Building on the Understanding of Business Processes Related to Service Provisioning and Service Assurance at Bell Canada

The main goal of this project will be a key contribution to the implementation of the Six Sigma methodology to the service provisioning and service assurance of Bell’s business customers. Six Sigma is an organized and systematic problem-solving method for strategic system improvement and new product and service development. It relies on statistical methods and […]

Read More
Security Assertion Checking & Enforcement Using Monitors

The goal of this project is to develop a new set of procedures and tools for testing the security of running software systems using a technique based on the concept of monitor. Monitors are systems which observe and analyze the behavior of a second system. The monitor will be designed as an external system that […]

Read More
Real-time Reproduction of Statistical Accurate Distributed System Workloads

Enquisite Software provides analytical services to corporate clients through the “mining” of data detailing how client customers interact with the clients’ Internet-point of presence. To facilitate this work, Enquisite actively collects a continuous stream of client interaction data which is stored in its repository, on which Enquisite clients perform on-demand queries for business actionable knowledge. […]

Read More
Extracting Commonality within Network Data Streams

Alcatel-Lucent manufactures telecommunications equipment, ranging from telephone handsets to internet routers. The Research & Innovation group within Alcatel-Lucent is mandated with evaluating new technologies and new ideas that may benefit Alcatel products, thereby benefiting Alcatel-Lucent’s customers, and ultimately the end users. One current area of their research is the ability to identify similar groups of […]

Read More
Natural Language Processing of Resumes

Matching potential employees to employment opportunities is a challenging task, which has significant commercial value. Employment agencies, departments in companies concerned with human resources and small company owners frequently have to read, or process, numerous resumes before identifying a short list of candidates. Working with Talent Technology, a developer of recruitment and hiring software and […]

Read More
Statistical Characterization of Real-World Distributed System Workloads

Enquisite Software provides analytical services to corporate clients through the “mining” of data detailing how the clients’ customers interact with the clients’ Internet points-of-presence. To facilitate this work, Enquisite collects a continuous stream of client interaction data, which is stored in an Enquisite-held repository, over which Enquisite clients perform on-demand queries for business actionable knowledge. […]

Read More
Cryptographic Security Solution for Laptops

In their various versions (XP, 2003, Vista, Longhorn), Windows operating systems offer different cryptographic security technologies for data such as Encrypted File System and BitLocker. The capabilities of these tools depend on the presence of hardware modules for example, the Trusted Platform Module. The aim of this project is to complete a comprehensive study of […]

Read More
Lie Algebra Image Processing Applied to Intrinsic Optical Imaging

Optical imaging and the underlying image analysis has seen tremendous progress in recent years. Although it is now possible to perform multi-modal acquisition, the analysis frameworks for multi-modal data remain elusive. For example, the different scales and resolutions at which the images are taken require the use of mathematical techniques to deform, analyze and co-register […]

Read More
Monitoring Sleep-related Breathing Irregularities with Computer Vision Techniques

Sleep monitoring plays an essential role in the diagnosis of sleep disturbances. While the polysomnogram represents the gold standard, it has the disadvantage of assessing the patient’s sleep in an unfamiliar environment, usually a sleep clinic. This proposal targets the development of new computer vision-based methods for home-based sleep monitoring in partnership with Vigil Health […]

Read More
Stochastic Modelling of Pre-sales and Network Request Provisioning Sub-processes at Bell Canada

The objective of this project is to contribute a quantitative framework for analyzing potential inefficiencies of current practices at Bell Canada in the early stages of telecommunication service provisioning, particularly pre-sales and network request sub-processes. Models of these processes incorporating randomness are to be estimated from past data and utilized as a basis for efficiency […]

Read More
Assymetric Lossless Compression via Algorithmic Self-organizing Structures

This internship project with Deep Compression Inc. aims to produce a prototype demonstrating a new technique for asymmetric lossless data compression. Unlike conventional compression techniques, this prototype will allow representational information to be recovered using an algorithmic recovery procedure, algorithmic self-organizing structure (ASOS). This new approach could pave the way for previously unprecedented levels of […]

Read More
Design and Implementation of IEEE 802.16j MMR Networks

Sparkmatrix, a provider of online tools for property managers, has positioned one of its next-generation service provisioning commodities at IEEE 802.16 networks (or Wimax). The company successfully delivered IEEE 802.11 and IEEE 802.16 services to their customers. To improve the service quality and coverage, they considered deploying relays in order to erase any possible black […]

Read More