Lundi |
Mardi |
Mercredi |
Jeudi |
Vendredi |
27-juin | 28-juin | 29-juin | 30-juin | 01-juillet |
Conférence Nationale en Intelligence Artificielle (CNIA) CNIA | Rencontres des Jeunes Chercheurs en Intelligence Artificielle (RJCIA) RJCIA | |||
Journées Francophones sur les Systèmes Multi-Agents (JFSMA) JFSMA | Applications Pratiques de l’Intelligence Artificielle (APIA) APIA | |||
Journées Francophone de Programmation par Contraintes (JFPC) JFPC | Journées d'Intelligence Artificielle Fondamentale (JIAF) JIAF | |||
Ingénierie des Connaissances (IC) IC | ||||
Journée IoT&IA IoT&IA | Journée Santé&IA Santé&IA | Journée Résilience&IA Résilience&IA | Journées Francophones Planification, Décision et Apprentissage (JFPDA) JFPDA | |
Journée EIAH&IA EIAH&IA | ||||
Atelier IN-OVIVE IN-OVIVE | Atelier Decade Decade | AGE AFIA | Atelier ACAI ACAI | |
Atelier ROCED ROCED | ||||
IA depuis Saint-Étienne, Jam CECILIA, Tutoriels, Festiv'IA |
The on-going process of softwarization of IT networks promises to reduce the operational and management costs of network infrastructures by replacing hardware middleboxes with equivalent pieces of code executed on general-purpose servers. Alongside the benefits from the operator's perspective, new strategies to provide the network's resources to users are arising. Following the principle of "everything as a service", multiple tenants can access the required resources -- typically CPUs, NICs, or RAM -- according to a Service-Level Agreement. However, tenants' applications may require a complex and expensive measurement infrastructure to continuously monitor the network function's state. This may limit the feasibility of AI-enhanced systems. Although the application's specific behavior is unknown (and often opaque to the infrastructure owner), the software nature of (virtual) network functions (VNFs) may be the key to infer the behavior of the high-level functions by accessing low-level information, which is still under the control of the operating system and therefore of the infrastructure owner. As such, in the scenario of software VNFs executed on COTS servers, the underlying CPU's behavior can be used as the sole predictor for the high-level VNF state without explicit in-network measurements. This novel methodology can be applied to infer high-level characteristics such as throughput or packet loss using CPU data instead of network measurements. In this presentation, we show our experimental analysis of the behavior of a CPU that executes a VNF under different loads, how to correlate such data with the high-level application state, and use this knowledge to detect some network metrics.
présenté dans
le cadre de l'année Prolog
Documentaire sur Alain Colmerauer, inventeur
du langage Prolog.
détails
Diner au restaurant La
Platine ou au Bistrot de la
galerie, avec une visite de la biennale du design
2022
sur présentation de coupon
Rencontre franco-québecoise pour questionner l’IA, organisé dans le cadre de Festiv'IA:
le "OFF" de PFIA
détails
I will present a conceptual analysis of influence, persuasion and deception. The central assumption of the analysis is that an agent's choices and intentions can be indirectly changed by changing its beliefs. In other words, influence on behavior can be realized through persuasion. I will show how these concepts can be formalized using logic. Time permitting, I will discuss the "affective path" of influence. Since emotions are triggered by beliefs and retroact on intentions, an agent's behavior can be changed, or simply affected, by eliciting certain emotions.
Diner au Château
d'Essalois surplombant les gorges de la Loire
sur présentation de coupon