÞÃÃÊvÊ/-]Ê ÜiÛiÀ]ÊÌ ÃÊVÕV>ÌÊii`ÃÊÌÊ«ÀÛ`iÊÃiÊÃiVÕÀÌÞÊ 2nd International Conference on Provable Security (ProvSec }Õ>À>ÌiiÃ°Ê / iÃiÊ }Õ>À>ÌiiÃÊ V>Ê Ài>ÌiÊ ÌÊ iÝÌiÀ>Ê «>ÀÌiÃÊ Óään®]Ê6ÕiÊxÎÓ{ÊvÊ -]Ê«>}iÃÊΣÎÎÓÇ]Ê-«À}iÀ]Ê"VÌLiÀÊ (pirates, competitors…) or to communication participants 2008. (accountability, minimal disclosure, resilience to disasters…).
It is the purpose of cryptographic protocols to specify how Awards such communications can be conducted in order to achieve the iÝ«iVÌi`ÊÌ>ÃÊÜ iÊvviÀ}Ê>««À«À>ÌiÊÃiVÕÀÌÞÊ}Õ>À>ÌiiÃ°Ê iÃÌÊ«>«iÀÊ>Ü>À`\Ê7Àà «ÊÊ/ÀÕÃÌÜÀÌ ÞÊ iVÌÃ]Ê1ÃiÝ]Ê August 2009 / iÊ 1 Ê ÀÞ«ÌÊ }ÀÕ«Ê `iÛi«i`Ê >Ê Ì ÀÕ} Ê iÝ«iÀÌÃiÊ Ê the precise modelling, design and analysis of cryptographic «ÀÌVðÊÊ«ÀiVÃiÊ`iÊÃÊii`i`ÊÌÊiÝ«ÀiÃÃÊÌ iÊ}Õ>À>ÌiiÃÊ Funding that we want a cryptographic protocol to offer. Cryptographic protocols can then be designed in such a way that the targeted X Europe: B-CCENTRE Ì>ÃÊ V>Ê LiÊ >V iÛi`Ê Ü iÊ «ÀiÃiÀÛ}Ê Ì iÊ iÝ«iVÌi`Ê ÃiVÕÀÌÞÊ X Belgium: BCRYPT properties and taking into account the operational requirements X Wallonie: CAMUS, SEE iÊivwViVÞÊ>`ÊÕÃ>LÌÞ°Ê ÛiÌÕ>Þ]ÊÌ iÊ1 Ê ÀÞ«ÌÊÀÕ«Ê X j`jÀ>ÌÊ7>i ÀÕÝiiÃ\Ê, - ""* builds security proofs that allow one to identify the specific assumptions under which the designed cryptographic protocols offer the properties defined in the model. Partnership
X Member of the networks: Representative References £°Ê ,9*/ÊÊ ÕÀ«i>Ê iÌÜÀÊvÊ ÝViiViÊÊ ÀÞ«Ì}Þ 2. LSEC information security cluster X , , Ê °]Ê ",/ ,Ê 6°]Ê * , ,Ê "°]Ê - 9/Ê °Ê >`Ê Î°Ê 1- -Ê>`Ê,- " *Ê}À>`Õ>ÌiÊÃV à 7, - Ê °]Ê `>«Ì}Ê iÃÊ vÀÊ «ÀÛ>LiÊ L>ÌÊ «ÀÛ>VÞ]Ê {°Ê ,iÃi>ÀV Ê ÕÌÞʺ6i}iÊ /»]Ê`ÃÊ7iÌiÃV >««iÊ Ê 6>ÞÊ ÌÕÀ]Ê >Õ`>Ê >â]Ê i`ÌÀî]Ê «ÕÌiÀÊ -iVÕÀÌÞÊ qÊ "`iÀâi]Ê>`iÀà -", -Ê Ó䣣]Ê iVÌÕÀiÊ ÌiÃÊ Ê «ÕÌiÀÊ -ViVi]Ê -«À}iÀ]Ê Sept. 2011. X Academia: Columbia University, INRIA, Massachusetts X * ,Ê*°Ê>`Ê* , ,Ê"°]Ê-iVÕÀiÊ/Ü*>ÀÌÞÊ «ÕÌ>ÌÊ Institute of Technology… "ÛiÀÊ>Ê< >i]ÊÊ8°Ê ÞiÊ>`Ê8°Ê i]Êi`ÌÀî]Ê*ÀÛ-iVÊ Ó䣣]Ê 6ÕiÊ ÈnäÊ vÊ iVÌÕÀiÊ ÌiÃÊ Ê «ÕÌiÀÊ -ViViÊ X `ÕÃÌÀÞ\Ê"À>}iÊÀ>ViÊ/iiVÊ,E o -®]Ê«>}iÃÊΣx]Ê-«À}iÀ]Ê"VÌLiÀÊ2011.
113 Products and Services KEYWORDS Security X Secure protocol definition and specification Protocols X Security evaluation and advice Cryptography
CONTACT Olivier PEREIRA [email protected] Tel. 32 (0) 10 47 81 41
WEB SITE http://www.uclouvain.be/crypto/
114 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY H 1
"«ÌÃ>Ì\Ê`i}Ê>`Ê>}ÀÌ Ã
SENIOR SCIENTISTS: X Pierre-Antoine ABSIL X À>XÃÊ 1, X 9ÕÀÊ -/ ,"6 X >Ì iÕÊ6 Ê696
Research Field and Subjects Representative References
Ê «ÀÌ>ÌÊ LiVÌÛiÊ vÊ "«iÀ>ÌÃÊ ,iÃi>ÀV Ê VÃÃÌÃÊ Ê X " -/ / "Ê °]Ê ,Ê °°Ê >`Ê 6 Ê 696 Ê °]Ê Ý}Ê modelling real life-situations in order to identify the best MIR Inequalities with Two Divisible Coefficients, Mathematical decisions to be taken. *À}À>}Ê]Ê6°Ê£ÓÎ]Ê°ÊÓ]Ê««°Ê{x£{nÎ]Ê2010. "«ÌÃ>ÌÊ«>ÞÃÊ>ÊViÌÀ>ÊÀiÊÊÌ ÃÊVÌiÝÌ°Ê`ii`]Ê«ÃÃLiÊ X 6" ,Ê "°]Ê 1,Ê °]Ê -/ ,"6Ê 9°]Ê -Û}Ê decisions can often be represented by a set of numerical wÌi`iÃ>Ê "«Ìâ>ÌÊ *ÀLiÃÊ LÞÊ *Þ>Ê variables, possibly restricted by some constraints. The sought ««ÀÝ>Ì]Ê Óä£ä]Ê ««°Ê ÎÇ{ÈÊ \Ê °Ê ]Ê °Ê 1,]Ê `iVÃÃÊ >ÀiÊ Ì iÊ vÕ`Ê >ÃÊ Ì ÃiÊ Ì >ÌÊ ÃiÊ ÀÊ >ÝÃiÊ °Ê , , ]Ê 7°Ê -Ê i`ÌÀî]Ê ,iViÌÊ `Û>ViÃÊ Ê a given numerical criterion, function of the decision variables. "«Ìâ>ÌÊ >`Ê ÌÃÊ ««V>ÌÃÊ Ê }iiÀ}]Ê -«À}iÀ]Ê "«ÌÃ>ÌÊ `i}Ê >`Ê >}ÀÌ VÊ ÌiV µÕiÃÊ V>Ê LiÊ 535 pp, 2010. applied in many different domains (management, engineering, X , -Ê ,°]Ê 1,Ê °]Ê Ê ÌiÀÀ«ÌÊ iÌ `Ê vÀÊ Ì iÊ economics) and to various types of problems (resource allocation, Ã}iv>VÌÞÊV>ÌÊ«ÀLiÊÜÌ ÊÝi`ÊÀÃÊÕÃ}Ê>ÊVVÊ choice of design parameters, scheduling). vÀÕ>Ì]Ê >Ì i>ÌV>Ê iÌ `ÃÊ vÊ "«iÀ>ÌÃÊ ,iÃi>ÀV ]Ê Efficiency of the computation of an optimal solution heavily 6°ÊÈn]Ê««°ÎnÎ{äx]Ê2008. depends on the type of problem that is to be solved (linear vs. X -Ê *°°]Ê " 9Ê ,°]Ê - *1 , Ê ,°]Ê "«Ìâ>ÌÊ nonlinear, continuous vs. discrete, stochastic vs. deterministic), }ÀÌ ÃÊ Ê >ÌÀÝÊ >v`Ã]Ê *ÀViÌÊ 1ÛiÀÃÌÞÊ *ÀiÃÃ]Ê ÌÃÊÃâiÊ>`ÊÌ iÊ>}ÀÌ ÃÊÕÃi`° 240 pp, 2008. / iÊ ÀiÃi>ÀV Ê VViÌÀ>ÌiÃÊ Ê ÌÜÊ `ÃÌVÌÊ >Ài>Ã°Ê "Ê Ì iÊ iÊ X -Ê *°°]Ê ,Ê °Ê °]Ê 6 Ê °Ê °]Ê /ÀÕÃÌ hand, integer programming problems, which allow the use region methods on Riemannian manifolds, Foundations of of discrete variables to model choices between a finite set of Computational Mathematics 7(3), pp. 303-330, 2007. possible decisions, are notoriously difficult and call for very X -/ ,"6Ê 9°]Ê -Ì }Ê /iV µÕiÊ >`Ê ÌÃÊ ««V>ÌÃÊ Ã«iVwVÊiÌ `ðÊ"ÊÌ iÊÌ iÀÊ >`]ÊÌ iÊVÛiÝÊ«ÌÃ>ÌÊ Ê -i`iwÌiÊ "«Ìâ>Ì]Ê >Ì i>ÌV>Ê *À}À>}]Ê and the Riemannian optimisation are two specific classes of 6°Ê££ä]Ê°ÊÓ]Ê««°ÊÓ{xÓx]Ê2007. continuous nonlinear problems that admit much more efficient X 6 Ê696 Ê °]Ê}ÀÌ ÃÊvÀÊÃ}iÌiÊÌÃâ}Ê«ÀLiÃÊ dedicated algorithms than general methods. ÜÌ ÊVÃÌ>ÌÊL>ÌV ÊÃâi]Ê >Ì i>ÌVÃÊvÊ"«iÀ>ÌÃÊ,iÃi>ÀV ]Ê In each case, the focus is on solving larger and larger problems, 6°ÊÎÓ]Ê°ÊÎ]Ê««°Êx{È£Î]Ê2007. thus allowing the modelling of more and more realistic situations with greater and greater detail. ,iViÌÊ «À}ÀiÃÃÊ ÜÌ Ê Ì ÃÊ ÀiëiVÌÊ ÃÊ «ÀiÃÃÛi°Ê ÀÊ iÝ>«i]Ê Awards linear optimisation problems that might have taken a month to solve fifteen years ago are now routinely solved in a few ÊÛÊ iÕ>Ê/ iÀÞÊ*ÀâiÊÓääÊ ", -ÊÃViÌÞ®\Ê9ÕÀÊ seconds on a desktop machine. It has been estimated that a NESTEROV factor of roughly three orders of magnitude in this speedup is due to algorithmic improvements and development of new methods, while another factor of three orders of magnitude is due to the evolution of computer hardware.
115 Funding KEYWORDS "«ÌÃ>Ì X F.R.S.-FNRS "«iÀ>ÌÃÊÀiÃi>ÀV X Wallonie Mathematical programming ÛiÝÊ«ÌÃ>Ì X j`jÀ>ÌÊ7>iÊ ÀÕÝiiÃÊ, ® Discrete optimisation X i}>ÊÌiÀÕÛiÀÃÌÞÊÌÌÀ>VÌÊ*iÃÊ*ÈÉä{Ê 9- "]Ê*ÈÉäÇ® Riemannian optimisation Ýi`ÊÌi}iÀÊ«À}À>} Production planning Partnership
CONTACTS X ÃÌÌÕÌiÊ vÀÊ ÕÌ`ÃV«>ÀÞÊ ,iÃi>ÀV Ê Ê +Õ>ÌÌ>ÌÛiÊ Pierre-Antoine ABSIL `i}Ê>`Ê>ÞÃÃÊ +® [email protected] X iÌÀiÊvÀÊ"«iÀ>ÌÃÊ,iÃi>ÀV Ê>`Ê ViÌÀVÃÊ ", ® Tel. 32 (0) 10 47 25 94 X Institute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM) François GLINEUR À>VðiÕÀJÕVÕÛ>°Li Tel. 32 (0) 10 47 81 64 Products and Services Yurii NESTEROV [email protected] Consultancy and collaboration with various industrial partners Tel. 32 (0) 10 47 43 48
Mathieu VAN VYVE >Ì iÕ°6>6ÞÛiJÕVÕÛ>°Li Tel. 32 (0) 10 47 81 61
WEB SITE http://uclouvain.be/en-core
116 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY H 2
Multi-agent systems
SENIOR SCIENTISTS: X ÕiÊ , 8 X ,>« >lÊ1 ,- X i> >ÀiÃÊ 6
Research Field and Subjects Awards
Birds or planes flying in formation, sensors sharing measurements, X IBM Belgium award 2006, 2009 ÀLÌÃÊ Ãii}Ê ÌÊ iÃÌ>LÃ Ê >Ê Ài`iâÛÕÃ]Ê Ã«iÊ «ÀViÃÃÀÃÊ X EECI award 2008 V>LÀ>Ì}Ê vÀÊ >Ê V«iÝÊ V«ÕÌ>Ì°Ê / iÃiÊ >ÀiÊ >Ê viÜÊ X Alcatel-Lucent-Bell award 2008 situations where a large number of agents communicate and evolve in order to achieve a global goal. Funding In the last decade, a large number of studies have been devoted ÌÊ Õ`iÀÃÌ>`Ê Ì iÃiÊ V«iÝÊ >Ì i>ÌV>Ê «ÀLiÃÊ >`Ê X *Ê*iÊ`½>ÌÌÀ>VÌÊÌiÀÕÛiÀÃÌ>Ài®Ê 9- " phenomena, among which: X F.R.S.-FNRS qÊ iÀ}iViÊvÊViVÌÛiÊLi >ÛÕÀÃ] qÊ ÕV>ÌÊÃÌÀ>Ìi}iÃÊvÀÊÀi`iâÛÕÃÊ«ÀLiÃ] qÊ iÌiVÌÊ>`ÊV>Ã>ÌÊvÊ>ÕÌÕÃÊ>}iÌÃ] Partnership qÊ iViÌÀ>Ãi`ÊV«ÕÌ>ÌÊLÞÊ>ÕÌÕÃÊ«ÀViÃÃÀÃ] qÊ iViÌÀ>Ãi`ÊÃÌ>LÃ>ÌÊvÊÌiÀViVÌi`ÊÃÞÃÌið X MIT X / / iÊ Ìi>Ê «ÀÛ`iÃÊ Ì iÀÊ iÝ«iÀÌÃiÊ Ê >>ÞÃÃ]Ê `iÃ}]Ê >`Ê X LIP6 «ÌÃ>ÌÊ vÊ Ì iÃiÊ V«iÝÊ ÃÞÃÌiÃ°Ê / iÀÊ VÌÀLÕÌÊ goes from the mathematical modelisation toward software implementation, and customer support. Products and Services
X Trainees Representative References X Analysis and design of algorithmic solutions for multi-agents infrastructure X , 8Ê° °]Ê"- 6-9Ê°]Ê/-/--Ê° °]Ê ÃÌÀLÕÌi`Ê X Software implementation and long-term care anonymous discrete function computation, IEEE Transactions on Automatic Control, 56:2276-2289, 2011. X 1 ,-Ê ,° °Ê >`Ê " Ê 6ViÌ]Ê "LÃiÀÛ>LiÊ }À>« Ã°Ê ÃVÀiÌiÊ««i`Ê >Ì i>ÌVÃ]Ê£x\Ên£qn]Ê2011. X ",/Ê °Ê >`Ê 6 Ê ° °]Ê ÃÌÀLÕÌi`Ê iÃ}Ê iÌ `ÃÊ vÀÊ i>ÀÊ +Õ>`À>ÌVÊ ÌÀÊ >`Ê / iÀÊ Ì>ÌÃ°Ê IEEE Transactions on Automatic Control, 55 (9), pp. 2085-2093, 2010. X 6 Ê ° °]Ê ,Ê ,°Ê >`Ê < * ,Ê -°]Ê "«Ì>Ê strategies in the average consensus problem. System and Control Letters, 58 (10-11), pp. 759-765, 2009. X , 8Ê° °]Ê ,-" Ê ° °"°]Ê 6 Ê° °Ê>`Ê " Ê6° °]Ê ÀiVÌi`Ê}À>« ÃÊvÀÊÌ iÊ>>ÞÃÃÊvÊÀ}`ÌÞÊ>`Ê persistence in autonomous agents systems, ÌiÀ>Ì>ÊÕÀ>Ê of robust and nonlinear control, 17:960-981, 2007.
117 KEYWORDS Autonomous agent localisation Consensus Distributed computing Large graph analysis and design
CONTACTS Julien HENDRICKX Õi°i`ÀVÝJÕVÕÛ>°Li Tel 32 (0) 10 47 23 77
Raphaël JUNGERS ,>« >i°Õ}iÀÃJÕVÕÛ>°Li Tel. 32 (0) 474 36 13 27
Jean-Charles DELVENNE i> >Àið iÛiiJÕVÕÛ>°Li Tel. 32 (0) 10 47 80 53
118 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY H 3
Modelling, analysis and control of distributed parameter systems
SENIOR SCIENTIST: X Ãi« Ê7
Research Field and Subjects Representative References
The field of distributed parameter systems (DPS) is an established X 6 Ê °]Ê " Ê °]Ê 7 Ê °]Ê *ÜiÀà >«}Ê area of research in automatic control engineering and applied control: Writing the system dynamics into the Brayton-Moser >Ì i>ÌVÃÊÜ V ÊÌÀ>ViÃÊÌÃÊÀÌÃÊL>VÊÌÊÌ iÊÃÝÌiðÊ/ iÊëiVwVÊ form, Systems & Control Letters, vol. 60, 618-624, 2011. feature of DPS is their distributed nature: in order to adequately X 1/ ,Ê °]Ê 7 Ê °]Ê +«Ì>Ê VÌÀÊ vÊ «ÃÌÛiÊ describe such systems one needs to use partial differential i>ÀÊ ÃÞÃÌiÃ]Ê "«Ì>Ê ÌÀÊ ««V>ÌÃÊ >`Ê iÌ `Ã]Ê equation (PDE) models. The department of Mathematics of the vol. 31, 547-566, 2010. 1ÛiÀÃÌÞÊvÊ >ÕÀÊ >ÃÊ`iÛi«i`Ê>ÊÜiÊÀiV}âi`ÊiÝ«iÀÌÃiÊ X *, 1,Ê °]Ê7 Ê°]Ê -/ Ê°]Ê,LÕÃÌÊLÕ`>ÀÞÊVÌÀÊ in this field and in control and system theory at large. Specific of systems of conservation laws, Mathematics of Control, Ì«VÃÊ vÊ iÝ«iÀÌÃiÊ VÕ`iÊ >Ì i>ÌV>Ê ÌiV µÕiÃÊ vÊ «ÕÌ Signals & Systems (MCSS), vol. 20, 173-197, 2008. output dynamical system modelling, feedback system theory, X , Ê°°]Ê " Ê °]Ê7 Ê°]ÊÃÞ«ÌÌVÊLi >ÛÕÀÊ i>À+Õ>`À>ÌVÊ+®Ê«Ì>ÊVÌÀÊ>`ÊëiVÌÀ>Êv>VÌÀÃ>Ì°Ê and stability for solutions of a biochemical reactor distributed Modelling, analysis and design applications include the heat parameter model, IEEE Transactions on Automatic Control, diffusion, the vibrating string and chemical and biochemical 6°ÊxÎ]Ê °Ê£]Ê{£Ó{£È]Ê2008. tubular reactors. X --Ê °]Ê 7 Ê °]Ê " Ê °]Ê "«Ì>Ê +vii`L>VÊ A central issue in process engineering is the analysis and design regulation of a nonisothermal plug flow reactor model by of control laws for systems that are modelled by nonlinear partial ëiVÌÀ>Êv>VÌÀâ>Ì]Ê Ê/À>Ã>VÌÃÊÊÕÌ>ÌVÊ ÌÀ]Ê differential equations, and more particularly by convection- 6°ÊxÓ]Ê °ÊÇ]Ê££Ç££Î]Ê2007. diffusion-reaction operators with boundary measurement and control. The goal is to design efficient tools in order to synthesise robust feedback control laws for applications in engineering. A Partnership ëiVwVÊÌ«VÊvÊÌiÀiÃÌÊÃÊÌ iÊÃÌÕ`ÞÊvÊÌ iÊ+«Ì>ÊLÕ`>ÀÞÊ control problem for the class of Sturm-Liouville systems, with X Département d’Ingénierie Mathématique, Institut ICTEAM, et a view to apply the results to convection-diffusion-reaction CESAME, Université catholique de Louvain systems with mass action kinetics. X >VÕÌjÊ`iÃÊ-ViViÃ]Ê1ÛiÀÃÌjÊ Õ>LÊ Õ>]Ê Ê>``>]Ê Invariant dynamical systems are dynamical systems for which et Ecole Supérieure de Technologie de Safi, Maroc iÛiÀÞÊ ÃÌ>ÌiÊ ÌÀ>iVÌÀÞÊ Ì >ÌÊ ÃÌ>ÀÌÃÊ vÀÊ >Ê }ÛiÊ « ÞÃV>ÞÊ X «Ã>>L]Ê ,-]Ê1ÛiÀÃÌjÊÃi« ÊÕÀiÀ]ÊÀiLi]ÊÀ>Vi admissible subset of the state space remains in this subset X j«>ÀÌiiÌÊ`iÊ ÌÀi]Ê>VÕÌjÊ*ÞÌiV µÕi]Ê1ÛiÀÃÌjÊ for all time. Since the whole state is usually unavailable from de Mons measurements, one typically uses feedback of the estimated X Department of Chemical and Materials Engineering, University state in order to control such systems (e.g. to stabilise them of Alberta, Canada around some equilibria of interest)., A fundamental problem is X iÀ}ÃV iÊ1ÛiÀÃÌBÌÊ7Õ««iÀÌ>]ÊiÀ>Þ the analysis and the design of nonlinear state estimators for X -V ÊvÊ >Ì i>ÌVÃ]Ê1ÛiÀÃÌÞÊvÊii`Ã]Ê1 invariant semi-linear distributed parameter systems, and the X Faculty of Mathematical Sciences, University of Twente, development of numerical methods for the synthesis of such Netherlands estimators.
119 KEYWORDS Automatic Control Dynamical systems Distributed parameter systems Feedback control State estimator "«ÌÃ>Ì Process engineering
CONTACT Joseph WINKIN Ãi« °ÜJvÕ`«°>V°Li Tel. 32 (0) 81 72 49 10
120 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY H 4
Process Modelling, Monitoring, Control and Real-Time "«ÌÃ>Ì
SENIOR SCIENTIST: X iÃÊ "
Research Field and Subjects involve the link between irreversible thermodynamics and system theory as a tool to design control strategies that are Research Field closer to the physics of the reaction systems. / iÊ >Ê >Ài>Ê vÊ iÝ«iÀÌÃiÊ ÃÊ Ài>Ìi`Ê ÌÊ Ì iÊ >Ì i>ÌV>Ê modelling of the dynamics of reaction systems, the analysis of Developed research methods the model properties, and the design and application of model- The monitoring and control strategies are applied to stirred based monitoring, control and real-time optimisation tools. The tank reactors (dynamics described by ordinary differential notion of reaction systems covers a large class of dynamical equations) as well as to processes whose dynamics are described systems where the matter transformation plays a central role, LÞÊ«>ÀÌ>Ê`vviÀiÌ>ÊiµÕ>ÌÃÊi°}°Ê«Õ}ÊyÜÊÀi>VÌÀÃ]ÊwÝi`Ê as in particular in chemical and biological systems. Applications or fluidised bed reactors or settlers as well as population fields cover more specifically the food, pharmaceutical, polymer, L>>ViÊ L>Ãi`Ê `iÃÊ vÀÊ «ÀViÃÃiÃÊ ÜÌ Ê Ãâi`ÃÌÀLÕÌi`Ê nanomaterials, metallurgical and pulp & paper industries, the «>ÀÌViÃÊ ÀÊ >}i`ÃÌÀLÕÌi`Ê Viî°Ê iÃ`iÃ]Ê Ì iÊ V«iÝÌÞÊ environment (solid waste, wastewater and water treatment), of the dynamics of the biological systems is also handled by but also plant growth. VÃ`iÀ}Ê «ÃÃLÞÊ V«iÝÊ iÌ>LVÊ iÌÜÀÃÊ >ÃÊ ÜiÊ >ÃÊ The need for appropriate monitoring and control tools in microbial ecology to emphasise the interactions between the order to optimise the on-line operation of environmental and different, possibly competing, species. Monitoring is related ecological systems is obvious. Yet the development of such tools in particular to the design of software sensors that are based has to handle typically two key issues. The first one is related to on the available knowledge on the process dynamics and Ì iÊ`vwVÕÌÞÊÌÊ`iÊÊ>ÊÀi>LiÊÜ>ÞÊÌ iÊV«iÝÊ`Þ>VÃ]Ê the limited number of process variables measured on-line in VÕ`}Ê Ì ÃiÊ vÊ Ì iÊ V iV>ÉL}V>ÉVÀL>Ê ÃÞÃÌiÃ°Ê order to reconstruct on-line the values of the unmeasured key / iÊÃiV`Ê`vwVÕÌÞÊiÃÊÊÌ iÊ>LÃiViÊvÊV i>«Ê>`ÉÀÊÀi>LiÊ process variables. A special attention is also given to the design on-line sensors for the key system variables. These issues are in and implementation of real-time optimisation methods via Ì iÊVÀiÊvÊÌ iÊiÝ«iÀÌÃiÊ`iÛi«i`ÊÛiÀÊÌ iÊ>ÃÌÊÓxÊÞi>Àð >`>«ÌÛiÊiÝÌÀiÕÊÃii}ÊVÌÀÊÌiV µÕiÃÊÌ >ÌÊ>ÜÊÌ iÊ Well accepted trends in the industry require plants that comply process to reach a priori unknown optimal operating points, with safety and environmental requirements in a sustainable way. ÌÀ>iVÌÀiÃÊ ÀÊ «ÀwiÃ°Ê ««V>ÌÃÊ Ê Ì ÃÊ wi`Ê >ÃÊ ÛÛiÊ iÃ`iÃ]ÊÊÌ iÊëiVwVÊVÌiÝÌÊvÊL}V>ÊÃÞÃÌiÃ]ÊÃÃÕiÃÊiÊ the biomedical field via an on-line optimisation strategy for «ÀÌiVÌÊ>}>ÃÌÊVÌ>>ÌÊ>`ÊViÝÃÌiViÊvÊ`vviÀiÌÊ drug delivery. micro-organisms are important issues in the biotechnology industry today. This implies on one hand the integrated use of environmental processes within the industrial plant, and on Representative References the other hand the development of appropriate techniques to >`iÊViÝÃÌiViÊÀÊ«ÀiÛiÌÊVÌ>>Ì° X ,**",/ÊA. and D" ÊD., Minimal time control of fed- L>ÌV Ê«ÀViÃÃiÃÊÜÌ Ê}ÀÜÌ ÊvÕVÌÃÊ >Û}ÊÃiÛiÀ>Ê>Ý>°Ê Research Approach IEEE Transactions on Automatic Control, to appear, 2011. The developed approaches are largely based on mass (and X 6 Ê °Ê andÊ " Ê °, Power-shaping of reaction iiÀ}Þ®Ê L>>ViÊ `iÃ°Ê "iÊ vÊ Ì iÊ Õ`iÀÞ}Ê `i>ÃÊ ÃÊ ÌÊ systems : the CSTR case study. Automatica., 46 (11), 1877- incorporate the knowledge about the process dynamics (e.g. 1883, 2010. basically, the reaction network and the material balances) as X " Ê °]Ê* ,, ,Ê °ÊandÊ19Ê °] ÝÌÀiÕÊ-ii}Ê well as (microbial) ecology concepts in monitoring and control Control and its Application to Process and Reaction Systems: algorithms. Moreover, the latter are able to deal with process A Survey. Mathematics and Computers in Simulation, Special uncertainties (in particular on the reaction kinetics) by the Issue, 82 (3), 369-380 2010. introduction of an adaptation scheme. New research trends X " Ê °]ÊBioprocess Control. ISTE, London, 2008.
121 X , Ê °]Ê ,**",/Ê °]Ê " Ê °Ê >`Ê " ,9Ê °]Ê KEYWORDS Microbial ecology and bioprocess control : opportunities and Modelling challenges. Journal of Process Control, 18, 865-875, 2008. Monitoring Software sensor Control, real-time optimisation Population balance Funding Metabolic network Microbial ecology X European Commission X Wallonie CONTACT X Private companies Denis DOCHAIN [email protected] Tel. 32 (0) 10 47 23 78 Partnership
X `ÕÃÌÀ>Ê «>ÀiÀà «\Ê >VÞ]Ê ÀiÛiÀ]Ê -Û>Þ]Ê -]Ê /Ì>]Ê WEB SITE >Û>*ÜiÀ]Ê ÜÊ À}]Ê*ÕÀ>ÌÃ]ÊÞ http://www.inma.ucl.ac.be/~dochain X Ê«ÀiVÌÃ\Ê Ê¸ «ÕÌiÀ`i`Ê`Ê }iiÀ}¸Ê "Ê ¸ vwViÌÊ"«iÀ>ÌÊvÊ1ÀL>Ê7>ÃÌiÜ>ÌiÀÊ/Ài>ÌiÌÊ*>Ìø®]Ê / ʸ/ ÌÀ}Ê>`Ê`Û>Vi`ÊÌii ÌÀÊvÊ } Ê Þi`Ê Ü>ÃÌiÜ>ÌiÀÊ ÌÀi>ÌiÌÊ «>Ìø®]Ê " "Ê º`Û>Vi`Ê ÌÀ}Ê>`Ê ÌÀÊvÀÊ«ÀÛi`Ê-Ì>LiÊ"«iÀ>ÌÊvÊ7`Ê Processing Waste Water Treatment Plants“), CPC (“Chemical Process Control”) X -Ê«ÀiVÌ\Ê --Ê} iÀÊ*>ÌÊ «>ÀÌiÌ® X *1*ÊiÌÜÀÊ 9- "
Products and Services
X Dynamical models X Software sensors X Control algorithms X ,i>/iÊ"«ÌÃ>ÌÊÌÃ
122 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY I 1
Cognitive Consequences of Technology
SENIOR SCIENTISTS: X i-« iÊ ", X Thierry DE SMEDT X *iÀÀiÊ-/, < X * ««iÊ6 ,
Research Field and Subjects Representative References
By making new kinds of representations and new ways of X *** // Ê/°]ÊiÕÝÊÛ`jÊiÊ}iÊ\ÊiÃÊ}ÀÕ«iÃÊ`¿>vwÌjÊ>ÕÊ interacting with people and with the available information, ICT service des compétences. Recherches en Communication, 34 support their users’ cognitive activity in novel ways. The research (under press). 2011. team observes and analyses the practices related to the uses of X ,"17 ,-Ê °]Ê >Ê Ài«ÀjÃiÌ>ÌÊ iÌ>iÊ `iÊ ¿ië>ViÊ ICT in order to assess how the formal properties of digital media Þ«iÀÌiÝÌÕi]Ê *ÀVii`}ÃÊ vÊ Ó*/ ½Óä££Ê qÊ Þ«iÀÌiÝÌÊ EÊ shape the activity they support. Þ«iÀi`>]Ê *À`ÕVÌÃ]Ê /ÃÊ EÊ iÌ `ÃÊ 1ÛiÀÃÌjÊ *>ÕÊ 6iÀ>i iÌâ®° 2011. Specific research questions include: X ", Ê°-°]Ê1Ê`miÊ`iÊ>Ê«ÀÃiÊiÊV«ÌiÊ`iʽÕÃ>}iÀÊ qÊ ÜÊ ÕÃiÀÃÊ `iÛi«Ê >Ê «>ÀÌVÕ>ÀÊ iÌ>Ê `iÊ vÊ Ì iÊ dans le processus de conception d’un dispositif de communi- iÛÀiÌÊÌ iÞÊÌiÀ>VÌÊÜÌ Æ cation interactif : le cas du persona. Proceedings of Dispositifs qÊ ÜÊÌ ÃÊ`iÊvÊÌ iÊiÛÀiÌÊyÕiViÃÊÌ iÀÊÌiÀ>VÌÊ techniques de communication humaine: transformations du with it, as well as the knowledge they construct through this iÊiÌÊÕÛi>ÕÝÊiÕÝÊÃV>ÕÝÊ >ÕÀ]Ê i}µÕi®° 2010. ÌiÀ>VÌÆ X ", Ê°-°Ê>`Ê-/, <Ê*°]ÊÓä£ä®°ÊÊ `iÊvÊÌ iÊ,iÊ qÊ ÜÊ ÌiÀ>VÌÛiÊ `}Ì>Ê iÛÀiÌÃÊ >ÞÊ vÃÌiÀÊ Ì iÊ vÊ Vi«ÌÕ>Ê iÌ>« ÀÃÊ Ê Þ«iÀi`>Ê «Ài iÃ°Ê `iÛi«iÌÊvÊëiVwVÊÃÃÆ *ÀVii`}ÃÊvÊ " \Ê ÕV>Ì]Ê }ÌÊ>`Ê i`>Ê qÊ ÜÊÕÃiÀÃÊ>ÀiÊÌ>iÊÌÊ>VVÕÌÊ`ÕÀ}Ê`iÃ}Ê«ÀViÃð (Braga, Portugal), 241-255. 2009. X *" Ê °]Ê vviÌÊ`½ÕÊÀjVÌÊj>ÀiÊÃÕÀÊ>ÊVÃÌÀÕVÌÊ Recent empirical research undertaken by our team has focused d’un modèle mental de situation. Dans I. Saleh, S. Leleu- on: iÀÛi]Ê9°Êi>iÀiÌ]Ê°Ê >ÃÃÕ]ÊEÊ °Ê Õ >Ê`°®]ÊÓ*/ ½ä°Ê qÊ iÌ>« ÀÊ >ÃÊ >Ê i>ÃÊ vÊ ÃÌÀÕVÌÕÀ}Ê Þ«iÀi`>Ê ÕÃiÀÊ Rétrospective et perspective 1989-2009 (p. 87-100). Paris: ÌiÀv>ViÃÊ>`ÊvÀ>ÌÊ>ÀV ÌiVÌÕÀiÆ iÀmðÊ2009. qÊ Ì iÊ ÌiÀ>VÌÊ LiÌÜiiÊ Ã«>Ì>Ê >LÌiÃÊ >`Ê Þ«iÀi`>Ê Ê X -/, <Ê*°]Ê *" Ê °ÊEÊ ", Ê°-°]ÊiÊÌÀÊ`iÊV>ÀÌiÃ°Ê vÀ>ÌÊÀiÌÀiÛ>ÊÌ>ÃÃÆ Une méthode d’investigation des catégories mentales au service qÊ ÌiÀ>VÌÛiÊ>ÀÀ>ÌÛiÃÊ>ÃÊ>Êi>ÃÊvÊVÃÌÀÕVÌ}ÊÜi`}iÆ de l’architecture de l’information. Document Numérique, 12(2), qÊ Ì iÊÕÃiÊvÊ«iÀÃ>Ê>ÃÊ>Ê`iÃ}ÊÌÆ 23-45. 2009. qÊ Ì iÊi`>ÊÌiÀ>VÞÊV«iÌiViÃÊÀiµÕÀi`ÊLÞÊÌ iÊÕÃiÊvÊ /Æ X -/, <Ê *°Ê Óään®]Ê Ê }ÌÕ`>Ê *iÀëiVÌÛiÊ Ê qÊ ÕÌ«>ÞiÀÊ iÊ Ài«>Þ}Ê }>iÃÊ >ÃÊ >Ê >VÌÛÌÞÊ Ì iÊ ,i>Ìà «Ê LiÌÜiiÊ Þ«iÀi`>Ê -ÌÀÕVÌÕÀiÊ >`Ê developing social competences. Comprehension. Proceedings of the Workshop on Cognition >`ÊÌ iÊ7iLÊ«°Ê£{Ç£x£®°ÊÀ>>`>\Ê1ÛiÀÃ`>`Ê`iÊÀ>>`>°Ê This research finds its foundations in the theoretical tenets 2008. of cognitive semiotics, a discipline that emerged at the X -/, <Ê *°Ê EÊ 1Ê ° °]Ê iÃ}}Ê >`Ê iÛ>Õ>Ì}Ê `ÀÛiÀÊ cross-roads of semiotics and cognitive science, and aims at ÃÕ««ÀÌÊÃÞÃÌiÃÊÜÌ ÊÌ iÊÕÃiÀÊÊ`°ÊÌÊÊÕ «ÕÌÊ-Ì]Ê understanding the interactions between representational media 66(3), 125-131. 2008. and cognitive activity. The investigation methods involve quasi- iÝ«iÀiÌ>ÌÃÊ>`ÊV}ÌÛiÊiÌ }À>« Þ°
123 Funding KEYWORDS User-centred design (UCD)
X F.R.S.-FNRS Usability testing User interfaces X FRFC Þ«iÀÌiÝÌÉ Þ«iÀi`> X FSR (UCLouvain) Þ«iÀÌiÝÌÊ>Û}>ÌÊ>`Ê>«Ã X European (MEDIA Programme) Computer-assisted instruction >ià Literacy Partnership
CONTACTS X >LÀ>ÌÀiÊ/À>Û>ÊiÌÊ }Ì]Ê1ÛiÀÃÌjÊ`iÊ/ÕÕÃiÊÊqÊiÊ Anne-Sophie COLLARD Mirail (France) [email protected] X "-/Ê >VÌÊ º ÕÀ«i>Ê ,iÃi>ÀV Ê iÌÜÀÊ Ê i>À}Ê ÌÊ Tel 32 (0) 81 72 53 28 Write Effectively” X / ]Ê1ÛiÀÃÌjÊ`iÊimÛiÊ-ÜÌâiÀ>`® Thierry DE SMEDT X Laboratoire Communication, Information, Médias, Université [email protected] de Paris III (France) Tel. 32 (0) 10 47 28 44 X Centre de Recherche Images Cultures et Cognitions, Université Pierre FASTREZ de Paris I (France) «iÀÀi°v>ÃÌÀiâJÕVÕÛ>°Li X "Ê Ê>L]Ê1ÛiÀÃÌÞÊvÊ >vÀ>]Ê->Ê i}Ê1-® Tel. 32 (0) 10 47 29 14
Philippe VERHAEGEN Main Equipment [email protected] Tel. 32 (0) 10 47 28 07
X >Ì>Ê ViVÌÊ >`Ê >>ÞÃÃÊ ÜÀÃÌ>ÌÃÊ vÀÊ ÃÕLiVÌÊ iÝ«iÀiÌÃÊÛÛ}ÊÌ iÊÕÃiÊvÊÕÌi`>Ê«À`ÕVÌÃÆ WEB SITES X i`V>Ìi`Ê ÃvÌÜ>ÀiÊ vÀÊ `>Ì>Ê ViVÌÊ >`Ê µÕ>ÌÌ>ÌÛiÉ http://www.uclouvain.be/grems qualitative analysis of user activity. http://www.crids.be/
Products and Services
X The research finds applications in the realm of user-centered design and evaluation of multimedia educational applications.
124 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY I 2
Interfaces for disabled
SENIOR SCIENTIST: X -Õâ>iÊ ,
Research Field and Subjects Representative References
/ iÊÀiÃi>ÀV Êwi`ÊÃÊ1ÃiÀÊ Ý«iÀiVi°ÊÊ«>ÀÌVÕ>À]ÊÌ iÊÀiÃi>ÀV Ê X ,Ê-°]Ê-7 Ê °]Ê +Ê °]Ê-Õ««ÀÌ}ÊÌ iÊ«>ÀÌV«>ÌÊ focuses on the user-centred design and the usability evaluation in social life of frail older adults in a one-day clinic. In Proc. IADIS of interfaces for persons with a disability. The design process ÌiÀ>Ì>Ê viÀiViÊ ÌiÀv>ViÃÊ >`Ê Õ>Ê «ÕÌiÀÊ involves analysis, elaboration of mock-up, focus-group, and ÌiÀ>VÌÊÓ䣣]Ê,i]ÊÕÞÊÓ{ÓÈ]Ê2011. compliance with guidelines. The testing can involve several X ,Ê -°]Ê "9 // Ê °]Ê 6 , " /Ê °]Ê 1ÃiÀÊ techniques such as heuristic evaluation, user study, lab-test, ÌiÀv>ViÊ`iÃ}ÊLÞÊÃiÌV }\Ê>ÊV«iÝÌÞÊ>>ÞÃÃÊvÊÜ`}iÌÊ >`ÉÀÊwi`ÌiÃÌ° representations. In Proc. of 2nd ACM Symposium on Engineering ÌiÀ>VÌÛiÊ «ÕÌ}Ê-ÞÃÌiÃÊ -ÊÓä£äÊ iÀ]Ê£ÓÎÊÕiÊ Making ICT accessible to older adults 2010), ACM Press, New York, pp. 57-66, 2010. “Do I have to press the big button labeled spacebar to separate X ,Ê-°]Ê"1< Ê°]Ê " , 9Ê,°]Ê6 Ê ,1-- Ê °]Ê Ê two words?” This question was the first feedback from a 7-* , Ê°°]Ê9- ,Ê°]Ê +Ê °]Ê/Ü>À`ÃÊÃÌ>`>À`âi`Ê one-year field-test undertaken with novice older adults using pen-based annotation of breast cancer findings. In Proc. a computer. The combination of User-Centered Design, agile viÀiViÊ Ê Õ> «ÕÌiÀÊ ÌiÀ>VÌÊ ½ä®]Ê ->Ê development, and field-test was adopted in order to provide i}Ê ®]ÊÕÞÊ£Ó{]Ê2009. the older adults with a better adapted user interface. The X ,Ê -°]Ê 7-" Ê °9°]Ê +Ê °]Ê 1ÃiÀViÌiÀi`Ê `iÃ}Ê purpose to adopt such a combination was to release an easy- and fast prototyping of an ambient assisted living solution for to-learn and easy-to-use user interface, so that the older adults i`iÀÞÊ«i«i°ÊÊ*ÀV°Ê Ê/ ÊÓää]Ê>ÃÊ6i}>ÃÊ 6®]Ê«ÀÊ would take possession of, and be satisfied with it. The resulting 27-29, 2009. ÌiÀv>ViÊÃÕ««ÀÌÃÊÃÕÀw}ÊÊÌiÀiÌ]Êi>}]Êi`ÌÊvÊÌiÝÌ]Ê X "9 // Ê °]Ê ,Ê -°]Ê 6 , " /Ê °]Ê ÕÌw`iÌÞÊ and management of photos. prototyping of user interfaces. In Proc. IFIP TC13 International Field-test observation turned out to be a key-success factor, viÀiViÊ Ê Õ> «ÕÌiÀÊ ÌiÀ>VÌÊ / , /½äÇ®]Ê iëiV>ÞÊ LiV>ÕÃiÊ Ì iÊ «ÀiVÌÊ >``ÀiÃÃiÃÊ Ì iÊ «ÀLiÊ vÊ ,Ê `iÊ >iÀ]Ê À>Ã]Ê -i«ÌiLiÀÊ £ä£{]Ê 2007, pp. 150-164. accessibility to ICT for people on the wrong side of the digital Awarded with the Brian Shackel Award. divide.
Skills and expertise Awards qÊ ÕÌ`>ÊÌiÀv>Vià qÊ 1ÃiÀ iÌÀi`Ê iÃ} X -iÃÃÊ >À]Ê ½££ÊVviÀiVi]ÊÓ䣣 qÊ 1Ã>LÌÞÊ>`ÊÃvÌÜ>ÀiÊviVÞVi X Best presentation award, EICS’10, 2010 qÊ /iV µÕiÃÊvÀÊÌ iÊi>LÀ>ÌÊvÊVÕ« X *ÀViÊ 6""]Ê ÃÌV>«Ê vÊ Ì iÊ VÀÃvÌÊ Û>ÌÊ iÌiÀÊ qÊ Û>Õ>ÌÊÌiV µÕiÃÊ>LÊÀÊwi`ÌiÃÌî (MIC) in Mons, 2009 qÊ iÃÌÊ«À>VÌVi]ÊÕ`iiÃ]Ê>`ÊiÕÀÃÌVà X "À>Ê «ÀiÃiÌ>ÌÊ ÌÊ LiÀÌÊ ]Ê }Ê vÊ Ì iÊ i}>Ã]Ê qÊ >Ì>Ê >`}]ÊvÀÊ>VµÕÃÌÊÌÊ>>ÞÃà Inauguration of the MIC, 2009 qÊ -Ì>ÌÃÌVÃ\Ê *Ê--ÊÃÌÌÕÌi® X Best paper Award, INTERACT’07, “Brian Shackel Award”, 2007
125 Funding KEYWORDS Ageing well
X Wallonie, 1st spin-off convention: 816788 Assistive technology for older adults Õ> «ÕÌiÀÊÌiÀ>VÌ X Wallonie, “Proof of concept” Funding User-centred design (UCD) Multimodal interaction Usability testing Partnership
CONTACT X Microsoft Innovation Center X Neomytic Suzanne KIEFFER -Õâ>i°ivviÀJÕVÕÛ>°Li X Wavenet Tel. 32 (0) 10 47 80 73
Products and Services
X User-centred design for interactive systems X iÃ}}Ê>`ÊLÃiÀÛ}ÊÌ iÊÕÃiÀÊiÝ«iÀiVi X Usability testing
126 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY I 3
Immersive Virtual Environment
SENIOR SCIENTISTS: X Martin EDWARDS X iÌÊ + X Mauro PESENTI X *iÀÀiÊ***"/
Research Field and Subjects X BADETS A., PESENTI M., Creating number semantics through finger movement perception. Cognition. 115, 46-53, 2010. / iÊiÀÃÛiÊ6ÀÌÕ>Ê ÛÀiÌÊ>LÀ>ÌÀÞÊ6 >L®ÊÃÊ>ÊiÜÊ X /9 , Ê °]Ê -1 - Ê °]Ê , / ,Ê °]Ê -/Ê °]Ê 6 Ê working infrastructure being set up in the Psychological Sciences BRUSSEL C., Developing video games and virtual environments Research Institute (IPSY) in order to assist psychologists in their with the Crystal Space engine. Design and Engineering of research, therapeutic and educational activities. The laboratory >iiÊ6ÀÌÕ>Ê>`Ê ÕÌ`>Ê ÛÀiÌÃ]Ê2010. uses virtual reality devices to immerse participants in a 3D virtual environment, in order to confront them with computer controlled situations and observe their reactions. Funding The main advantage of the virtual reality is that it allows a ÛiÀÞÊyiÝLiÊVÌÀÊvÊÌ iÊÃÌÕ>ÌÃÊÊÜ V ÊÌ iÊÃÕLiVÌÃÊ>ÀiÊ X Wallonie immersed, overcoming many of the technical and practical X Fonds National de la Recherche Scientifique «ÀLiÃÊ Ì >ÌÊ >ÀiÊ iÌÊ ÜÌ Ê Ì iÊ V>ÃÃV>Ê ¼Ê ÛÛ½Ê iÀÃÊ X European Regional Development Fund techniques. The deepness of the immersion may also be ÕV Ê L}}iÀÊ Ì >Ê Ì iÊ VÞÊ ÕÃi`Ê >Õ`ÉÛ`iÊ vÌ>}iÃ°Ê Furthermore, new possibilities are opened, such as the complete Main Equipment manipulation of the environment and the set up of non-realistic situations. X
Representative References
X "1 <Ê °]Ê 9< , 9/Ê 6°]Ê "- / Ê °]Ê ***"/Ê *°]Ê -V>Ê >ÝiÌÞÊ L>ÃiÃÊ Ì iÊ iÛ>Õ>ÌÊ vÊ v>V>Ê displays: Evidence from single face and multi-facial stimuli. Cognition and Emotion,pp. 1-9, 2011. X , 7 Ê,°]Ê 7, -Ê °°]Ê"LÃiÀÛi`ÊÀi>V Êi>ÌVÃÊ `Õ>ÌiÊ iÝiVÕÌi`Ê Ài>V Ê i>ÌVÃÊ Ê «Ài iÃ°Ê +Õ>ÀÌiÀÞÊ ÕÀ>ÊvÊ Ý«iÀiÌ>Ê*ÃÞV }Þ°ÊÈ{]Ê£änÓ£äÎ]Ê2011. X ***"/Ê*°]Ê6, 9 Ê °]Ê 1 ,Ê6°]Ê }ÌÛiÊ*ÀViÃÃ}Ê -«iVwVÌÞÊ vÊ ÝÕÃÊ ««Ài iÃ\Ê «>VÌÊ Ê ÃÌÀiÃÃÊ >`Ê *iÀvÀ>ViÊ`ÕÀ}Ê-«iiV Ê Ý«ÃÕÀi°Ê i >ÛÀÊ/ iÀ>«Þ°Ê{£{®\Ê 575-586, 2010.
127 KEYWORDS 6ÀÌÕ>ÊÀi>ÌÞ Immersive interfaces Cognition Motion capture Procedural animation
CONTACTS Martin EDWARDS [email protected] Tel. 32 (0) 10 47 39 83
Benoît MACQ [email protected] Tel. 32 (0) 10 47 88 16
Mauro PESENTI [email protected] Tel. 32 (0) 10 47 88 22
Pierre PHILIPPOT [email protected] Tel. 32 (0) 10 47 43 78
WEB SITE http://sites.uclouvain.be/ivelab/
128 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY I 4
Engineering of User Interfaces
SENIOR SCIENTISTS: X i>Ê6 , " / X `ÀiÊ "9 // X Õ>Ê >ÕiÊ" < <Ê ,"- X ,V>À`Ê/ -", ,"
Research Field and Subjects – ÕÌVÕÌÕÀ>ÌÞÉ}Õ>ÌÞ\Ê ÕÃiÀÃÊ Ã«i>Ê `vviÀiÌÊ >}Õ>}iÃ]Ê LÕÌÊ>ÃÊiÝ«iVÌÊÌÊ >ÛiÊÌ iÀÊÕÃiÀÊÌiÀv>ViÊÃÕLiVÌÊÌÊV>Ã>ÌÊ Engineering of User Interfaces (UIs) is concerned by the software (adaptation with respect to their specific country, culture, engineering aspects of interactive systems, primarily their language) or globalisation (adaptation to the largest population user interfaces. The development life cycle of a user interface of users possible). In particular, we handle culturally-aware user starts from requirement engineering until its deployment, interfaces. evaluation, and maintenance. Any question occurring during – Multi-organisation user interfaces: they support tasks, this development life cycle from an engineering point of view business processes, and workflow that span over multiple users is relevant. belonging to different groups, entities, or organisations. – ÕÌVÌiÝÌÊ ÌiÀv>ViÃ\Ê Ì iÞÊ >ÀiÊ ÃÕ««Ãi`Ê ÌÊ VÌÕiÊ ÌÊ For this purpose, we rely on a dedicated UI development method ÀÕÊiÛiÊvÊÌ iÊVÌiÝÌÊvÊÕÃiÊÃÊV >}}ÊÌ iÊÕÃiÀÊiÛÛiÃÊÛiÀÊ Ì >ÌÊÃÊÃÌÀÕVÌÕÀi`Ê>VVÀ`}ÊÌÊÌ ÀiiÊ>ÝiÃ\ time, the platform is changing, and the socio-organisational 1. Models that capture various aspects of an interactive system iÛÀiÌÊÃÊ`Þ>V®°Ê/ iÊÃ>iÊÌ>ÃÊVÕ`ÊLiÊiÝ«ÀiÃÃi`ÊÊ through adequate abstractions such as: task, domain, user, very different ways depending on the constraints imposed by «>ÌvÀ]Ê iÛÀiÌ]Ê >LÃÌÀ>VÌÊ 1]Ê VVÀiÌiÊ 1]Ê VÌiÝÌÊ vÊ Ì iÊVÌiÝÌÊvÊÕÃi° use, interactor. These models are written in a particular User – Multi-modality: user interfaces may involve different Interface Description Language (UIDL) having its own notation modalities of interaction (e.g., graphic, vocal, haptic, tactile) 1ÃiÀÊ ÌiÀv>ViÊ i8ÌiÃLiÊ >ÀÕ«Ê >}Õ>}iÊ qÊ ÜÜÜ°ÕÃÝ° either one at a time or simultaneously. org). – Multi-platform user interfaces: they include user interfaces that 2. A step-wise method that decomposes the development life could run indifferently on any computing platform, regardless cycle into steps and sub-steps, involving relevant models when of its operating system, window manager or particular device any, based on model-based design, model driven engineering, (e.g., mobile phone, smartphone, tablet, laptop, interactive and method engineering techniques. kiosk, desktop, large screen, wall screen). 3. A software support that provides stakeholders (e.g., designers, developers, end users) with guidance on how to 1ÃiÀÊÌiÀv>ViÃÊVÕ`ÊÛ>ÀÞÊ>VVÀ`}ÊÌÊ>ÞÊvÊÌ iÃiÊ>ÝiÃ]ÊÌ ÕÃÊ apply the method based on the models. also introducing Distributed User Interfaces (DUIs) that could span across these dimensions over time and space. Topics of interest include multi-device interactive systems, new and emerging modalities (e.g., gesture), entertaining applications (e.g., mobile and ubiquitous games), and design Representative References >`Ê `iÛi«iÌÊ iÌ `ÃÊ i°}°]Ê iÝÌÀiiÊ «À}À>}®°Ê }iiÀ}ÊvÊÕÃiÀÊÌiÀv>ViÃÊÃÊ>ÃÊiÝ«Ài`Ê>VVÀ`}ÊÌÊÌ iÊ X 6 , " /Ê °]Ê ÃÌÀLÕÌi`Ê 1ÃiÀÊ ÌiÀv>ViÃ\Ê ÜÊ ÌÊ vÜ}Ê>ÝiÃ\ Distribute User Interface Elements across Users, Platforms, – Multi-device user interfaces\ÊÌ iÊÃ>iÊ1Êà Õ`ÊLiÊiÝiVÕÌi`Ê >`Ê ÛÀiÌÃ]Ê *ÀV°Ê vÊ 8Ì Ê }ÀiÃÊ ÌiÀ>V>Ê `iÊ seamlessly on one or many different devices, having potentially ÌiÀ>VVÊ *iÀÃ>"À`i>`ÀÊ ÌiÀÊ>VV½Óä£äÊ 6>iV>]Ê very heterogeneous interaction capabilities. Ç£äÊ-i«ÌiLiÀÊÓä£ä®]Ê*"]Ê6>iV>]Ê««°ÊΣ{]Ê2010. – Multi-user interfaces: tasks could be carried out by one or X 6 , " /Ê °]Ê `i ÀÛiÊ }iiÀ}Ê vÊ 1ÃiÀÊ multiple users working separately or together, thus posing the Interfaces: Promises, Successes, and Failures, Proc. of 5th Annual need for multi-user interfaces that goes beyond sharing a same ,>>Ê v°ÊÊÕ> «ÕÌiÀÊÌiÀ>VÌÊ," ½ÓäänÊ user interface across different users. >Ã]Ê £n£Ê -i«ÌiLiÀÊ Óään®]Ê >ÌÀÝÊ ," ]Ê ÕV>ÀiÃÌ]Ê 2008, pp. 1-10.
129 Partnership KEYWORDS Computer-Aided Design of User Interfaces
X CETIC, Belgium Engineering Interactive Computing Systems Õ> «ÕÌiÀÊÌiÀ>VÌ X Defimedia, Belgium Model-driven engineering X Fondacion CTIC, Spain Software engineering X *ÞÌiV VÊ1ÛiÀÃÌÞÊvÊ6>iV>]Ê-«> User interfaces X See & Touch, Belgium X University of Castilla-La Mancha, Spain CONTACT X 1ÛiÀÃÌÞÊvÊÀiLi]Ê]ÊÀ>Vi X W4, France Jean VANDERDONCKT i>°Û>`iÀ`VÌJÕVÕÛ>°Li Tel. 32 (0) 10 47 85 25
Products and Services WEB SITES X UI design: scenario-based design, prototyping, mockup http://www.usixml.org, http://www.usixml.eu X UI development: programming, model-driven engineering of http://www.lilab.be, http://www.lilab.eu UIs http://www.openinterface.org X UI evaluation: evaluation with or without users according to sound protocols (e.g., web sites) X 1Ê>`>«Ì>Ì\Ê>`>«Ì>ÌÊvÊiÝÃÌ}Ê1ÃÊÌÊiÜÊVÌiÝÌÃÊvÊ use, new devices or platforms.
130 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY J 1
Automated analysis of foreign language learner writing and speech
SENIOR SCIENTISTS: X -ÞÛ>iÊ, , X9ÛiÃÊ -/ X-ÞÛiÊ Ê " X>lÌ>iiÊ+1 XFanny MEUNIER X >}>Ê*+1"/
Research Field and Subjects X , ,]Ê 18Ê °]Ê 1 ,Ê °]Ê *+1"/Ê °]Ê The International Corpus of Learner English. Handbook and The Centre for English Corpus Linguistics (CECL) has played CD-ROM. Version 2. Louvain-la-Neuve: Presses universitaires de a pioneering role in the collection and automated analysis of Louvain, 2009. >À}iÊiiVÌÀVÊViVÌÃÊvÊëiÊ>`ÉÀÊÜÀÌÌiÊ>}Õ>}iÊ X , ,Ê -°]Ê i>ÀiÀÊ À«À>Ê Ê Ài}Ê >}Õ>}iÊ produced by foreign language learners. The CECL has designed `ÕV>Ì°ÊÊ6>Ê iÕÃi-V Ê °Ê>`ÊÀLiÀ}iÀÊ °°Êi`ð®Ê a comprehensive error annotation system for both English Encyclopedia of Language and Education°Ê6ÕiÊ{]Ê-«À}iÀ]Ê and French as a foreign language and a range of automated 337-351, 2008. methods that can inform the following applications: X , ,Ê -°]Ê ,Ê "°]Ê *" /" Ê °]Ê /" -Ê °Ê EÊ < *Ê 6°]ÊÌi}À>Ì}Ê i>ÀiÀÊ VÀ«À>Ê >`Ê >ÌÕÀ>Ê >}Õ>}iÊ qÊ VÕÃÌÃ>ÌÊ vÊ ÜiLL>Ãi`Ê i>À}Ê ÌÃÊ Ê vÕVÌÊ vÊ processing: A crucial step towards reconciling technological i>ÀiÀýÊ>ÌÌiÃÌi`Ê`vwVÕÌiÃÆ sophistication and pedagogical effectiveness. ReCALL 19(3): qÊ «ÀÛiiÌÊ vÊ >ÕÌ>ÌVÊ Ã«iÊ >`Ê }À>>ÀV iV}Ê 252-268, 2007. ÌÃ]Ê>ÕÌ>ÌVÊÃVÀ}ÊÌÃÊ>`ÊëiiV ÊÀiV}ÌÊ«À}À>ÃÆ X +1 Ê°]Ê, ,Ê-°ÊEÊ*+1"/Ê °]Êi>ÀiÀÊVÀ«À>\ÊÌ iÊ qÊ >ÕÌ>ÌVÊ`iÌwV>ÌÊvÊÌ iÊÕÃiÀýÊÌ iÀÊÌ}ÕiÊ£®Ê>`Ê missing link in EAP pedagogy. Journal of English for Academic «ÀwViVÞÊiÛiÆ Purposes 6(4): 319-335, 2007. qÊ `iÃ}Ê vÊ VÕÃÌÃi`Ê >}Õ>}iÊ ÌiÃÌÃÊ >`Ê «i`>}}V>Ê material. Funding The associated automated techniques are the following: X EU qÊ V«>ÀÃÃÊvÊÜÀ`É}À>ÊÃÌÃÆ X F.R.S.-FNRS qÊ iÝÌÀ>VÌÊvÊÛiÀÊ>`ÊÕ`iÀÕÃi`ÊÜÀ`ÃÉ}À>ÃÆ X -,É1 qÊ iÀÀÀÊ>Ì>ÌÊ>`Ê>>ÞÃÃÆ X j`jÀ>ÌÊ7>i ÀÕÝiià qÊ «>ÀÌvëiiV ÊÌ>}}}° X Macmillan Dictionaries Ltd
Representative References Partnership
X -/ Ê 9°]Ê , ,Ê -°Ê EÊ / 7-- Ê °]Ê ÀÀÀÊ «>ÌÌiÀÃÊ X >V>ÃÌiÀÊ1ÛiÀÃÌÞÊ1® >`Ê>ÕÌ>ÌVÊ£Ê`iÌwV>Ì°ÊÊ>ÀÛÃ]Ê-°ÊEÊ ÀÃÃiÞ]Ê-°Êi`ð®Ê X " Ê1ÛiÀÃÌÞÊ1-® Approaching Transfer through Text Classification: Explorations X 1ÛiÀÃÌÞÊvÊ"ÃÊ ÀÜ>Þ® in the Detection-based Approach. Clevendon: Multilingual X >Ì iiÊ1ÛiÀÃÌiÌÊiÕÛiÊ i}Õ® Matters, 2011. X -/ Ê 9°Ê EÊ , ,Ê -°]Ê >Ìi}Àâ}Ê Ã«i}Ê iÀÀÀÃÊ to assess L2 writing. International Journal of Continuing Engineering Education and Life-Long Learning]Ê Ó£ÓÉή\Ê ÓÎx 252, 2011. X +1 Ê°]Ê Ê " Ê-°ÊEÊ, ,Ê-°]ÊLouvain International Database of Spoken English Interlanguage. Handbook and CD-ROM. Louvain-la-Neuve: Presses universitaires de Louvain, 2010.
131 Products and Services KEYWORDS Ài}Ê>}Õ>}iÊi>À}ÉÌi>V } Corpora: Pedagogical materials development Error detection and correction L1 identification X International Corpus of Learner English (ICLE): 3.7 million Language testing words of English writing produced by learners from 16 mother Speech recognition tongue backgrounds. Wide international network coordinated by the CECL (started in 1990). CONTACT X Louvain International Database of Spoken English Interlanguage (LINDSEI): 1 million words of English speech Sylviane GRANGER produced by learners from 11 mother tongue backgrounds. [email protected] Tel. 32 (0) 10 47 49 47 7`iÊÌiÀ>Ì>ÊiÌÜÀÊVÀ`>Ìi`ÊLÞÊÌ iÊ Ê}}ÆÊ started in 1995). X French Interlanguage Database (FRIDA): 300,000 words of WEB SITES French writing produced by learners from a range of mother http://www.uclouvain.be/en-cecl.html Ì}ÕiÊL>V}ÀÕ`ÃÆÊvÕÞÊiÀÀÀÌ>}}i`° http://www.uclouvain.be/en-258636.html
Services:
X Design and analysis of learner corpora X Automated error analysis X Design of corpus-informed pedagogical material and language tests
132 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY J 2
Constraint Programming
SENIOR SCIENTIST: X 9ÛiÃÊ 6
Research Field and Subjects X SCHAUS P., DEVILLE Y.]ÊÊL>Ê ÃÌÀ>ÌÊvÀÊ *>V}Ê with Precedences: Application to the Assembly Line Balancing Constraint Programming (CP) is a powerful paradigm for Problem. AAAI-08, Twenty-Third AAAI Conference on Artificial `i}Ê >`Ê ÃÛ}Ê V«iÝÊ VL>ÌÀ>Ê «ÌÃ>Ì®Ê Intelligence, 2008. problems in area such as planning, scheduling, sequencing, configuration, design and resource allocation. It integrates techniques from artificial intelligence, computer science, Funding operational research and optimisation. CP separates the modelling of the problem from the search for solutions. It X F.R.S.-FNRS offers high level modelling languages based on constraints. CP X Wallonie proposes two complementary search mechanisms. Standard X EC CP is based on systematic tree search coupled with pruning techniques to remove infeasible solutions. Constraint-Based Local Search (CBLS) allows heuristic search based on the Partnership iÝ«À>ÌÊvÊi} LÕÀ `ð X Brown University, USA / iÊ ÃÌÀ>ÌÊ ,iÃi>ÀV Ê ÀÕ«Ê >ÌÊ 1 Ê >ÃÊ >Ê } Ê iÝ«iÀÌÃiÊ X IRIDIA, ULB, Belgium in Constraint Programming. The group is mainly interested X Dynadec, USA in modelling, consistency techniques, integration of CP and X IBA, Belgium CBLS, constraint languages, heuristic search, graph matching, scheduling, routing problems, development of methods and tools for specific classes of problems, applications in domains KEYWORDS such as networking and medical applications. Artificial Intelligence Constraints Constraint satisfaction Constraint programming Representative References Constraint languages "«ÌÃ>Ì X DEVILLE Y., VAN HENTENRYCK P., Domain Consistency with ÀL``iÊ6>ÕiðʣÈÌ ÊÌiÀ>Ì>Ê viÀiViÊÊ*ÀV«iÃÊ and Practice of Constraint Programming Lecture Notes in CONTACT Computer Science, Springer, 2010. Yves DEVILLE [email protected] X SCHAUS P., VAN HENTENRYCK P., MONETTE J.N., COFFRIN C., Tel. 32 (0) 10 47 20 67 MICHEL L., DEVILLE Y., Solving Steel Mill Slab Problems with ÃÌÀ>Ì >Ãi`Ê /iV µÕiÃ\Ê *]Ê -]Ê >`Ê -°Ê ÕÀ>Ê vÊ Constraints, 16(2), 125-147, Springer, 2010. WEB SITES X ZAMPELLI S., DEVILLE Y., SOLNON C., Solving Subgraph http://www.info.ucl.ac.be/~yde ÃÀ« ÃÊ *ÀLiÃÊ ÜÌ Ê ÃÌÀ>ÌÊ *À}À>}°Ê ÕÀ>Ê http://becool.info.ucl.ac.be vÊ ÃÌÀ>ÌÃ]Ê6ÕiÊ£x]Ê ÕLiÀÊÎ]ÊÎÓÇÎxÎ]Ê-«À}iÀ]Ê2009. X MONETTE J.-N., DEVILLE Y., VAN HENTENRYCK P.]Ê " \Ê -ÞÌ iÃâ}Ê -V i`Õ}Ê }ÀÌ ÃÊ vÀÊ } iÛiÊ `iÃ°Ê ", -Ê «ÕÌ}Ê-ViÌÞÊ viÀiViÊ -ä®]Ê2009.
133 134 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY J 3
À>« Ê>ÞÃÃÊ>`Ê7iLÊ }
SENIOR SCIENTISTS: X *iÀÀiÊ 1*" / X À>XÃÊ"1-- X >Ê*,"// X Marco SAERENS
Research Field and Subjects Representative References
Many approaches in the fields of “Machine Learning” (ML) and X /, Ê°]Ê6 Ê< ," Ê °]Ê, +Ê*°]Ê- "Ê °]Ê ºÜi`}iÊ ÃVÛiÀÞÊÊ >Ì>L>ÃiÃ»Ê ÊÀʺ >Ì>Ê }»®]Ê ,- Ê°ÊEÊ- , -Ê °]ʸ-iÃÕ«iÀÛÃi`ÊV>ÃÃwV>ÌÊ>`Ê but also in applied statistics and pattern recognition, have gone LiÌÜiiiÃÃÊV«ÕÌ>ÌÊÊ>À}i]Êë>ÀÃi]Ê`ÀiVÌi`Ê}À>« ø°Ê Ì ÀÕ} ÊÌ iÊiÝÌÀ>VÌÊvÊÜi`}iÊvÀÊÌ iÊV>ÃÃV>Ê`ÕLi Pattern Recognition, 44 (6), pp. 1212-1224, 2011. iÌÀÞÊLiVÌÃÉÛ>À>LiîÊÌ>LÕ>ÀÊ`>Ì>° X 1-/Ê°]Ê 1*" /Ê*°]Ê 1/Ê°Ê&Ê6 Ê Ê°, “Pathway `ÃVÛiÀÞÊ Ê iÌ>LVÊ iÌÜÀÃÊ LÞÊ ÃÕL}À>« Ê iÝÌÀ>VÌ»°Ê These approaches are however cumbersome for many vÀ>ÌVÃ]Ê6°ÊÓÈ]Ê °Ê]Ê««°Ê£Ó£££Ó£n]Ê2010. application domains, typically those where the data naturally X /, Ê °]Ê 9 Ê °]Ê 1/Ê °]Ê , "-- Ê °]Ê take the form of graph structures (like the web, molecular - "Ê °Ê EÊ - , -Ê °]Ê ¸/ iÊ ÃÕÛiÀ«>Ì ÃÊ VÛ>À>ViÊ structures, social networks, etc.) rather than a tabular format. kernel: a novel covariance measure between nodes of a directed }À>« ¸°Ê Ê /À>Ã>VÌÃÊ Ê *>ÌÌiÀÊ >ÞÃÃÊ >`Ê >V iÊ iÜÊ ÌiV µÕiÃÊ qÊ ÀiviÀÀi`Ê ÌÊ >ÃÊ º}À>« Ê }»Ê ÀÊ ºÊ Intelligence, 32 (6), pp. 1112-1126, 2010. >>ÞÃûÊÌiV µÕiÃÊqÊ >ÛiÊÀiViÌÞÊLiiÊÛiÃÌ}>Ìi`ÊÌÊiÝÌÀ>VÌÊ X 1/Ê°]Ê, "-- Ê°]Ê- , -Ê °ÊEÊ 1*" /Ê*°]ʸ-i ÕÃivÕÊvÀ>ÌÊ`ÀiVÌÞÊvÀÊÌ ÃiÊV«iÝÊ`>Ì>° ÃÕ«iÀÛÃi`Ê V>ÃÃwV>ÌÊ vÀÊ `ÃVÀ>ÌÛiÊ À>`Ê Ü>ø°Ê Proceedings of the European Conference on Machine Learning ÀÊiÝ>«i]ÊÜiLÊÊ>>ÞÃÃÊ>ÃÊÌÊiÝ«ÌÊÌ iÊ}À>« ÊÃÌÀÕVÌÕÀiÊ ®]Ê iVÌÕÀiÊ ÌiÃÊ Ê «ÕÌiÀÊ -ViVi]Ê 6°Ê xÓ££]Ê of large networks, such as the web environment, and to rank -«À}iÀ6iÀ>}]Ê««°Ê£ÈÓ£ÇÇ]Ê2008. nodes according to some “centrality” or “importance” score. X 9 Ê°]Ê /, Ê°]Ê- "Ê °ÊEÊ- , -Ê °]ʸÊv>ÞÊ Some of those techniques are used with success in commercial vÊ`ÃÃ>ÀÌÞÊi>ÃÕÀiÃÊLiÌÜiiÊ`iÃÊ}iiÀ>â}ÊLÌ ÊÌ iÊ Ãi>ÀV Êi}iÃÊi°}°]Ê}i®° à ÀÌiÃÌ«>Ì Ê >`Ê Ì iÊ VÕÌiÌiÊ `ÃÌ>Viø°Ê *ÀVii`}ÃÊ vÊ Ì iÊ £{Ì Ê - Ê ÌiÀ>Ì>Ê viÀiViÊ Ê Üi`}iÊ Ì iÀÊ iÝ>«iÊ VViÀÃÊ ºV>LÀ>ÌÛiÊ ÀiVi`>Ì»Ê ÃVÛiÀÞÊ>`Ê >Ì>Ê }Ê ®]Ê««°ÊÇnxÇÎ]Ê2008. within a community of users and given a database of past X "1--Ê °]Ê *,"// Ê °]Ê , ,-Ê ° °Ê EÊ - , -Ê °]Ê individual behaviors. In this framework, the database can naturally ¸,>`Ü>Ê V«ÕÌ>ÌÊ vÊ Ã>ÀÌiÃÊ LiÌÜiiÊ `iÃÊ vÊ be viewed as a graph and suitable notions of distance on a graph >Ê }À>« ]Ê ÜÌ Ê >««V>ÌÊ ÌÊ V>LÀ>ÌÛiÊ ÀiVi`≯°Ê V>Ê LiÊ `iÛi«i`Ê ÌÊ V>«ÌÕÀiÊ >`iµÕ>ÌiÊ i>ÃÕÀiÃÊ vÊ «ÀÝÌÞÊ Ê/À>Ã>VÌÃÊÊÜi`}iÊ>`Ê >Ì>Ê }iiÀ}]Ê£Êή]Ê between items and users, in order to make recommendations pp. 355-369, 2007. i°}°]ÊvÀÊLÃÊÌÊ«ÕÀV >Ãi]ÊiÊ>âÊ`iî°
Biochemical network analysis forms a third application domain Partnership of graph mining techniques. Such networks, describing cellular processes, can be viewed as typed graphs for which dedicated X 8iÀÝÊ,iÃi>ÀV Ê iÌiÀÊ ÕÀ«iÊ À°Êi> V iÊ,i`iÀî mining tools allow new insights for the biologists. Appropriate X 1ÛiÀÃÌjÊ`iÊ>Ê j`ÌiÀÀ>ji]Ê >ÀÃii]ÊÀ>ViÊ*Àv°Ê°Ê6>Êi`i® distance measures between graph nodes can then be used to iÝÌÀ>VÌÊvÀiµÕiÌÊÀÊÀiiÛ>ÌÊÃÕL}À>« ð Products and Services 7iÊ «ÀÛ`iÊ ÕÀÊ iÝ«iÀÌÃiÊ Ê }À>« Ê }Ê >`Ê Ê >>ÞÃÃÊ ÌiV µÕiÃ°Ê "ÕÀÊ VÌÀLÕÌÊ }iÃÊ vÀÊ Ì iÀiÌV>Ê `i}Ê X Collaborative recommendation (Citobi) toward implementation in various application areas such as the X Bioinformatics and modelling: from genomes to networks ones described above. > iÌ®
135 KEYWORDS À>« Ê>>ÞÃÃ Link analysis Biochemical network analysis Collaborative recommendation Web mining À>« Ê}
CONTACTS Pierre DUPONT [email protected] / É Tel. 32 (0) 10 47 91 14
François FOUSS [email protected] / É ÊEÊ- Tel. 32 (0) 65 32 32 16
Alain PIROTTE [email protected] / É ÊEÊ- Tel. 32 (0) 10 47 83 80
Marco SAERENS [email protected] / É ÊEÊ- Tel. 32 (0) 10 47 92 46
WEB SITE http://www.ucl.ac.be/mlg/
136 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY J 4
Machine learning: feature selection and dimensionality reduction
SENIOR SCIENTISTS: X *iÀÀiÊ 1*" / X Ê°Ê X V iÊ6 , 9- X 6ViÌÊ7 ,/<
Research Field and Subjects Representative References
Machine learning deals with the design of computer programs X <,"6Ê,°]Ê 1*" /Ê*°, Ensemble Logistic Regression for Ì >ÌÊ>ÕÌ>ÌV>ÞÊ«ÀÛiÊÜÌ ÊiÝ«iÀiViÊÌ iÀÊLi >ÛÕÀÊÀÊ Feature Selection, Lecture Notes in Bioinformatics, No. 7036, «Ài`VÌÛiÊ «iÀvÀ>Vi°Ê /Þ«V>Ê iÝ>«iÃÊ VÕ`iÊ V«ÕÌiÀÊ Springer, pp. 133-144, 2011. programs that learn to detect fraudulent credit card transactions, X , <" /"Ê °]Ê , <" /"Ê ° °]Ê spam filters, medical diagnosis software, etc. The latter help to *1// Ê /°]Ê 1*" /Ê *°]Ê Ý«iVÌ>ÌÊ *À«>}>ÌÊ vÀÊ predict the status of a patient based on former patient records. Bayesian Multi-task Feature Selection, Lecture Notes in Artificial The common characteristic of those various applications is Intelligence, No. 6321, Springer, pp. 522-537, 2010. essentially the estimation of a mathematical model from past X Ê°°]Ê6 , 9- Ê °]ÊScale-independent quality criteria for measurements to predict new ones. dimensionality reduction, Pattern Recognition Letters, Elsevier, 6°ÊΣ]Ê °Ê£{]Ê««°ÊÓÓ{nÓÓxÇ]Ê"VÌLiÀÊ2010. In modern data collections, the number of different X *1// Ê /°]Ê 1*" /Ê *°, Partially Supervised Feature measurements from the same sample is often very large. For -iiVÌÊ ÜÌ Ê ,i}Õ>Àâi`Ê i>ÀÊ `iÃ]Ê ÓÈÌ Ê ÌiÀ>Ì>Ê iÝ>«i]Ê Ì iÊ ÕLiÀÊ vÊ vÀiµÕiVÞÊ L>`ÃÊ ÌÊ LiÊ VÃ`iÀi`Ê Conference on Machine Learning, 2009. in the analysis of a spectrogram, or the number of probes X *1// Ê /°]Ê 1*" /Ê *°, Feature Selection by Transfer i>ÃÕÀ}Ê}iiÊiÝ«ÀiÃÃÃ]Ê>ÞÊiÝVii`ÊÃiÛiÀ>ÊÌ ÕÃ>`Ã]ÊvÊ i>À}Ê ÜÌ Ê i>ÀÊ ,i}Õ>Àâi`Ê `iÃ]Ê iVÌÕÀiÊ ÌiÃÊ Ê not millions. Such a large dimensionality, sometimes orders of Artificial Intelligence, No. 5781, Springer, pp. 533-547, 2009. magnitude larger than the number of available samples, raises X ,"--Ê °]Ê , "-Ê °]Ê 7 ,/<Ê 6°]Ê 1, -Ê °]Ê specific issues to estimate robust predictive models. In particular, 6 , 9- Ê °]Ê >ÃÌÊ -iiVÌÊ vÊ -«iVÌÀ>Ê 6>À>LiÃÊ ÜÌ Ê traditional machine learning techniques are often prone to B-Spline Compression, Chemometrics and Intelligent Laboratory ÛiÀwÌÊÌ iÀÊÕ`iÀÞ}Ê`i\ÊÌ iÊÜi`}iÊiÝÌÀ>VÌi`ÊvÀÊ -ÞÃÌiÃ]Ê ÃiÛiÀ]Ê6°ÊnÈ]Ê °ÊÓÊ««°ÊÓänÓ£nÊ«ÀÊ2007). the available sample cannot be generalised. X Ê°°]Ê6 , 9- Ê °]Ê i>ÀÊ`iÃ>ÌÞÊÀi`ÕVÌ]Ê Springer, Information Science and Statistics series, 310 pp, Feature selection aims at identifying automatically the most 2007. relevant measurements for the intended analysis or prediction task. Such a selection limits the risk of overfitting, offers more interpretable models and often reduces the computational cost Awards at prediction time. X / L>ÕÌÊ ii«ÕÌÌi]Ê Ê i}ÕÊ ÉÊ °,°-° ,-Ê «ÕÌiÀÊ Dimensionality reduction goes beyond feature selection: it can Science PhD thesis Award, Stable Feature Selection in Empty discard useless features and combine the relevant ones in a linear Spaces or nonlinear fashion. This leads to a new feature space with X ««V>ÌÃÊ ÌÊ iiÊ *Àw}Ê >`Ê >}ÃÃÊ vÀÊ Ê improved or more desirable properties, such as the possibility to Microarrays represent the most prominent features of the considered data set, such as clusters or other hidden patterns.
137 Funding KEYWORDS Machine learning Wallonie, Region of Brussels, UCL, FRIA, F.R.S.-FNRS Data analysis Dimensionality reduction Feature Selection Transfer learning Partnership Multi-task learning
X i«>ÀÌiÌÊ vÊ *>ÌÊ -ÞÃÌiÃÊ }Þ]Ê iÌÊ 1ÛiÀÃÌÞ]Ê Belgium CONTACTS X Université Paris 1 Panthéon Sorbonne, France Pierre DUPONT [email protected] Tel. 32 (0) 10 47 91 14 Main Equipment John A. LEE °iiJÕVÕÛ>°Li Desktop and grid computers Tel. 32 (0) 2 764 95 28
Michel VERLEYSEN Products and Services [email protected] Tel. 32 (0) 10 47 25 51
X Data analysis case studies and software development Vincent WERTZ X Short courses on machine learning and data mining specialised ÛViÌ°ÜiÀÌâJÕVÕÛ>°Li topics Tel. 32 (0) 10 47 23 80
WEB SITE http://www.ucl.ac.be/mlg/
138 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY J 5
From noisy to standard written language – statistical rewrite, correction and alignment methods
SENIOR SCIENTIST: X ,V >À`Ê 1",/
Research Field and Subjects Up to now, this framework has been applied to (1) the post- VÀÀiVÌÊ vÊ ÃÞÊ " ,Ê ÕÌ«ÕÌÃ]Ê Ó®Ê Ì iÊ À>Ã>ÌÊ vÊ Standard language is the language subset considered as correct SMS (converted from the so-called SMS language to a chosen and acceptable, because described and encoded in grammars ÃÌ>`>À`®]Ê >`Ê Î®Ê Ì iÊ VÀÀiVÌÊ vÊ `VÌ>ÌÊ iÝiÀVÃiÃÊ Ã>ÀÌÊ and dictionaries. comparison of a copy with the original of the dictation, to Actually, there are many standards, the standard in use detect the place of errors and propose a diagnosis of them). depending on a not so short list of factors: the speaker’s level of education and mood, the interlocutor (a friend, a colleague, a ÃÌÀ>}iÀ]Ê>`Ê>ÊÜiÜÊw}ÕÀi®]ÊÌ iÊÃV>ÊVÌiÝÌÊvÀ>Ê Representative References or official event), the day time, etc. Some linguistic phenomena, of course, are always wrong. X 1",/Ê ,°]Ê ," 1/Ê -°]Ê ÕÌ>ÌÊ vÊ `VÌ>ÌÊ That is the case, for instance, of a misspelled word (like “spel” iÝiÀVÃiÃ°Ê Ê ÜÀ}Ê VL>ÌÊ vÊ Ê >`Ê *°Ê instead of “spell”). But, often, both the correctness and the Computational Linguistics in the Netherlands Journal, 1:1-20, appropriateness of a linguistic fact depend on whether this 2011. iÊ Li}ÃÊ ÌÊ Ì iÊ ÃÌ>`>À`Ê Ê ÕÃiÆÊ vÀÊ ÃÌ>Vi]Ê ºDear Sir” X 1",/Ê,°]Ê «ÃÌÊwÌÀjiÊiÌÊ>ÀµÕiÕÀÃÊ`iÊÀm}iÃÊ`iÊ is correct, but this is not the appropriate way of greeting a ÀjjVÀÌÕÀiÊ«ÕÀÊÕiÊ`ÃÌ>ViÊ`¿j`ÌÊyiÝLi°Ê««V>ÌÊDÊ>Ê vÀi`oÊiÝVi«ÌÊvÊ}t correction des mots hors-vocabulaire. Traitement Automatique des Langues (T.A.L), 51(1):11-40, 2010. At CENTAL, the Centre for Natural Language Processing, a X 1",/Ê,°]Ê," 1/Ê-°]Ê "1 " Ê°°]Ê," Ê °]Ê significant part of the research focuses on written standards, Ê ÞLÀ`Ê ÀÕiÉ`iL>Ãi`Ê wÌiÃÌ>ÌiÊ vÀ>iÜÀÊ vÀÊ i.e. standards limited to texts. Two points are studied: (1) how to À>â}Ê- -ÊiÃÃ>}iðÊProceedings of ACL, pp. 770-779, build a model of a given standard? (2) when a form is out of the 2010. standard in use, whatever the reason, how to choose the right X 1",/Ê ,°]Ê -/ ,Ê °]Ê /-Ê °]Ê Ê °]Ê ," Ê °]Ê standard form to replace it? ,iVÌÉ6iÀðÊ1ÊÃÞÃÌmiÊ`iÊVÛiÀÃÊ>ÕÌ>̵ÕiÊ>ViiÉ These questions may be seen as two parts of a correction ÕÛiiÊ ÀÌ }À>« iÊ DÊ ÛÃjiÊ }ÕÃ̵ÕiÊ iÌÊ ``>V̵Õi°Ê problem°Ê Ê Ì ÃÊ V>Ãi]Ê Ì iÊ ÃÕÌÊ ÃÊ vÌiÊ iÝ«iÀÌL>Ãi`\Ê >Ê Proceedings of TALN, no pages, 2009. linguist describes the standard and the errors he knows from X 1",/Ê ,°]Ê ," 1/Ê -°]Ê ," Ê °]Ê jwÌÊ `¿ÕÊ experience, which are often only a subset of all possible ÃÞÃÌmiÊ`¿>}iiÌÊ- -ÉvÀ>X>ÃÊÃÌ>`>À`ÊDÊ¿>`iÊ`¿ÕÊwÌÀiÊ deviations. de composition. Proceedings of JADT, pp. 155-166, 2008. At CENTAL, these questions are considered as a special kind X 1",/Ê ,°]Ê -/"1Ê °]Ê Ê 7i} Ìi`Ê Ìi of the noisy channel metaphor°Ê "Ê Ì ÃÊ L>ÃÃ]Ê Ì iÊ `i>Ê ÃÊ ÌÊ -Ì>ÌiÊÀ>iÜÀÊvÀÊ ÀÀiVÌ}Ê ÀÀÀÃÊÊ >ÌÕÀ>Ê-ViiÊ" ,°Ê propose a statistical representation of both the standard and Proceedings of ICDAR, pp. 889-893, 2007. the channel’s noise: a supervised learning, partially based on automatic strings alignment (edit distance, similarity measure) of clean and noisy data, produces (1) a statistical language model of the standard and (2) a set of weighted rewrite rules modelling the channel’s noise and corresponding to mappings from noisy to clean data. Represented and handled using weighted finite-state tools, both the statistical language and the set of weighted rules are used at runtime to normalise (i.e. “get À`ÊvÊÌ iÊÃiÊvÀ»®ÊÃÞÊÌiÝÌð
139 Patent KEYWORDS Normative aspects of written language A method and a device for normalizing SMS messages. Date Noisy channel Supervised training of filling: May 27th 2010. Submission number EP10005506.0. Weighted finite-state tools Status: pending. Statistical language models Weighted rewrite rules Pattern recognition Funding Machine learning
X Wallonie, Belgium CONTACT X European community Richard BEAUFORT [email protected] Tel. 32 (0) 10 47 37 73 Partnership
X University of Mons, Belgium WEB SITES X University of Antwerp, Belgium http://www.uclouvain.be/cental.html http://www.normalink.com/platon/ X 1ÛiÀÃÌÞÊ i}iÊ iÌ]Ê i}Õ http://www.normalink.com/textit/ X ", Ê7>Ê«ÕLVÊÃiÀÛViÊvÀÊi«ÞiÌÊ>`ÊÌÀ>}®]Ê http://www.uclouvain.be/recto-verso/ Charleroi, Belgium X 1ÛiÀÃÌÞÊvÊ>V>ÃÌiÀ]Ê1Ìi`Ê}` X Ê iÀ>Ê ,iÃi>ÀV Ê iÌÀiÊ vÀÊ ÀÌwV>Ê Ìi}iVi®]Ê >ÃiÀÃ>ÕÌiÀ]ÊiÀ>Þ
Products and Services
X PlatON: a spelling-dedicated online platform currently focused Ê`VÌ>ÌÊiÝiÀVÃiðÊ/ ÃÊ«>ÌvÀÊÃÊÌÜv`\ÊÊÌ iÊiÊÃ`i]Ê Ìi>V iÀÃÊ VÀi>ÌiÊ `VÌ>ÌÃÊ >`Ê V iVÊ ÃÌÕ`iÌÃ½Ê V«iÃÆÊ Ê Ì iÊ other side, students do dictations prepared by their teacher. The platform automatically corrects students’ copies. ÌÌ«\ÉÉÜÜÜ°À>°VÉ«>ÌÉ X Text-it/Voice-it\Ê >ÕÌ>ÌVÊ ÌiÝÌÊ iÃÃ>}iÃÊ À>Ã>Ì°Ê "iÊ>««V>Ì° ÌÌ«\ÉÉÜÜÜ°À>°VÉÌiÝÌÌÉ X Recto/Verso: automatic system dedicated to the application vÊÌ iÊ£äÊÀiV Êëi}ÊÀiVÌwV>ÌÃÊÊ>ÊÌiÝÌÊÜÀÌÌiÊÊ ÃÌ>`>À`ÊÀÌ }À>« Þ°Ê"iÊ>««V>Ì° ÌÌ«\ÉÉÜÜÜ°ÕVÕÛ>°LiÉÀiVÌÛiÀÃÉ
140 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY K 1
Statistical methods for the analysis of microarray data
SENIOR SCIENTISTS: X i>ÕVÊ X iÌÊ + X iÀÌÀ>`Ê ,<//" X jÀiÊ ,"- X iÊ," ,/
Research Field and Subjects X ,"- Ê °]Ê ,<//"Ê °]Ê "6 ,/-Ê °]Ê ," ,/Ê °]Ê +Ê °]Ê Ê °°]Ê «>VÌÊ vÊ Ì iÊ Ã«ÌÌi`Ê VÀ>ÀÀ>ÞÊ "ÛiÀÊ Ì iÊ «>ÃÌÊ viÜÊ Þi>ÀÃ]Ê Ì iÊ VÀ>ÀÀ>ÞÊ ÌiV }ÞÊ >ÃÊ preprocessing method on fold-change compression and markedly impacted the molecular biology, allowing researchers variance stability. BMC Bioinformatics, 12:413, 2011. ÌÊ i>ÃÕÀiÊ ivwViÌÞÊ Ì iÊ iÝ«ÀiÃÃÊ iÛiÊ vÊ Ì ÕÃ>`ÃÊ vÊ X 6 Ê ,Ê6",-/Ê-°]Ê , Ê°°]Ê, Ê°]Ê," ,/Ê°]Ê }iiÃÊ Ê >Ê Ã}iÊ iÝ«iÀiÌ°Ê -ÕÌ>iÕÃÊ i>ÃÕÀiiÌÊ ",Ê °]ÊÊ°°]ÊÕÌ>Ìi`ÊViÊ`ÃÀÕ«ÌÊÃÊ>ÊÀi>LiÊ vÊ Ì ÕÃ>`ÃÊ vÊ }iiÊ iÝ«ÀiÃÃÊ iÛiÃÊ «ÀÛ`iÃÊ >Ê «ÌiÌ>Ê >`Ê «ÜiÀvÕÊ iÌ `Ê ÌÊ Ã>ÌiÊ , Ê vÀÊ vÀiÃ Ê Ã>«Ê vÀâiÊ ÃÕÀViÊvÊÜi`}i°ÊÜiÛiÀ]ÊÌ iÊ } ÊÌ ÀÕ} «ÕÌÊ>`ÊÃÞÊ normal or malignant oral mucosa samples. Clinical Chemistry nature of the microarray data remains a serious challenge for and Laboratory Medicine, 47:294-301, 2009. statisticians and bio-informaticians. Instead of having a few X , Ê°°]Ê6 Ê ,Ê6",-/Ê-°]Ê/" Ê °]ÊÊ°°]Ê variables and a large number of observations, microarray data Preservation of RNA for functional analysis of separated alleles usually deal with thousands of variables (the genes) and only ÊÞi>ÃÌ\ÊV«>ÀÃÊvÊÃ>«vÀâiÊ>`Ê, >ÌiÀÁÊÃ`ÊÌÃÃÕiÊ viÜÊ LÃiÀÛ>ÌÃ°Ê ÕÀÌ iÀÀi]Ê >ÃÊ VÀ>ÀÀ>ÞÊ iÝ«iÀiÌÃÊ ÃÌÀ>}iÊiÌ `Ã°Ê V>Ê iÃÌÀÞÊ>`Ê>LÀ>ÌÀÞÊ i`ViÆÊ contain many steps that are potentially affected by their own 45:1283-7, 2007. individual noise and variation, the data are generally very noisy.
The research focuses on the analysis of signals generated by Funding microarray and more specifically on the data pre-processing. Raw data generated by the scanners must be pre-processed in Wallonie multiple successive steps that include the correction of saturated spots, the background correction, the transformation and the normalisation. These pre-processing steps have to be defined Partnership according to the microarray application (class comparison, class prediction or class discovery). Special attention has also to be "/ ÊqÊ*À}À>iÊ`½iÝViiViÊ`iÊ>Ê7>i]ÊÓääxÓä£ä° paid to the pre-analytic procedure. Recent publications have rightfully pointed out problems of inter-platform and inter- operator variability, largely due to the lack of standardisation Main Equipment and quality control of this critical step. A comprehensive set of equipments necessary to perform microarray To comprehend the impact of the pre-analytical and data pre- analysis (spotting and reading) is used by the team. Among these, processing steps, the clinical relevance of the results is assessed one finds the Bioanalyser Agilent 2100 used to assess the quality of in a multidisciplinary research team that includes engineers, Ì iÊ, ]ÊÌ iÊÝÊii«ÝÊÕÃi`ÊÌÊÃV>Ê>`ÊÌÀ>ÃviÀÊÌ iÊÀiÃÕÌÃÊÌÊ biostatisticians, clinicians, and scientists. Ì iÊV«ÕÌiÀ]ÊÀÊÌ iÊÀÀ>ÞÜÀÝÊLV «ÊÀi>`iÀÊ>`ÊÃiÛiÀ>ÊëÌÌiÀÃÊ (scienion, Sensovation, industrial spotter).
Representative References ÊvÕÊiµÕ««i`ÊvvÞiÌÀÝÊ«>ÌvÀÊÃÊ>Û>>LiÊi>ÀLÞÊvÀÊ } Ê `iÃÌÞÊÌiÃÌ}°Ê >ÀÊiµÕ«iÌÃÊÊÌ iÊ«>ÌvÀÊ>ÃÊVÕ`iÊ X ,"- Ê °]Ê ,<//"Ê °]Ê ," ,/Ê °]Ê +Ê °]Ê a pysequencing machine, an ABI sequencer 3130, a real-time Ê °°]Ê L}Ê ÕÌ«iÊ >ÃiÀÊ ÃV>ÃÊ vÊ Ã«ÌÌi`Ê PCR Taqman 7900 and a real-time PCR light cycler Roche 480, VÀ>ÀÀ>ÞÃÊLÞÊi>ÃÊvÊ>ÊÌÜÜ>ÞÊ "6Ê`i°Ê-Ì>ÌÃÌV>Ê and a portable Real-time PCR Agilent technology Strategene applications in genetics and molecular biology, 11(3), Article 8, ÝÎääx*° 2012.
141 Products and Services KEYWORDS Microarray data preprocessing The research intends to provide quality controlled results based Microarray low density & high density Customised protein and oligonucleotides chips on the use of arrays of various density (customised array) within Pharmacogenetics the setting of a core facility. Pharmacogenomics This intends to provide a technical platform for clinical, preclinical, Signal processing and discovery research considering that sophisticated and costly analytical procedures cannot be afforded by every clinical or research laboratory with a low scale activity (i.e., dealing with a CONTACTS number of samples per day, per week, or per month). Jean-Luc GALA Indeed, this emerging technology requires a high degree of i>ÕV°}>>JÕVÕÛ>°Li Tel. 32 (0) 2 764 31 65 iÝ«iÀÌÃiÊ>`ÊiÝ«iÃÛiÊiµÕ«iÌð Benoît MACQ / ÃÊVÀiÊv>VÌÞÊÜÊ«ÀÛ`iÊ>ÊÌ iÊiÝ«iÀÌÃiÊÀiµÕÀi`ÊvÀÊÌ iÊ [email protected] tests and will carry them out. The type of samples and the Tel. 32 (0) 10 47 88 16 V ViÊvÊ>ÀÀ>ÞÊÜÊLiÊ`ÃVÕÃÃi`ÊÜÌ Êi>V Ê«ÀiVÌÊi>`iÀÊ>` Bertrand BEARZATTO ÀiÃÕÌÃÊÜÊLiÊ«ÀÛ`i`°Ê"ÊÌ ÃÊ«ÕÀ«Ãi]Ê`ÕÃÌÀ>ÊVÌ>VÌÃÊ>`Ê iÀÌÀ>`°Li>Àâ>ÌÌJÕVÕÛ>°Li support include ClinEuroDiag (for low density microchips) and Tel. 32 (0) 2 764 31 96 vwiÌÀÝÊvÀÊ } Ê`iÃÌÞÊVÀV «Ã®° Jérôme AMBROISE iÀi°>LÀÃiJÕVÕÛ>°Li Tel. 32 (0) 2 764 31 96
Annie ROBERT [email protected] Tel. 32 (0) 2 764 33 21
WEB SITE http://sites.uclouvain.be/md-ctma/
142 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY K 2
Machine learning for biomedical applications
SENIOR SCIENTISTS: X V iÊ6 , 9- X *iÀÀiÊ 1*" / X Ê°Ê
Research Field and Subjects Representative References
Machine learning (ML) cross-fertilises applied statistics and X "+1, Ê°]Ê Ê "9Ê°]Ê, "-Ê °]Ê6 , 9- Ê °]Ê computer science, and aims at designing algorithms and Feature selection for supervised inter-patient heart beat methods for the automatic analysis of data. It has provided classification. Computational Intelligence and Neuroscience, considerable breakthroughs in many domains, e.g. in medicine `>ÜÊ *ÕL°Ê À«°]Ê 6°Ê Ó䣣]Ê °Ê È{În£È]Ê ««°Ê £]Ê `\Ê (help for diagnosis, prognosis or treatment response prediction), £ä°££xxÉÓ䣣ÉÈ{În£È]Ê2011. industry (design, predictive maintenance, etc.), and many others. X Ê /°]Ê *1// Ê /°]Ê 6 Ê Ê * ,Ê 9°]Ê 1*" /Ê *°]Ê SAEYS Y., Robust biomarker identification for cancer diagnosis The use of machine learning in the biomedical domain is with ensemble feature selection methods, Bioinformatics, widespread, and provides considerable opportunities for 6°ÊÓÈ]Ê °ÊÎ]Ê««°ÊÎÓÎn]Ê2010. improving healthcare assistance, pathology discovery and X Ê ,Ê°]Ê Ê°°]Ê6 , 9- Ê °]ÊÊ*ÀV«i`Ê««À>V Ê drug administration. Machine learning aims at analysing large ÌÊ >}iÊ iÃ}Ê ÜÌ Ê ->ÀÌÞÊ iÀiÃÊ ÛÛ}Ê *>ÌV iÃ°Ê amounts of data, and at providing to specialists important iÕÀV«ÕÌ}]Ê ÃiÛiÀ]Ê6°ÊÇÎ]Ê °ÊÇ]Ê£££Óä]Ê >ÀV Ê vÀ>ÌÊiÝÌÀ>VÌi`ÊÊ>Ê>ÕÌ>ÌVÊÀÊÃi>ÕÌ>ÌVÊÜ>Þ®Ê 2010. from these data. This information typically takes the form of X Ê "9Ê°]Ê Ê ,Ê°]Ê6 , 9- Ê °]ÊÊ-Õ«iÀÛÃi`Ê a mathematical model estimated from a collection of past Wavelet Transform Algorithm for R Spike Detection in Noisy patients to predict the status of future patients. Ã°Ê ÕV>ÌÃÊÊ «ÕÌiÀÊ>`ÊvÀ>ÌÊ-ViVi]Ê 6°ÊÓx]Ê««°ÊÓxÈÓÈ{]Ê2009. / iÊ >V iÊ i>À}Ê ÀÕ«Ê >ÌÊ 1 Ê >ÃÊ ÀiViÌÞÊ `iÛi«i`Ê X *1// Ê /°]Ê 1*" /Ê *°, Partially Supervised Feature iÝ«iÀÌÃiÊÊ>ÊÕLiÀÊvÊLi`V>Ê>««V>ÌÊwi`Ã]Ê>}Ê -iiVÌÊ ÜÌ Ê ,i}Õ>Àâi`Ê i>ÀÊ `iÃ]Ê ÓÈÌ Ê ÌiÀ>Ì>Ê which: Conference on Machine Learning (ICML), 2009. qÊ / iÊ >ÕÌ>ÌVÊ >Ì>ÌÊ >`Ê V>ÃÃwV>ÌÊ vÊ X Ê "9Ê °]Ê ,/ Ê °]Ê 6 , 9- Ê °]Ê Ê °]Ê iiVÌÀV>À`}À>ÊÜ>ÛivÀÃ]Ê>VVÀ`}ÊÌÊ ÊÃÌ>`>À`ÃÆ ÌiÀ}Ê i>ÀÌÊ ,i>Ìi`Ê VÌÛÌÞÊ vÀÊ 6>}ÕÃÊ iÀÛiÊ ,iVÀ`}ÃÊ qÊ / iÊ `iÌwV>ÌÊ vÊ ÀiiÛ>ÌÊ L>ÀiÀÃÊ vÀÊ VÀ>ÀÀ>ÞÊ in Rats, IFESS 2008, 13th Annual International FES Society }iiÊiÝ«ÀiÃÃÊ`>Ì>]ÊvÀÊV>ViÀÊÌÀi>ÌiÌÊÀiëÃiÊ«Ài`VÌ]Ê viÀiVi]Ê ÀiLÕÀ}Ê iÀ>Þ®]Ê Ó£ÓxÊ -i«ÌiLiÀÊ Óään°Ê i>ÀÞÊ`>}ÃÃÊvÊ>ÀÌ ÀÌÃÊÀÊ«À}ÃÃÊvÊ>iÀ}ÞÆ i`°Ê/iV °]Ê6°ÊxÎ]Ê-Õ««°Ê£]Ê««Ê£È£n]Ê2008. qÊ / iÊ `iÃ}]Ê `iLÕÀÀ}]Ê >`Ê Ãi}iÌ>ÌÊ vÊ «ÃÌÀÊ iÃÃÊÌ}À>« ÞÊ>}iÃÆ qÊ / iÊwÌiÀ}ÊvÊiÀÛiÊÀiVÀ`}ÃÆ Patent qÊ ÀiÊ }iiÀ>Þ]Ê Ì iÊ iÝÌÀ>VÌÊ vÊ ÀiiÛ>ÌÊ vÀ>ÌÊ >`Ê knowledge from signals and data collected in a medical or A Method for Classifying a Cancer Patient as Responder or Non- biomedical environment, including patient data. Àië`iÀÊÌÊÕÌ iÀ>«Þ]Ê7"ÉÓä£äÉäÓ£Ç{®°
143 Awards KEYWORDS Machine learning X / L>ÕÌÊ ii«ÕÌÌi]Ê Ê i}ÕÊ ÉÊ °,°-° ,-Ê «ÕÌiÀÊ Data analysis Signal processing Science PhD thesis Award, Stable Feature Selection in Empty Biomedical data -«>ViÃÊ««V>ÌÃÊÌÊiiÊ*Àw}Ê>`Ê >}ÃÃÊvÀÊ Ê Patient records Microarrays
CONTACTS Funding Pierre DUPONT [email protected] Tel. 32 (0) 10 47 91 14 X Wallonie X Brussels-Capital Region John A. LEE X FRIA, F.R.S.-FNRS °iiJÕVÕÛ>°Li Tel. 32 (0) 2 764 95 28
Partnership Michel VERLEYSEN [email protected] Tel. 32 (0) 10 47 25 51 X -ÌÕVÊëÌ>]Ê ÀÕÃÃià X Christian de Duve Institute of Cellular Pathology X i«>ÀÌiÌÊ vÊ *>ÌÊ -ÞÃÌiÃÊ }Þ]Ê iÌÊ 1ÛiÀÃÌÞ]Ê WEB SITE Belgium http://www.ucl.ac.be/mlg/
Main Equipment
Desktop and grid computers
Products and Services
X Data analysis case studies and software development X Short courses on machine learning and data mining specialised topics
144 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY K 3
Medical imaging
SENIOR SCIENTISTS: X iÌÊ + X 6ViÌÊ "- X >ÕÀiÌÊ +1 - X Õ>ÕiÊ -- - X >Ì >Ê", Ê Ê86,9
Research Field and Subjects Representative References
Medical imaging techniques underwent significant X -- -Ê°]Ê +1 -Ê°]Ê", Ê Ê86,9Ê°]Ê /-Ê8°]Ê improvements in the past decades. That leads to the path +Ê °]Ê vviÀ« VÊ,i}ÃÌÀ>ÌÊvÊ>}iÃÊÜÌ Ê6>À>LiÊ towards safer and more individualised treatments by allowing Contrast Enhancement. Ì°Ê°ÊvÊ i`°Ê>}}, 2011(1), p. the clinician to take images from multiple modalities and at 16, 2011. different time points. As this generates a huge amount of data, X ,Ê-°]Ê"1< Ê°]Ê " , 9Ê,°]Ê6 Ê ,1-- Ê °]Ê Ê automatic tools are needed to help the clinician during (a) the 7-* , Ê °]Ê9- ,Ê°]Ê +Ê °]Ê /Ü>À`ÃÊ ÃÌ>`>À`âi`Ê diagnostic, (b) the treatment planning and (c) the treatment «iL>Ãi`Ê >Ì>ÌÊ vÊ LÀi>ÃÌÊ V>ViÀÊ w`}Ã°Ê Õ> delivery. The “Image and Signal Processing” (ISP) group of the «ÕÌiÀÊ ÌiÀ>VÌ°Ê ÌiÀ>VÌ}Ê Ê 6>ÀÕÃÊ ««V>ÌÊ / ÊÃÌÌÕÌiÊi>`ÃÊÃiÛiÀ>ÊÀiÃi>ÀV Ê«ÀiVÌÃÊÊÌ iÃiÊÌ«Vð Domains. Springer-verlag, p. 524-533, 2009. X -- -Ê°]Ê", Ê Ê86,9Ê°]Ê -Ê-°]Ê ,Ê°]Ê A platform (MedicalStudio) is under development to help +Ê °]Ê Ê*°]Ê6 Ê */Ê7°]Ê Û>Õ>ÌÊvÊÀ}`Ê the physician to analyse and annotate images such as registration models for interfraction dose accumulation in >}À>« iÃ]Ê ÝÀ>ÞÃÊ vÊ Ì iÊ Õ}ÃÊ >`Ê vÊ LiÊ viVÌÃ°Ê radiotherapy. Med. Phys., 36(9), p. 4268-76, 2009. A strong focus is set on the interface in order to simplify the X "-< 7-Ê ,°]Ê 6 Ê °]Ê /, 6- Ê °]Ê Ê °]Ê human computer interaction. An important research effort has , /-Ê °]Ê , 9 ,]Ê °]Ê +Ê °]Ê /Ü>À`ÃÊ >Ê Ìi}À>Ìi`Ê been dedicated to the development of automatic segmentation ÃÞÃÌiÊ vÀÊ «>}Ê >`Ê >ÃÃÃÌ}Ê >Ýv>V>Ê ÀÌ }>Ì VÊ and registration of multimodal images for radiotherapy surgery. Computer methods and programs in biomedicine, planning. The following applications are currently evaluated by 91(1), p. 13-21, 2008. physicians: articulated registration methods for compensating X ", Ê Ê 86,9Ê °]Ê -- -Ê °]Ê "- -Ê °]Ê Ê `vviÀiÌÊ«>ÌiÌÊ«ÃÌÃÆÊ>Ì>ÃÊÌÊ«>ÌiÌÊÀ}`ÊÀi}ÃÌÀ>ÌÊ , Ê °]Ê ,Ê°]Ê 1- Ê°]Ê6 Ê , 7Ê°]Ê Ê ÕÃ}ÊÕÌÕ>ÊvÀ>ÌÆÊ>`ÊÃÌ>ÌÃÌV>Ê>Ì>ÃÊVÃÌÀÕVÌ° ,19-- ,Ê °]Ê +Ê °]Ê Ê *°]Ê /ÕÕÀÊ `ii>ÌÊ and cumulative dose computation in radiotherapy based on Finally, whereas new imaging modalities are ever more available, deformable registration of respiratory correlated CT images imaging pathology in the treatment room remains a challenge vÊ Õ}Ê V>ViÀÊ «>ÌiÌÃ°Ê ,>`Ì iÀÊ EÊ "V°] 6°Ê nx]Ê °Ê Ó]Ê (for instance in surgery or radiotherapy). Indeed, real time p. 232-8 2007 imaging and image analysis techniques are mandatory to guide X 1Ê "-Ê ¿- Ê °]Ê /-Ê 8°]Ê ,", Ê 6°]Ê Ê treatment and improve its precision. Therefore, the ISP group is , Ê °]Ê +Ê °]Ê 7, Ê -°]Ê ÃÌ>ÌÊ vÊ Ì iÊ >ÃÊi>`}Ê>Ê«ÀiVÌÊÌ >ÌÊ>ÃÊÌÊ`iÛi«ÊiÜÊÌÀ>«iÀ>ÌÛiÊ deformations induced by articulated bodies: Registration of the imaging functionalities. This is realised by registering and spinal column. Biomedical Signal Processing and Control, 2(1), combining high-quality pre-operative anatomical or functional p. 16-24, 2007. images (PET, MRI, CT, …) to images available during treatment such as US, CBCT, optical 3D scanner, open field MRI, …
145 Funding KEYWORDS Image processing
X Wallonie Registration Segmentation X F.R.S.-FNRS Annotation Interaction Atlas construction Partnership
CONTACTS X V>\Ê µÕiÃÊ-ÌÕV]Ê µÕiÃÊ Ì`i]Ê >>ÃÌÀÊ VÊ ®]Ê >ÃÃ>V ÕÃÃiÌÃÊiiÀ>ÊëÌ>Ê1-® Benoît MACQ [email protected] X V>`iV\Ê1*iÊ1-®]Ê , /-Ê,®]Ê1 É ," Tel. 32 (0) 10 47 22 71 X `ÕÃÌÀ>\Ê ]Ê/iiÃ]Ê-iiÃ]Ê+,>Þ Vincent NICOLAS 6ViÌ° V>ÃJÕVÕÛ>°Li Products and Services Tel. 32 (0) 10 47 85 55
Laurent JACQUES X iiÀ>Ê VÃÕÌ>VÞÊ >`Ê iÝ«iÀÌÃiÊ Ê Ì iÊ `>Ê vÊ >}iÊ >ÕÀiÌ°>VµÕiÃJÕVÕÛ>°Li processing and user interaction Tel. 32 (0) 10 47 81 24
Guillaume JANSSENS Õ>Õi°>ÃÃiÃJÕVÕÛ>°Li Tel. 32 (0) 10 47 80 74
Jonathan ORBAN DE XIVRY >Ì >°"ÀL>JÕVÕÛ>°Li Tel. 32 (0) 10 47 80 74
WEB SITE http://sites.uclouvain.be/ispgroup/
146 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 1
Impacts of hybrid pedagogical environments on learning and teaching quality
SENIOR SCIENTISTS: X Marcel LEBRUN X À>XÃiÊ " + X Philippe MERCENIER X Frédéric MINNE X Denis SMIDTS
Research Field and Subjects Representative References
Ten years ago, the IPM team started the development of a X iVÌvÊÞ-1*°Ê6iÀÃÊÕiÊÌÞ«}iÊ`iÃÊ`ëÃÌvÃÊ ÞLÀ`iÃÊ software prototype of what is called today LMS (Learning de formation en enseignement supérieur. Distances et savoirs Management System). Claroline (acronym of Classrooms on £ÉÓ䣣Ê6°Ê®]Ê«°ÊÈÈ]Ê2011. line) aimed at promoting pedagogical development, overcoming X " +Ê °]Ê ,1 Ê °Ê EÊ - /-Ê °]Ê >ÞÃiÊ `iÃÊ ivviÌÃÊ `iÊ technical pitfalls and giving teachers the opportunity to focus ½iÃi}iiÌÊ ÞLÀ`iÊDʽÕÛiÀÃÌjÊ\Ê`jÌiÀ>ÌÊ`iÊVÀÌmÀiÃÊ on the most important goal: students learning. iÌÊ `½`V>ÌiÕÀÃÊ `iÊ Û>iÕÀÃÊ >ÕÌjiÃ°Ê Revue Internationale des Today, the development of Claroline goes on in partnership with Technologies en Pédagogie Universitaire, 7,3, p. 48-59, 2010. various departments of UCLouvain (e.g. EPL-ICTM) and with X ,1 Ê °]Ê " +Ê°ÊiÌÊ- /-Ê °]Ê1iÊ«>ÌivÀiÊÌiÀiÌÊ others worldwide institutions gathered in an international not pour former les enseignants, Education et Formation, revue for profit organisation, the Claroline Consortium. jiVÌÀµÕiÊ `iÊ ½1 ]Ê Q Ê }iR]Ê ciÓ{]Ê ÃÊ iÊ }iÊ iÊ décembre 2010. Two main research fields are investigated: X ,1 Ê °]Ê " +Ê °Ê EÊ - /-Ê °]Ê >Ài]Ê >Ê ÌiÀiÌÊ 1. User-centred design with concepts like autonomy, simplicity, Teaching and Learning Platform to Foster Teachers’ Professional ÌÕÌÛiÞÊ >`Ê iÀ}VÃÊ L>Ãi`Ê Ê Ìi>V iÀÃÊ iÝ«iVÌ>ÌÃÊ iÛi«iÌÊ>`Ê«ÀÛiÊ/i>V }Ê+Õ>ÌÞÊ\ÊÀÃÌÊ««À>V iÃ. analysis and users (including students) follow-up. AACE Journal]Ê£Ç{®]ÊÎ{ÇÎÈÓ°Ê iÃ>«i>i]Ê6\Ê ]Ê2009. 2. From a pedagogical point of view, and considering that X " +Ê°]Ê ,1 Ê °ÊEÊ- /-Ê °]ÊÊ>ÊÀiV iÀV iÊ`iÃÊivviÌÃÊ educational institutions are today good laboratories to analyse a `¿ÕiÊ «>ÌivÀiÊ `¿iÃi}iiÌÉ>««ÀiÌÃÃ>}iÊ iÊ }iÊ wide variety of hybrid configurations, the team developed a real ÃÕÀÊ iÃÊ «À>̵ÕiÃÊ «j`>}}µÕiÃÊ `¿ÕiÊ ÕÛiÀÃÌjÊ \Ê «ÀimÀiÃÊ iÝ«iÀÌÃiÊÌÊi>ÃÕÀiÊ«i`>}}V>Ê«>VÌÃÊvÊÌÀ>}ÊÃiÌÕ«Ã]ÊvÀÊ approches, Revue Internationale des Technologies en Pédagogie computer augmented or knowledge-based traditional lectures Universitaire, 5,1, p. 45-57, 2008. ÌÊ ÀiÊ >VÌÛiÊ ÀÊ ÌiÀ>VÌÛi]Ê VÌiÝÌÕ>Ãi`Ê iÛÀiÌÃ°Ê X ,1 Ê °]Ê+Õ>ÌÞÊ/Ü>À`ÃÊ>Ê Ý«iVÌi`Ê>ÀÞ\Ê*i`>}}ÞÊ These hybrid pedagogical setups are at the intersection between and Technology Speaking Together About Innovation. AACE face to face (or standard) education and distance (or continued) Journal, 15Ó®]Ê££x£Îä°Ê iÃ>«i>i]Ê6\Ê ]Ê2007. training. This invites educational technologists and teachers to reconsider presence and distance learning, initial and continued training, mediatisation of resources and mediation between Awards LiVÌÃÊ>`Ê>VÌÀÃÊvÊi`ÕV>ÌÊ>`ÊÃViÌÞ° X ÊÓääÇ]ÊÌ iÊ >ÀiÊ ÃÀÌÕÊÀiViÛi`ÊÌ iÊ1 - "Ê«ÀâiÊ At the European level, the researchers are contributing to for the use of ICT in education Ì iÊ º iVÌvÊ Þ-1*»Ê Ü V Ê ÃÊ `i`V>Ìi`Ê ÌÊ Ì iÊ ivviVÌÃÊ >`Ê X Ê ÓääÇ]Ê >ÀViÊ iLÀÕÊ ÀiViÛi`Ê Ì iÊ ,LiÀÛ>Ê «ÀâiÊ vÀÊ ÃÊ the conditions of impacts of hybrid setups on training and book « eLearning pour enseigner et apprendre » (Academia- i`ÕV>ÌÊÊ } iÀÊi`ÕV>Ì°Ê"ÊÌ ÃÊL>ÃÃ]ÊÌ iÊÌi>Ê}iÌÃÊ>Ê Bruylant, Louvain-la-Neuve) Û>Õ>LiÊ iÝ«iÀÌÃiÊ Ê `ÃÌ>ViÊ ÌÀ>}Ê >`Ê i>À}]Ê vviÀ}Ê now fully distance master degrees. These researches and developments contribute to quality learning and training for multi-sites companies and institutions in a lifelong learning and competences aware world.
147 Funding KEYWORDS Education X ÕÀ«i>Ê ÊqÊ/i«ÕÃ]Ê*Ç Training E-Learning X j`jÀ>ÌÊ7>i ÀÕÝiià Competences X Wallonie
CONTACTS Partnership Marcel LEBRUN [email protected]
X Université Claude Bernard, Lyon I Tel. 32 (0) 10 47 89 27 X Université Rennes II Françoise DOCQ X AWT (Agence Wallonne des Télécommunications) [email protected] X Ecole Centrale de Lyon Tel. 32 (0) 10 47 26 63 X EMLyon Business School X Êj>À`Ê`iÊ6VÊÊ Philippe MERCENIER X 1ÛiÀÃÌjÊi>Ê iÌ]Ê->Ì Ìii [email protected] Tel. 32 (0) 10 47 88 87 X Université Blaise Pascal, Clermont-Ferrand X Université de Montpellier II Frédéric MINNE X 1ÛiÀÃÌjÊ`ÕÊÕÝiLÕÀ} [email protected] X 1ÛiÀÃÌjÊ`iÊimÛiÊqÊ/iVv> Tel. 32 (0) 10 47 80 06 X 1ÛiÀÃ`>`Ê`iÊ6}]Ê-«> X 1ÛiÀÃÌjÊ`ÕÊ+ÕjLiVÊDÊ ÌÀj>ÊqÊ/iÕµ Denis SMIDTS [email protected] X 1ÛiÀÃÌjÊ`ÕÊ+ÕjLiVÊDÊ,ÕÃ Tel. 32 (0) 10 47 36 57 X Universidad Católica del Norte, Chile
X 1ÛiÀÃÌjÊ >i`Ê*ÀiiÀÊ"Õ`>]Ê >ÀV WEB SITES X University of Columbia, School of Law, USA http://www.uclouvain.be/IPM http://www.claroline.net
Products and Services
X Development, diffusion and promotion of the Claroline Learning Management System. X ÃÌ}]Ê ÃÕ««ÀÌ]Ê VÕÃÌÃ>ÌÊ >`Ê ÌÀ>}Ê Ì ÀÕ} Ê Ì iÊ International Claroline Consortium
148 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 2
Ethical governance of information technology
SENIOR SCIENTISTS: X * ««iÊ"1" X Stephen RAINEY X Laurence MASCLET
Research Field and Subjects X "1" Ê* °]Ê Ê °]Ê Ì V>ÊÛiÀ>ViÊvÀÊ iÀ}}Ê /\Ê "«i}Ê }ÌÛiÊÀ>}Ê>`ÊV iÛ}ÊÀiyiÝÛÌÞÊʸ7 >ÌÊ / iÊ>LÀ>ÌÀÞÊvÀÊ Ì V>ÊÛiÀ>ViÊvÊvÀ>ÌÊ/iV }ÞÊ `ÊvÊvÀ>ÌÊÃViÌÞ¶ÊÛiÀ>Vi]ÊÛÀÌÕ>ÌÞ]ÊÃÕÀÛi>Vi]Ê /®Ê ÃiiÃÊ ÌÊ >``ÀiÃÃÊ Ì iÊ «ÀLiÊ vÊ Ì iÊ V`ÌÃÊ vÀÊ ÃÕÃÌ>>LÌÞ]ÊÀiÃiVi¸\ÊÌ Ê*Ê/ ÊÌiÀ>Ì>ÊVviÀiVi]Ê ethical governance of research and development of information Ê Óä£äÊ >`Ê £ÃÌÊ *Ê / ££Ê ÌiÀ>Ì>Ê VviÀiVi]Ê *Ê ÌiV }iðÊ/ iÊvÕ`>iÌ>Ê>ÃÊvÊÌ iÊ /Ê>ÀiÊÌ\ Óä£äÊi`Ê>ÃÊ«>ÀÌÊvÊ7 ÊÓä£ä]Ê ÀÃL>iÊÕÃÌÀ>>]Ê-i«ÌiLiÀÊ 2010 Proceeding, ed Springer, pp.98-111, 2010. qÊ ÛiÃÌ}>ÌiÊ>`Ê`iÌiÀiÊÌ iÊV`ÌÃÊ>`Ê>««V>ÌÃÊvÊ X "1" Ê * °]Ê Ê °]Ê `ÌÃÊ vÀÊ >Ê ivviVÌÛiiÃÃÊ vÊ the relationship between ethics, governance, rationality, and iÌ V>ÊÀiyiÝÛÌÞÊÊ /L>Ãi`Ê«ÀiVÌÃ\ÊvÀÊÌ iÀÞÊÌÊ«À>VÌVi¸Ê ÌiV }V>ÊÀiÃi>ÀV Ê>`Ê`iÛi«iÌÆ Ê / " *ÊÓä£äÊ/ iʸL>VÜ>À`Ã]ÊvÀÜ>À`ÃÊ>`ÊÃ`iÜ>ÞÃ¸Ê qÊ vVÕÃÊëiVwV>ÞÊÊvÀ>ÌÊ>`ÊV«ÕÌ}ÊÌiV }iÃÊ V >}iÃÊvÊ /Ê«ÕLà iÀÊÕÛiÀÃÌ>ÌÊ,ÛÀ>ÊÊ6À}]Ê««°ÓÎäÓÎÇ]Ê ÀiÃi>ÀV Æ 2010. qÊ «ÀÛ`iÊ>ÊvÀ>iÜÀÊvÀÊ«ÀÛi`Ê}ÛiÀ>ViÊiV >ÃÃÊ X "1" Ê * °]Ê LiÌÊ Ìi}iViÊ ÌiV }Þ\Ê VÀÌV>Ê that will identify and address potential ethical issues that arise perspective ethical and societal issues, in living and working and from new and emerging technologies in the early stages of learning beyond technology, University of Pavia, Mantua, Italy, development. 24-26, conference proceedings, pp.334-354, September 2008. X , 1,Ê °]Ê 1, -/ ,Ê "°]Ê 1+1 "9Ê *°]Ê"1" Ê * °]Ê >Ãi`ÊÊiÌ V>ÊÀÃÊÌ >ÌÊ >ÛiÊLiiÊÕ`}i`Ê>ÃÊi}Ì>ÌiÊ>`Ê "// , , Ê °]Ê * Ê °]Ê **Ê °]Ê -8Ê °]Ê 7 , Û>`ÊÊëiVwVÊÀi>ÌÊÌÊ /]ÊÌ iÊ /ÊÃiiÃÊÌÊÕ`iÀÃÌ>`Ê 71Ê °]Ê7/ "1- Ê °]Ê Ì VÃÊvÊ «ÕÌ}Ê ÌÌiiÃ\Ê the activities through which the society attempts to act and to -Õ}}iÃÌÃÊvÀÊÕVÌÃ]ÊÀÊ>`Ê-ÌÀÕVÌÕÀiÊ `ð]Ê"ÊLi >vÊ regulate itself. vÊ*-°Ó°Ó\Ê `ð]Ê*Ê*ÀiÃÃ]Ê>ÝiLÕÀ}ÊÕÃÌÀ>]ÊÎÓÊ«°]Ê- Ê The operational base for this research is an international 9783901882243, 2008. iÌÜÀÊ LÕÌÊ >ÀÕ`Ê `vviÀiÌÊ ÀiÃi>ÀV Ê «ÀiVÌÃ°Ê / iÃiÊ >Ài]Ê Ê«>ÀÌVÕ>À]ÊÌÜÊVÕÀÀiÌÊ ÕÀ«i>Ê«ÀiVÌÃÊÊÌ iÊÌ iiÃÊvÊ scientific and technological development, ethics, rationality, and Funding governance. The first one is ETICA (Ethical Issues of Emerging ICT ««V>ÌîÊ>`ÊÌ iÊÃiV`ÊiÊÃÊ -Ê Ì V>ÊÛiÀViÊ X Ê*ÀiVÌÃ\ of emerging technologies). qÊ *ÈÊ *ÀiVÌÊ 1 \Ê ÕÌ`>Ê ÌiÀ>VÌÃÊ analysis and exploration of users within a controlled environment) qÊ *ÇÊ *ÀiVÌÃÊ " - ,Ê Ê VÛÊ ÃViÌÞÊ À}>â>ÌÃÊ Ê Representative References designing research governance, ETICA - Ethical Issues of iÀ}}Ê /Ê««V>ÌÃ]Ê -ÊÊ/ iÊ Ì V>ÊÛiÀ>ViÊvÊ X "1" Ê * °]Ê , 9Ê -Ì°]Ê ÕÀ«i>Ê «ÀiVÌÊ -\Ê Ambient Intelligence in Society) ÝÃÌ}Ê -ÕÌÃÊ ÌÊ Ì iÊ Ì V>Ê ÛiÀ>ViÊ *ÀLiÊ >`Ê X Ê*ÀiVÌ\ÊÎ/\ÊÌÀ>ë>ÀiVÞ]ÊÌÀÕÃÌÊ>`ÊÌà >À>VÌiÀâ>ÌÊvÊÌ iÀÊÌ>ÌÃÊÊ`°Ê{°£Ê2011. X ,-/ Ê-/Ê °]Ê, 9Ê-Ì°]Ê"1" Ê* °]ÊÜÊÌÊ``ÀiÃÃÊ Ethics of Emerging ICTs, 2011.
149 Partnerships KEYWORDS Ethics
X T.EC Solutions Pty Sidney, Australia ÛiÀ>Vi Information technologies X International Center for Information Ethics (ICIE) Civil society organisation X `>ÌÊÌiÀiÌÊ ÕÛiiÊjjÀ>Ì Democracy X Ecole Normale Supérieure, France Ethical governance X Institut Destrée, Belgium Responsible research X European Commission Code of conduct X Center for Ethics Technology and Society, ICAM, Lille, France X ALERT (Aspects of Law and Ethics Related to Technology), CONTACTS ``iÃiÝÊ1ÛiÀÃÌÞ]Ê`]Ê1Ìi`Ê}` Philippe GOUJON X UFR de Philosophie - PARIS 1 « ««i°}ÕJvÕ`«°>V°Li X -V Ê vÊ «ÕÌ}Ê -ViVi]Ê ``iÃiÝÊ 1ÛiÀÃÌÞ]Ê Ì iÊ Tel. 32 (0) 81 72 52 58 ÕÀÀÕ} ÃÊ1ÊÊ` X 6//Ê/iV V>Ê,iÃi>ÀV Ê>LÀ>ÌÀÞÊvÊ>`° Stephen RAINEY X >ÕÌBÌÊvØÀÊÕÌÕÀÀiyiÝ]Ê7ÌÌi]ÊiÀ>Þ [email protected] X Department of Information Technology, University of Turku, Laurence MASCLET Finland [email protected] X Center for Ethics Technology and Society Institut Catholique `¿ÀÌÃÊiÌÊ jÌiÀÃÊ ®]Êi]ÊÀ>Vi X Collège International de Philosophie, France WEB SITES X i/Ê1ÛiÀÃÌDÊ >ÌÌV>Ê`iÊ->VÀÊ ÕÀiÊ1 - ®]Ê >]ÊÌ>Þ www.etica-project.eu X Université de Franche Comté, France www.egais-project.eu X >ÀÃÀÕ iÊÃÌÌÕÌiÊvÊ/iV }ÞÊiÀ>ÞÊ/®]ÊiÀ>Þ X Laboratory for Computing and Social Responsibility, Montfort 1ÛiÀÃÌÞ]ÊiViÃÌiÀ]Ê1 X ivÌÊ 1ÛiÀÃÌÞÊ vÊ /iV }Þ]Ê / iÊ iÌ iÀ>`ÃÆÊ / "-/ Ê Delft, The Netherlands X University of Twente, Enschede, The Netherlands X Laboratory for Applied Philosophy and Public Ethics (CAPPE), Charles Sturt University, Australia X / iÊ >ÃÌi}>ÌiÊ ÃÕÌ>VÞ]Ê1
Products and Services
X Ì VÃÊVÃÕÌ>VÞÊvÀÊ`ÕÃÌÀÞ]ÊÀiÃi>ÀV Ê«ÀiVÌÊ}ÛiÀiÌÊ laboratories X Ì V>ÊiÝ«iÀÌÊvÀÊÌ iÊ ÕÀ«i>Ê ÃÃÊÊV >À}iÊvÊÌ iÊ ethical training X "À}>Ã>ÌÊvÊÌiÀ>Ì>ÊVviÀiViÃ
150 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 3
Privacy By Design
SENIOR SCIENTISTS: X >ÀiÊ" / ,- X jViÊ Ê/ ,7 X i> >ÀVÊ6 Ê9-
Research Field and Subjects Representative References
We have entered the society of global media, having millions of X , Ê °]Ê ", -Ê °]Ê" / ,-Ê °]Ê-V}V>Ê iÞiÃÊ«ii}ÊÊiÛiÀÞÊ>ëiVÌÊvÊVÌâiÃÊvi]ÊÜ}ÊiÛiÀÞÊ >LÌ]Ê >`Ê iÌ V>Ê ÃÃÕiÃÊ Ê v>V>Ê ÀiV}ÌÊ ÃÞÃÌiÃ\Ê Ý«À}Ê Ì iÊ every word tipped in the network, every relation we maintain… possibilities for Improved critical assessments of technologies?, In this pervasive “computing system”-oriented society, the very Ê - Ê ÓäänÊ qÊ *ÀVii`}ÃÊ vÊ Ì iÊ /iÌ Ê Ê ÌiÀ>Ì>Ê nature of the privacy is at stake. Nowadays, companies deal Symposium on Multimedia), 15-17 Dec. 2008. IEEE: p. 602-608, with billions of data that could personally identify customers, 2008. and the latter have nothing to say in the process. X " / ,-Ê °]Ê , Ê °]Ê ", -Ê °]Ê Õ>Ê -ViViÃÊ >`Ê -ÞÃÌiÊ iÃ}Ê Ê ÀÊ Ý«iÀÌÃiÊ ÌÊ -ÌÕ>Ìi`Ê Responding to the European willingness to answer issues raised iLiÀ>Ì]Ê É Ê ÓäänÊ viÀiViÊ i`Ê Ê >>Ê by privacy and to reduce the security gaps, the Research Centre ÀiiVi®]ÊÓäÓÓ`Ê"VÌLiÀÊ2008. in Information, Law and Society (CRIDS) has set up a team to deepen the Privacy by Design and to circumscribe the notion vÊ«ÀÛ>VÞ°Ê/ iÊ}>ÊÜÌ ÊÌ iÊ*ÀÛ>VÞÊLÞÊ iÃ}Ê«ÀiVÌÊÃÊÌÊ Funding achieve an acceptable level of protection for personal data and to enforce this protection in the core design of information X ÕÀ«i>Ê1]Ê*ÈÊqÊvÀ>ÌÊ-ViÌÞÊ 1 systems. X ÕÀ«i>Ê1]Ê*ÊÇÊqÊvÀ>ÌÊ-ViÌÞÊ*, /-
Due to the irreversibility of advanced information technologies, privacy issues and requirements have to be considered at the very Partnership beginning of their design. Privacy by Design aims to reinforce the legal framework and the human arrangements in order to X Research Center in Information Systems Engineering (PReCISE) ensure people a better protection. It is a way to complete the (Belgium) legal framework which cannot ensure a total protection due to X ,ÊÀiLiÊqÊ, i«iÃÊÀ>Vi® its nature. X 1ÛiÀÃÌÞÊvÊ>Ã}ÜÊ1Ìi`Ê}`® X 6ÃÕ>ÊÌÃÊ-«>® As privacy is a concern of the earliest stage of software X University of Amsterdam (The Netherlands) developments, the studied field applies the concept of pro- X University of Tel Aviv (Israel) activeness. The protection relies on specific technologies that X University of Lille (France) embed privacy and security principles in their source code, but X ``iÃiÝÊ1ÛiÀÃÌÞÊ1Ìi`Ê}`® >ÃÊ Ê >Ê «ÀÛ>VÞÊ >Ü>ÀiÊ >>}iiÌÊ vÊ Ì iÊ vÀ>ÃÌÀÕVÌÕÀiÉ network. Products and Services / iÊ , -Ê«ÀiVÌÊÊ*ÀÛ>VÞÊLÞÊ iÃ}ÊvVÕÃiÃÊÊÌ iÊvÜ}Ê main goals: X Privacy Enhanced Technology theory qÊ iÝ«ÀiÊ Ì iÊ VÌi«À>ÀÞÊ i>}ÃÊ vÊ Ì iÊ ÌÊ vÊ X Private and public sphere definition º«ÀÛ>Ìi»Ê>`ʺ«ÕLV»Æ X Privacy by Design requirements qÊ «À«Õ`Ê>Ê`iVÀ>ÌVÊL>>ViÊLiÌÜiiÊÃiVÕÀÌÞÊ>`Ê«ÀÛ>VÞÆ qÊ `iÃ}Ê>ÊVVi«ÌÕ>Ê>`ÊiÌ `}V>ÊvÀ>iÊvÀÊ*ÀÛ>VÞÊLÞÊ Design requirements.
151 KEYWORDS Privacy Data protection Privacy Enhanced Technology Private sphere
CONTACTS Claire LOBET-MARIS [email protected] Tel. 32 (0) 81 72 49 91
Cécile DE TERWANGNE [email protected] Tel. 32 (0) 81 72 47 72
Jean-Marc VAN GYSEGHEM i>>ÀV°Û>}ÞÃi} iJvÕ`«°>V°Li Tel. 32 (0) 81 72 58 23
WEB SITE http://www.crids.be
152 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 4
Telecommunications Regulation
SENIOR SCIENTISTS: X ,LiÀÌÊ+1 X i> >ÀiÊ ,/ X iÝ>`ÀiÊ Ê-/,
Research Field and Subjects Telecommunications regulation is adopted and implemented at both EU and national levels. The issue of the status, activities and Telecommunications (also referred to as electronic principles applicable to regulators is another important aspect communications) cover networks, services and terminal vÊÌ iÊ1̽ÃÊiÝ«iÀÌÃi°Ê/ iÊ i}>ÊÀi«>ÀÌÌÊvÊV«iÌiViÃÊ equipment transmitting signals through electromagnetic means between the federal telecoms and Community media regulators, (cables, wires, optical fibre, wireless). Telecommunications Ê Ì iÊ VÌiÝÌÊ vÊ Ì iÊ VÛiÀ}iViÊ vÊ Ì iÃiÊ ÌiV }iÃ]Ê ÃÊ constitute the backbone of the information society as a whole. finally a challenging topic for research, publications, advice and A regulation that is efficient, adaptable to technology evolution training. and applied in a transparent way is thus of crucial importance for the European Union and its Member States as well as for the industry and ultimately for consumers. Such a regulation raises Representative References intricate legal, economic and technological issues. X , Ê* °]Ê Ê-/, Ê°]Ê7 iÀiÊ- Õ`ÊÌ iÊ ÕÀ«i>Ê Since the late 1980’s, the Research Centre in Information, Law Union Intervene to Foster the Internal Market for eComms? and Society (CRIDS) has addressed a number of challenging Communications & Strategies 82: 63-84, 2011. topics centred on telecommunications. It works notably on the X DE STREEL A., The Regulated conduct defence in antitrust definition and regulation of markets which are characterised V>ÃiÃ°Ê >V}ÀÕ`Ê«>«iÀÊvÀÊÌ iÊ" \ÊÎÈÊ«°]Ê2011. by the presence of incumbent companies having a significant X , 9 Ê °]Ê iÊ `Û`i`iÊ ÕjÀµÕi\Ê VÌiÝÌiÊ iÌÊ iiÕÝ°Ê market power. Upon those are imposed remedies aimed at R.D.T.I. 42: 11-34, 2011. fostering competition, e.g. the obligation to grant access to X +1 Ê,°]Ê Ê-/, Ê°]Ê"1Ê°]Ê"-/Ê°]Ê"-/Ê °]Ê/ iÊ 1Ê their networks and other facilities necessary to allow other regulatory Framework applicable to electronic communications, players to enter the market. Also, the CRIDS’ research covers Ê ,< /Ê °]Ê "½, Ê °Ê i`ð®]Ê /iiVÕV>ÌÃ]Ê Ài}Õ>ÌÊÌ >ÌÊ«ÀÌiÃÊÌ iÊ`i«ÞiÌÃÊvÊiÝÌÊ}iiÀ>ÌÊ broadcasting and the internet - EU competition law and >VViÃÃÊiÌÜÀÃÊ ®ÊÕÃ}Ê«ÌV>ÊwLÀiÊ>`ÊÌ iÀÊ>VViÃÃLÌÞ°Ê Ài}Õ>Ì°Ê-ÜiiÌÊEÊ >ÝÜi\ÊÎÓÈÓ]Ê2010. These networks are essential for a very fast internet access. Such X DE STREEL A., Impacts of EU policy options for revision of the issues present a perfect opportunity to address the application universal service provision. Study for the European Commission, of both, sector specific regulation and competition law and the Ê«>ÀÌiÀà «ÊÜÌ Ê6>Ê VÊ >>}iiÌÊ ÃÕÌ>ÌÃ\Ê£nÇÊ«°]Ê relationship between them. 2010. X "-/Ê °]Ê +1 Ê ,°]Ê ÕV>ÌÃÊ jiVÌÀµÕiÃÊ iÌÊ The conditions for entering the markets are also of crucial répartition des compétences : chantiers importants en cours. importance. The allocation and the regulation of radio spectrum R.D.T.I. 34: 5-27, 2009. vÀiµÕiViÃ]ÊÜ V ÊÃÊ>ÊÌi`Ê>`ÊÛ>Õ>LiÊÀiÃÕÀViÊÊ>ÊVÌiÝÌÊ X +1 Ê ,°]Ê 6 Ê Ê °]Ê -/ 6 -Ê °]Ê 6 Ê *°]Ê of rapidly increasing demand for mobile services, are especially Droit des communications électroniques - Code thématique. studied. Larcier: 327 p., 2009. X DE STREEL A., The current and future European regulation Ê>ÊVÌiÝÌÊvÊv>ÃÌiÛÛ}ÊÌiV }iÃÊÜÌ Ê } ÊiVVÊ of electronic communications: a critical assessment. Telecommunications Policy 32 (11): 722-734, 2008. relevance, it is important to avoid leaving anyone behind. For this reason, the provision of services of general economic interest (such as the universal service obligations) must be guaranteed in order to prevent or overcome the digital divide to the benefit of less prosperous populations. Consumer protection rules also receive an increasing attention by CRIDS.
153 Funding KEYWORDS Electronic communications
X Belgian Institute for Postal services and Telecommunications Broadcasting Sector Specific Regulation (BIPT) and other regulators Competition Law X Belgian Federal Public Service Economy, SMEs, Self-employed Consumer protection and Energy Regulatory authorities X 7>iÊ>`Ê iÕÌÃV ëÀ>V }iÊiiÃV >vÌÊ i}ià iÝÌÊiiÀ>ÌÊVViÃÃÊ iÌÜÀÃÊ ® X ÃÌÌÕÌÊ«ÕÀʽ }>ÌjÊ`iÃÊiiÃÊiÌÊ`iÃÊiÃÊ ® -iÀÛViÃÊvÊiiÀ>Ê VVÊÌiÀiÃÌÊ- ® X European Commission and European Parliament X European Bank for Reconstruction and Development (EBRD) CONTACTS X "
Robert QUECK X Telecommunications Companies [email protected] Tel. 32 (0) 81 72 52 12
Partnership Jean-Marie CHEFFERT i>>Ài°V ivviÀÌJvÕ`«°>V°Li Tel. 32 (0) 81 72 47 85 X Centre for European Policy Studies (CEPS) (Belgium) X ÃiÊ-Õ«jÀiÕÀÊ`iÊ¿Õ`ÛÃÕiÊ -®Ê i}Õ® Alexandre DE STREEL X Cullen International (Belgium) >iÝ>`Ài°`iÃÌÀiiJvÕ`«°>V°Li X Florence School of Regulation (Italy) Tel. 32 (0) 81 72 48 57 X ÌiÀ`ÃV«>ÀÞÊ iÌÀiÊvÀÊ>ÜÊEÊ /Ê ,®ÊvÊ°1°ÊiÕÛiÊ (Belgium) WEB SITE X 7ÃÃiÃV >vÌV iÃÊ ÃÌÌÕÌÊ vØÀÊ vÀ>ÃÌÀÕÌÕÀÊ Õ`Ê Õ >ÌÃÊ`iÃÌiÊ7®ÊiÀ>Þ® http://www.crids.be
Products and Services
X Consultancy and studies providing neutral and independent analysis X Preparation of draft laws and regulations X Conferences and Seminars X Training programmes tailored to individual needs
154 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 5
Social Networking Sites
SENIOR SCIENTISTS: X >LiiÊ X >ÀiÊ" / ,- X i>* ««iÊ " 9
Research Field and Subjects Representative References
/`>Þ]Ê ÃV>Ê iÌÜÀ}Ê ÃÌiÃÊ Q- -iÃRÊ qÊ >ViL]Ê 9Õ/ÕLi]Ê X Ê °]Ê >ViL]Ê µÕ>`Ê ÌÕÊ ÕÃÊ ÌiÃo]Ê Ê *,"18Ê -°]Ê i`]ÊiÌV°ÊqÊ>ÀiÊ>Ê«>ÀÌÊvÊÌ iÊiÛiÀÞ`>ÞÊ«ÕLVÊ>`Ê«ÀÛ>ÌiÊ *iÃiÀÊiÃÊj`>ÃÊÃV>ÕÝÊÊ iÕÝÊ«ÕÀÊ>ÊVÕV>Ì°Ê*1+Ê ÛiÃÊ vÊ ÃÊ vÊ «i«i°Ê / iÃiÊ >ÀiÊ iÝ«>`}Ê «ÀÛ>ÌiÊ *ÀiÃÃiÃÊ1ÛiÀÃÌ>ÀiÃÊ`iÊ+ÕjLiV®]Ê2011. territories over the World Wide Web, bringing numerous X Ê °]Ê *,"18Ê -°]Ê iVÌÃ°Ê ÕV>ÌÊ questions in different scientific disciplines. In other words, they numérique et lien social. PUN (Presses Universitaires de Namur): constitute a promising laboratory for interdisciplinarity. In this 355 p., 2011. VÌiÝÌ]Ê Ì iÊ iÝ«iÀÌÃiÊ vÊ Ì iÊ ,iÃi>ÀV Ê iÌÀiÊ Ê vÀ>Ì]Ê X " 9Ê °*°]Ê >ViLÊ >ÕÊ Ài}>À`Ê `iÃÊ Àm}iÃÊ iÕÀ«jiiÃÊ Law and Society (CRIDS) is threefold: sociological, legal and VViÀ>ÌÊ >Ê «ÀÌiVÌÊ `iÃÊ `jiÃ°Ê ÕÀ«i>Ê ÕÀ>Ê vÊ sciences of communication. From the legal perspective, SNSes Consumer Law: 235-271, 2010. are studied as a kind of “Cloud Computing” service. The lead X " 9Ê °*°]Ê ÌÀ>VÌiÀÊ `>ÃÊ iÃÊ ÀjÃi>ÕÝÊ ÃV>ÕÝ\Ê ÕÊ }iÃÌiÊ researches relate to privacy, data protection, contract law and >`jµÕ>ÌÊ «ÕÀÊ VÌÀ>VÌiÀÊ Ã>Ê ÛiÊ «ÀÛjiÊ Ê +ÕiµÕiÃÊ ÀjyiÝÃÊ consumer protection. Taking into account private international en droits belge et américain. Revue de la Faculté de droit de >Ü]Ê «ÕLVÊ ÌiÀ>Ì>Ê >ÜÊ >««V>LÌÞÊ vÊ Ì iÊ ,®Ê >`Ê l’Université de Liège: 133-224, 2010. criminal international law, an ongoing doctoral research is more specifically related to the applicability of privacy and related rights (i.e., notably, data protection and confidentiality of Funding information systems) to international situations. F.R.S.-FNRS (Research Fellow) Social networks also give rise to new social practices. By drawing on these networks, various social groups (e.g., political militants, youth, people with disease, etc.) develop different practices and Partnership assign them different meanings and strength. For instance, counseling and prevention services in the psychological field X 6"/ wonder about both the suitability of their presence on those X Laboratoire de communication mediatisée par ordinateur networks, and the risks of using their strength to enhance or >L "®Ê >>`>® create news relationships with their addressees. X Laboratoire Société, environnement et territoire (SET) (France)
In addition, social networks raise questions about the types of social bonds they generate: Do they give rise to new types Products and Services vÊ ÃV>Ê Ài>ÌÃÊ À]Ê VÛiÀÃiÞ]Ê `Ê Ì iÞÊ ÕÃÌÊ Ài«À`ÕViÊ >`Ê ÀivÀViÊiÝÃÌ}ÊÀi>Ìà «Ã¶Ê ÊÌ iÞÊ>ÜÊvÀÊÃV>ÞÊÝi`Ê `ÊÕÃiÊvÊÃV>ÊiÌÜÀ}ÊÃÌiÃÊÊÀ}>Ã>Ìà and diversified publics or, on the contrary, do they lead to individual and social “identity isolation”?
A communication approach will raise the question about the massive recurrence of “rumors” and try to develop tools to understand the risks of breaking the communication framework.
155 KEYWORDS Social Networking Sites Cloud computing Õ>Ê,} ÌÃ Consumer protection Surveillance Democracy Sociability Social movements
CONTACTS Annabelle KLEIN [email protected] Tel. 32 (0) 81 72 48 92
Claire LOBET-MARIS [email protected] Tel. 32 (0) 81 72 49 91
Jean-Philippe MOINY i>« ««i°ÞJvÕ`«°>V°Li Tel. 32 (0) 81 72 52 07
WEB SITE http://www.crids.be
156 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 6
Policy and legal issues of the Internet
SENIOR SCIENTISTS: X -jÛiÀiÊ 1-" , X jViÊ Ê/ ,7 X ÌiiÊ " / ," X 9ÛiÃÊ*"1 / X ,LiÀÌÊ+1
Research Field and Subjects Representative References
Information and Communications Technologies have a significant X +1 Ê°ÊiÌÊ>°]ÊÕ`iÊ`iÃÊÌÌÕ>ÀiÃÊ`iÊÃÌiÃÊÌiÀiÌ° legal and policy dimension. These aspects are addressed by SPF Economie: 220 p., 2011. members of the Research Centre in Information, Law and Society X " / ,"Ê °ÊiÌÊ>°]ÊÕ`iÊ«ÕÀÊiÃÊÕÌÃ>ÌiÕÀÃÊ`½ÌiÀiÌ°Ê-*Ê (CRIDS) for more than 30 years. When computer networks and Economie: 250 p., 2011. Internet first unfolded, the primary concern was as how to adapt X *"1 /Ê 9°]Ê 1/7,/Ê -°]Ê Ê ,/Ê *°]Ê -Ê ,°Ê i`ð®]Ê iÝÃÌ}Ê >ÜÃÊ ÌÊ «iÀ>ÌÃÊ V>ÀÀi`Ê ÕÌÊ Ê Ì iÊ ÜiL]Ê ÃÕV Ê >ÃÊ Computers, privacy and data protection: an element of choice. e-Commerce, delivery of copyrighted content, communicating. Springer: 457 p., 2011. Were contract rules, copyright law, consumer protection, privacy X *"1 /Ê9°]Ê ,"// Ê°°]Ê `iÊ`ÕÊ ÀÌÊ`iÃÊ/iV }iÃÊ or telecommunications regulations fit for the digital age? Could de l’Information et de la Communication. Larcier: 1094 p., they simply be applied to this new channel of communication, 2011. VÃÕ«ÌÊ >`Ê iÌiÀÌ>iÌ¶Ê Ê «À>ÀÞÊ LiVÌÛiÊ vÊ Ì iÊ X ,"16,"9Ê°]Ê , /Ê °Êi`ð®]Ê>Ü]Ê Õ>Ê>}iVÞÊ research in ICT law is to study the equivalence of the application and autonomic computing : the philosophy of law meets the and enforcement of legal provisions to this new environment. philosophy of technology. Routledge: 227 p., 2011. X *"1 /Ê 9°]Ê 1 - Ê °]Ê ,/Ê -°]Ê *, -Ê °Ê i`ð®]Ê ÜiÛiÀ]ÊÌ iÊÜiLÊ>`ÊÌ iÊÌ iÀÊ`}Ì>Ê`iÛi«iÌÃÊ >ÛiÊ>ÃÊ VÃiÊ ÕÀ«i>Ê/Ê>Ü°ÊÕÜiÀ\ÊÈÓnÊ«°]Ê2010. generated new opportunities as well as new risks and threats: X 1-" ,Ê -°]Ê Ê / ,7 Ê °Ê i`ð®]Ê ÀµÕiÊ `iÊ copyright piracy, failures to comply with privacy and consumers’ ÕÀëÀÕ`iViÊiÊ`ÀÌÊ`iÃÊÌiV }iÃÊ`iÊ¿vÀ>ÌÊÓääÓ rights, abuse of monopolies, digital divide and so on. More 2008). R.D.T.I. 35: 175 p., 2009. vÕ`>iÌ>Þ]Ê /Ê >ÃÊLi}}i`ÊÌ iʵÕiÃÌÊvÊÌ iÊiÝÌiÌÊvÊÌ iÊ X +1 Ê ,°]Ê 6 Ê Ê °]Ê -/ 6 -Ê °]Ê 6 Ê *°]Ê regulation of a worldwide network, both in terms of geography ÀÌÊ `iÃÊ VÕV>ÌÃÊ jiVÌÀµÕiÃÊ qÊ `iÊ Ì j>̵Õi° and scope. This raises intricate policy issues where new legal Larcier: 327 p., 2009. solutions or balances might be required.
9iÌ]Ê >ÜÊ ÃÊ ÌÊ ÕÃÌÊ >Ê LÃÌ>ViÊ ÌÊ ÌiV }Þ°Ê *VÞ>iÀÃÊ Awards should pay a proper attention to enact regulations that foster the development of a competitive and consumer-friendly digital 9°Ê*"1 /ÊÃÊ>ÊiLiÀÊvÊÌ iÊV>`jiÊÀÞ>iÊ`iÃÊ-ViViÃ]Ê economy that would be respectful of fundamental freedoms `iÃÊiÌÌÀiÃÊiÌÊ`iÃÊ i>ÕÝÀÌÃÊ`iÊ i}µÕiÊÓää®° and would bring about full benefits of economic growth for all.
Finally, policy and legal issues increasingly tend to be embedded Funding in emerging technologies, whose design aims at being, for instance, privacy-compliant. That requires an assessment of the X European Union (FP6, FP7) ÌiV }ÞÊLÞÊi}>ÊiÝ«iÀÌÃ]Ê>ÌÊÌ iÊi>ÀÞÊÃÌ>}iÊvÊÌÃÊ`iÃ}° X i}>Êi`iÀ>ÊÛiÀiÌ X F.R.S.-FNRS iVi]ÊÊÀ`iÀÊÌÊÀiVi`ÊÀiiÛ>ÌÊ«VÞÊV ViÃ]ÊÌ iÊi}>Ê research on ICT takes several directions, from the description of applicable laws and the assessment of law compliance of ÌiV }iÃÊ ÀÊ `}Ì>Ê «ÀiVÌÃ]Ê ÌÊ Ì iÊ «ÀëiVÌÛiÊ Ì }Ê about emergent technologies, the challenges they raised and the models they create.
157 Partnership KEYWORDS Internet policy, law and regulation
*\Ê 1ÛiÀÃÌÞÊ vÊ ØÃÌiÀÊ iÀ>Þ®]Ê 1ÛiÀÃÌÞÊ vÊ "ÃÊ E-Commerce Privacy ÀÜ>Þ®]Ê +ÕiiÊ >ÀÞÊ i}iÊ vÊ `Ê 1®]Ê 1ÛiÀÃÌÞÊ vÊ Cyberlaw the Balearic Islands (Spain) Ethics Electronic communications Copyright Products and Services Piracy
X Policy and legal analysis and recommendations CONTACT X Assessing risks and legal issues of Information technologies, Séverine DUSOLLIER models and scenarios [email protected] X Ensuring the legal compliance of Internet and other ICT Tel. 32 (0) 81 72 47 60 «ÀiVÌÃ X Practical guide on legal issues and concerns for the Internet users and entrepreneurs WEB SITE X Assessing the legal dimension of the design and deployment http://www.crids.be of technologies
158 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 7
E-Health: Legal aspects
SENIOR SCIENTISTS: X i>Ê ,6 X i> >ÀVÊ6 Ê9-
Research Field and Subjects of transfers of personal data from Member States to third VÕÌÀiÃÊÓääή]Ê /Ê*È]Ê*]ÊÓääÈ®]Ê-, ÊÓääÈ®]Êi}>ÞÊ ICT dissemination is part of a new management of healthcare ii>Ì ÊÓääÈ® which takes into account both patient’s and practitioner’s À} ÌÃÊqÊ>ÞÊÌ iÀÊÀ} ÌÊÌÊÀiëiVÌÊvÀÊ«ÀÛ>ÌiÊvi°ÊëÌ>ÃÊ qÊ i}>Ê «ÀiVÌÃ\Ê >Ì>Ê *ÀViÃÃ}Ê vÀÊ -ViÌwVÊ *ÕÀ«ÃiÃ]Ê and practitioners are setting up telematic networks supporting ÌâiÊ i}>Ê *ÀÌiVÌÊ >`Ê i`V>Ê /À>]Ê,/1,]Ê ,-Ê £]Ê ÓÊ Ì iÊ iÝV >}iÊ vÊ «>Ìi̽ÃÊ`>Ì>Ê qÜÌ Ê ÀÊ ÕÌÃ`iÊ Ì iÀÊ ÕÃÕ>Ê EÊÎ]ÊëÌ>Ê iÜÊ Vi«Ì]Ê ]Ê/ ]Ê7 ]Ê i`Ìi]Ê «ÀiVVÌðÊ/ iÊ i}>ÊÛiÀiÌÊVÀi>Ìi`Ê>Ê«>ÌvÀÊ>}Ê 7>Êi>Ì Ê iÌÜÀ]Ê-]ÊiÌV° >ÌÊ«ÀÛ}Ê>`Ê`iÛi«}Ê>ÊÃiVÕÀiÊiÝV >}iÊvÊ`>Ì>ÊÊÌ iÊ healthcare sector. In the same time, the privately operated º7>Ê i>Ì Ê iÌÜÀ»Ê ÃÊ }ÀÜ}Ê >À}iÀÊ >`Ê VÛiÀÃÊ >Ê Representative References substantial part of the market. In any case, these platforms have to comply with privacy and data protection requirements which X ,6 Ê°]Ê>Ê«ÀÌiVÌÊ`iÃÊ`jiÃÊ`ÕÊ«>ÌiÌÊDʽ «Ì>°Ê have to be considered for both the patient and the practitioner. ÕÜiÀ\Ê££äÊ«°]Ê2009. X 6 Ê 9- Ê ° °]Ê iÃÊ «>ÌiÌÃÊ \Ê ÕÃ>}iÀÃÊ ÕÊ Ã«iÃÊ / iÊ ÕÀ«i>Ê 1Ê vÕ`ÃÊ ÀiÃi>ÀV Ê «ÀiVÌÃÊ Ì >ÌÊ Ã >ÀiÊ bénéficiaires de droits sur le réseau, in Passager du réseau. resources (including medical databases) with, in view, high- Cahiers de l’Institut wallon pour la santé mentale 5: 36-44, quality healthcare and scientific research. Companies offer new 2009. ii>Ì Ê«À`ÕVÌÃÊ>`ÊÃiÀÛViÃÊÌÊ«À>VÌÌiÀÃ]Ê Ã«Ì>Ã]ÊvÕ`}Ê X 6 Ê 9- Ê ° °]Ê ii>Ì Ê ÃiÀÛViÃÊ >`Ê `ÀiVÌÛiÊ Ê agencies and patients. The latter are increasing their hold on the iiVÌÀVÊ ViÀViÊ ÓäääÉ룃 »]Ê Ê Ê , +Ê °Ê iÌÊ >°Ê management of their health and on the use made of their data. i`ð®]Ê >LÀ>ÌÛiÊ*>ÌiÌÊ iÌÀi`Êii>Ì °Ê"-Ê*ÀiÃÃ\ÊxÇÈÈ]Ê All these elements raise legal concerns amongst them privacy 2008. >`Ê`>Ì>Ê«ÀÌiVÌÊÃÃÕiðÊ/`>Þ]ÊÌ ÃiÊ>ÌÌiÀÃÊ>ÀiÊiÝ>ViÀL>Ìi`Ê X ,6 Ê °Ê j`°®]Ê >Ê «ÀÌiVÌÊ `iÃÊ `jiÃÊ j`V>iÃ°Ê iÃÊ by the Web 2.0 and Cloud Computing phenomena. `jwÃÊ`ÕÊ88iÊÃmViÊÊ/ iÊ«ÀÌiVÌÊvÊi`V>Ê`>Ì>°Ê >i}iÃÊ of the 21st century. Anthémis: 217 p., 2008. The work of the Research Centre in Information, Law and Society X ,6 Ê °]Ê *>À>>Ê `iÃÊ ÀiëÃ>LÌjÃÊ jiÃÊ >ÕÝÊ ÃiÀÛViÃÊ , -®ÊÊii>Ì ÊvVÕÃiÃÊ>ÞÊÊÌ iÊvÜ}ÊÌ«VÃ\ iÌÊ«À`ÕÌÃÊ`iÊ>ÊÃ>ÌjÊiÊ}iÊiÊ`ÀÌÊiÕÀ«ji]ÊÊ 11 /Ê ° °]Ê*Ê°ÊiÌÊ ,6 ÊÊ `ð®]Ê ÛÕÌÊÀjViÌiÊ`iÃÊ>VÌÃÊ qÊ *ÀViÃÃ}Ê vÊ «iÀÃ>Ê `>Ì>Ê VViÀ}Ê LÌ Ê «>ÌiÌÃÊ >`Ê en responsabilité médicale en France : comparaison avec «À>VÌÌiÀÃÆ ½jÌÀ>}iÀ°ÊiÃÊ ÌÕ`iÃÊëÌ>mÀiÃ\ÊÈ££n]Ê2008. qÊ i`V>Ê iÛViÃÊ>`Êii>Ì Ê-iÀÛViÃÆ X 6 Ê 9- Ê ° °Ê iÌÊ >°]Ê / iÊ /Ê iÌ V>Ê >`Ê i}>Ê qÊ iVÌÀVÊi>Ì Ê,iVÀ`ÃÆ ÀiµÕÀiiÌÃ°Ê /Ê«ÀiVÌ\Ê£{Ê«°]Ê2007. qÊ >>}iiÌÊvÊ i>Ì Ê`>Ì>L>ÃiÃÆ X 6 Ê 9- Ê ° °]Ê ½vÀ>ÌÊ }jj̵ÕiÊ iÌÊ iÊ qÊ ÛiÀi̽ÃÊ ÀiÊ Ê Ì iÊ vviÀÊ vÊ ii>Ì Ê «À`ÕVÌÃÊ >`Ê ÌÀ>ÌiiÌÊ `iÃÊ `jiÃÊ DÊ V>À>VÌmÀiÊ «iÀÃi]Ê Ê 11 /Ê ÃiÀÛViÃÆ ° °]Ê**Ê°]Ê ,6 ÊÊj`ð®] Séminaire d’actualité de droit qÊ *>Ìi̽ÃÊÀ} ÌÃÊ>`Ê`ÕÌið j`V>Ê qÊ ÃÃiÀÊ j`V>Ê iÌÊ `jiÃÊ j`V>iÃÊ `iÊ Ã>Ìj°Ê ÌÕ`iÃÊëÌ>mÀiÃ\ÊÓ{ÎÓxÇ]Ê2007. , -Ê «ÃÃiÃÃiÃÊ >Ê ÃÌÀ}Ê iÝ«iÀÌÃiÊ Ê ii>Ì Ê «À`ÕVÌÃÊ >`Ê X ,6 Ê°]Ê>Ê}iÃÌÊ`iÃÊÀõÕiÃÊëjVwµÕiÃÊ>ÕÝÊÌÀ>ÌiiÌÃÊ ÃiÀÛViÃÊÌ >ÃÊÌÊÌÃÊ«>ÀÌV«>ÌÊÌÊÕiÀÕÃÊ«ÀiVÌÃ\ `iÊ `jiÃÊ j`V>iÃÊ iÊ `ÀÌÊ iÕÀ«ji]Ê Ê ,6Ê ÀÊ iÌ°Ê al. (éds.), Systèmes de santé et circulation de l’information, qÊ ÕÀ«i>Ê «ÀiVÌÃ\Ê 1," , -Ê £{®]Ê /,1-/ /Ê V>`ÀiiÌÊjÌ µÕiÊiÌÊÕÀ`µÕi°Ê >â\ÊÇ£äÎ]Ê2007. £È®]Ê --Ê ÓääÓ®]Ê ,iÃi>ÀV Ê >`Ê >ÃÃÃÌ>ViÊ Ê Ì iÊ wi`Ê
159 Awards KEYWORDS Privacy / iÊ ,iÃi>ÀV Ê ,i«ÀÌÊ ºi}>ÞÊ ii>Ì »Ê >ÃÊ LiiÊ `iÃ}>Ìi`Ê Data protection “Study of the Month” in February 2007 by the European i>Ì Ê>Ü i>Ì ÃÃÊ /Ê vÀÊ i>Ì Ê Ê vÀ>ÌÊ -ViÌÞÊ >`Ê i`>Ê Medical Devices ®Ê>`Ê«ÕLà i`ÊÊ >ÀV ÊÓäänÊLÞÊÌ iÊ ÕÀ«i>Ê Ãà i>Ì Ê-iÀÛViÃ
Funding CONTACTS Jean HERVEG i>° iÀÛi}JvÕ`«°>V°Li X European Commission (FP6, FP7) Tel. 32 (0) 81 72 47 78 X Wallonie X j`jÀ>ÌÊ7>i ÀÕÝiià Jean-Marc VAN GYSEGHEM X i}>Êi`iÀ>ÊÛiÀiÌ i>>ÀV°Û>}ÞÃi} iJvÕ`«°>V°Li X Companies Tel. 32 (0) 81 72 58 23
WEB SITE Partnership http://www.crids.be
X CETIC (Belgium) X Université catholique de Louvain, ICTeam (Belgium) X Narilis (Belgium) X ÕÃÌ`ÝÊ i}Õ® X Centre for Data Protection (Belgium) X University of Montreal, CRDP (Canada) X , ÊÀ>ViÊqÊ >>`>® X *>ÕÊ ->L>ÌiÀÊ 1ÛiÀÃÌÞÊ qÊ /ÕÕÃiÊ ]Ê >VÕÌÞÊ vÊ i`ViÊ (France) X University of Coimbra, Centre de Direito Biomédico (Portugal) X 1ÛiÀÃÌÞÊvÊÌ iÊ7iÃÌÊvÊ }>`]Ê /Ê1Ìi`Ê}`® X University of Southampton, The IT Innovation Centre (United }`® X European Summer School (21 partners)
Products and Services
X Training X Legal Analysis and Support
160 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 8
E-Archiving and Records Management
SENIOR SCIENTISTS: X ÌiiÊ " / ," X >ÀiÊ "1
Research Field and Subjects service, contractual duties or reversibility. Moreover, the use of cloud computing to perform secure e-Archiving is controversial Both public and private sector are concerned by electronic >`Êà Õ`ÊLiÊV>ÀivÕÞÊiÝ>i`° archiving for several reasons: economic, legal or historic value of the data, better management, security, legal obligation… Representative References But a long term preservation of electronic documents remains a challenge. It is indeed crucial to preserve legibility, integrity and X "1 Ê °]Ê 6>À>ÌÃÊ ÃÕÀÊ ½jVÀÌÊ jiVÌÀµÕi\Ê >ëiVÌÃÊ authenticity of electronic records, despite the rapid, permanent de droit comparé, in Proceedings of the L. R. Wilson Chair in and unpredictable evolution of technologies (hardware and Information Technology and E-Commerce Law, University of software) and the fragility of the data medium. These issues Montreal, Canada, Augustus 2011. must be considered from the creation of the document to its X "1 Ê °]Ê ½>ÀV Û>}iÊ jiVÌÀµÕiÊ iÌÊ iÊ `ÀÌ\Ê iÌÀiÊ end, i.e. during its complete cycle of life. The digital heritage of obligations et précautions, in Proceedings of the Conference on information society is at stake. the Legal aspects of electronic archiving Namur, Belgium, May 2011. The problem is not new and great progress has been made in X "1 Ê °]Ê +ÕiµÕiÃÊ >ëiVÌÃÊ ÕÀ`µÕiÃÊ `iÊ ½>ÀV Û>}iÊ Ì iÊwi`ÊvÊÀiVÀ`ÃÊ>>}iiÌ°ÊÜiÛiÀ]ÊÃÕLÃÌ>Ì>ÊivvÀÌÃÊ électronique, in Proceedings of the 11th International Days are still needed to increase awareness of e-archiving issues and of the Archives, Université catholique de Louvain, Louvain-la- `iÛi«Ê >««À«À>ÌiÊ >`Ê yiÝLiÊ ÃÕÌÃ]Ê vÀÊ >Ê ÌiV V>]Ê Neuve, Belgium, March 2011. management and legal point of view. X "1 Ê °]Ê/ iÊi}>ÊÛ>ÕiÊvÊiiVÌÀVÊ`VÕiÌÃ\ÊÌ iÊ iÝÌÊ ÃÌi«Ã]Ê Ê *ÀVii`}ÃÊ vÊ Ì iÊ ÌiÀ>Ì>Ê VviÀiViÊ Ê From a legal perspective, a number of critical questions are iVÌÀVÊ iÀVi]Ê ÀÕÃÃiÃ]Ê"VÌLiÀÊ2010. identified and addressed by the Research Centre in Information, X "1 Ê ]Ê 6 Ê 9- Ê ° °]Ê ½>ÀV Û>}iÊ `iÃÊ Law and Society (CRIDS). The first and tricky issue raised by VÕÀÀiÀÃÊjiVÌÀµÕiÃ\Ê>ëiVÌÃÊÕÀ`µÕiÃ]ÊÊ*ÀVii`}ÃÊvÊÌ iÊ e-Archiving is the legal value of the electronic archive, especially workshop on electronic archiving of emails, Namur, Belgium, as a means of evidence. The question is important not only for May 2009. “digital native” documents, but also for scanned ones. X " / ,"Ê °]Ê 6iÀÃÊ ÕÊ V>`ÀiÊ ÕÀ`µÕiÊ «ÕÀÊ iÃÊ ÃiÀÛViÃÊ `iÊ Vw>Vi¶Ê ¿iÝ«jÀiViÊ Li}i]Ê Ê *ÀVii`}ÃÊ vÊ Ì iÊ °Ê ,°Ê It is also essential to comply with the rules imposed for control Wilson Chair on Confiance et environnements électroniques, or validity purposes, notably in terms of location, duration, 1ÛiÀÃÌÞÊvÊ ÌÀi>]Ê >>`>]Ê"VÌLiÀÊ2008. medium, authentication or confidentiality, both in private and X "1 Ê °]Ê ¿>ÀV Û>}iÊ jiVÌÀµÕiÊ iÊ `ÀÌÊ Li}i]Ê vÀÊ public sectors. In certain cases, European companies will also Ì iÊ ÎÇÌ Ê }ÀiÃÃÊ vÊ Ì iÊ ÀV ÛÃÌÃÊ ÃÃV>ÌÊ vÊ +ÕiLiV]Ê have to comply with American e-Discovery rules. +ÕiLiV]Ê >>`>]Ê >ÞÊ2008. X " / ,"Ê °]Ê "1 Ê °]Ê ""Ê9°]Ê , //Ê,°]Ê ÃiÊ Archiving personal data will also impose duties in terms of iÊ ÕÛÀiÊ`½ÕÊV>`ÀiÊÕÀ`µÕiÊ«ÕÀÊiÃÊÃiÀÛViÃÊ`iÊVw>Vi]Ê privacy. In particular, archiving of e-Mails will raise problems Report for the Belgian FPS Economy, 2007. with regard to the secrecy of communications.
E-Archiving is a business in itself. Some companies or administrations would like to recourse to a trusted third party for the archiving of their documents. Such an outsourcing, if allowed by law, also raises questions with regard to the level of
161 Funding KEYWORDS Electronic archiving
X European (ERDF) Records management Enterprise Content Management (ECM) X Wallonie Information Lifecycle Management (ILM) X SPF Economie, P.M.E., Classes moyennes et Energie E-Signature Trusted Third Party Cloud computing Partnership ÛiÀiÌ
X University of Montreal (Canada) CONTACTS X States Archives in Belgium Etienne MONTERO X i`-Ê ÌiÀ>Ì>Ê qÊ i`iÀ>ÌÊ vÊ vÀ>ÌÊ viVÞViÊ [email protected] Management, Storage and Archiving (France) Tel. 32 (0) 81 72 47 64 X i`-Ê i}ÕÊqÊ i}>Êi`iÀ>ÌÊvÊvÀ>ÌÊviVÞViÊ Management, Storage and Archiving (Belgium) Marie DEMOULIN [email protected] Tel. 32 (0) 81 72 47 62 Products and Services
WEB SITES X "À}>Ã>ÌÊvÊÜÀà «ÃÊ>`ÊVÕÀÃiÃÊÊÌ iÊi}>Ê>ëiVÌÃÊ http://www.crids.be of e-archiving and records management http://www.fedisa-international.eu X -ÌÕ`ÞÊ vÊ Ì iÊ i}>Ê >ëiVÌÃÊ vÊ >Ê i>ÀV Û}Ê «ÀiVÌÊ >`Ê records management
162 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 9
Copyright and the Internet
SENIOR SCIENTISTS: X -jÛiÀiÊ 1-" , X >ÀiÊ , X >ÀiÊ "
Research Field and Subjects information, the conditions for the collective and collaborative creation, and more generally on artistic practices in the The digital environment offers new opportunities for creators information society. Wiki creation, user generated content to achieve and disseminate their works, but it also raises the (born in the Web 2.0), open access and open source creation challenge of the effective protection of their rights. Digital raise challenging legal and sociological questions. V«Þ}ÊvÊÜÀÃÊÃÊi>ÃÞ]Êv>ÃÌÊ>`ÊiÝ«iÃÛiÊ>`Ê`ÃÃi>ÌÊ of these copies in the world is done in a few clicks. Technical All these issues are key to research and teaching of the means, such as streaming or peer-to-peer file-sharing, allow Research Centre in Information, Law and Society (CRIDS) and its VÕV>ÌÊvÊÕÃV]ÊÛiÃ]ÊÃvÌÜ>Ài]Ê/6ÊÃiÀiÃ]ÊiLÃ]Ê Intellectual Property Unit. without the consent or remuneration of the authors and producers. Copyright law and enforcement need to adapt to Representative References such challenges, particularly to fight what some call a “piracy” widespread. In parallel, copyright-protected works feed the X " Ê °]Ê ÀÌÊ`½ÕÌÃ>ÌÊ`iÃÊ ÕÛÀiðÊ>ÀViÀÊ °Ê , -\Ê cultural, informational and entertainment content on the 32, 1ère édition 2012. Internet. They are now offered in new services (e.g. video- X 1-" ,Ê -°]Ê , Ê >ÌÊ Ì iÊ ÌiÀÃiVÌÊ vÊ V«ÞÀ} ÌÊ >ÜÊ on-demand, social networks, mobile services…) and by new >`Ê ÌiV }Þ\Ê >Ê V>ÃiÊ ÃÌÕ`ÞÊ vÀÊ Ài}Õ>Ì]Ê Ê ÛiÀ>Vi]Ê >VÌÀÃÊi°}°Ê/ÕiÃ]Ê i}>VÊ/6]Ê9Õ/ÕLi]Ê}i®°ÊÃÌiÀ}Ê Regulations and Powers on the Internet. Cambridge University the developments of adequate and lawful business models to Press: forthcoming, 2011. provide for digital content is also a matter for copyright law, X 1-" ,Ê -°]Ê " Ê °] Peer-to-peer File-sharing and whose territoriality-based rules and practices sometimes raise Copyright: What could be the role of Collective Management. concern. ÕL>ÊÕÀ>ÊvÊ>ÜÊ>`ÊÌ iÊÀÌÃ\ÊvÀÌ V}]Ê2011. X " Ê °]Ê ,i}ÃÌiÀÃ]Ê >Ì>L>ÃiÃÊ >`Ê "À« >Ê 7ÀÃ]Ê Ê The regulatory framework for copyright law (national, European , 9 Ê °Êi`°®]Ê «ÞÀ} ÌÊ>`Ê ÕÌÕÀ>ÊiÀÌ>}i\Ê*ÀiÃiÀÛ>ÌÊ or international) has been profoundly altered in the last 15 years and access to works in a digital world. Edward Elgar Publishing: to adapt to the challenges and the threats posed by the digital 28-50, 2010. development and by the increasing piracy on the Internet. This X DUSOLLIER S., The relations between copyright law and >`ÕÃÌiÌÊ >ÃÊ À>Ãi`Ê Ê >`Ê VÌÕiÃÊ ÌÊ À>ÃiÊ Ê >ÞÊ i}>Ê consumer’s rights from a European perspective. European issues, particularly concerning the proper balance of copyright, Parliament: 39 p., 2010. between protection of the rights of authors and the creation and X 1-" ,Ê -°]Ê ,Ê °] Private copy levies and technical the safeguarding of a public access to culture and information. protection of copyright: the uneasy accommodation of two conflicting logics, in E. Derclaye (ed.), Research handbook on New methods of copyright enforcement have been deployed, the future of EU copyright. Edward Elgar: 349-72, 2008. such as Digital Rights Management that overrides copyright X 1-" ,Ê-°]Ê ÀÌÊ`¿>ÕÌiÕÀÊiÌÊ«ÀÌiVÌÊ`iÃÊ ÕÛÀiÃÊ`>ÃÊ law in many regards. Private copying and other limitations of ¿ÕÛiÀÃÊ ÕjÀµÕiÊ qÊ ÀÌÃÊ iÌÊ iÝVi«ÌÃÊ DÊ >Ê ÕmÀiÊ `iÃÊ copyright are increasingly at stake as they are not guaranteed dispositifs de verrouillage des œuvres. Larcier: 619 p., 2007 (2nd on the Internet. Copyright might also stand in the way of ed.). `iÛi«iÌÊvÊ«ÀiVÌÃÊÜÌ Ê>ÊÃ}wV>ÌÊ«ÕLVÊÛ>ÕiÊÃÕV Ê>ÃÊ digital libraries or digital learning. Awards The fate of creation in the digital age also can not do without a sociological and philosophical approach. Internet revived The CRIDS has been selected by the European Parliament as one the debate on the notion of author and work, the status of vÊÌÃÊwÛiÊiÝ«iÀÌÃÊÊV«ÞÀ} ÌÊ>Ü°
163 Funding KEYWORDS Copyright & Internet
X Wallonie Peer-to-peer Digital Rights Management X European Union (FP6, FP7) Private copying X j`jÀ>ÌÊ7>i ÀÕÝiià Piracy X F.R.S.-FNRS Access to culture X FUNDP Authorship Digital libraries
Partnership CONTACTS Séverine DUSOLLIER X ÕÀ«i>ÊÌ i>ÌVÊiÌÜÀÊ " 1 Ê «ÞÀ} ÌÊ>`ÊÌ iÊ [email protected] public domain) (some 30 countries are represented) Tel. 32 (0) 81 72 47 60 X European thematic network LAPSI (Legal aspects of public sector information) (some 20 countries are represented) Caroline KER X Belgian Council of Intellectual Property [email protected] Tel. 32 (0) 81 72 58 20 X Association Littéraire et Artistique Internationale (ALAI) (28 countries are represented) Caroline COLIN X Association for Teaching and Research in Intellectual Property [email protected] (ATRIP) (some 300 members of various countries) Tel. 32 (0) 81 72 52 07 X *\Ê 1ÛiÀÃÌÞÊ vÊ ØÃÌiÀÊ iÀ>Þ®]Ê 1ÛiÀÃÌÞÊ vÊ "ÃÊ ÀÜ>Þ®]Ê +ÕiiÊ >ÀÞÊ i}iÊ vÊ `Ê 1®]Ê 1ÛiÀÃÌÞÊ vÊ the Balearic Islands (Spain) WEB SITE http://www.crids.be X Creative Commons (Belgium)
Products and Services
X «ÞÀ} ÌÊ Vi>À>ViÊ vÀÊ >ÞÊ `}Ì>Ê «ÀiVÌÊ `}ÌÃ>Ì]Ê on-line provision of content, cloud computing, digital libraries, distance learning, …) X Analysing the application of copyright on the Internet X Policy and legal analysis and recommendations in copyright law X Assessing the collective management of copyright in Europe X Assessing the legal dimension of the design and deployment of digital rights management.
164 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY L 10
Legal Aspects of Cloud Computing
SENIOR SCIENTISTS: X Philippe LAURENT X Jean-Marc VAN GYSEGHEM X Jean-Philippe MOINY
Research Field and Subjects computing world. Enforcement of law and crime prosecution in the cloud also raise new challenges. The cloud and virtualisation With the amazing development of telecommunication technologies allow the clients to install, configure and use technologies and the exponential increase of bandwidth and remotely “virtual machines”, the location of which could be storage capacities, computing has evolved to a point where unknown from users and third parties. When rights, such as isolated machines are not pertinent anymore. Computing is IP rights for instance, are violated, or if crimes are committed now mainly based upon communication between servers, in such context, it is heavily burdensome to determine the clients, data centres and networks. The current trend is illegitimate acts or actions, to identify the responsible persons the mutualisation of resources in order to maximise their and to localise the incriminated data and files. allocation and to benefit from economies of scale. It allows the centralisation of machinery, calculation power, memory and software, as well as the supply of such resources amongst Representative References clients, according to their constantly actualised needs. These evolutions and tendencies have given birth to a federating but X POULLET Y., VAN GYSEGHEM J.-M., MOINY J.-P., GÉRARD J., quite blurred concept, namely “Cloud Computing”. This model GAYREL C., Data protection in the clouds, in GUTWIRTH S., is characterised by the remote use of shared pool of external POULLET Y., DE HERT P., LEENES R. (eds.), Computers, privacy resources (memory, CPU, software, platforms, virtual machines, and data protection : an element of choice. Springer: 377-409, data,…), which are at the disposal of the users by on-demand 2011. network access on an permanent, adaptable and scalable basis. X VAN GYSEGHEM J.-M., Cloud computing et protection des It offers an easier and cheaper access to the needed computing données à caractère personnel : mise en ménage possible? capabilities, through a certain dispossession of the user. R.D.T.I. 42: 35-50, 2011. This new model entails changes of practices and has major X POULLET Y., VAN GYSEGHEM J.-M., GÉRARD J., MOINY J.-P., consequences from a legal perspective. These issues henceforth GAYREL C., Cloud computing and its implications on data constitute an important part of the activities of the Research protection - discussion paper. Council of Europe, Project on Centre in Information, Law and Society (CRIDS). First of all, one Cybercrime: 28 p., 2010. will note that this more or less systematic externalisation of the computing infrastructures and resources creates a shift towards a system based on service contracts, where the customer is Funding extremely dependent on the cloud and the network providers, permanently relying on these services to drive his business or X Council of Europe simply to live his everyday life (e.g., using a social network X European Union site). Hosting and processing information in the cloud and its X IT Companies transfer beyond the state’s boundaries have also important legal consequences, especially when personal data or confidential data are involved. Sustainability, confidentiality and integrity of Partnership the data in the cloud, as well as security of the “network”, are crucial issues to be dealt with in a proper and legitimate manner. X Queen Mary, University of London (UK) Cloud computing also creates changes of paradigms and of X CETIC (Belgium) strategies in the field of intellectual property. The property of X IT Companies data, code and IP rights in and to the cloud are to be carefully analysed. The debates as to how to legally frame interoperability and standardisation are also of particular relevance in the cloud
165 Products and Services KEYWORDS Cloud computing
X The CRIDS closely follows the evolution of “cloud computing”, IT law Data protection and studies its legal and social implications from different E-Commerce points of view, including data protection, intellectual property Intellectual property protection, liability, computer crimes, contractual practices and Contract law other regulatory aspects, and provides studies on the topic. Service level agreements X The CRIDS’s team conducts researches and drafts scientific Computer criminality reports and articles on the topic. X The CRIDS organises and participates to national and CONTACTS international legal conferences related to the cloud computing Philippe LAURENT technology. [email protected] X The CRIDS has also created a regional think tank gathering Tel. 32 (0) 81 72 47 78 iÝ«iÀÌÃÊvÀÊ`vviÀiÌÊÃiVÌÀÃÊ>`Êwi`ÃÊvÊ>VÌÛÌÞ° Jean-Marc VAN GYSEGHEM i>>ÀV°Û>}ÞÃi} iJvÕ`«°>V°Li Tel. 32 (0) 81 72 58 23
Jean-Philippe MOINY i>« ««i°ÞJvÕ`«°>V°Li Tel. 32 (0) 81 72 52 07
WEB SITE https://www.crids.be
166 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 11
ÛiÀiÌ
SENIOR SCIENTISTS: X jViÊ`iÊ/ ,7 X >ÀiÊ" / ,- X ÃiÊ ,6 X >ÀiÊ "1
Research Field and Subjects Representative References
The legal issues raised by e-government (e-gov) are manifold. X `iÊ / ,7 Ê °Ê iÌÊ MOINY °* °]Ê Ê Ê >Ê VÀÃjiÊ `iÊ >Ê Almost all legal disciplines may be involved, depending on the publicité de l’administration, de la réutilisation des informations VÃ`iÀi`Ê«ÀiVÌ° `ÕÊÃiVÌiÕÀÊ«ÕLVÊiÌÊ`iÊ>Ê«ÀÌiVÌÊ`iÃÊ`jiÃÊ\ʽiÝi«iÊ`iÊ / ÕÃ]Ê Ì iÊ iÊ vÀÃÊ vÀÊ VÌâiÃÊ ÕÃÌÊ VÃ`iÀÊ Ì iÊ ÃÃÕiÃÊ la directive INSPIRE », C.D.P.K. n° 2, pp. 121-141 ., 2010. of form, validity and proof. The sharing of software between X `iÊ / ,7 Ê °]Ê Ê ,"9Ê °]Ê *"1 /Ê 9°]Ê Ê >Ê services raises issues of intellectual property and IT contracts. Convention européenne des droits de l’homme en filigrane The development of the eID platforms and the management de l’administration électronique », Entre ombres et lumières : of access to various databases maintained by the State involve cinquante ans d’application de la Convention européenne des respect for privacy (principles of necessity, proportionality…). droits de l’homme en Belgique, coll. de la Faculté de droit de The legal framework for authentic sources used by the ½1 ]Ê ÀÕÝiiÃ]Ê ÀÕÞ>Ì]Ê««°ÊÓnÎÎxÇ]Ê2008. }ÛiÀiÌÊ>ÃÊVÃÌÌÕÌiÃÊ>Ê>ÀÊV >i}iÊvÀÊ}ÛiÀiÌÃ°Ê X `iÊ / ,7 Ê °]Ê Ê >Ê «ÀÌiVÌÊ `iÃÊ `jiÃÊ DÊ Finally, the implementation of European legislation on the reuse caractère personnel et l’e-gouvernement » in Défis du droit à of information from the public sector (open data) requires la protection de la vie privée - Perspectives du droit européen >`ÕÃÌiÌÃÊÌÊÌ iÊvi`iÀ>Ê>`ÊÀi}>Êi}>ÊvÀ>iÜÀ°Ê/ ÃÊ et nord-américain. Challenges of Privacy and Data Protection raises, among others, some issues of intellectual property and Law – Perspectives of European and North American Law, coll. personal data protection. Cahiers du Centre de Recherches Informatique et Droit, n° 31, ÀÕÝiiÃ]Ê ÀÕÞ>Ì]Ê««°Êxäxx££]Ê2008. But e-gov raises also sociological and institutional concerns, X " / ,-Ê °ÊiÌÊ`iÊ/ ,7 Ê °]Ê`iʽ ÕÛiÀiiÌÊ important to the future of our democracy and the role of au gouvernement en réseau : questions de recherche pour les the state. The concepts of interoperability and of integration, sciences sociales, In Revue Terminal, Issues 99-100, 2007. which are very popular in computer science and are promoted for e-gov, raise wide institutional concerns regarding the roles and responsibilities of the various federated entities. Funding The modernisation of public administration also means the introduction of organisational changes which have to be X Wallonie iÝ«Ài`°Ê>Þ]ÊÌ iÊÃÌ>ÌiÊ >ÃÊ>ÊVÀÌV>ÊÀiÊÊÃV>ÊV iÃÊ X -*" and integration of all. Modernisation and the use of ever more X European FP advanced technologies of information can lead to make its >VViÃÃÊ`vwVÕÌÊvÀÊÃiÊVÌâiÃ]ÊLÕÌÊ>ÃÊÌʼ}ÛiÀ½ÊVÀi>Ã}ÞÊ using aggregated data in profiles, models or types both very À>ÌÛiÊ>`ÊÀi`ÕVÌÛiÊvÊÌ iÊVÌâiýÊÛ}ÊiÝ«iÀiVi°
/ iÊiÝ«iÀÌÃiÃÊvÊÌ iÊ , -ÊÀi}>À`\ qÊ / iÊi}>ÊvÀ>iÊvÊÌ iÊi}ÛÆ qÊ / iÊÀ}>Ã>Ì>ÊV >}iÊ>>}iiÌÆ qÊ / iÊ>ÃÃiÃÃiÌÊvÊiÌ V>]Ê«ÌV>Ê>`ÊÃV}V>Ê«>VÌÃÊ of e-government.
167 Partnership KEYWORDS Simplification
X Easi-Wal (Wallonie) Modernisation Public administration X Ê ÃÃÊ Li}iÊ `¿>VVmÃÊ iÌÊ `iÊ ÀjÕÌÃ>ÌÊ `iÃÊ "«iÊ >Ì> documents administratifs) Public archives
Products and Services CONTACTS Cécile DE TERWANGNE X i}>ÊÃÕ««ÀÌÊvÀÊi}ÛÊ«ÀiVÌÃ\Ê`À>vÌ}ÊvÊi}Ã>Ì]Êi}>Ê [email protected] assistance for data protection, for issues regarding authentic Tel. 32 (0) 81 72 49 61 sources, public archives… Claire LOBET-MARIS X "À}>Ã>Ì>Ê ÃÕ««ÀÌÊ vÀÊ i}ÛÊ «ÀiVÌÃ\Ê V >}iÃÊ >> [email protected] gement, organisation’s analysis, social and ethical requirements. Tel. 32 (0) 81 72 49 91
Elise DEGRAEVE [email protected] Tel. 32 (0) 81 72 49 61
Marie DEMOULIN [email protected] Tel. 32 (0) 81 72 49 61
WEB SITES http://www.crids.be http://info.fundp.ac.be/cita
168 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY L 12
/iV }ÞÊÃÃiÃÃiÌÊEÊÛiÀ>Vi
SENIOR SCIENTISTS: X >Ì >iÊ, X >ÀiÊ" / ,- X ÌiÌÌiÊ,"16,"9
Research Field and Subjects Representative References
The Technology Assessment is a set of methods and techniques X " / ,-Ê °]Ê , Ê °]Ê iÊ VÀ«ÃÊ iÊ iÌÊ «>Ã°Ê to give voice to people in the shaping of the technologies /À>ÛiÀÃjiÊjÌ µÕiÊ`iÃÊÌiV }iÃÊ`iÊ>ÊÃÕÀÛi>Vi]ÊÊjÀiÀÊEÊ and of the sciences & technologies policies. It aims at driving comprendre. Revue des Annales des Mines: Mars 2012. our technological environment not only with economic X , /Ê °]Ê,"16,"9Ê°]Ê°ÊLaw, Human Agency and and technical criteria, but also on basis of legal, ethical and Autonomic Computing - Philosophers of Law Meet Philosophers social concerns. In the field of IT, Technology Assessment of Technology. Routledge, 2011. ÃÊ vÕ`>iÌ>Ê ÌÊ Ì iÊ iÝÌiÌÊ Ì >ÌÊ Ì iÊ ÌiV }iÃÊ >ÀiÊ X , Ê °]Ê ", -Ê °]Ê" / ,-Ê °]Ê-V}V>Ê shaping our lifestyles, our social interactions and our political >`Ê iÌ V>Ê ÃÃÕiÃÊ Ê v>V>Ê ÀiV}ÌÊ ÃÞÃÌiÃ\Ê Ý«À}Ê Ì iÊ organisations. But Technology Assessment is also really critical possibilities for Improved critical assessments of technologies?, when considering the irreversibility and the pervasiveness of in - Ê ÓäänÊ qÊ *ÀVii`}ÃÊ vÊ Ì iÊ /iÌ Ê Ê ÌiÀ>Ì>Ê some emerging information and communication technologies. Symposium on Multimedia), 15-17 Dec. 2008. IEEE: p. 602-608, This is particularly the cases for very critical systems as those 2008. related to the surveillance technologies and to the medical ones X ,"16,"9Ê°]Ê*ÀÛ>VÞ]Ê >Ì>Ê*ÀÌiVÌ]Ê>`ÊÌ iÊ1«ÀiVi`iÌi`Ê vÀÊÜ V Ê , -Ê >ÃÊ`iÛi«i`Ê>ÊÕµÕiÊiÝ«iÀÌÃiÊÊ ÕÀ«i° Challenges of Ambient Intelligence. Studies in Ethics, Law, and /iV }Þ]Ê6°ÊÓ]ÊÃðʣ]ÊÀÌViÊÎ\Ê£x{]Ê2008. The Research Centre in Information, Law and Society (CRIDS) considers Technology Assessment as a set of methods and techniques that improve the democratic deliberation of our Funding future technological environment and therefore their social acceptability. X Wallonie X -*" / iÊiÝ«iÀÌÃiÃÊvÊ , -Ê>Ài\ X Europe FP qÊ ,ÃÃÊ>ÃÃiÃÃiÌÊvÊÌiV }V>ÊÃÞÃÌiÃÆ qÊ *ÕLVÊ`iLiÀ>ÌÊvÊÌiV }V>ÊV ViÃÆ qÊ i« ÊÃÕÀÛiÞÊÜÌ ÊiÝ«iÀÌÃÊÊ«ÀëiVÌÛiÊÃVi>ÀÃÆ qÊ Ì V>Ê}ÛiÀ>ViÊvÊ«ÀiVÌð
169 Partnership KEYWORDS Ethics X "-/ÊÓnÊVÃÌÓn°À}® Assessment Impacts X ESST (European Network in Sciences Society and Technology) Risks X Réseau FNRS Sciences Technologie et Société Democracy Deliberation
Products and Services CONTACTS
X Methodologies and tools for active technological choices’ Nathalie GRANDJEAN deliberation >Ì >i°}À>`i>JvÕ`«°>V°Li Tel. 32 (0) 81 72 49 61 X iÌ `}iÃÊ>`ÊÌÃÊvÀÊ *ÊÃÕÀÛiÞ X Methodologies and tools for ethical governance of ICT’s Claire LOBET-MARIS «ÀiVÌð [email protected] Tel. 32 (0) 81 72 49 91
Antoinette ROUVROY [email protected] Tel. 32 (0) 81 72 58 18
WEB SITES http://www.crids.be http://info.fundp.ac.be/cita
170 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 1
Calcul Intensif et de Stockage de Masse (CISM)
SENIOR SCIENTISTS: X / >ÃÊ 1/ X iÀ>À`Ê6 Ê, / , X Luc SINDIC X >iÊ, "-
Research Field and Subjects Partnership
CISM is an inter-disciplinary high-performance computing X CÉCI: « Consortium des Equipements de Calcul Intensif », facility. It was created in 2004 by, and for, the scientists engaged ÃÕ««ÀÌi`ÊLÞÊÌ iÊ ,-°Ê ÊVÕ`iÃÊÌ iÊ* ÊViÌÀiÃÊvÊÌ iÊ in the field of numerical simulations. Since then, CISM has universities in Belgian French Community. empowered researchers from many distinct areas with the X , \Ê i}>Ê , Ê Ì>ÌÛiÊ vÀÊ ÀiÃi>ÀV Ê iÀ`]Ê ability to refine models, test theories, and develop algorithms, coordinated by Belnet. up to levels which cannot be attained with simple workstations X SMCS: Plateforme technologique de Support en Méthodologie or local servers. et Calcul Statistique of UCL
In 2010, the CISM facilities have been used to produce more than 60 high-quality scientific publications in research areas such Main Equipment as climatology, nuclear physics, analytic chemistry, materials engineering, nanotechnologies, theoretical physics, optics, X The CISM facilities consist mainly of 3 clusters for a total of numerical mechanics, and nonparametric statistics. No less than more than 2100 CPU cores and 18 Tflops peak and nearly 8 TB 28 distinct research poles, belonging to 5 universities, use the of RAM: - ÊV«ÕÌ}Ê«ÜiÀÊÊ>ÊÀi}Õ>ÀÊL>ÃÃÊvÀÊÌ iÀÊ«ÀiVÌð qÊ i>ÌÀi\Ê ÓxÈÊ *1Ê Ê "«ÌiÀÊ ÓxÓJÓ°ÈÊ âÊ >`Ê ÈÊ *1Ê ÌiÊ 8iÊ xxÓäJÓ°ÓÇÊ â]Ê - ,Ê wL>`Ê ÜÊ >ÌiVÞÊ / iÊ - Ê v>VÌiÃÊ >ÜÊ iÊ ÌÊ «À`ÕViÊ >`ÉÀÊ «ÀViÃÃÊ ÛiÀÞÊ ÌiÀViVÌʳÊnÊ- *Ê>V iÃÊÜÌ ÊÕ«ÊÌÊ£ÓnÊ ÊvÊiÀÞ° large amounts of data, but also to apply costly algorithms to qÊ , \ÊÎÓÊ *1Ê8iÊx{ÓäJÓ°xÊâ]ÊL ÊÌiÀViVÌ° ÀiÊÀi>Ã>LÞÃâi`Ê`>Ì>ÃiÌðÊ1ÃiÀÃÊV>ÊÀiÞÊÊ>ÊÃÌÀ}Ê>`Ê qÊ ÊÊV>LÀ>ÌÊÜÌ Ê ®\Ên£ÈÊ *1Ê Ê"«ÌiÀÊ ÀiV}Ãi`ÊÜ ÜÊ>`ÊiÝ«iÀÌÃiÊÊ«>À>iÊ«À}À>}]Ê È£Ç{JÓ°ÓÊâ]ÊÕ«ÊÌÊx£ÓÊ ÊvÊ, Ê«iÀÊ`i]Ê+ ,ÊwL>`Ê optimised libraries, and diverse compilers. The CISM facilities are interconnect. also equipped with many scientific computing software’s, both X A new cluster (in collaboration with CÉCI) containing more generalist and highly specialised. than 1000 CPU cores, is planned for the beginning of 2012. X The CISM also safely and securely hosts more than 250 TB of Besides high-performance computing, CISM offers high- data accessible though high-bandwidth networks. performance storage of the data so they can be accessed from X All the equipment is located in two computing rooms the computing facilities and the researcher workstations rapidly, equipped with water-cooling and air-cooling systems. securely, and safely.
Funding
Fonds de la recherche scientifique (F.R.S.-FNRS)
171 Products and Services KEYWORDS } Ê*iÀvÀ>ViÊ «ÕÌ} X Installation, configuration, and optimisation of hardware and Super (very large) computers software infrastructures for high-performance computing *>À>iÊ«À}À>}É>}ÀÌ ÃÌÀLÕÌi`ÊwiÊÃÞÃÌiÃÊÉÊ >ÃÃÊÃÌÀ>}i X Training regarding all user-related aspects of high-performance Batch processing systems computing: code optimisation, parallelisation, optimised Numerical algorithms LÀ>ÀiÃ]ÊV«iÀÃ]ÊVÕÃÌiÀÊV«ÕÌ}]Ê*1ÊV«ÕÌ}° X 1ÃiÀÊÃÕ««ÀÌÊvÀÊV`iÊ«ÌÃ>ÌÊÊÀÌÀ>]Ê É ³³]Ê*ÞÌ ]Ê and other languages. CONTACTS X 1ÃiÀÊÃÕ««ÀÌÊvÀÊVÕÃÌiÀÊÕÃ>}i\ÊÀiÌiÊ>VViÃÃ]ÊÃVÀ«Ì}]ÊLÊ Thomas KEUTGEN resource evaluation, etc. [email protected] Tel. 32 (0) 10 47 32 39 X Access to fully licensed professional compilers and other commercial scientific software. Bernard VAN RENTERGHEM [email protected] Tel. 32 (0) 10 47 81 91
Luc SINDIC [email protected] Tel. 32 (0) 10 47 26 52
Damien FRANÇOIS [email protected] Tel. 32 (0) 10 47 32 65
Bertrand CHENAL (logisticien FNRS, CECI) [email protected] Tel. 32 (0) 10 47 34 63
WEB SITE www.cism.ucl.ac.be
172 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 2
Interuniversity Scientific Computing Facility
SENIOR SCIENTISTS: X i>Ê*Ê6 ," X iÌÊ * X "ÛiÀÊ *,- X ÕVÊ ,, X Philippe LAMBIN X >iÊ*°Ê6 , 1/ , X Frédéric WAUTELET X >Ê7"1/ ,-
Research Field and Subjects Representative References
The interuniversity Scientific Computing Facility was created X Ê-° °]Ê "1 Ê ° °]Ê Ê7 ,"-- Ê °ÊandÊ * Ê in 1985 to help Belgian scientists working in the fields of B., Theoretical Assessment of New Molecules for Second-Order Non- theoretical physics and chemistry to access powerful computing linear Optics]ÊÌ°Ê°Ê+Õ>ÌÕÊ i°Ê£££]Ê£xnΣxx]Ê2011. resources in a constructive spirit of know-how sharing. Since X6 ," Ê°*°]Ê- " -Ê*°]Ê "Ê°]Ê 9Ê°]Ê7 -",Ê ° °]Ê that time, the computing resources have roughly doubled every "" ,Ê°°]Ê>`Ê,--,/Ê °]ÊReverse color sequence in the two years, reaching a theoretical performance of 9 Tflops in the diffraction of white light by the wing of the male butterfly Pierella current cluster configuration. luna (Nymphalidae: Satyrinae), Phys. Rev. E 82, 021903, 2010. X, -Ê °]Ê 1 , Ê °]Ê *+1 Ê °*°]Ê Ê ,19 Ê °]Ê The organisation of the centre is still thematic and oriented +Ê °ÊandÊ7"1/ ,- °]ÊAnalysis of the interactions taking towards solving problems in computational physics and place in the recognition site of a bimetallic Mg(II)-Zn(II) enzyme, chemistry, bringing in the simplification of a coherent tool isopentenyl diphosphate isomerase: a parallel quantum- «ÌÃi`ÊvÀÊ>ÊvVÕÃi`ÊLiVÌÛi°ÊÌÊÌ iÊ>ÃV>i]ʵÕ>ÌÕÊ chemical and polarizable molecular mechanics study]Ê °Ê * ÞÃ°Ê chemistry and numerical solid state physics merge and share Chem. B, 114, 4884-4895, 2010. common numerical tools. X6 ," Ê °*°Ê>`Ê - " -Ê *°]Ê Structural Colours]Ê Ê jÀiÊ >Ã>ÃÊ >`Ê -Ìi« iÊ °Ê -«Ã]Ê i`ÌÀÃ\Ê `Û>ViÃÊ Ê ÃiVÌÊ The iSCF allows us to perform quantum chemistry calculations * ÞÃ}Þ]ÊV>`iVÊ*ÀiÃÃÊ ÕÀ}Ì®Ê6°ÊÎn]Ê««°Ê£n£Ó£n]Ê2010. ÜÌ Ê }ÀÜ}Ê V«iÝÌÞÊ >`Ê Ã« ÃÌV>Ì]Ê ÃÊ Ì >ÌÊ Ì iÊ X1/ 1 ,Ê°]Ê /Ê°]Ê-Ê °]Ê 1 "Ê9°]Ê Ê°°]Ê systems under study today are clearly in the scale range of /,9Ê *°°]Ê * , -Ê °Ê andÊ * Ê °, Theoretical >VÀiVÕiÃ]Ê ÃÕ«À>iVÕiÃ]Ê >`Ê >ÃÌÀÕVÌÕÀiÃ°Ê "Ê simulation of vibrational sum-frequency generation spectra from Ì iÊ Ì iÀÊ i`]Ê « ÞÃVÃÊ vÊ Ã`Ê >ÌiÀ>ÃÊ iÝÌi`Ê ÌÊ Ì iÊ iÃÃÊ density functional theory: Application to p-nitrothiophenol and symmetric cases of structured materials and nanoparticles. 2,4-dinitroaniline, ChemPhysChem 10, 2132-2142, 2009. Present investigations tackling chromophores, proteins X *,-Ê "°]Ê 6 ," Ê °Ê *°]Ê 1-/--" Ê "°Ê >`Ê and DNA strands in interaction with drugs, carbon (nano) ,"1* /Ê °]Ê"«Ìâ>ÌÊvÊ« ÌVÃÊvÀÊVÀÀÕ}>Ìi`ÊÌ clusters, nanotubes and (nano)sheets (including graphene), wÊÃ>ÀÊViÃ]Ê°Ê««°Ê* ÞðʣäÈ]Êä{xäx]Ê2009. and inorganic mesoporous materials address their structural, X ,/ L. and 6 , 1/ , Ê °*°, Coarse Point Charge thermodynamical, electronic, optical, magnetic, and vibrational Models For Proteins From Smoothed Molecular Electrostatic properties. Potentials]Ê°Ê i°Ê/ iÀÞÊ «ÕÌ°]Êx]ÊÎÓÇÎÓn]Ê2009. X *"*"6Ê 6° °]Ê ,, Ê °Ê >`Ê Ê * °]Ê Resonant Raman "ÛiÀÊÀiViÌÊÞi>ÀÃ]ÊÌ iÊ- Ê«ÀiVÌÊ >ÃÊ>ÃÊVÕ`i`ÊÌ iÀiÌV>Ê spectra of graphene with point defects. Carbon 47,2448-55, 2009. developments in the field of photonics, as needed for the control X "-Ê 6°]Ê,11 Ê °]Ê andÊ * Ê °, An analytical vÊ} ÌÊyÕÝiÃÊÊÌÀ>ëÀÌ]Ê« ÌÛÌ>VÊ`iÛViÃ]Ê}V>Ê`iÛViÃ°Ê derivative procedure for the calculation of vibrational Raman In this direction, new methodologies are proposed to address optical activity spectra]Ê°Ê i°Ê* ÞðʣÓÇ]ÊÓä{£äx]Ê2007. LiÌVÊ>ÌiÀ>ÃÊ>`Ê«>ÃVÊÃÞÃÌiðÊÀÊiÝ>«i]ÊÌ iÊ reverse engineering of natural structures implies developing large-scale simulations of electromagnetic waves propagation Awards Ê } ÞÊV«iÝÊÃÌÀÕVÌÕÀið /Ài>Ê*ÀâiÊvÊÌ iÊ i}ÕÊ,Þ>Ê-ViÌÞÊvÊ iÃÌÀÞÊÓääÎ\Ê iÌÊ * ]ÊÓää\Ê >Ê7"1/ ,-® ÊÓää]ÊÕVÊ ,, ÊÀiViÛi`Ê>ʼ-«iV>ÊÀiV}ÌÊ`«>½Ê by the World Cultural Council
173 Funding KEYWORDS / iÀiÌV>Ê>`Ê+Õ>ÌÕÊV iÃÌÀÞ F.R.S.-FNRS, European (FP6, FP7), Wallonie, Fédération Wallonie- Theoretical Physics Scientific Computing ÀÕÝiiÃÊ, ®]Ê*ÊÈÉÓÇ Electronic properties "«ÌVÃ Photonic crystals Partnership Biophotonics Plasmonic XUniversity of Mons (The iSCF is a shared high-performance computing center with UMons) XUniversity of California in Santa Barbara (USA) CONTACTS X1ÛiÀÃÌÞÊvÊ À`i>ÕÝÊÀ>Vi® Jean Pol VIGNERON XUniversity of Sherbrooke (Canada) i>«°Û}iÀJvÕ`«°>V°Li Tel. 32 (0) 81 72 47 11 X"Ã>>Ê1ÛiÀÃÌÞÊ>«>® X1iÕÛi]Ê1 ÕÛ>]Ê1>ÃÃiÌ]Ê1}iÌ]Ê1 Benoît CHAMPAGNE X1ÛiÀÃÌjÊ*iÀÀiÊiÌÊ >ÀiÊ ÕÀiÊqÊ*>ÀÃÊÈ [email protected] X1ÛiÀÃÌjÊ `iÀÌÊqÊ*>ÀÃÊÇ Tel. 32 (0) 81 72 45 54 X >ÌÕÀ>ÊÃÌÀÞÊ ÕÃiÕÊqÊ` XLinköping University (Sweden) WEB SITE XUniversity of Stockholm (Sweden) http://www.iscf.be XMoscow State University (Russia)
Main Equipment iSCF cluster consists of 85 computing nodes for a total of 792 cores with a peak performance of 9 Tflops, 6 interactive `iÃÊvÀÊÜ V ÊLÃÊV>ÊLiÊÃÕLÌÌi`ÊÌÊÌ iÊLÊÃV i`ÕiÀÊÌÊ run on the nodes and two file servers with about 45 TB of disk space available. There are two main types of compute nodes: qÊ xnÊ`iÃÊÜÌ Ê£ÈÊÀÊÈ{Ê ÊvÊiÀÞ]Ê`Õ>Ê+Õ>` ÀiÊÌiÊ 8iÊ8x{Èä° qÊ ÓxÊ`iÃÊÜÌ ÊÎÈÊÀÊÇÓÊ ÊvÊiÀÞ]Ê`Õ>Ê-Ý ÀiÊÌiÊ 8iÊ8xÈxä°
Products and Services
Elaboration and implementation of methods of theoretical chemistry and physics as well as of optics Simulations of structural, electronic, optical, magnetic, and vibrational properties of molecules, supramolecules, clusters, polymers, surfaces, and crystals.
174 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY M 3
Web-based environments for English use in professional and academic settings
SENIOR SCIENTISTS: X Sylviane GRANGER X Magali PAQUOT
Research Field and Subjects Representative References
The Centre for English Corpus Linguistics (CECL) specialises in XGRANGER S., Electronic lexicography: From challenge to the use of corpora and corpus linguistics techniques to inform opportunity. In Granger, S. & Paquot, M. (Eds.) Electronic needs driven English writing aid tools. Its research expertise Lexicography. Oxford: Oxford University Press, 2012. covers every aspect of design and production of web-based XPAQUOT M., Automated customization or how to bring environments for English use in professional and academic electronic dictionaries closer to their users. In Granger, S. & settings, and includes (1) corpus building, (2) extraction of Paquot, M. (Eds). Electronic Lexicography. Oxford: Oxford domain-specific terminology, (3) lexicographical analysis of University Press, 2012. words, (4) warnings against common difficulties and errors XGRANGER S. & PAQUOT M., Customising a general EAP and (5) pedagogical materials development (e.g. tailor-made dictionary to meet learner needs. In Granger, S. & Paquot, M. exercises). (Eds). eLexicography in the 21st century: New challenges, new applications. Cahiers du CENTAL 7. Louvain-la-Neuve, Presses The CECL’s hallmark lies in the systematic use of corpora, i.e. universitaires de Louvain, pp. 87-96. 2010. large databases of texts, to conduct its research. Corpora of XGRANGER S. & PAQUOT M., The Louvain EAP dictionary. expert writing are used to provide detailed lexicographical Proceedings of the XIV Euralex International Congress, descriptions of words in terms of meaning, translation, Leeuwarden, The Netherlands, pp. 321-326. 2010. frequency, collocations and recurrent phrases. Learner corpora XPAQUOT M. & BESTGEN Y., Distinctive words in academic (i.e. corpora of non-native writing) serve to investigate non- writing: a comparison of three statistical tests for keyword native writers’ difficulties. Various automated techniques are extraction. In Jucker, A., Schreier, D. & M. Hundt (Eds) Corpora : used to analyse corpora, e.g. keyword identification, n-gram Pragmatics and Discourse. Amsterdam: Rodopi, 247–269, 2009. extraction and collocation analysis. XGRANGER S. & PAQUOT M., From dictionary to phrasebook? In Bernal, E. and DeCesaris, J. (Eds) Proceedings of the XIII After a fruitful collaboration with the ILT KULeuven on a University EURALEX International Congress, Barcelona, Spain, 1345-1355, Terminology database, i.e. a French-English-Dutch terminological 2008. database of university-related terms (e.g. coordinated research project, co-supervision agreement), the CECL is now writing a dictionary of academic vocabulary, i.e. words that are used to Funding structure an academic text (e.g. to introduce a new topic, to sum up or conclude a text). One highly innovative feature of the XFSR-FNRS Louvain English for Academic Purposes Dictionary (LEAD) is its XFédération Wallonie-Bruxelles customisability: the content is automatically adapted to users’ needs in terms of discipline and mother tongue background (L1). Discipline-based customisation serves to illustrate words Partnership in a context that is relevant for the user and provide access to discipline-specific corpora. L1 customisation serves to give XKatholieke Universiteit Leuven, Belgium feedback on errors and problems that a specific L1 population XUniversity of Lancaster, UK typically encounters.
175 Products and Services KEYWORDS Custom dictionary Services: English for Specific Purposes Localisation XAnalysis of users’ writing needs Needs analysis X ÝÌÀ>VÌÊvÊ`>ëiVwVÊÌiÀ}Þ /iÀ}ÞÊiÝÌÀ>VÌ XCompilation of custom dictionaries Writing aid XDesign of localised writing aid environments for professional Pedagogical materials development English
Products: CONTACT XThe Louvain EAP dictionary Sylviane GRANGER [email protected] Tel. 32 (0) 10 47 49 47
WEB SITES http://www.uclouvain.be/en-cecl.html http://sites-final.uclouvain.be/lexique/lexique.php
176 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 4
A world-wide computing grid for LHC data analysis
SENIOR SCIENTISTS: X >VÊ ,1 " X Pavel DEMIN X 6ViÌÊ /,
Research Field and Subjects Representative References / iÊ >À}iÊ >`ÀÊ `iÀÊ ®]Ê Ê «iÀ>ÌÊ >ÌÊ Ì iÊ , Ê >LÀ>ÌÀÞÊ Ê iiÛ>Ê -ÜÌâiÀ>`®Ê ÃViÊ ÛiLiÀÊ Óää]Ê X -Ê " ",/" °Ê -i>ÀV Ê vÀÊ ,iÃ>ViÃÊ Ê Ì iÊ is designed to produce proton-proton collisions at the i«ÌÊ >ÃÃÊ ÃÌÀLÕÌÊ Ê ««Ê VÃÃÊ >ÌÊ ÃµÀÌÃ®Ê rÊ ÇÊ /i6°Ê Õ«ÀiVi`iÌi`ÊiiÀ}ÞÊvÊ£{Ê/i6°Ê1 Ê« ÞÃVÃÌÃÊ>ÀiÊÛÛi`ÊÊ *Ê££äx\äÎ]Ê2011. Ì iÊ -ÊiÝ«iÀiÌÊ «>VÌÊ ÕÊ-i`®]ÊÜ V ÊÃÊiÊ X -Ê " ",/" °Ê -i>ÀV Ê vÀÊ i>ÛÞÊ -Ì>LiÊ >À}i`Ê vÊÌ iÊÌÜÊ>ÊiÝ«iÀiÌÃÊvÕÀÊÊÌÌ>®ÊÌ >ÌÊÜÊÃÌÕ`ÞÊÌ iÊ *>ÀÌViÃÊÊ««ÊVÃÃÊ>ÌÊõÀÌîÊrÊÇÊ/i6°Ê *ÊäÎÊäÓ{]Ê2011. VÃÃÊ«À`ÕVi`ÊLÞÊÌ iÊ °Ê/ iÊ Ê>`Ê -Ê>ÀiÊiÝ«iVÌi`Ê X -Ê " ",/" °Ê ÀÃÌÊ i>ÃÕÀiiÌÊ vÊ Ì iÊ ÀÃÃÊ to be operated for at least 10 years and will allow elementary -iVÌÊ vÀÊ /«+Õ>ÀÊ *>ÀÊ *À`ÕVÌÊ Ê *ÀÌ*ÀÌÊ particles and their fundamental interactions to be studied at the ÃÃÊ>ÌÊõÀÌîrÇÊ/i6°Ê* ÞðiÌÌ° Èx\{Ó{{{Î]Ê2011. ÕiÝ«Ài`Ê/i6ÊiiÀ}ÞÊÃV>i° X -Ê " ",/" °Ê -Ê ÌÀ>V}Ê «iÀvÀ>ViÊ ÀiÃÕÌÃÊ / iÊ>ÕÌÊvÊ`>Ì>ÊÀiVÀ`i`ÊLÞÊÌ iÊ ÊiÝ«iÀiÌÃÊÊiÊÞi>ÀÊ vÀÊi>ÀÞÊ Ê«iÀ>Ì°Ê ÕÀ°Ê* ÞÃ°Ê°Ê ÊÇä]Ê££Èx]Ê2010. corresponds to about 107 gigabytes. This figure is almost 100 ÌÌ«\ÉÉ `° >`i°iÌÉÓäÇn°£ÉnnÇäÈ ÌiÃÊ } iÀÊÌ >ÊÊ«ÀiÛÕÃÊ } iiÀ}ÞÊ« ÞÃVÃÊiÝ«iÀiÌÃ°Ê X -Ê " ",/" ]Ê -Ê >Ì>Ê *ÀViÃÃ}Ê 7ÀyÜÃÊ Furthermore, it does not include simulation data to be produced `ÕÀ}Ê>Ê ÝÌi`i`Ê ÃVÊ,>ÞÊ,Õ°Ê°ÊÃÌ°ÊxÊ/äÎääÈ]Ê2010. in order to compare measurements to theoretical predictions. X -Ê " ",/" °Ê / iÊ -Ê iÝ«iÀiÌÊ >ÌÊ Ì iÊ , Ê In addition, the data will have to be re-processed and analysed °Ê -/ÊÎÊ-änää{]Ê2008. very frequently by the 2000 physicists of the 200 Institutes X -Ê " ",/" °Ê -\Ê / iÊ V«ÕÌ}Ê «ÀiVÌ°Ê worldwide that constitute the CMS Collaboration. /iV V>Ê`iÃ}ÊÀi«ÀÌ]Ê , ÓääxäÓÎ]Ê2005. Efficient data processing and analysis of the large amount of Ê`>Ì>Ê>ÃÊÜiÊ>ÃÊÌ iÊ`ÃÌÀLÕÌi`Ê>ÌÕÀiÊvÊÌ iÊ >LÀ>ÌÊ require a highly powerful and sophisticated distributed Funding V«ÕÌ}ÊvÀ>ÃÌÀÕVÌÕÀi]ÊÌ iÊ7À`Ü`iÊ Ê «ÕÌ}ÊÀ`Ê 7 ®°Ê/ iÊ7 Ê>ÜÃÊÌÀ>ë>ÀiÌÊÕÃiÊvÊà >Ài`ÊV«ÕÌ}Ê F.R.S.-FNRS Convention IISN: 4.4.505.05 resources. UCL is operating a “Tier-2” computing site, which is vÕÞÊ Ìi}À>Ìi`Ê ÜÌ Ê Ì iÊ 7 °Ê Ê Óä££Ê Ì iÊ ViÌÀiÊ ÃÌi`Ê 400 TB of mass storage and 450 CPU cores connected to the Partnership ÌiÀiÌÊÜÌ Ê>Ê£äÊLÉÃÊ`i`V>Ìi`Êi° ÌÊ Ì iÊ i}>Ê iÛi]Ê Ì iÊ «ÀiVÌÊ ÛÛiÃÊ >Ê Ì iÊ i}>Ê X7 Ê >LÀ>Ì 1ÛiÀÃÌiÃÊÊÌ iÊ -Ê >LÀ>ÌÊ1]Ê1 ]Ê1iÌ]Ê1 ]Ê XCMS Collaboration 1 ÃÊ>`Ê61 ®ÊÜÌ Ê>ÊÃiV`ÊV«ÕÌ}ÊViÌÀiÊV>Ìi`ÊÊ Ì iÊ1 É61 ÊV>«Õð
177 Main Equipment KEYWORDS Particle physics The UCL Tier-2 computing center consists of 74 computing CMS nodes for a total of 456 cores with a peak performance of 3500 7 *-* äÈ]Ê£ÓÊwiÊÃiÀÛiÀÃÊÜÌ Ê>LÕÌÊ{ääÊ/ ÊvÊ`ÃÊë>ViÊ À` available. There are 4 main types of computer nodes: 12 nodes Computing ÜÌ ÊÎÊ ÊvÊiÀÞÊ>`Ê`Õ>Ê-}i ÀiÊ Ê"«ÌiÀÊÓ{nÆÊ CERN £ÈÊ `iÃÊ ÜÌ Ê {Ê Ê vÊ iÀÞÊ `Õ>Ê Õ> ÀiÊ ÌiÊ 8iÊ Tier-2 x£ÈäÆÊ£{Ê`iÃÊÜÌ Ê£ÈÊ ÊvÊiÀÞÊ>`Ê`Õ>Ê+Õ>` ÀiÊ ÌiÊ8iÊ xÎ{xÆÊÎÓÊ`iÃÊÜÌ Ê£ÈÊ ÊvÊiÀÞÊ>`Ê`Õ>Ê CONTACTS +Õ>` ÀiÊÌiÊ8iÊ x{Óä°Ê/ iÊViÌiÀÊÃÊViVÌi`ÊÌÊÌ iÊ Giacomo BRUNO 7 Ê>`ÊÌ iÊÌiÀiÌÊÜÌ Ê>Ê£äÊLÉÃÊ`i`V>Ìi`Êi° >V° ÀÕJÕVÕÛ>°Li Tel. 32 (0) 10 47 32 15
Products and Services Pavel DEMIN [email protected] XAnalysis and storage of the data recorded by the CMS Tel. 32 (0) 10 47 31 65 iÝ«iÀiÌ° Vincent LEMAITRE X-Õ>ÌÊvÊ`>Ì>Ê«À`ÕVi`ÊLÞÊÌ iÊ -ÊiÝ«iÀiÌ° 6ViÌ°i>ÌÀiJÕVÕÛ>°Li Tel. 32 (0) 10 47 32 41 These services are open to an international collaboration of about 200 research institutes worldwide and are performed Ì >ÃÊÌÊÌ iÊ7 ÊÃvÌÜ>ÀiÊvÀ>ÃÌÀÕVÌÕÀi° WEB SITES http://cp3.irmp.ucl.ac.be http://lcg.web.cern.ch/LCG http://cms.web.cern.ch
178 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 5
1 Ê ÀÞ«ÌÊÀÕ«
SENIOR SCIENTISTS: X "ÛiÀÊ* , , X À>XÃ8>ÛiÀÊ-/ ,/
Research Field and Subjects X 1 Ê-°]Ê, ,Ê-°Ê>`Ê* , ,Ê"°]Ê-Õ>ÌÊL>Ãi`Ê ÃiVÕÀÌÞÊÊÌ iÊ>««i`Ê«ÊV>VÕÕÃ]ÊÊ,°Ê>>Ê>`Ê°ÊÕ>À]Ê / iÊ1 Ê ÀÞ«ÌÊÀÕ«Ê}>Ì iÀÃÊÓÊvÕÌiÊ«ÀviÃÃÀÃ]ÊÇÊ«ÃÌ`VÃÊ editor(s), Foundations of Software Technology and Theoretical and 12 PhD students with backgrounds from microelectronics, «ÕÌiÀÊ -ViViÊ qÊ -// -Ê Óää]Ê iLâÊ ÌiÀ>Ì>Ê telecommunications, computer science and mathematics. This Proceedings in Informatics, December 2009. wide diversity of knowledge allowed the group to develop a X-/ ,/Ê °8°]Ê Ê /°°]Ê 91 Ê °]Ê Ê 1wi`Ê ÃÌÀ}ÊiÝ«iÀÌÃiÊÊVÀÞ«Ì}À>« Þ]ÊLÕÌÊ>ÃÊÊÌÃÊ>««V>ÌÃÊÌÊ À>iÜÀÊ vÀÊ Ì iÊ >ÞÃÃÊ vÊ -`i >iÊ iÞÊ ,iVÛiÀÞÊ various security related issues, including physical attacks and Attacks, in the proceedings of Eurocrypt 2009, Lecture Notes in VÕÌiÀi>ÃÕÀiÃÊ Ê Ã>ÀÌV>À`Ã]Ê *Ã]Ê - î]Ê « ÞÃV>ÞÊ «ÕÌiÀÊ-ViVi]ÊÛÊx{Ç]Ê««Ê{{Î{È£]Ê }i]ÊiÀ>Þ]Ê unclonable functions (PUFs), efficient implementation of Springer, April 2009. cryptosystems, design and analysis of cryptosystems and protocols, elliptic curves, formal foundations of cryptography, âiÀÜi`}iÊ`iÌwV>Ì]Ê«ÀÛ>VÞÊi >V}ÊÌiV }iÃ]Ê Awards secure multiparty computation, voting systems, etc. À>XÃ8>ÛiÀÊ-Ì>`>iÀÌÊÀiViÛi`ÊÌ iÊvÜ}Ê>Ü>À`Ã\ Through its strong commitment to academic research (more than X Ê"ÕÌÃÌ>`}Ê`ÃÃiÀÌ>ÌÊ>Ü>À`]ÊÓää{ÊÀiViÛi`ÊvÀÊ 150 international publications since 2004) and its numerous the European Design and Automation Association for the best V>LÀ>ÌÃÊÜÌ Ê`ÕÃÌÀ>Ê«>ÀÌiÀÃ]ÊÌ iÊ1 Ê ÀÞ«ÌÊÀÕ«Ê PhD thesis in category “innovative embedded system design”). is intensively involved in the evolution of security technology, X ÕÀ«i>Ê ,iÃi>ÀV Ê ÕVÊ , ®Ê -Ì>ÀÌ}Ê À>ÌÊ vÀÊ VÕ`}Ê Ì iÊ `iÃ}Ê vÊ Ì iÊ iÝÌÊ }iiÀ>ÌÊ vÊ Ã>ÀÌV>À`Ã]Ê «ÀiVÌÊ ,-\Ê `iÛi«iÌÊ vÊ VVÀiÌiÊ L>ÃiiÌÃÊ vÀÊ sensor network security, election systems, etc. Ì iÊ iÝÌÊ }iiÀ>ÌÊ vÊ VÀÞ«Ì}À>« VÊ >}ÀÌ ÃÊ >`Ê Ì iÀÊ implementation. / iÊ1 Ê ÀÞ«ÌÊÀÕ«Ê>ÃÊ}>ÛiÊÀÃiÊÌÊÃiÛiÀ>ÊëvvÃ\Ê"VÌ>ÃÊ Óäää®]ÊÓ ÀÞ«ÌÊÓääήÊ>`ÊÌ*ÝÊ-°°ÊÓääÈ®° "ÛiÀÊ*iÀiÀ>ÊÀiViÛi`ÊÌ iÊvÜ}Ê>Ü>À`Ã\ X iÃÌÊ «>«iÀÊ >Ü>À`\Ê iÊ ``>]Ê "ÛiÀÊ `iÊ >Àivvi]Ê "ÛiÀÊ *iÀiÀ>]Ê >`Ê i>>VµÕiÃÊ +ÕõÕ>ÌiÀ°Ê iVÌ}Ê >Ê 1ÛiÀÃÌÞÊ Representative References *ÀiÃ`iÌÊ1Ã}Ê"«iÕ`ÌÊ6Ì}\Ê>ÞÃÃÊvÊ,i>7À`Ê1ÃiÊ vÊiÃ]ÊÊ °ÊivviÀÃ]Ê°°Ê>]Ê/°Ê À>]Êi`ÌÀî]Ê iVÌÀVÊ X , , Ê °]Ê ",/ ,Ê 6°]Ê * , ,Ê "°]Ê - 9/Ê °Ê >`Ê 6Ì}Ê /iV }ÞÊ 7Àà «É7Àà «Ê Ê /ÀÕÃÌÜÀÌ ÞÊ 7, - Ê °]Ê `>«Ì}Ê iÃÊ vÀÊ «ÀÛ>LiÊ L>ÌÊ «ÀÛ>VÞ]Ê iVÌÃ]Ê1ÃiÝ]ÊÕ}ÕÃÌÊÓää° Ê 6>ÞÊ ÌÕÀ]Ê >Õ`>Ê >â]Ê i`ÌÀî]Ê «ÕÌiÀÊ -iVÕÀÌÞÊ qÊ -", -Ê Ó䣣]Ê iVÌÕÀiÊ ÌiÃÊ Ê «ÕÌiÀÊ -ViVi]Ê -«À}iÀ]Ê Sept. 2011. Partnership X, /Ê°]Ê -Ê,°]Ê- Ê°,°]Ê-/ ,/Ê°8°]Ê 7 - Ê °]ÊÊÀ>â>ÌÊvÊÌ iÊ-iVÕÀÌÞÊi>ÌÕÀiÃÊvÊ Member of the networks: Physical Functions, in the proceedings of the IEEE Symposium X ,9*/ÊÊ ÕÀ«i>Ê iÌÜÀÊvÊ ÝViiViÊÊ ÀÞ«Ì}Þ Ê-iVÕÀÌÞÊ>`Ê*ÀÛ>VÞ]Ê««ÊÎÇ{£Ó]Ê">>`]Ê >vÀ>]Ê1-]Ê XLSEC information security cluster May 2011. X 1- -Ê>`Ê,- " *Ê}À>`Õ>ÌiÊÃV à X91Ê9°]Ê-/ ,/Ê°8°]Ê* , ,Ê"°Ê>`Ê91 Ê °]Ê*À>VÌV>Ê leakage-resilient pseudorandom generators, Proceedings of Academia: Columbia University, INRIA, Massachusetts Institute the 17th ACM conference on Computer and communications vÊ/iV }Þ]Ê]Ê /Ê<ÕÀV o ÃiVÕÀÌÞ]Ê«>}iÃÊ£{££x£]Ê ]Ê"VÌLiÀÊ2010.
179 Industry: Orange France Telecom R&D, ST Microelectronics, NXP, KEYWORDS Thales… Block ciphers Cryptography Electronic voting FGPA Funding Number theory PUF XEurope: TAMPRES, CRASH, B-CCENTRE Privacy-preserving systems XBelgium: BCRYPT Secure multiparty computation XWallonie: MIPSs, CAMUS, SEE, TRACEA, SCEPTIC, NANOTIC Sensor networks Side channel analysis Fédération Wallonie-Bruxelles: ARC-SCOOP Smart card
Products and Services CONTACTS [email protected] XCryptosystems and security infrastructure evaluation [email protected] XSecurity evaluation of integrated circuit against tampering Tel. 32 (0) 10 47 81 41 and eavesdropping (side-channel power and electromagnetic attack). WEB SITE XExpertise on high throughput and low-cost implementation http://www.uclouvain.be/crypto/ of processors for asymmetric and symmetric cryptography. XSecure multiparty computation protocols XUniversally verifiable voting systems
Main Equipment
In order to analyse the power consumption of enciphering devices, the group has built a test bench made of a large bandwidth oscilloscope Tektronix TDS7104, clock generators TaborElectronics WW1072 and Agilent 33250A and a customised board to plug the device in. The power supplies and clock can be finely controlled, and glitches can be inserted in those to check the chip fault-resistance. We also record its electro-magnetic radiations as an image of the local currents flowing in the silicium die, with near-field emission probes Rohde&Schwarz HZ15.
180 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY M 6
Wallonia ELectronics and COmmunications MEasurements A facility making a bridge from molecules to signals
SENIOR SCIENTIST: X Isabelle HUYNEN
Research Field and Subjects Funding
The WELCOME facility is a state-of-the-art technological XEC FP7 program platform providing multidisciplinary tools in the field of electrical XESF COST actions and electromagnetic characterisation. At WELCOME, over one XF.R.S.-FNRS and FRIA hundred of researchers from the four corners of the globe XIWT perform thousands of hours of experiments per year. They XFEDER (Project Minatis) benefit from a powerful range of equipments and an exceptional XPAI pool of expertise acquired over more than 40 years at UCL. XWallonie - DGO6 projects Available tools and techniques in the WELCOME facility support X… various research axes including micro- and nanotechnology (materials and devices), Silicon-on-Insulator technology, RF and microwave circuits, digital systems and VLSI architectures, Partnership MEMS/NEMS, cryptography, ultra low-power wireless biometric and biological sensors, molecular electronics, signal The WELCOME facility is complementary in many aspects to propagation and wireless communications between sensors. resources and skills available in nearby research centres active in Extending from molecules to signals, WELCOME offers, through similar fields. This complementary favours fruitful collaborations a broadband and unified approach, a wide variety of electrical in the frame of numerous projects funded at the regional and and electromagnetic measurements techniques, going from federal level and ensures its international competitiveness. the physical behaviour of materials, sensors and devices, to systems architectures and signal propagation between them. XBelgian collaborations*: Cenaero, Certech, Cetic, Sirris, The infrastructure goes further bringing together three pillars: Materia Nova, IMEC, KULeuven, Multitel, UGent, University of research, education, and services to the industry. WELCOME Liège, ULB/VUB (Brussels), Univ. Mons-Hainaut & FPMS, FUNDP helps to cover all steps of development in electronics and (Namur), communications, from design to prototyping, including modelling, fabrication, testing and reliability assessment. XInternational collaborations: IEMN (FR)… The WELCOME facility is also complementary in many aspects to resources and skills available at other UCL technological XIndustrial collaborations*: facilities, such as the WINFAB clean rooms, the Cyclotron in Belgium: BER, Melexis, nSilition, CISSOID, IMEC, On Semi Resource Centre, material science and biological labs. Belgium, Thalès Alenia Space Etca, Thalès Communications Research in Information and Communications Technologies Belgium, ICOMS, … within WELCOME involves hardware, protocols and channels for abroad: SOITEC (FR), RFMD (USA), ST-Microelectronics (FR), IBM wireless and ultra-wideband communications in a free-space, (USA), OKI (J), EADS (FR, DE), Thalès TRT (FR), … multi-path, secured or anechoic environment (see detailed key- word list). *non exhaustive list
181 Main Equipment KEYWORDS Wireless sensors and communications networks X6>ÀÕÃÊ V>Ý>Ê ÃiÌÕ«Ã]Ê Ü>viÀÊ «ÀLiÊ ÃÌ>ÌÃÊ >`Ê 6iVÌÀÊ Ultra-Wide Band (UWB) Network Analysers configurations to achieve a multi-port "ÊV >ià Body Area Networks (up to 4 accesses) and multi-parametric characterisation of Antennas `iÛViÃÊ >`Ê ÃiÃÀÃÊ 6]Ê 6]ÊÌi«iÀ>ÌÕÀiVÀÜ>Ûi]Ê iiVÌÀ Satellite communications mechanical, and magneto-electrical sweeps, …), in small-signal Signal and image processing >`Êi>ÀÊÀi}i]ÊvÀÊ ÊÌÊ££äÊâ]ÊÊÌ iÊÌi«iÀ>ÌÕÀiÊ Digital circuits À>}iÊ{xää° Digital systems Security and cryptography XLow current probes, logical analysers, analog waveform and -"ÊÌiV }ÞÊ>`ÊÕÌÀ>ÜÊ«ÜiÀÊ`iÃ} digital pattern generators, digital oscilloscopes, vector signal -É - }iiÀ>ÌÀÃÊ ÜÌ Ê É+Ê ÀÊ `}Ì>Ê `Õ>ÌÊ vÀÊ >>}É`}Ì>Ê Wideband multi parametric characterisation VÀVÕÌÃÊ >`Ê ÃÞÃÌië>V>}iÊ Ã>ÀÌÊ V>À`Ã]Ê , Ã]Ê *Ã®Ê interfacing with sensor measurements XAnechoic chamber for electromagnetic testing of materials, CONTACTS devices and sensors Isabelle HUYNEN XBroadband antennas and arrays [email protected] Tel. 32 (0) 10 47 23 08 XChannel sounders XRF hardware for wireless and ultra-wideband communications Pascal SIMON between sensors [email protected] Tel. 32 (0) 10 47 94 33 See full catalog list at: Pierre GERARD ÌÌ«\ÉÉÃÌiðÕVÕÛ>°LiÉÜiViÉ7iL }É i«Év>VÌið [email protected] pdf Tel. 32 (0) 10 47 94 50
Products and Services WEB SITE http://www.uclouvain.be/welcome/ 7 " Ê >Ài>`ÞÊ >ÃÜiÀÃÊ ii`ÃÊ vÊ `ÕÃÌÀÞÊ Ê i}ÕÊ and abroad, in the frame of (sub) contracts and consultancy. With some regulation policy, trainings for R&D engineers from industry are also possible.
182 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 7
iVÃÊ>`Ê`iÃÊvÀÊ-Õ««ÞÊ >Ê>`Ê"«iÀ>ÌÃÊ Management
SENIOR SCIENTISTS: X *iÀÊ, X * ««iÊ 6 , X Pierre SEMAL X i>-jL>ÃÌiÊ/ , < X >Ì iÕÊ6 Ê696
Research Field and Subjects Representative References
Supply Chain Management (SCM) covers all aspects of X "Ê ,°Ê Ê >`Ê 7"- 9Ê °Ê °]Ê "«Ìâ}Ê «À`ÕVÌÊ >`Ê production, logistics and supplier relations. It combines transportation in a commit-to-delivery business mode. European operations management, management science and industrial ÕÀ>ÊvÊ"«iÀ>Ì>Ê,iÃi>ÀV ]ÊÓäÎή]ÊÈ£{È£n]Ê2010. organisation in a systematic attempt to understand, model and X ,1-- /Ê8°Ê>`Ê, Ê*°Ê°]Ê-Õ««ÞÊÀiÌÊ`ÃÌÀLÕÌÊÕ`iÀÊ support the multi-level organisational behaviour. Bayesian belief when the buyer invests in specific assets. The Centre for Supply Chain Management (CESCM) is in 7À}Ê*>«iÀÊ- ÊÓä£äÉä{]Ê2010. particular oriented towards: X, Ê*°Ê°Ê>`Ê-* ,< Ê,°]Ê Þ>VÊÌÊÛiÃÌiÌÊÊ qÊ i«ÀV>Ê>>ÞÃÃ]ÊÌ iÊiVVÊ>`ÊÃÞÃÌiVÊ`i}ÊvÊ -Õ««ÞÊ >ÃÊÕ`iÀÊÃÞiÌÀVÊvÀ>Ì°Ê ", Ê ÃVÕÃÃÊ inter-organisational relations, *>«iÀÊÓä£äÉnx]Ê2010. qÊ Ì iÊÃÌÕ`ÞÊ>`Ê`iÛi«iÌÊvÊiÌ `}iÃÊ>`ÊÌiV µÕiÃÊ X " -/ / "Ê °]Ê ,Ê°Ê°Ê>`Ê6 Ê696 Ê °]Ê Ý}Ê for the decision support systems at all hierarchical levels of the MIR inequalities with two divisible coefficients. Mathematical chain Programming Series A, 123(2), 451-483, 2010. qÊ Ì iÊ ÃÌÕ`Þ]Ê `i}Ê >`Ê «ÌÃ>ÌÊ vÊ ÃÞÃÌiÃÊ vÊ X*" /Ê9°]Ê6 Ê696 Ê °]Ê7"- 9Ê°]Ê- \ÊÊLÀ>ÀÞÊvÊ decentralised or distributed coordination. tools for solving production planning problems, In: Research - Ê iLiÀÃÊ >ÀiÊ VÃiÞÊ >vw>Ìi`Ê ÜÌ Ê ", \Ê iÌÀiÊ vÊ /Ài`ÃÊÊ L>ÌÀ>Ê"«Ìâ>Ì]Ê7°°Ê ]Ê°ÊÛ>ÃâÊ>`Ê "«iÀ>ÌÃÊ,iÃi>ÀV Ê>`Ê VVð °Ê6Þ}iÊi`î]Êi`iLiÀ}]Ê-«À}iÀ6iÀ>}]ÊΣÇÎ{È]Ê2009. / iÊ ViÌÀiÊ ÃÊ VÕÀÀiÌÞÊ V>ÀÀÞ}Ê ÕÌÊ ÃiÛiÀ>Ê ÀiÃi>ÀV Ê «ÀiVÌÃÊ X/ , <Ê -°]Ê - Ê *°]Ê 6 ,Ê *°]Ê ÃÌ}À>Ê L>Ãi`Ê >ÀÕ`ÊÌ iÊÌ iiÊvÊà >Ài`ÊÀiÃÕÀViÃÊÊÃÕ««ÞÊV >ðÊÜÊ LÕ`ÃÊ >`Ê >««ÀÝ>ÌÃÊ vÀÊ «À`ÕVÌÊ iÃ]Ê ÕÀ«i>Ê can containers or re-usable packaging be used efficiently in ÕÀ>ÊvÊ"«iÀ>Ì>Ê,iÃi>ÀV ]Ê£Ç]Ê££ÎΣ£{£] 2009. a network of producers and consumers to increase logistic X 6 ,Ê *°]Ê 6 Ê Ê - , Ê °]Ê "«Ìâ}Ê Ì iÊ ivwViVÞ¶ÊÜÊV>ÊÛiÃÌiÌÊLiÊ>>}i`ÊÜ iÊÌ iÊV>«>VÌÞÊ ÃÌ>vw}Ê >`Ê ÀÕÌ}Ê vÊ Ã>Ê ÃâiÊ iÀ>ÀV V>Ê V>ViÌiÀÃ]Ê ÃÊÌÊLiÊÕÃi`ÊLÞÊÃiÛiÀ>Ê`i«i`iÌÊ>}iÌÃÊÊÀ`iÀÊÌÊ>ÝÃiÊ *À`ÕVÌÊ >`Ê "«iÀ>ÌÃÊ >>}iiÌ]Ê £Çή]Ê ÎäÈΣ] Ì iÊ}L>ÊivwViVÞ¶ÊÜÊV>ÊÌÃâiÃÊLiÊ«ÌÃi`ÊÊÀ`iÀÊÌÊ 2008. Ì>iÊÌÊ>VVÕÌÊÌ iÊ`vviÀiÌÊiÛiÃÊvÊÌ iÊÃÕ««ÞÊV >¶ÊÜÊ is efficiency measured in a decentralised production setting ÃÕV Ê>ÃÊ>ÊÃÕ««ÞÊV >¶ÊÜÊV>Ê>ÊiiÀ}ÞÊ>ÀiÌÊLiÊ>`iÊ>ÃÊ Funding ivwViÌÊ>ÃÊ«ÃÃLi¶Ê/ iÃiÊ>ÀiÊiÝ>«iÃÊvʵÕiÃÌÃÊÃÌÕ`i`Ê within the framework of shared resources. Xj`jÀ>ÌÊ7>i ÀÕÝiiÃ]ÊVÌÊ`iÊ,iV iÀV iÊ ViÀÌji X- }V>ÃÊV >ÀÊÊÃÌÀ>Ìi}VÊÃÕÀV}Ê>`Ê«ÀVÕÀiiÌ X ÃE à XIdem Papers
183 Partnership KEYWORDS Supply chain management XLund University "«ÌÃ>Ì Production XLogistics in Wallonia Network Xn-Side s.a. (spin-off of research centre) Integer programming Decision support systems
Products and Services CONTACTS XDevelopment of optimisation or simulation models for Per AGRELL [email protected] }ÃÌVÃÊ>`Ê«iÀ>ÌÃÊÜÌ Ê>Ê-Õ««ÞÊ >ÊVÌiÝÌ Tel. 32 (0) 10 47 43 05 XDevelopment of performance evaluation methodologies for decentralised systems Philippe CHEVALIER XDevelopment of models (simulation or analytic) for service [email protected] operations Tel. 32 (0) 10 47 83 96
Pierre SEMAL [email protected] Tel. 32 (0) 10 47 83 66
Jean-Sébastien TANCREZ ðÌ>VÀiâJÕVÕÛ>ðLi Tel. 32 (0) 65 323 538
Mathieu VAN VYVE [email protected] Tel. 32 (0) 10 47 81 61
WEB SITE http://www.uclouvain.be/en-cescm.html
184 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 8
iVÕ>ÀÊ>}}]Ê,>`Ì iÀ>«Þ]Ê>`Ê"V}Þ
SENIOR SCIENTISTS: X 6ViÌÊ, ", X Pierre SCALLIET X -Ìiv>>Ê69 , X À>XÃÊ , X Stanislas PAUWELS X Daniel LABAR X iÊ " X 8>ÛiÀÊ /- X Ê°Ê X Edmond STERPIN X 6>iÃ>Ê "
Research Field and Subjects X , ", Ê6°]Ê 6, Ê°°]Ê /,Ê°]Ê *Ê °Ê - - " -/,"]Ê Õ`iiÃÊ 7À}Ê ÀÕ«°Ê -µÕ>ÕÃÊ ViÊ V>ÀV>Ê The centre for molecular imaging, radiotherapy, and oncology vÊ Ì iÊ i>`Ê >`Ê iV\Ê - - " -/,"Ê V>Ê *À>VÌViÊ ,"®Ê vVÕÃiÃÊ ÌÃÊ ÀiÃi>ÀV Ê >VÌÛÌiÃÊ Ê Ì iÊ ÕÃiÊ vÊ i`V>Ê Õ`iiÃÊvÀÊ`>}ÃÃ]ÊÌÀi>ÌiÌÊ>`ÊvÜÕ«°ÊÊ"V°Ê imaging for cancer treatment. For this purpose, the centre Suppl 5: v184-v186. 2010. `iÛi«ÃÊ >Ê iÝ«iÀiÌ>Ê «>ÌvÀÊ vÀÊ Ã>Ê >>Ê >}}°Ê X ", Ê°]Ê -/ "/Ê*°]Ê -- -Ê°]Ê Ê°°]Ê /-Ê8°]Ê This platform comprises a camera for positron emission , ", Ê 6°]Ê +Ê °]Ê Û>Õ>ÌÊ vÊ Ì iÊ À>`L}V>Ê tomography (PET), a camera for single photon emission impact of anatomic modifications during radiation therapy computed tomography (SPECT), a camera combining SPECT for head and neck cancer: Can we simply summate the dose? >`Ê 8À>ÞÊ V«ÕÌi`Ê Ì}À>« Þ]Ê >`Ê >Ê >ÕÌÀ>`}À>« ÞÊ ,>`Ì iÀ>«ÞÊ>`Ê"V}ÞÊÈ\ʣΣ£În°Ê2010. plate scanner. These imaging devices are backed by an animal X Ê ,Ê °]Ê Ê °°]Ê , "-Ê °]Ê 6 , 9- Ê °]Ê Ê house with the necessary equipment for small animal handling, principled approach to image denoising with similarity kernels preparation, and anaesthesia, a small animal irradiator, a biology involving patches. Neurocomputing 73(7-9): 1199-1209. 2010. laboratory, and a tracer production unit that covers all steps X Ê °°]Ê /-Ê 8°]Ê , ", Ê 6°]Ê "Ê °]Ê `}i«ÀiÃiÀÛ}Ê from the reception of radioisotopes to the delivery of a broad filtering of images with low photon counts. IEEE Trans Pattern À>}iÊvÊViÀÌwi`ÊiVÕiÃ°Ê ÛiÌÕ>Þ]Ê ,"Ê>ÃÊëiV>ÃiÃÊ Anal Mach Intell 30(6): 1014-1027. 2008. in medical physics applied to imaging and radiotherapy, with a X /-Ê 8°]Ê Ê °°]Ê "Ê °]Ê " 18Ê °]Ê , ", Ê 6°]Ê particular focus on Monte Carlo computed simulations. Ê }À>`iÌL>Ãi`Ê iÌ `Ê vÀÊ Ãi}iÌ}Ê * /Ê >}iÃ\Ê The spectrum of available imaging modalities is completed by iÌ `}ÞÊ >`Ê Û>`>Ì°Ê ÕÀ«i>Ê ÕÀ>Ê vÊ ÕVi>ÀÊ >ÊVÃiÊV>LÀ>ÌÊÜÌ ÊÌ iÊ1 É, ÊÀiÃi>ÀV ÊÕÌÊÃ>Ê Medicine 34(9): 1427-1438. 2007. animal magnetic resonance imaging). In order to cope with the ever-growing importance of information and communication technologies in modern medical imaging, Patents ,"Ê VÌÕÕÃÞÊ iÝÌi`ÃÊ ÌÃÊ iÝ«iÀÌÃiÊ Ê Ã}>Ê >`Ê >}iÊ «ÀViÃÃ}ÊÊV>LÀ>ÌÊÜÌ Ê1 É / °Ê ,"ÊëiV>ÃiÃÊ (1999) European patent n° 99870172.6 “Methods for preparing in image segmentation, image registration, and respiratory «iÀyÕÀ>Ìi`ÊQ£nRÀ>`>Lii`ÊÌÀ`>âiÊ`iÀÛ>ÌÛiÃÊvÀÊ signal analysis. ViÕ>ÀÊ Þ«Ý>Ê`iÌiVÌ»° For the transition from small animal imaging to clinical studies, ,"Ê ÜÀÃÊ >`Ê Ê >`Ê ÜÌ Ê Ì iÊ ->ÌÕVÊ 1ÛiÀÃÌÞÊ Ã«Ì>Ê>`ÊÌÃÊÀ>`}Þ]ÊÀ>`Ì iÀ>«Þ]Ê>`ÊÕVi>ÀÊi`ViÊ Awards departments. -/,"6>À>Ê>Ü>À`ÃÊÊÓää]ÊÓää{]Ê>`Ê££°
Representative References
X -/ "/Ê *°]Ê Ê °°]Ê /-Ê 8°]Ê , ", Ê 6°]Ê `>«ÌÛiÊ radiotherapy of head and neck cancers. Seminars in Radiation "V}ÞÊÓäÓ®\Ên{Î]Ê2010. X Ê °°]Ê -i}iÌ>ÌÊ vÊ «ÃÌÀÊ iÃÃÊ Ì}À>« ÞÊ images: Some recommendations for target delineation in À>`>ÌÊV}Þ°Ê,>`Ì iÀ>«ÞÊ>`Ê"V}ÞÊÈή\ÊÎäÓÎäÇ]Ê 2010.
185 Funding KEYWORDS Medical Imaging
X F.R.S.-FNRS and associated funds Molecular Imaging Radiotherapy X Europe "V}Þ X Belgian Federal Public Service Radiobiology X Wallonie Radiochemistry X >VjÀ«iÊ`ÕÊ À`"ÕiÃÌÊÀ>Vi® Medical Physics X Belgian Foundation against Cancer Signal and image processing X Télévie X `ÃÊÃi« Ê >à CONTACTS X Fondation Saint-Luc Vincent GREGOIRE 6ViÌ°Ài}ÀiJÕVÕÛ>°Li Tel. 32 (0) 2 764 94 43 Partnership Pierre SCALLIET X iÌÀiÊ"ÃV>ÀÊ>LÀiÌÊi [email protected] X >Ì iiÊ1ÛiÀÃÌiÌÊiÕÛi Stefaan VYNCKIER X 1ÛiÀÃÌiÌÊiÌ -Ìiv>>°6ÞViÀJÕVÕÛ>°Li X University of Wisconsin (Madison, WI) X Tomotherapy Inc. (Madison, WI) François JAMAR X Ion Beam Applications (Louvain-la-Neuve) À>Vð>>ÀJÕVÕÛ>°Li
Stanislas PAUWELS [email protected] Main Equipment Daniel LABAR X Small animal PET camera [email protected] X Small animal SPECT camera X Radiotracer production facility Anne BOL [email protected]
Xavier GEETS Products and Services 8>ÛiÀ°iiÌÃJÕVÕÛ>°Li
X Radiotracer production for medical imaging (preclinical & John A. LEE clinical) and industrial applications °iiJÕVÕÛ>°Li X Modelling of imaging and treatment devices for Monte Carlo Edmond STERPIN simulation [email protected] X Consulting in radiobiology X Issuing of international guidelines in radiotherapy and Vanesa BOL radiobiology 6>iÃ>° JÕVÕÛ>°LiÊ
186 Ê1 6 ,-/, Ê"16 ÊÊINFORMATION AND COMMUNICATION TECHNOLOGY M 9
"Ì iÀÊÀiÃi>ÀV ÊÃÌÌÕÌiÃ]ÊViÌÀiÃÊ>`Ê}ÀÕ«Ã
1. CRIDS x°Ê Þ>V>Ê-ÞÃÌiÃ]Ê ÌÀÊ>`Ê"«ÌÃ>Ì The Research Centre on IT, Law and Society has as main 6. Electronic Circuits and Systems LiVÌÛi]ÊÌ iÊ>ÊvÊvÃÌiÀ}ÊvÕ`>iÌ>Ê>`Ê>««i`ÊÀiÃi>ÀV Ê Ç°Ê >À}iÊÀ>« ÃÊ>`Ê iÌÜÀà in the field of information and communication technologies 8. Machine Learning and Artificial Intelligence from legal, technical and socio-economic perspectives. With a 9. Micro and Nano Technologies and Systems team of 46 researchers, CRIDS is developing multi-disciplinary 10. Microwave Engineering and Applied Electromagnetism ÀiÃi>ÀV iÃÊ Ê Õ>Ê -ViViÃÊ >`Ê «ÕÌiÀÊ -ViVi°Ê 11. Signal and Image Processing Information technologies and new communication technologies 12. Software Engineering and Programming Systems >ÛiÊ>Ê>ÀÊ«>VÌÊÊÌ iÊÜ>ÞʺÜiÊiÝÃÌÊÌ}iÌ iÀ»Ê>`ÊÌ iÊ Ü>ÞÊ ºÜiÊ >VÌÊ Ì}iÌ iÀ»°Ê Ê Ì ÃÊ VÌiÝÌ]Ê , -Ê iÝ«ÀiÊ Ì iÃiÊ ÌÌ«\ÉÉÜÜÜ°ÕVÕÛ>°LiÉiVÌi>° Ì changes and the impact on regulation from a technological and legal perspective. 4. ILC ÌÌ«\ÉÉÜÜÜ°VÀ`ðiÕ The Institute for Language and Communication counts 27 staff members and 60 researchers working in the areas of theoretical and applied linguistics, and communication studies. Several Ó°Ê " 1- research teams specialise in ICT-related domains: The Focus research group federates several researchers of the qÊ vÀ>ÌÊiÝÌÀ>VÌÊ>`ÊÀiÌÀiÛ> University of Namur interested in the study of the basic paradigms qÊ /iÝÌÕ>Ê`>Ì>L>ÃiÃÊ} and mathematical foundations of computer science. Building qÊ / iÃ>ÕÀÕÃÊ}iiÀ>ÌÊ>`ÊVÃÌÀÕVÌ Õ«ÊÌ iÊiÝ«iÀÌÃiÊvÊÇÊvÕÊÌiÊ«ÀviÃÃÀÃÊ>`Ê£äÊÀiÃi>ÀV iÀÃ]Ê qÊ -«iiV ÊÃÞÌ iÃÃ Ì iÊ}ÀÕ«Ê >ÃÊVÕÀÀiÌÞÊ`iÌwi`ÊÌÜÊ>ÀÊÀiÃi>ÀV Ê>ÝiÃ\ÊÊ qÊ /iV }Þi >Vi`Ê>}Õ>}iÊi>À} the one hand, declarative languages, and, on the other hand, qÊ ÕÌ}Õ>ÊLÕÃiÃÃÊ>}Õ>}iÊ>>ÞÃà decision making and performance. Special focus is put on qÊ }ÕÃÌVÊVÀ«ÕÃÊ>`Ê`>Ì>L>ÃiÊVÃÌÀÕVÌ coordination languages, process algebras, semantics, logics, qÊ iÜÊi`>ÊÕÃiÊ>`Ê`iÛi«iÌÊÜiLÊÓ°ä® program analysis and verification, probabilistic mathematical qÊ i`>ÊÌiÀ>VÞ «ÀLiÃ]ÊÕViÀÌ>ÌÞÊ>>}iiÌ]Ê>>ÞÃÃÊ>`ÊÛÃÕ>â>ÌÊ of model output. ÌÌ«\ÉÉÜÜÜ°ÕVÕÛ>°LiÉV
ÌÌ«\ÉÉÜÜÜ°vÕ`«°>V°LiÉiÉvVÕà 5. ILSM The Louvain School of Management Research Institute 3. ICTEAM (ILSM) is devoted to theoretical and applied, empirical and With more than 40 professors and more than 200 researchers, iÝ«iÀiÌ>Ê ÃÌÕ`iÃÊ vÊ >>}iiÌÊ vÊ «ÀÛ>ÌiÊ >`Ê «ÕLVÊ ICTEAM carries both basic and applied world-class research organisations, including but not limited to research on in various sub domains of Information and Communication ÌiÀ>Ê >`Ê iÝÌiÀ>Ê vÕVÌ>Ê >>}iiÌÊ «ÀViÃÃiÃÊ Technologies, Electronics and Applied Mathematics. that are present in all enterprises and organisations. Since Several research groups carry out research in the field of: management by itself is characterised by its multiple facets, 1. Applied Mathematics dynamics and interdependence with resource, process and 2. Biomedical Engineering product development, the science of management requires 3. Communication Systems and Networks multiple approaches in terms of functional orientation, research 4. Cryptography and Information Security methodology and focus. This is why the Institute mobilises
187 around 70 faculty members and 100 affiliated researchers from relativity and fundamental interactions, that is partner of the the fields of economics, information system science, operations CMS experiment at the CERN; a center of research in geometry, research, psychology and sociology to address management physics and probability, with works on statistical mechanics questions of societal and economic relevance. and random matrices; a center in fundamental mathematics, analysis, algebra and algebraic topology; the cyclotron resources http://www.uclouvain.be/en-ilsm.html center with fundamental and applied activities (aeronautics and production of polymers membranes); a research center for space radiations whose activities are related to design of space 6. IPM radiation detectors and analysis of space radiation data. The IPM, a resource centre for the university teachers. IPM stands for “Institut de Pédagogie universitaire et des http://www.uclouvain.be/irmp Multimédias” (Institute for Higher Education and Technology). Institute objective is the improvement of the university teaching in a SOTL (Scholarship of Teaching and Learning) perspective. 8. NAXYS This objective is carried out by university teachers pedagogical Based on a team of 50 researchers, the aim of the NAmur research training and by offering them a large variety of pedagogical center for compleX sYStems is to study systems composed of resources. In the same spirit, IPM ensures the coordination, interacting parts/agents whose local behavior, resulting from the animation and the diffusion of pedagogical initiatives and the interactions between them, cannot provide a complete promotes them through the FDP (Fonds de Développement understanding of the global behaviour, i.e. considering the Pédagogique, Funds for Pedagogical Development). It covers system as a whole, say on a macroscopic scale. At present, the pedagogical setups development and Learning Outcomes center focuses on the following topics: algorithmic complexity, approaches with or without ICT, and also videos-podcasts, analysis and data classification, biology and bioinformatics, multimedias and Internet tools. chemico-physical systems, climate and environment, cosmology IPM coordinates a broad range of activities concerning and space, financial Systems, mobility and transports, orbital technological uses for learning and teaching (including eLearning movements and social dynamics. and ODL, Open and Distance Learning), developing so effective expertise and consultancy in this domain. The university gives www.fundp.ac.be/en/sci/naxys his support for the development of CLAROLINE, a worldwide known eLearning platform, developed initially within IPM. At an European level, IPM is working inside the “Collectif Hy-SUP” 9. PRECISE dedicated at the search of effects and conditions of impacts of With 11 faculty members, 30 researchers and 27 research hybrid pedagogical setups on training and education. associates, the PReCISE research center conducts research on the engineering and management of advanced information http://www.uclouvain.be/ipm systems. Topics of interest include data engineering, evolution, model-driven engineering, quality and measurement, requirements engineering and business-IT alignment, security 7. IRMP and service engineering. The Institute IRMP is an Institute for research in fundamental mathematics and physics. The Institute is divided into five inter- http://www.fundp.ac.be/en/precise/ related components : a center of research on cosmology, general
188 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY
Keywords Index
3D mesh 108 Business Modelling 80, 82 Access control 52 Business to Business 84 Access to culture 164 CASE tool 50, 74, 76, 78 Active database 74 CERN 178 Adaptation 70 Certification 64 Adaptive signal processing 24 Checkpoint-restart 91 Ad hoc networks 35 Circle of friends 96 Ageing well 126 Circuit design 90 Agent-based Web Services 48 Civil society organisation 150 Annotation 146 Clone detection 37 Antenna Arrays 26 Cloud computing 34, 156, 162, 166 Antennas 182 Clustering 94 Architectural Patterns 62 CMOS process 90 Architecture composition 55 CMS 178 Architecture description language 55 Code of conduct 150 Architecture design rationale 55 Cognition 128 Architecture variability management 55 Cognitive radio 24 Artificial Intelligence 65, 133 Collaboration 42 Assessment 170 Collaborative recommendation 136 Assignment 100 Communication 88 Assistive technology for older adults 126 Competences 148 Atlas construction 146 Competition Law 154 Authentication 46, 52 Complex systems 34 Authorisation 46 Component-based software engineering 55 Authorship 164 Component-based systems 35 Automatic Control 120 Computer-Aided Design of User Interfaces 130 Automatic refactoring 37 Computer architecture 86 Autonomous agent localisation 118 Computer-assisted diagnostic 72 Batch processing systems 172 Computer-assisted instruction 124 Biochemical network analysis 136 Computer criminality 166 Biomedical data 144 Computer programming 34 Biophotonics 174 Computer Supported Cooperative Work 54 Blind 108 Computing 178 Block ciphers 180 Conceptual Modelling 82 Body Area Networks 182 Concurrent program analysis 37 Broadcasting 154 Consensus 118 Business Analysis 42 Constraint languages 133 Business Intelligence 67 Constraint programming 34, 133 Business-IT alignment 80 Constraints 133
189 Constraint satisfaction 133 Design Patterns 62 Consumer protection 154, 156 Design Tools and Techniques 58 Contactless 110 Detection 104 Contract law 166 Detection and sensing 26 Control, real-time optimisation 122 Detection estimation 20 ÛiÝÊ«ÌÃ>ÌÊ 94, 116 Development tools 28 Cooperative communications 24 Digital circuits 86, 182 Cooperative Web Services 48 Digital libraries 164 Coordination 35 Digital Rights Management 164 Copyright 158 Digital systems 86, 182 Copyright & Internet 164 Dimensionality reduction 138 Critical success factors 80 Directional prediction 105 Cryptanalysis 112 Discrete optimisation 116 Cryptographic protocols 110 Disparity map 105, 108 Cryptography 112, 114, 180 Distributed computing 118 Custom dictionary 176 ÃÌÀLÕÌi`ÊwiÊÃÞÃÌiÃÊÉÊ >ÃÃÊÃÌÀ>}iÊ 172 Customer relationship Management 84 Distributed parameter systems 120 Customised protein and oligonucleotides chips 142 Domain Specific Modelling Language 54 Cyberlaw 158 DSP 86 Data analysis 138, 144 Dynamical systems 120 Database design 74, 78 Earth-satellite channel modelling 22 Database engineering 78 E-Business 84 Database evolution 50 V«ÃiÉ Ê 54 Database migration 50 E-Commerce 84, 158, 166 Database quality 78 Education 148 Database reverse engineering 76 ÛiÀiÌÊ 162 Data dematerialisation 74 i>Ì Ê 160 Data engineering 76 E-Learning 148 Data-intensive computing 34 Electromagnetics 88 Data mining 67, 94, 96 Electronic archiving 162 Data protection 152, 160, 166 Electronic communications 154, 158 Data warehouse 74 Electronic properties 174 Decision-support 46 Electronic voting 180 Decision support system 65 Embedded systems 43, 91 Decision support systems 184 Emerging technologies 30 Deliberation 170 Empirical Software Engineering 64 Democracy 150, 156, 170 Emulation 11 Deployment 55 Energy consumption 90 Design concept 91 Engineering Interactive Computing Systems 130
190 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY
English for Specific Purposes 176 Information privacy 72 Enterprise Content Management (ECM) 162 Information retrieval 94 Error detection and correction 132 Information technologies 150 E-Signature 162 Integer programming 184 Ethical governance 150 Integrated circuits 90 Ethics 150, 158, 170 Intellectual property 166 Exhibition watermarking 108 Intelligent Systems 62 Fault tolerance 91 Interaction 146 Feature Selection 138 Internet policy, law and regulation 158 Feedback control 120 Inverse problems 102 FGPA 86, 180 IT architecture 80 Foreign language learning/teaching 132 IT law 166 Formal methods 58 JPEG2000 105, 108 Games 124 Knowledge Extraction 67 GIS 100 Knowledge management 80 Goal-oriented requirements engineering 60 L1 identification 132 Governance 80, 150 Languages 80 Graph analysis 136 Language testing 132 Graph-based clustering 104 Large graph analysis and design 118 Graph mining 136 Large-scale distributed systems 34 Grid 178 Large-scale graphs 94, 96 Healthcare model 72 Large-scale Networks 98 Health law 160 LHC 178 Health Services 160 Link analysis 136 High availability 91 Literacy 124 High Performance Computing 172 Localisation 176 HSPA 11 Logic programming 28 Human-Computer Interaction 126, 130 Logics of programs 58 Human Rights 156 Low-power 86 Hypertext/hypermedia 124 LTE 11 Hypertext navigation and maps 124 Machine learning 138, 140, 144 Image processing 146 Maintainability 28, 32 Immersive interfaces 128 Mathematical programming 116 Impacts 170 Medical Devices 160 IMS 14 Medical guidelines 72 Inductive learning from examples 60 Medical image annotation 72 Information Lifecycle Management (ILM) 162 Medical Imaging 186 Information Management 67 Medical ontology 72 Information Modelling 82 Medical Physics 186
191 MEMS/NEMS 88, 182 Network Protocols 16 Metabolic network 122 Networks 88, 94, 96 MetaCASE 54 Next Generation Access Networks (NGA) 154 Metadata repository 72 Noisy channel 140 Metamaterials 26 Non Functional Requirements 82 Microarray data preprocessing 142 Normative aspects of written language 140 Microarray low density & high density 142 Number theory 180 Microbial ecology 122 Numerical algorithms 172 Micro-nano-electronics 88, 90 Object-oriented languages 28 Middleware & services 55 Object-oriented programming 28 (MIMO) Multiple-Input Multiple-Output 24, 182 Oncology 186 Mixed integer programming 116 Open Data 168 Mobile environment 30 Operations research 116 Mobile telephone communication 96 Optics 102, 174 Mobility 35, 98 Optimisation 116, 120, 133, 184 Model checking 43, 58, 60 Organisational Patterns 82 Model-driven engineering 130 Overload 14 Model-driven software engineering 60 Parallel architecture 86 Modelling 122 Parallel programming/algorithm 172 Models of Computation 58 Particle filters 104 Model synthesis 60 Particle physics 178 Model transformation 55 Patient records 144 Modernisation 168 Pattern recognition 140 Molecular Imaging 186 Pedagogical materials development 132, 176 Monitoring 122 Peer-to-peer 164 Motion capture 128 Peer-to-peer computing 34 Multi-agent systems 62 Personalisation 70 Multi-modal 100 Pervasive computing 30 Multimodal interaction 126 Pharmacogenetics 142 Multi-task learning 138 Pharmacogenomics 142 Multitier processing 104 Photonic crystals 174 Multiuser systems 20 Physically unclonable functions 112, 180 Mutual coupling 26 Physical security 112 Needs analysis 176 Piracy 158, 164 Network 184 Plasmonic 174 Network Architecture and Design 16 Population balance 122 Network management 18 Power management 90 Network monitoring 18 Privacy 52, 152, 158, 160 Network Operations 18 Privacy Enhanced Technology 152
192 ACADÉMIE UNIVERSITAIRE LOUVAIN - INFORMATION AND COMMUNICATION TECHNOLOGY
Privacy-preserving systems 180 Restructuring, reverse engineering, and reengineering 28 Private copying 164 Reusable Software 32 Private sphere 152 Riemannian optimisation 116 Procedural animation 128 Rights expression languages 52 Process engineering 120 Rights management 52 Production 184 Risk analysis 60 Production planning 116 Risks 170 Program analysis 37 Satellite communications 22, 182 Program code analysis 76 Scalability 32 Programmer workbench 28 Scientific Computing 174 Programming languages 34 Sector Specific Regulation 154 Programming paradigms 30 Secure multiparty computation 180 Program understanding 37 Security 88, 110, 114 Propagation 24 Security and cryptography 182 Protocols 114 Segmentation 104, 146 Proximity check 110 Semantic Web 70 PTZ control 104 Sensor networks 180 Public administration 168 Sensors 88, 90 Public archives 168 Service composition 46 PUF 112 Service level agreements 166 QIM 108 Service-oriented computing 46 QoS 48 Service selection 46 QoS Monitoring 46 Services of General Economic Interest (SGEI) 154 Radar backscattering of wake vortex 22 Side-channel 112 Radiobiology 186 Side channel analysis 180 Radiochemistry 186 Signal analysis, synthesis, and processing 102 Radio frequency identification (RFID) 110 Signal and image processing 182, 186 Signal and image processing 43, 186 Signal processing 20, 142, 144 Recommendation 48 Simplification 168 Recommendation Systems 84 SIP 14 Records management 162 Smart card 180 Registration 146 Sociability 156 Regulatory authorities 154 Social movements 156 Reliability 58 Social Network Analysis 67 Reputation 46, 48 Social Networking Sites 156 Requirements 42 Social networks 96, 98 Requirements engineering 46, 82 Software architecture 91 Responsibility 80 Software Design 62 Responsible research 150 Software engineering 42, 130
193 Software maintenance 28 Training 148 Software Measurement 64 Transceiver design 24 Software Process Improvement 64 Transfer learning 138 Software Product Lines 40, 42, 50 Transformational techniques 76, 78 Software/Program Verification 58 Transport networks 100 Software Quality 64 Tropospheric depolarisation 22 Software Reuse 40 Tropospheric scintillation 22 Software sensor 122 Trusted Third Party 162 Software specification 60 Ubiquitous computing 30 SOI technology and ultra-low power design 182 Ultra-low power 90 Space and time 98 Ultra-Wide Band (UWB) 24, 182 Spectrum management 20 Usability testing 124, 126 Speech recognition 132 Use Case Models 82 Standards 64 User-centred design (UCD) 124, 126 State estimator 120 User context 70 Statistical language models 140 User interfaces 124, 130 Statistics database 74 Verification 43 Stereo Image 105, 108 Virtual reality 128 Strategy 80 Visual Modelling 54 Super (very large) computers 172 Wavelet transform 105 Supervised training 140 Web mining 136 Supply chain management 184 Web presentation 70 Surveillance 156 Web services 70, 84 System-on-chip 86 Weighted finite-state tools 140 Temporal migration 74 Weighted rewrite rules 140 Terminology extraction 176 Wideband multi parametric characterisation 182 Testbed 11, 14 WiMAX 11 Test input generation 37 Wired communications 20 Theoretical and Quantum chemistry 174 Wireless communications 24, 26 Theoretical Physics 174 Wireless sensors and communications networks 182 Tier-2 178 WLCG 178 Time-memory trade-off 110 Workflow model 72 Tracking 104 Writing aid 176
194
The Académie universitaire Louvain (AL) is a university consortium composed of the following three academic institutions: FUNDP, FUSL and UCL. The Research Administration departments of the Académie universitaire Louvain aim at promoting and facilitating academic collaboration with outside partners (companies, research centres and other public bodies).
The Research Administrations mission is multiple:
u to initiate and stimulate the relations between research laboratories, enterprises and/or public bodies; u to facilitate knowledge transfer and contribute to the third mission of the university “service to society”; u to contribute to the regional economic development through cooperation with local actors; u to promote the development of innovative products and services and the setting-up of spin-offs; u to guarantee the best management of intellectual property; u to inform the researchers (dissemination of the information on available funding sources) and to advise the researchers (legal and financial expertise); u to assist the researchers at several stages of their research project (identification of the available funding sources, application for the funding best matching their needs, contract negotiation, appropriate management of the obtained funds during the project lifetime); u to ensure the dissemination and monitoring of research contracts inside the academy.
UCL [email protected] TEL: 32 (0)10 47 24 98 FAX: 32 (0)10 47 48 30 Place de l’Université, 1 B-1348 Louvain-la-Neuve www.uclouvain.be/research
FUNDP FUSL [email protected] TEL: 32 (0)2 211 78 11 TEL: 32 (0)81 72 50 49 FAX: 32 (0)2 224 79 97 FAX: 32 (0)81 72 57 01 Facultés universitaires Saint-Louis Rue de Bruxelles, 61 Conseil de la Recherche B-5000 Namur Prof. F. Ost www.fundp.ac.be/recherche www.fusl.ac.be
L’Union européenne et la Wallonie investissent dans votre avenir
AL Académie universitaire Louvain
Produced by AL - April 2012