Marc Lemercier

Learn More
Learning from past projects allows designers to avoid previous errors and to solve problems. Several methods have defined techniques to memorize lessons and experiences from projects in what we call project memory. This paper presents our traceability approach that allows to extract knowledge without perturbing designers' activities. Our approach is based(More)
Everyday more than fifty million messages are generated by about two hundred million profiles on Twitter. Some users attempt to exploit the success of this micro logging platform and its relative freedom to perform malicious actions that can lead to identity or data theft. This work aims to propose a framework to assess suspicious behavior on Twitter. We(More)
A proposal from the DARSI (ADSNI) project team: is the set of attributes of a node Abstract With the exponential growth of social networks of Internet the identity of an individual has become numerical and thus diffused in both time and space dimensions. We cannot ignore that online social network has become a new platform for people to communicate and(More)
The convergence of mobile and online social network technologies has led to the emergence of mobile social applications available through stores for mobile devices. Nowadays, one can observe the proliferation of mobile social networks and the diversity of digital profiles for a unique person. In this work, we propose to model the multiple facets of one(More)
Smartphones have become increasingly popular, and, nowadays, thanks to the use of 3G networks, the need for connectivity in a business environment is significant. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data and Intranet networks. If any of this information were to(More)
Online social networks and microblogging platforms have collected a huge number of users this last decade. On such platforms, traces of activities are automatically recorded and stored on remote servers. Open data deriving from these traces of interactions represent a major opportunity for social network analysis and mining. This leads to important(More)
Nowadays, Smartphones have been widely used due to their capabilities in communication and multimedia processing. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data, and Intranet networks. Hence, the Internet of the future will be mobile Internet. However, threat of(More)