This website uses cookies. You have the possibility to accept or refuse their use.
Accept allReject allLearn more and configureWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.
These cookies collect information in a compiled manner to help us understand how our site is used and how well our marketing efforts are performing, or to help us personalize our site to improve your browsing experience.
< br>If you do not want your visit to be tracked on our site, you can block this tracking in your browser here:
We also use different external services like Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Map Settings:
Vimeo and Youtube video embeds:
Passwords: security, vulnerability and constraints
Digital, In the NewsHervé Debar, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay [divider style=”normal” top=”20″ bottom=”20″] What is a password? A password is a secret linked to an identity. It associates two elements, what we own (a bank card, badge, telephone, fingerprint) and what we know (password or code). Passwords are very widely used, for computers, telephones, banking. […]
Our expressions under the algorithmic microscope
Digital, In the NewsMohamed Daoudi, a researcher at IMT Lille Douai, is interested in the recognition of facial expressions in videos. His work is based on geometrical analysis of the face and machine learning algorithms. They may pave the way for applications in the field of medicine. Anger, sadness, happiness, surprise, fear, disgust. Six emotions which are […]
IoT: How to find your market? Footbar’s story
Digital, In the News, Start-up-enIn the connected objects sector, the path to industrialization is rarely direct. Finding a market sometimes requires adapting the product, strategic repositioning, a little luck, or a combination of all three. Footbar is a striking example of how a startup can revise its original strategy to find customers while maintaining its initial vision. Sylvain Ract, […]