Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where François Trousset is active.

Publication


Featured researches published by François Trousset.


conference on soft computing as transdisciplinary science and technology | 2008

Web opinion mining: how to extract opinions from blogs?

Ali Harb; Michel Plantié; Gérard Dray; Mathieu Roche; François Trousset; Pascal Poncelet

The growing popularity of Web 2.0 provides with increasing numbers of documents expressing opinions on different topics. Recently, new research approaches have been defined in order to automatically extract such opinions from the Internet. They usually consider opinions to be expressed through adjectives, and make extensive use of either general dictionaries or experts to provide the relevant adjectives. Unfortunately, these approaches suffer from the following drawback: in a specific domain, a given adjective may either not exist or have a different meaning from another domain. In this paper, we propose a new approach focusing on two steps. First, we automatically extract a learning dataset for a specific domain from the Internet. Secondly, from this learning set we extract the set of positive and negative adjectives relevant to the domain. The usefulness of our approach was demonstrated by experiments performed on real data.


database and expert systems applications | 2011

Towards an automatic characterization of criteria

Benjamin Duthil; François Trousset; Mathieu Roche; Gérard Dray; Michel Plantié; Jacky Montmain; Pascal Poncelet

The number of documents is growing exponentially with the rapid expansion of the Web. The new challenge for Internet users is now to rapidly find appropriate data to their requests. Thus information retrieval, automatic classification and detection of opinions appear as major issues in our information society. Many efficient tools have already been proposed to Internet users to ease their search over the web and support them in their choices. Nowadays, users would like genuine decision tools that would efficiently support them when focusing on relevant information according to specific criteria in their area of interest. In this paper, we propose a new approach for automatic characterization of such criteria. We bring out that this approach is able to automatically build a relevant lexicon for each criterion. We then show how this lexicon can be useful for documents classification or segmentation tasks. Experiments have been carried out with real datasets and show the efficiency of our proposal.


conference on information and knowledge management | 2006

Privacy preserving sequential pattern mining in distributed databases

Vishal Kapoor; Pascal Poncelet; François Trousset; Maguelonne Teisseire

Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. This escalation has been fueled by the growing mistrust of individuals towards organizations collecting and disbursing their Personally Identifiable Information (PII). Digital repositories have become increasingly susceptible to intentional or unintentional abuse, resulting in organizations to be liable under the privacy legislations that are being adopted by governments the world over. These privacy concerns have necessitated new advancements in the field of distributed data mining wherein, collaborating parties may be legally bound not to reveal the private information of their customers. In this paper, we present a new algorithm PriPSeP (Privacy Preserving SEquential Patterns) for the mining of sequential patterns from distributed databases while preserving privacy. A salient feature of PriPSeP is that due to its flexibility it is more pertinent to mining operations for real world applications in terms of efficiency and functionality. Under some reasonable assumptions, we prove that our architecture and protocol employed by our algorithm for multi-party computation is secure.


database and expert systems applications | 2012

Opinion Extraction Applied to Criteria

Benjamin Duthil; François Trousset; Gérard Dray; Jacky Montmain; Pascal Poncelet

The success of Information technologies and associated services (e.g., blogs, forums,...) eases the way to express massive opinion on various topics. Recently new techniques known as opinion mining have emerged. One of their main goals is to automatically extract a global trend from expressed opinions. While it is quite easy to get this overall assessment, a more detailed analysis will highlight that opinions are expressed on more specific topics: one will acclaim a movie for its soundtrack and another will criticize it for its scenario. Opinion mining approaches have little explored this multicriteria aspect. In this paper we propose an automatic extraction of text segments related to a set of criteria. The opinion expressed in each text segment is then automatically extracted. From a small set of opinion keywords, our approach automatically builds a training set of texts from the web. A lexicon reflecting the polarity of words is then extracted from this training corpus. This lexicon is then used to compute the polarity of extracted text segments. Experiments show the efficiency of our approach.


conference of european society for fuzzy logic and technology | 2011

Multi-criteria improvement of options

Abdelhak Imoussaten; Jacky Montmain; François Trousset; Christophe Labreuche

Designing the way a complex system should evolve to better match the customers’ requirements provides an interesting class of applications for muticriteria techniques. The required models to support the improvement design of a complex system must include both preference models and system behavioral models. A MAUT model captures the decisions related to customers’ preferences whereas a fuzzy representation is proposed to model the relationships between systems parameters and performances to capture operational constraints. This latter part of the improvement design is supported by a branch and bound algorithm to efficiently compute the most relevant actions to be performed.


ieee international conference on fuzzy systems | 2015

On the consideration of a bring-to-mind model for computing the Information Content of concepts defined into ontologies

Sébastien Harispe; Abdelhak Imoussaten; François Trousset; Jacky Montmain

Ontologies are core elements of numerous applications that are based on computer-processable expert knowledge. They can be used to estimate the Information Content (IC) of the key concepts of a domain: a central notion on which depend various ontology-driven analyses, e.g. semantic measures. This paper proposes new IC models based on the belief functions theoretical framework. These models overcome limitations of existing ICs that do not consider the inductive inference assumption intuitively assumed by human operators, i.e. that occurrences of a concept (e.g. Maths) not only impact the IC of more general concepts (e.g. Sciences), as considered by traditional IC models, but also the one of more specific concepts (e.g. Algebra). Interestingly, empirical evaluations show that, in addition to modelling the aforementioned assumption, proposed IC models compete with best state-of-the-art models in several evaluation settings.


scalable uncertainty management | 2012

Comfort as a multidimensional preference model for energy efficiency control issues

Afef Denguir; François Trousset; Jacky Montmain

The incessant need for energy has raised its cost to unexpected heights. In response to this situation, many projects have been started in order to save energy. In this context, RIDER project tries to develop a weak system dependency of energy management framework which could be applied for different systems. Particularly, our RIDER Decision Support System (DSS) focuses on proposing generic control rules and optimization techniques for energy management systems. Therefore, the DSS aims to compute the most relevant target values (i.e., setpoints) to be provided to the energy control system and then, improving thermal comfort sensation or reducing energy costs. Literature proposes reusable system independent statistical models for thermal comfort. However, they are not easily interpretable in terms of a preference model which makes control not intuitive and tractable. Since thermal comfort is a subjective multidimensional concept, an interpretable and reusable preference model is introduced in this paper. Multi Attribute Utility Theory (MAUT) is used for this.


IFAC Proceedings Volumes | 2009

The Translation of Will into Act: Achieving a Consensus between Managerial Decisions and Operational Abilities

Jacky Montmain; François Trousset

Abstract In the current industrial context, strategies intended to bring about continuous improvement have to include the multi-criteria performance expression aspects. A MAUT model is proposed in the first part of this paper: it captures the managers’ strategy in terms of performances improvement. The search of an efficient improvement is formalized as an optimization problem. Nevertheless, MAUT models address purely managerial decisions but do not include the material constraints related to the action plans that address the required improvement. A qualitative model is thus proposed to support this implementation part. It models the relations between goals and actions to define the most relevant action plan. Finally, a unified framework is proposed to conciliate managerial and implementation aspects in an industrial improvement project. It integrates a preferences’ model for the managerial aspects and a CSP model for the operational aspects. Both models are conjointly run into an iterative process to define an efficient improvement.


EGC (best of volume) | 2010

Intrusion Detections in Collaborative Organizations by Preserving Privacy

Nischal Verma; François Trousset; Pascal Poncelet; Florent Masseglia

To overcome the problem of attacks on networks, new Intrusion Detection System (IDS) approaches have been proposed in recent years. They consist in identifying signatures of known attacks to compare them to each request and determine whether it is an attack or not. However, these methods are set to default when the attack is unknown from the database of signatures. Usually this problem is solved by calling human expertise to update the database of signatures. However, it is frequent that an attack has already been detected by another organization and it would be useful to be able to benefit from this knowledge to enrich the database of signatures. Unfortunately this information is not so easy to obtain. In fact organizations do not necessarily want to spread the information that they have already faced this type of attack. In this paper we propose a new approach to intrusion detection in a collaborative environment but by preserving the privacy of the collaborative organizations. Our approach works for any signature that may be written as a regular expression insuring that no information is disclosed on the content of the sites.


very large data bases | 2009

SAX: a privacy preserving general pupose methodapplied to detection of intrusions

François Trousset; Pascal Poncelet; Florent Masseglia

To overcome the problem of attacks on networks, new Intrusion Detection System (IDS) approaches have been proposed in recent years. They consist in identifying signatures of known attacks to compare them to each request and determine whether it is an attack or not. However, these methods are set to default when the attack is unknown from the database of signatures. Usually this problem is solved by calling human expertise to update the database of signatures. However, it is frequent that an attack has already been detected by another organization and it would be useful to be able to benefit from this knowledge to enrich the database of signatures. Unfortunately this information is not so easy to obtain. In fact organizations do not necessarily want to spread the information that they have already faced this type of attack. In this paper we propose a new approach to intrusion detection in a collaborative environment but by preserving the privacy of the collaborative organizations. Our approach works for any signature even if it needs a complex program to be detected and insure that no information is disclosed on the content of any of the sites. For this pupose, we have developped a general method (SAX) that allows to compute any algorithm while preserving privacy of data and also of the program code which is computed.

Collaboration


Dive into the François Trousset's collaboration.

Top Co-Authors

Avatar

Pascal Poncelet

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benjamin Duthil

University of La Rochelle

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Maguelonne Teisseire

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Ali Harb

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Mathieu Roche

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

Vishal Kapoor

Netaji Subhas Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge