Available courses
La Sécurité, la prévention des risques et la gestion d’une alerte sont des notions très sérieuses qui nous concernent tous. Il appartient à chacun d’avoir une attitude responsable et un comportement civique, même en cas de situations d’urgence.
Module en ligne de sensibilisation aux Violences Sexistes et Sexuelles.
Ce module a été développé dans le cadre du Plan National du lutte contre les VSS du Ministère de l'Enseignement Supérieur et de la Recherche.
Hot Topics in Mobile Communications
· This course presents some recent or emerging HOT TOPICS within the area of mobile networks.
· The course is modified from 2014 (and earlier) versions to allow focus on updated set of hot topics and trends in mobile communications.
· We emphasize emerging techniques to be used in future 5G mobile networks to allow for a significant increase in user quality, and network capacity.
· The course earns 5 ECTS
· We cover hot topics for 5G such as "Massive MIMO" , "network cooperation", "interference management", and "device coordination". These topics cover 21 hours.
· In the other 21hours, external experts (Intel, Huawei, ETSI, etc.) from Industry reveal hot topics seen from the wireless networking industry.
Teaching and Learning Methods : Lectures, Exercise and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory (25% of final grade).
This course presents the architecture of microprocessor-based systems, from the internals of the processors themselves to the main peripherals that surround them and make a complete computing machine, capable of running operating systems like GNU/Linux, Android, Windows, iOS...
Teaching and Learning Methods : Lectures, team-work, lab sessions, mini-conferences by industrials
Course Policies : Attendance to the lab sessions and the mini-conferences is mandatory
Digital communications is the study of physical layer transmission and reception strategies in communications equipment such as mobile communication devices, high-speed ethernet, optical communications and subscriber-line communications. It comprises the areas of (i) statistical modelling of communication channels (ii) design of coding and modulation systems for error resiliency (iii) design of demodulation and decoding strategies and the associated methods for assessing their performance. In addition to providing an overview of communication channels and classical modulation strategies, this course takes a hands-on approach by focusing on the details of a few critical elements of digital communications pertaining to modern wireless transceivers, both coherent and non-coherent.
Teaching and Learning Methods :: Lectures and hands-on lab sessions in MATLAB using signals acquired from local 4G networks.
Course Policies : Attendance to lab sessions is mandatory.
This course aims to present a treatment of mathematical methods suitable for engineering students who are interested in the rapidly advancing areas of signal analysis, processing, filtering and estimation. Significant current applications relate to, e.g., speech and audio, music, wired and wireless communications, instrumentation, multimedia, radar, sonar, control, biomedicine, transport and navigation. The course presents a study of linear algebra, probability, random variables, and analogue systems as a pre-requisite to material relating to sampled-data systems. Time permitting, the final part of the course covers the concepts of random processes, the analysis of random signals, correlation and spectral density.
Teaching and Learning Methods: The course is comprised of lectures, exercises and laboratory sessions.
Course policies: This course is aimed at students who have NOT already completed preparatory classes. Completion of all in-lecture examples is strongly advised.
The goal of MOBCOM is to provide a fundamental understanding of mobile communication systems. The course will seek to describe the key aspects of channel characteristics/modeling, of communication techniques, and to describe the application of these techniques in wireless communication systems.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2-3 students)
Course Policies : Attendance to Lab session is mandatory.
This course presents a series of mobile systems in their entirety to synthetize the knowledge gained in more fundamental courses. It explores current and emerging standards and follows the evolution of various mobile services.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory.
Would you like to investigate beyond the surface of Windows, MacOS, Linux, Android? Fed up with not understanding the origin of segmentation faults, why you need to eject a USB key before physically removing it, or why/how your Android system can execute Pokemon Go and Facebook at the same time? You want to delve into the details of the inner workings of the Linux kernel? Join us to discover the power of Operating Systems!
Teaching and Learning Methods : Lectures (40%), Lab sessions (40%), Project (20%)
Course Policies: Attendance to some lab and project session is mandatory
This course covers a variety of topics, all related to the use and management of a Linux operating system. In particular, the course is divided in three parts dedicated respectively to the command-line, to the Python programming language, and to maintaining, compiling, and installing applications.
« Those who fail to plan, plan to fail... ». Architects, tailors, and directors all use plans (or models) for their creation, and software engineers are no exception. Thus, it is a common practice for software project managers to rely on the UML langage to document their software projects, and to perform modeling of the software itself.
Teaching and Learning Methods : Lectures (20%), Exercises (40%), Lab sessions (40%)
Course Policies: Attendance to labs is mandatory
The proper treatment of modern communication systems requires the modelling of signals as random processes. Often the signal description will involve a number of parameters such as carrier frequency, timing, channel impulse response, noise variance, interference spectrum. The values of these parameters are unknown and need to be estimated for the receiver to be able to proceed.
Parameters may also occur in the description of other random analysis of communication networks, or in the descriptions of sounds and images, or other data, e.g. geolocation. This course provides an introduction to the basic techniques for estimation of a finite set of parameters, of a signal spectrum or of one complete signal on the basis of a correlated signal (optimal filtering, Wiener and Kalman filtering). The techniques introduced in this course have a proven track record of many decades. They are complementary to the techniques introduced in the EURECOM course Stat. They are useful for other application branches such as machine learning, in the EURECOM courses MALIS and ASI.
Teaching and Learning Methods: Lectures, Homework, Exercise and Lab session (groups of 1-2 students depending on size of class).
Course Policies: Attendance of Lab session is mandatory (15% of final grade).
This course provides a broad introduction to cryptography and communication security mechanisms based on cryptography. The course covers fundamental aspects such as security evaluation criteria and the mathematical constructs underlying cryptographic primitives as well as applied aspects like the design of major encryption and hashing algorithms, details of security mechanisms relying on cryptography such as data encryption, integrity, digital signature, authentication, key management, and public-key infrastructures.
Teaching and Learning Methods : Lectures and Lab sessions
Course Policies : Attendance to Lab sessions is mandatory.
Teaching and Learning methods: Weekly lectures and Laboratories
This course provides an introduction to practical security concepts. The goal is to understand common attacks and countermeasures in a range of topics. The course is practice oriented, it describes real attacks and countermeasures. Students will practice attacks on a dedicated server (similar to a Capture the Flag competition).
Teaching and Learning Methods :Weekly class. Some guest lectures. Homework are online challenges, on a number of topics related to the class. A first lab is organized during lecture time to bootstrap challenges.
Course Policies :Class attendance is not checked but generally required to succeed.
The goal of this course is to provide a comprehensive view on recent topics and trends in distributed systems and cloud computing. We will discuss the software techniques employed to construct and program reliable, highly-scalable systems. We will also cover architecture design of modern datacenters and virtualization techniques that constitute a central topic of the cloud computing paradigm. The course is complemented by a number of lab sessions to get hands-on experience with Hadoop and the design of scalable algorithms with MapReduce.
Teaching and Learning Methods: Lectures and Lab sessions (group of 2 students)
Course Policies: Attendance to Lab session is mandatory.
The objective of this course is to give students a solid background in Machine Learning (ML) techniques. ML techniques are used to build efficient models for problems for which an optimal solution is unknown. This course will introduce the basic theories of Machine Learning, together with the most common families of classifiers and predictors. It will identify the basic ideas underlying the mechanism of learning, and will specify the practical problems that are encountered when applying these techniques, optimization, overfitting, validation, together with possible solutions to manage those difficulties.
Teaching and Learning Methods : Lectures and Lab sessions (groups of 1 or 2 students)
Course Policies : Attendance to Lab sessions is mandatory
Because multimedia data (in particular image and video) require efficient compression techniques in order to be stored and delivered, image and video compression is a crucial element of an effective communication system.
This course covers the most popular lossless and lossy formats, introduces the key techniques used in source coding, as well as appropriate objective/subjective metrics for visual quality evaluation.
Teaching and Learning Methods: Each class includes a problem session for students to practice the material learned. This course includes a limited number of lab session hours.
Course Policies: It is mandatory to attend lab. sessions.
The course aims at providing students with a basic knowledge and practice about the use of computer algorithms to perform image processing on digital images. The two main objectives attached to Digital Image Processing (DIP) are to improve the visual quality of images and to automatically extract semantic information from visual data (e.g. object recognition).
Teaching and Learning Methods: Each session is split into two parts: 1.5-hour lecture and 1.5-hour lab.
Course Policies: It is mandatory to attend lab. sessions.
This course covers the implementation of database systems by addressing the main topics, including data storage, indexing, querying; query optimization and execution; concurrency control and transaction management.
The purpose of the course is to become familiar with the principles and the ideas behind established techniques for handling data at scale. Students will implement classic and cutting-edge database systems methods in three projects. Projects represent the biggest chunk of this course. The projects require extending the functionality of a data management system in order to support novel features. In at least one the projects, students will also write a technical report that describes and experimentally evaluates the built system.
The course is complemented by lab sessions to guide students through the design and validation of the methods developed during the lectures.
Teaching and Learning Methods: Lectures and Lab sessions.
Course Policies :
Students are expected to do their own assigned work. If it is determined that a student has engaged in any form of academic dishonesty, he or she may fail the course and additional sanctions according to Eurecom's policies.
This course will discuss all relevant aspects related to mobile systems security. Mobile devices have been revolutionized users' lives, and more than two billions mobile devices have been sold to date. Unfortunately, these devices, their operating systems, and the applications running on them are affected by security and privacy concerns. This course will be hands-on and will cover topics such as the mobile ecosystem, the design and architecture of mobile operating systems, rooting and jailbreaking, application analysis, malware reverse engineering, malware detection, vulnerability assessment, automatic static and dynamic analysis, and exploitation and mitigation techniques. While this course will mostly focus on Google's Android OS (its open nature makes it possible to have more interesting exercises and projects), it will also cover technical details about Apple's iOS as well.
Teaching and Learning Methods : Lectures , labs, and homework assignments.
Course Policies : Class and lab attendance is not checked but generally required to succeed.
The goal of this course is to equip students with security and privacy technologies for the Big Data and the cloud computing paradigm. Students will discover the latest advances in privacy and security technologies and will understand their limitations as well.
Teaching and Learning Methods : Lectures (sometimes invited) and homeworks
Course Policies : homeworks and final project are mandatory
The goal of this course is to introduce the students to the basic concepts of secure multiparty computation, the foundational MPC protocols and someadvanced blockchain protocols. This is a theoretical course! We will see foundational aspects of MPC, protocols, proof (as in math) of security, fundational aspects of Blockchain.
Teaching and Learning Methods:Lectures and homework.
Course Policies: Final project and homework arenot mandatory
The module teaches the state-of-the art of the modeling techniques for vehicular mobility. The objectives are first to describe the challenges of close-to-reality random models for vehicular mobility, then to introduce the concepts of vehicular traffic flow models and Origin-Destination (O-D) Matrices for trip and path planning. Finally, it trains on best practices to apply these concepts for realistic vehicular traffic modeling on vehicular traffic simulators.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory.
(Course for Post Master and International Masters students only).
This module provides a global and coherent view of C-ITS standardization activities in major standard development organizations (SDOs) or industry consortia, such as the IEEE, the ETSI, the ISO, the IETF and the SAE. This module also illustrates the similarities and differences between different approaches in Europe, the US, and the rest of the world. This module finally details the standardization process related to different C-ITS technologies or information.
Teaching and Learning Methods : Lectures, Case Studies and attendance to Standardization meetings
Course Policies : Attendance to case studies and standardization meetings is mandatory.
Interested in learning how to communicate using quantum bits? Curious about how quantum algorithms and quantum computers work? This is an introductory course to quantum communication, computation, and information processing. We will cover various aspects of quantum information science and systems, introducing in a simple manner key principles and concepts, which are often considered “hard” or mysterious.
After a brief overview of quantum technology, the course starts with a concise introduction of key principles of quantum mechanics. Then, we cover fundamental aspects of quantum information, such as qubit, entanglement, Bell inequalities, and EPR (Einstein-Podolsky-Rosen) paradox, as well as of quantum communication (noise, quantum channels, decoherence, von Neumann entropy, Holevo capacity). We also present basic principles of quantum computing and study key quantum algorithms (e.g., Shor’s, Grover’s, quantum Fourier transform). Finally, we discuss potential applications and emerging topics, such as quantum AI and quantum/ post-quantum security.
Previous exposure to quantum mechanics is not required. All necessary concepts and mathematical formalism are taught during the first lectures.
Teaching and Learning Methods: Lectures supported by illustrative examples and exercises. Each session starts summarizing key concepts from previous lecture. Optional project for in-depth study of theoretical concepts or for understanding practical aspects (e.g. implementing/programming basic quantum algorithms and gates).
Course Policies: Attendance to lectures is not mandatory but highly recommended.
(Course for Post Master and International Masters students only).
This module teaches the fundamentals of simulation and emulation methodologies providing guidance on how to design a performance evaluation campaign, set up a test scenario, select the appropriate models, level of granularity, metrics for statistical correctness, and discuss the differences between simulation and emulation platforms and how to use them for accurate performance evaluation of communications for ITS.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory.
Abstract:
The purpose of this course is to introduce the student to new and exciting applications whose analysis and resolution will employ powerful yet simple information-theoretic tools. Such applications will be in the context of communications, distributed computing, compressive sensing as well as data science.
Teaching and Learning Methods
The course will cover material from a variety of seminal textbooks, and will try to instill a proper mix of theory and practice. The student will be taught a variety of information theoretic approaches, and will be exposed to the technological impact of these approaches. We will learn how basic mathematical machinery can be used to provide clear insight and simple solutions to some of the most interesting technological problems in communications, distributed computing, compressive sensing and machine learning.
Course Policies
- Exams: The (final) exam will be two hours long, and it will be comprehensive. During the exam, all notes from this taught class are allowed.
- Project: The work performed during the project can be collaborative.
The Semantic Web is an evolving extension of the World Wide Web in which the semantics of information and services on the web is defined. It derives from W3C director Sir Tim Berners-Lee's vision of the Web as a universal medium for data, information, and knowledge exchange. This course is a guided tour for a number of W3C recommendations allowing one to represent (RDF/S, SKOS, OWL) and query (SPARQL) knowledge on the web as well as the underlying logical formalisms of these languages, their syntax and semantics. We will present the problems of modeling ontologies and reconciling data on the web. Finally, we will explain how to extract knowledge from textual documents using natural language processing and information extraction technologies.
Teaching and Learning Methods: Lectures and Lab sessions (group of 2 students max)
Course Policies: Attendance to the Lab sessions is mandatory.
This course provides an overview of the architecture of microprocessor-based systems. It presents the main hardware and software components and the concept of instruction set which can be considered as the hardware-software interface. It is intended for students who never had courses in computer architecture.
Teaching and learning methods:
- Understanding of the structure of a computer system, of its main hardware and software components of their role
- Programming in assembly language
- Understand how hardware and software interact
Course Policies: /
Programming Languages and Algorithm Design has the following objectives:
-
Introduce students to basic programming concepts and programming tools; -
Study three programming languages: C, as an example of low-level language; Python, as an example of high-level language; and MATLAB, as an example of domain-specific language; -
Provide students with methods and knowledge suitable for the design of efficient algorithms; -
Provide methods for the analysis of resources (memory and time) used by algorithms; -
Provide a catalogue of the most well-known and efficient algorithms for basic computational problems (sorting, searching, resource optimization, etc.).
Teachind and Learning methods:
The course is composed by lectures and laboratory sessions. The laboratory sessions consist in interactive crash courses (2 sessions of 3 hours each for each programming language, see “Course Structure” below) where the students have the opportunity of learning the basic programming concepts of different programming languages.
Course policies:
The course is composed by lectures, laboratory sessions in the form of interactive crash courses, and a mini student project.
Interactive:
The laboratory sessions will be interactive and will include discussions with the students and lab exercises. It will be held in one lab room equipped with a projector.
Crash curse:
The course will be structured into two sessions of 3 hours each.
The first session will serve as introduction to the programming language and corresponding programming tools. After a short description of the purpose and characteristics of the environment and programming language, the students will be guided through lab exercises to familiarize with the software and the basic programming concepts.
The second session will introduce additional libraries with a particular emphasis on the ones used in EURECOM courses.
The discussion will be alternated with lab exercises. The students will be given some time to solve a problem and then a volunteer student will be asked to show their solution to the other students using the computer connected to the projector.
The objective is to ensure that all students participate in the discussions and present their solution at least once during the course.
This class approaches wireless communication from the perspective of digital signal processing (DSP). No background in digital communication is assumed, though it would be helpful. The utility of a DSP approach is due to the following fact: wireless systems are bandlimited. This means that with a high enough sampling rate, thanks to Nyquist’s theorem, we can represent the bandlimited continuous-time wireless channel from its samples. This allows us to treat the transmitted signal as a discrete-time sequence, the channel as a discrete-time linear time invariant system, and the received signal as a discrete-time sequence. In this class, we take an experimental approach to wireless digital communication. We will use a well-known software defined radio platform known as the USRP (universal software radio peripheral) where the radio can be programmed in software instead of implemented using hardware. The focus will be on the design, implementation, evaluation, and iterative optimization of a digital wireless communication link. At the end of this class, you will have constructed your own wireless communication link. In this process, you will have achieved the following learning objectives. You will understand what bandlimited system is and how sampling works. You will be able to compute power spectra of bandlimited signals. You should be able to describe the design challenges associated with building a wireless digital communication link. You should be able to define and calculate bit error rates for some common modulation schemes. You should know the difference between binary phase shift keying and quadrature phase shift keying as well as how to implement them. You should understand the connection between pulse shaping and sampling. You should know how to define excess bandwidth for a raised-cosine pulse. You should understand how to obtain a sampled channel impulse response from a continuous time propagation channel. You should understand how to train and estimate the coefficients of a frequency selective channel. You should understand the various kinds of synchronization required and how to compensate for different sources of asynchronicity. You should be able to explain how to perform equalization using single carrier frequency domain equalization or OFDM modulation.
Teaching and Learning methods: /
Course Policies:/
The aim of this course is to introduce students to physical and psycho acoustics, digital audio technologies, sound processing and synthesis techniques specific to live-sound, audio and music applications. Special emphasis is placed on practice with the support of audio-specific software.
Teaching and Learning Methods: The lecture is divided in half between the theoretical part, which is enriched by sound examples, and practice in the laboratory.
Course Policies: Attendance to lectures and labs is not mandatory but highly recommended.
Description
The course will cover:
- Physical and psycho acoustics;
- Fundamentals of digital audio;
- Techniques and technologies for sound analysis, processing and synthesis;
- Hands-on practice with dedicated audio deployment tools.
The detailed course programme can be viewed at this link: https://www.massimilianotodisco.eu/teaching.html
Learning outcome
Students will be able to:
- understand and identify the fundamental characteristics of sound for the physical and perceptual world;
- understand the principles of digital audio;
- select and implement established signal processing and synthesis methods for sound and music signals;
- develop and evaluate practical sound-based applications.
Bibliography
- Fletcher, N. H., & Rossing, T. D. (1991). The physics of musical instruments. New York, Springer-Verlag.
- Vaseghi, S. V. (2007). Multimedia Signal Processing: Theory and Applications in Speech, Music and Communications. J. Wiley.
- Everest, F. and Pohlmann, K. (2001). Master Handbook of Acoustics. 5th ed. New York, McGraw-Hill.
- Müller, M. (2015). Fundamentals of Music Processing - Audio, Analysis, Algorithms, Applications. Springer.
- Course slides.
Requirements: Proficiency in mathematics, physics and statistics.
Grading Policy: Exam (80%) + Lab test (20%)
Nb hours of lectures/labs: 10.5/10.5
Nb hours per week: 3
The architectures of networks and service delivery platforms are subject to an unprecedented techno-economic transformation. This trend, often referred to as Network Softwarization, will yield significant benefits in terms of reducing expenditure and operational costs of next-generation networks. The key enablers are Network Function Virtualization (NFV), Software-Defined Networking (SDN), Cloud and Edge Computing.
This course will cover the principle of Network Softwerization by introducing and detailing the concepts of SDN, NFV and Cloud Computing (focusing on the IaaS model and Edge Computing). Besides covering the theoretical aspects, the course will provide an overview of the enabling technologies, and how combining these concepts will allow building flexible and dynamic virtual networks tailored to services.
Teaching and Learning Methods: Lectures and lab. sessions.
Course Policies: Attendance to Lab sessions is mandatory.
Reinforcement Learning (RL) has recently emerged as a powerful technique in modern machine learning, allowing a system to learn through a process of trial and error using feedback. It has been succesfully applied in many use-cases, including systems such as AlphaZero, that learnt to master the games of chess, Go and Shogi.
The goal of this course is to introduce the students to basic concepts of RL such as, Markov decision processes, dynamic programming, model-free methods, approximation methods via value function and policy evaluation and many more useful tools. This is a theoretical course but we will provide examples of real-world applications to demonstrate the usefulness of RL.
Teaching and Learning Methods
Lectures, homework, exercises. Each lecture starts summarizing key concepts from previous lecture. Part of each lecture is often dedicated to illustrative examples and exercises.
Course Policies
Attendance to lectures and exercise sessions is not mandatory by highly recommended.
This course is like a mini-MBA (Masters' in Business Administration) and covers much of the same ground as a business school classical post-experience MBA (though not in the same depth). This is one of a triad of related courses all of which are of special interest to those intending to become managers (practically everyone!), or, eventually, owners of their own companies.
Teaching and Learning Methods: Lectures, team exercises, and presentations
Course Policies: On-time class attendance is mandatory; three unapproved absences mean exclusion.
This course consists of three essential elements:
(1) 'Know yourself' - understanding the drivers of your own behavior. This is the basis of any personal development and is critical for developing effective interaction with others whether as a team member, or as a team leader.
(2) 'Working with others' - building on the self-knowledge mentioned above, this core element allows you to explore, understand, and practice ways of working with others that are both more enjoyable and more effective. This is critical given that almost everyone works as part of a team.
(3) 'What's next?' - building on both the above sections, this element helps you take the next steps in your career: setting objectives, selecting target organizations, applying for jobs, and effective interviewing.
Teaching and Learning Methods: Lectures, team exercises, and presentations
Course Policies: On-time class attendance is mandatory; three unapproved absences mean exclusion.
Thanks to this class, you will understand why an innovative project cannot be considered as a regular project.You will learn how to take the market into account at a very early stage in project management, how to link technology and needs and how to lead in a time of uncertainty and complexity. You will be trained to build a solid and convincing launching strategy as a team on specific cases that you choose. Whatever the nature or maturity of a project, you will learn to identify its potential and market, to choose the most relevant positioning and to build a viable business model.
You have an innovative idea that you would like to expand in the market. You want to know if you are made for entrepreneurship. You plan to work in a R&D company or in an innovation department. Or you are simply curious to know how to innovate better. This course is for you!
Teaching and learning methods:
The pedagogy of this course is deliberately interactive through the application of new concepts studied on concrete cases. We will use the pedagogical tools developed by Vianeo (card game, paper canvas, digital platform) and the participants' cases throughout the course in teams of 5 or 6.
Course Policies: Mandatory attendance. Between 2 courses, work on collecting information, further analysis, updating or preparation.
This course provides a solid introduction to intellectual property law from a managerial and strategic perspective taking an international and comparative approach.
The course is the study of how companies protect innovations in order to create value for the company
Teaching and Learning Methods : Lectures and cases sessions (group of 4 students)
Course Policies : Attendance to Lab session is mandatory.
Thiscourse aims to start with the circular flow of economic activity and the interdependence of its institutional sectors. The evolution of sustainable development’s concept is developed with its economic, social and environmental dimensions. It highlights the challenges and commitments to be met at national and international level. Corporate social responsibility towards the various stakeholders is an essential step in the achievement of a sustainable economy.
Teaching and Learning Methods
A course of 5 sessions around the fundamentals of the concept of sustainable development.
Students will then have to apply their knowledge in 2 sessions through:
- Presentation (student subgroups) on a topical subject related to sustainable economy challenges.
- Debriefing and discussion
Course Policies: Seven 3-hour sessions.
EURECOM wishes to involve students in its "promotion" activities and thus values their commitment to the school community.
Teaching and Learning Methods:
-
Activity of elected student delegates:
- Participation in teaching committees appeal commissions and disciplinary councils
-
Activities to "promote" the school:
- Travel to the venue of the event
- The pedagogical recognition of student commitment takes the form of a compulsory UE for first-year students and an optional free EC for the other years.
Course Policies:
Student engagement activities can only be validated once per academic year.
-
For elected students:
- Any invitation to attend a council or a committee is equivalent to an authorization to be absent from lessons for full members and, in the event of absence or impediment, for substitute members.
- The list of elected students is communicated to the heads of the components concerned so that the special status of these students in the context of teaching is known.
-
For "promotion" activities:
- Possibility of one-off absence from lessons, duly justified
The commitment mission must represent a minimum of 40 hours over the academic year.
Article 29 of the Equality and Citizenship Law, published on 27 January 2017, generalizes the mechanisms for recognizing student commitment to all higher education institutions.
Student involvement in solidarity promotes the acquisition of skills and knowledge that contribute to personal development, citizenship training, and better integration of students.
Teaching and Learning Methods: The pedagogical recognition of student commitment takes the form of a CE that can be chosen within an opening UE. It is therefore not compulsory but can be chosen by the student in addition to the curriculum.
Course Policies:
The activities or missions in the student's commitment can only give rise to one validation per academic cycle.
This CE is not available to students in the first year of the engineering cycle.
The commitment must represent a minimum of 20 hours over the academic year.
Application file: To benefit from the validation of their commitment, the student must:
- Apply to the Director of Studies no later than 7 days after the start of the academic year. For students who start their commitment activity during the semester, the application must be made before the end of the semester to be considered for the following semester.
-
The application file includes:
- A photocopy of the student card or the school certificate
- The application forms
-
Any formal proof of belonging to one of the categories listed under “Description”; i.e:
- A certificate of activity and/or mission specifying the host organization, the general missions, and the time constraints, signed by the head of the organization
- A contract of employment
- Any supporting documents that the student considers useful to attest to his/her commitment and the particular needs related to the activity in which he/she is engaged.
- After obtaining a favourable opinion, the registration to the CitiCom CE is validated.
Course for EIT students only
Two topics – with related concepts, methods and/or tools – will be covered in the context of a selected innovation or entrepreneurial case:
• One fixed and common topic: Assessing the impact of a technology on an industry, market and/or organization, the support and barriers to its deployment, the influence on a specific goal/agenda (technology transfer, existing industry, new company, etc.).
• One case-dependent topic: pertaining to market / business environment analysis (main forces affecting the business, suppliers, partners, competition, environmental issues), sustainability and social issues, business modeling, go-to-market strategies, etc.
The innovation or entrepreneurial project may be originating from:
• Cases issued from EIT Digital Innovation Action Lines: within Activities, Partners / Business Community projects,
• Cases based on the continuation of students EIT Digital Summer School (or BDLab) project,
• Cases within other innovation or entrepreneurial projects rooted in a real-life environment as may be collected in the university ecosystem.
Teaching and Learning Methods :
The I&E Study is based on a group assignment and on an individual assignment. A large autonomy is given to the students to organize and achieve their goals.
a. Group assignment:
Students will work in teams of around 4 students. Teams will be assigned cases. Each team will identify and address a challenge/question in the context of their assigned case. This challenge/question may be related to considering alternate business models or go-to-market scenarios in relation with the innovation or entrepreneurial case, fed by exploration in some specific areas: business environment, competition, suppliers, partners, environmental and sustainability issues, etc.
To address their challenge/question, the students will cover the 4 generic steps of an explorative business analysis:
- Identification of the relevant challenge/question,
- Acquisition of applicable concepts/methods/tools,
- Observations (data collection) on a selected part of the case,
- Analysis and interpretation.
Students’ supervision comprises:
- One individual or group session to introduce and detail the assignment and help students identify the challenges/questions,
- 1-to-many workshops: one for each of the 4 study steps above. Students support can be structured through pre-/post-assignments for each workshop,
- One oral defense.
It is expected that the authors of the case will contribute to supervision, provide data/contacts, participate to an oral defense and/or offer other meeting occasions to ensure rooting of the business assignment in real life.
b. Individual assignment:
Students will work on an online individual assignment. This individual assignment can be done before, during or after the group assignment. In this assignment, students will acquire concepts and tools pertaining to the assessment of the impact of a technology on an industry, market and/or organization. Students will also get the opportunity to apply these concepts and tools to their own case (based on their group-assignment case when possible).
Students’ supervision comprises (may be combined with the group assignment supervision):
- One group session to introduce and detail the assignment,
- 1-to-many workshops to help students follow the steps in the assignment structure.
Cour
This course focuses on Responsible Research and Innovation applied to the digital domain. It provides conceptual, theoretical and empirical foundations for students to develop a transdisciplinary approach to dealing with the non-technical implications of technological innovation. Students will learn about the key concepts in the field (sustainability, reversibility, acceptability, anticipation, participation) as well as the main methods of technology assessment that enable them to better approach the contemporary challenges and controversies of the digital age. Based on contributions from experts from different backgrounds, the course sessions will cover a range of issues raised by digital technologies in terms of health, ethical, social and environmental risks.
Teaching and Learning Methods: The course consists of seven complementary sessions led by various experts in the field of digital technologies and impact assessment (university researchers, representatives of public regulatory and risk assessment agencies, consultants, business leaders). It is based on a participatory teaching approach, requiring the active involvement of students, both in class (discussions, presentations, tutorials) and at home (reading, web research, writing). A collective research project to formalise knowledge will be required and presented at the end of the course.
Course Policies: Attendance and punctuality at all course sessions are compulsory. Classwork/homework associated with each session is also compulsory and will be marked. Laptops or tablets are permitted for note-taking and practical work.
- This course provides a broad overview of computer networking, covering the application layer, transport layer, network layer, and link layers.
- It covers basic concepts in computer networking as well as the prominent Internet protocols.
Teaching and learning methods:
Lectures and Lab sessions (group of 2-3 students)
Course Policies: attendance to labs is mandatory
The objective of this course is to raise awareness of the threats and challenges and to introduce the main concepts of cybersecurity. The aim is to present a guide of good practices applicable to all IT professionals, whether they are in training or in activity.
Database systems are used for storing and maintaining any sort of data, providing convenient access to them through efficient query processing.
This course aims to give fundamental knowledge about databases, with particular attention to relational models. Students will learn how to design a relational database, using established methods such as E/R diagrams, and implement them. In addition, this course will offer an extensive presentation of SQL query languages.
Teaching and Learning Methods:
Lectures (with in-class exercises) and individual practical labs.
Statistics is a foundation of many areas of science and engineering that involve `` data.’’ This course focuses on fundamental concepts in statistical inference that are necessary for applying statistical methods in practice and that form the basis of other fields such as machine learning.
Teaching and Learning Methods: Students learn by lectures, exercises, and computer experiments.
Course Policies: The valid usage of statistical methods requires a mathematical understanding of the underlying mechanism. As such, the course covers both mathematical and algorithmic aspects of statistics.
This course offers a survey of several well-known attacks targeting specific weaknesses of hardware (microprocessors, dedicated hardware cryptographic accelerators...) For each of them the conditions of success are explained and some countermeasures are proposed.
Teaching and Learning Methods : Lectures, lab sessions
Course Policies : Attendance to the lab sessions is mandatory
The subtitle of this course could be “Multi-Antenna Interference Handling for Multi-User Multi-Cell Systems”. Indeed the main focus is on the exploitation of multiple antennas to (more easily) handle inter-symbol and inter-user interference. Key concepts here are beamforming, MIMO (Multi-Input Multi-Output), Multi-User MIMO, Massive MIMO.
After a basic course in digital communications, a wide range of issues arise in the treatment of physical layer procedures in a wide variety of transmission technologies such as xDSL, gigabit Ethernet, powerline systems, DAB/DVB broadcasting and optical communication systems to name a few. These issues involve e.g. multi-rate echo cancellation for full duplex operation on twisted pair telephone lines, synchronization and equalization techniques in a variety of single and multi-carrier systems, impulsive noise in powerline and automotive systems etc. Even just wireless communications encompass a wide range of systems such as satellite, underwater, near-field communications, fixed wireless access, private systems, sensors, IoT, etc. and a wide range of aspects such as relaying, full duplex radio, cognitive radio, location estimation etc.
Whereas these systems will be briefly mentioned, the main focus will be on cellular wireless and the use of multiple antennas at receivers and transmitters. Spatial filtering, spatiotemporal filtering, and multiuser detection for CDMA are all treated in a unified fashion.
Teaching and Learning Methods: Lectures, Exercise and Lab session (groups of 1-2 students depending on size of class).
Course Policies: Attendance of Lab session is mandatory (25% of final grade).
The aims of the course are to provide students with tools that can help to design error-free software/hardware systems. The course gives both the theoretical foundations and the pratical use of formal methods.
Teaching and Learning Methods : Lectures and Lab sessions.
Course Policies : Attendance to Lab session is mandatory.
This course treats the subject of modern radio engineering and includes typical RF architectures and their characterizations, modeling, prediction and simulation of radio-wave propagation, cellular planning, systems-level aspects of modern radio network design.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory.
Computational methods in digital communications provides a selection of hands-on experiments in programming and implementation techniques for high-performance computing applied to telecommunications. Students will learn architecture concepts and how to optimize software to implement different types of algorithms efficiently on software-based systems.
Teaching methods: The course is primarily given in a lab setting leveraging guided personal work. The instructor gives some lecture material progressively during the course of the lab-sessions in an on-demand fashion. The mini-project teamwork includes regular 45 minutes review meetings with the instructor and teaching assistants to overview progress on the subject.
Grading: 50% final mini-project work and presentation, 50% grading of lab sessions.
Teaching and Learning Methods: Lectures, Homework (2-3), and a case study (study and present a research paper in a group of 2-3 students).
Course Policies: Mandatory participation, Case study optional, but recommended.
This module addresses the access methods in Wireless Local Access Networks (WLAN). The basic contention and management mechanisms are detailed. Current and emerging standards of WLAN toward 5G are also presented.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory.
Image & Video processing is part of many applications related to security: digital watermarking, steganography, image forensics, biometrics, and video surveillance.
- Digital Watermarking allows owners or providers to hide an invisible and robust message inside a digital Multimedia document, mainly for security purposes such as owner or content authentication. There is a complex trade-off between the different parameters : capacity, visibility and robustness.
- Steganographyis the art and science of writing hidden messages (in a picture or a video) in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message.
- Image Forensics includes two main objectives: (1) To determine through which data acquisition device a given image is generated; (2) To determine whether a given image has undergone any form of modification or processing.
- Biometrics: The security fields uses three different types of authentication : something you know, something you have, ore something you are : a biometric. Common physical biometrics includes fingerprints, hand geometry ; and retina, iris or facial characteristics. Behavioural characters include signature, voice. Ultimately, the technologies could find their strongest role as intertwined and complementary pieces of a multifactor authentication system. In the future biometrics is seen playing a key role in enhancing security, residing in smart cards and supporting personalized Web e-commerce services. Personalization through person authentication is also very appealing in the consumer product area. This course will focus on enabling technologies for Biometrics, with a particular emphasis on person verification and authentication based on or widely using image/video processing.
- Video surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting. By default, for a better scene understanding, automatic image processing tools are used between acquisition/transmission and visualization or storage
Teaching and Learning Methods: Ce cours comporte un nombre limité de Travaux Pratiques et Travaux Dirigés.
Course Policies: Les TPs sont obligatoires.
This course provides an overview of software and hardware design for smart objects. It shows how to specify, design and validate digital hardware components, how to integrate them in a microprocessor-based system, and how to drive them from the software layers.
Teaching and Learning Methods: Lectures, team-work, lab sessions. Students are provided with prototyping boards and design tools for the whole semester duration.
Course Policies: Attendance to the lab sessions is mandatory
This course introduces the main concepts and techniques used in computer graphics and image synthesis. It focuses on 3D object modelling and advanced visualization methods used in 3D and Virtual imaging, scientific and information visualization, CAD, flight simulation, games, advertising and movie special effects. The courses mixes theoretical and practical sessions and the project requires a student personal involvement.
Teaching and Learning Methods :Lectures, Lab sessions and project (groups of 2 to 4 students)
Course Policies : It is mandatory to
- Attend to all the Lab sessions
- Deliver of a project movie and attend the project contest.
This course provides an introduction to the automatic processing of speech and audio signals. It starts with a treatment of the human speech production and perception mechanisms and looks at how our understanding of them has influenced attempts to process speech and audio signals automatically. The course then considers the analysis, coding and parameterisation of signals in the case of different speech and audio processing tasks. After an introduction to essential pattern recognition techniques, the course considers specific applications including speech recognition, speaker recognition and speaker diarization. The course also includes a treatment of speech and audio coding, noise compensation and speech enhancement.
Teaching and Learning Methods:
The course is comprised of lectures and exercises and laboratory sessions.
Course policies: Attendance of laboratory sessions is mandatory.
The course is roughly divided in two separate parts. The first covers the topics of computer forensics and incident response. In particular, we discuss a number of techniques and open source tools to acquire and analyze network traces, hard disk images, Windows and Linux operating system artifacts, log files, and memory images.
The second part of the course deals with the analysis of malware and unknown binaries. Here the goal is to introduce students to the main classes of techniques used in malware analysis and reverse engineering. We cover both static techniques (ELF and PE file structures, dissasseblers and decompilers, data and control flow analysis, abstract interpretation, ...) and dynamic techniques (sandboxing, library and syscall traces, dynamic instrumentation, debugging, taint analysis, unpacking,...). We will use mostly open source tools, with the exception of IDA Pro.
Teaching and Learning Methods : Lectures and Homework Assignment
This course aims at providing a solid and practical foundation to the design and execution of machine learning projects. Students will get familiar with a wide range of topics, through the application of theoretic ideas on problems of practical interest. This is a reverse class, in which students are required to study (or revise) a particular topic at home, and apply what they have learned in numerous laboratory sessions.
To define a machine learning projects, students will use cloud-based GPU resources, such as Google Colab, Kaggle and many more. Typically, projects are developed using Python Notebooks, or a legacy IDE, and can rely on standard machine learning libraries, and available pre-trained models, such as the ones provided by HuggingFace.
Project outcomes take the form of short research-style reports, which include methodological choices, results and a critical discussion on the performance achieved for a particular task.
This course focuses on the principles of learning from data and quantification of uncertainty, by complementing and enriching the Introduction to Statistical Learning course. In particular, the course is divided into two main parts that correspond to the supervised and unsupervised learning paradigms. The presentation of the material follows a common thread based on the probabilistic data modeling approach, so that many classical algorithms, such as least squares and k-means, can be seen as special cases of inference problems for more general probabilistic models. Taking a probabilistic view also allows the course to derive inference algorithms for a class of nonparametric models that have close connections with neural networks and support vector machines. Similarly to the Introduction to Statistical Learning course, the focus is not on the algorithmic background of the methods, but rather on their mathematical and statistical foundations. This advanced course is complemented by lab sessions to guide students through the design and validation of the methods developed duringthe lectures.
Teaching and Learning Methods : Lectures and Lab sessions (preferably one student per group)
Course Policies : Attendance of Lab sessions is mandatory
Deep Learning is a new approach in Machine Learning which allows to build models that have shown superior performance fora wide range of applications, in particular Computer Vision and Natural Language Processing. Thanks to the joint availability of large data corpus and affordable processing power, Deep Learning has revived the old field of Artificial Neural Networks and provoked the "Renaissance" of AI (Artificial Intelligence). The objective of this course is to provide an overview of the field of Deep Learning, starting from simple Neural Network architectures and pursuing with contemporary and state of the art practices and models. The course is organized as a combination of lectures where the theory is exposed and discussed, and hands-on sessions (labs) where experimentations are performed to practice with the theoretical concepts.
Teaching and Learning Methods : The course is composed of a combination of lectures and labs.
Course Policies : Attendance to all sessions is mandatory.
This course covers the application-level protocols dedicated to IOT. Knowing the limited capacity, in terms of battery and CPU, of the things, the classical application protocols used in the Internet like HTTP are not adequate. This course presents the recent application protocols specially developed for IOT. These protocols are organized into two categories: (i) Client/server (like COAP) and (ii) Publish/Subscribe (like MQTT, XMPP). In addition to these protocols, this course introduces two types of architecture, specifically dedicated to host IOT services, like 3GPP MTC and oneM2M.
Teaching and Learning Methods: The course is organised in lectures and labs.
Course Policies: Labs are Mandatory (reports)
This course introduces fundamental concepts in machine learning with applications to networked systems and the Internet of Intelligent Things (IoIT). Students will gain foundational knowledge of cutting-edge methods, including autoencoders, deep generative models, and reinforcement learning. They will also get familiar with fundamental information-theoretic frameworks (e.g., information bottleneck) and theoretical principles. We will also introduce large-scale distributed and decentralized learning over wireless networks, in particular under constraints (completion time, radio resources, computational efficiency, etc.).
Teaching and Learning Methods: Lectures, exercise sessions, and lab sessions. Each lecture starts summarizing key concepts from the previous lecture. Part of each lecture is often dedicated to illustrative examples and exercises.
Course Policies: Attendance to lab session is mandatory. Attendance to lectures and exercise sessions is highly recommended..
This course covers the Low Power Wide Area Network (LPWAN) protocols dedicated to IOT. LPWAN is a technology that intends to offer Internet connectivity to a large number of objects ("Things") under very strict requirements in terms of cost, power consumption, long distance, battery life, indoor penetration, etc. This course presents two families of LPWA protocols specially developed for IOT: (i) LPWAN for unlicensed spectrum (e.g. LoRa, SigFox ...) and (ii) Cellular LPWAN for licensed spectrum (e.g. 3GPP LTE Cat. M1 or Cat. NB).
Teaching and Learning Methods: The course is organized in 4 lectures and 3 labs.
Course Policies: Labs are Mandatory (reports)
This module addresses mechanisms and strategies to model multi-modal transportation. The objectives are first to introduce concepts of population modeling. Second, it extends graph theory concepts for modeling heterogeneous transportation networks, in particular public transport networks. Mechanisms for activity and demand modeling for multimodal transportation will also be discussed. Finally, this lecture trains on best practices to apply these concepts for efficient multimodal transportation planning on vehicular traffic simulator
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory.
This module addresses mechanisms and strategies to improve traffic efficiency and carbon footprint. The objectives are first to introduce the underlying theory such as Waldrop Equilibrium required for efficient path planning. Second, it describes concepts and theory behind the optimization of traffic lights to traffic conditions. Third, it provides guidelines and methodologies to model emissions and integrate them into efficient path planning. Finally, it trains on best practices to apply these concepts for efficient and green path planning on vehicular traffic simulators.
Teaching and Learning Methods : Lectures and Lab sessions (group of 2 students)
Course Policies : Attendance to Lab session is mandatory
Wireless communications are pervasive and have been used for a century. They are used in a very large set of security applications (communications by security forces, car key remote, alarm system, access control, drone command and control, surveillance devices) . However, day to day applications also require to be protected for privacy and personal security, such as WiFi or mobile communications (2G/3G/4G). At the same a number of challenges are present in wireless communications security, for example, messages are broadcasted, making it possible to intercept them without being noticed. Wireless signals are subject to jamming, making them unavailable.
This course will give a large perspective of the fundamental challenges in securing wireless communications, from the physical layer, modulations to the application protocols. A special focus will be put on practice with hands on exercises (using software defined radios and WiFi dongles).
Teaching and Learning Methods : Course is composed of lectures, Labs and small projects with final presentation.
Course Policies : Class attendance, labs and projects mandatory.
The architectures of networks and service delivery platforms are subject to an unprecedented techno-economic transformation. This trend, often referred to as Network Softwarization, will yield significant benefits in terms of reducing expenditure and operational costs of next generation networks. The key enablers are Network Function Virtualization (NFV), Software-Defined Networking (SDN), Cloud Computing (mainly Edge Computing).
This course will cover the principle of Network Softwerization by introducing and detailing the concepts of SDN, NFV and Cloud Computing (focusing on the IaaS model and Edge Computing). Besides covering the theoretical aspects, the course will provide an overview of the enabling technologies, and how combining these concepts will allow building flexible and dynamic virtual networks tailored to services, e.g. Anything as a Service (AaaS) and Network Slicing.
Teaching and Learning methods:
- Be able to control a network using a NoS (SDN controller)
- Be able to deploy a virtual network architecture
Since 1948, the year of publication of Shannon’s landmark paper “A mathematical theory of communications”, Information theory has paved the ground for the most important developments of today’s information/communication world making it perhaps the most important theoretical tool to understand the fundamentals of information technologies. The main objective of this course is to provide an introductory-level coverage of Information Theory. Information theory studies the ultimate theoretical limits of source coding and data compression, channel coding, and reliable communications via channels, and provides the guidelines for the development of practical signal-processing and coding algorithms. The course is meant to provide an intuitive point of view and foundation for both research and practice.
Teaching & Learning Methods: Lectures and homework.
Course policies:
Attendance Policy: Attendance is expected and required in every class period, unless previously discussed with the instructor. We will cover a lot of ground in this course to build a strong foundation for Information Theory, so attendance is important. To encourage learning, preparation, and participation, the lectures will be complemented by additional reading or review materials, e.g., slides, papers, MATLAB codes, and online course materials to cover some of the basic concepts prior to the lectures.
Other Course Policies: All mobile devices (e.g., smartphones, tablets, computers) should be stored securely away during lecture and are not be used unless specifically directed otherwise by the instructor. Use of a mobile device during an exam without the explicit permission of the instructor will be interpreted as the illicit transfer of exam data, will be considered an act of cheating and will be treated as such.
You are expected to approach the instructor with any issue that may affect your performance in class ahead of time. This includes absence from important class meetings, late assignments, inability to perform an assigned task, the need for extra time on assignments, etc. You should be prepared to provide sufficient proof of any circumstances based on which you are making a special request.
Academic Integrity: Student-teacher relationships are built on trust. For example, students must trust that teachers have made appropriate decisions about the structure and content of the courses they teach, and teachers must trust that the assignments that students turn in are their own. Acts that violate this trust undermine the educational process. In this class, all assignments that are turned in for a grade must represent the student’s own work. Submission of any assignment that is in violation of this policy may result in a penalty of an F in the class and may be subject to further disciplinary action.
If you have any questions concerning this policy before submitting an assignment, please ask for clarification.
Human-computer interaction (HCI) is the study of interaction between people (users) and computers, as the intersection of computer science, behavioral sciences, design and several other fields of study. This course aims to provide the basic concepts of user centered design when developing web applications. It will offer a deep dive presentation of modern web technologies: HTML-5, CSS-3 and Javascript. Finally, this course will provide techniques for evaluating user interfaces.
Teaching and Learning Methods: Lectures and mini-project (group of 3-4 students)
Course Policies: Attendance to course session is mandatory.
Course Description:
- Learn and
understand the role of sketching in design and its relation to creativity
- Focus on interaction design for web applications
- Get an overview of existing software tools that support sketching and learn Sketchify or Balsamiq
- Practice
and master new web technologies
- Develop rich web interactive applications (HTML5, CSS3, javascript)
- Learn advanced HTML5 APIs (web audio, media fragments, SEO and semantics)
- Be aware of accessibility constraints and devices
constraints (mobile phone)
- Know how to evaluate user interfaces
- Know your users through user centered design methods
- Learn how to perform A/B tests, usability and ergonomics studies
Bibliography:
- Bill Buxton (2007), Sketching User Experiences: Getting the Design Right and the Right Design, Morgan Kaufmann.
- Marti A. Hearst (2009). Search User Interfaces, Cambridge. http://www.searchuserinterfaces.com/
- Review of User Interface Prototyping Tools, http://www.dexodesign.com/2008/11/07/review-16-user-interface-prototyping-tools/
- HTML EdX online course: https://www.edx.org/xseries/html5-w3c
Requirements:
- Software development methodologies
- Basic knowledge of web technologies (html, css, javscript) is a plus but not mandatory
Reinforcement Learning (RL) has recently emerged as a powerful technique in modern machine learning, allowing a system to learn through a process of trial and error using feedback. It has been succesfully applied in many use-cases, including systems such as AlphaZero, that learnt to master the games of chess, Go and Shogi.
The goal of this course is to introduce the students to basic concepts of RL such as, Markov decision processes, dynamic programming, model-free methods, approximation methods via value function and policy evaluation and many more useful tools. This is a theoretical course but we will provide examples of real-world applications to demonstrate the usefulness of RL.
Teaching and Learning Methods
Lectures, homework, exercises. Each lecture starts summarizing key concepts from previous lecture. Part of each lecture is often dedicated to illustrative examples and exercises.
Course Policies
Attendance to lectures and exercise sessions is not mandatory by highly recommended.
This course aims to raise students' awareness of the entrepreneurial posture and practice by allowing them to discover the cognitive and operational process that under
lies the transformation of an idea into a viable and sustainable project.
Teaching and learning methods:
The course is organized in the form of a 'full immersion' seminar, which will occupy the students full time for a short week (3 full days + 1 half day).
The course will focus on real-life cases. Students will work in groups of 3 to 4 people, on real projects submitted by the participants. Prior to the course, each participant is asked to think about a topic or an idea that he/she would like to explore further. It can be a real business creation project or an idea that the student would like to explore further.
Each participant will present his/her idea in 2 minutes maximum to the whole group during the Ice-Breaker session that will take place during the first morning of the session. Each student will have to choose the project they want to work on to form teams of 3 or 4 people (not all projects can be worked on during the course).
Course Policy: Attendance and punctuality to all course sessions is mandatory.
The diversity of interrogations, of major issues and challenges, of the uncertainties structuring the contemporary international environment, lead today’s observers - the citizens, the Chief executive officer as well as students and future managers - to look carefully at those complex and challenging matters. The knowledge and understanding of those issues have become, in a word, indispensable.
Teaching and Learning Methods: Lecture/interactive conference with the class; use of various teaching materials and technical tools (PPT presentations, documentaries, TV programs, internet) to maintain student attention and encourage participation.
Course Policies : Attendance and punctuality at all course sessions are mandatory.
In the Business Simulation course, students, in groups of three to four, will manage a virtual company as an aid to learning, by doing, about the practical aspects of running a company in a dynamic international environment. The course will be provided in a compact blended learning environment.
Teaching and Learning Methods:
Uniquely at EURECOM, this course will be delivered in a blended learning environment. That is, only half of the learning will take place in the classroom at fixed times each week. The other half of the course will be undertaken online at times, and places, suitable for the individual student teams, provided that the required tasks (usually a decision set) is completed within the defined week timeframe.
Research has shown that the best learning experience from the business simulation is over a concentrated timeframe. Therefore, this course, of the standard 42 hours effective learning time for a 5-credit program, will be completed over seven weeks elapsed time (rather than the standard 14 weeks). Some students may find this helpful; freeing up time towards the end of the semester to work on projects in other courses.
During the course, following initial briefings, student teams will each take up to 12 sets of business decisions; each decision set representing one quarter of a business year. Decisions are entered online before a predefined cutoff date and time. These decision sets drive the simulation, the results being provided online. During the seven classroom sessions, instructors will be available, face-to-face, to answer questions and provide support. Between the classroom sessions, instructors are available online (asynchronously, and, at pre-agreed times, live), as are a range of online support materials, including videos and guides.
Teaching will combine classroom and video-based instruction, guidance, and support, with additional online materials and individual support helping students, at their own time and pace, to master the technical and practical aspects of the simulation.
Course Policies:
Active participation is required from each student. The grading system is continuous (see below) and is on both team and individual results. On-time attendance at entire classroom sessions is mandatory and will be recorded. Unapproved absences may result in expulsion. Individual student participation during the online sessions will be monitored by the teams themselves. Peer reviews are part of the evaluation process. In the final classroom session, each team, involving each individual student, will present their results to the class and to assessors.
The project oriented approach is considered in leading companies as an efficient method to manage both market and client oriented deliverables (i.e. products and services) as well as investments. In order to better manage and control projects, enterprises often evolve from a “Functional organisation” into a “Matrix organisation”, in which a new breed of leaders appears: Project Managers. The Project Management Profession becomes a key element in the new and global enterprise model.
The EURECOM Global Project Management class aims at introducing the different Project Management concepts and techniques, mixing “main tent” presentation of key topics and hands-on case studies for each student to experience team dynamics and managing sample projects.
Teaching and Learning Methods include Lectures (all attendees) and Case Study sessions (in groups).
A case study in the technology domain will be performed during the course, from session to session. The main purpose of this case study is to illustrate, use and get familiar with the different Project Management methods and techniques introduced during the lectures. The case study may require some work between the class sessions. Students will present their work to the whole class for the purpose of sharing and obtaining feed-back. In order to optimize the effectiveness of each session, the students will be expected to keep the topics addressed in earlier sessions fresh in their mind, prepare for the case study, and actively participate through questions and presentation of the results of the case study.
Course Policies: Attendance is Mandatory for Both Lectures and Case Study sessions.
Non-attendance would need to be justified by serious reasons and limited to a maximum of 2.
Active participation in the Case Study sessions is expected.
Contemporary works in the sociology of Technology offer numerous critics of the classical divide between technical and social features. It has been shown that the success or failure of technical innovations rests on their propensity to merge with various organizational and interactional features. This course aims at providing students with a precise understanding of different combinations between technologies and conversational features. Various case studies of technologies in use will be examined, either in professional or ordinary or in mundane contexts. Drawing from those studies, the course provide several methodological discussions, with a strong focus on observation of social conduct in natural settings and the use of audio or video recordings in social science.
Teaching and Learning Methods : Lectures , written and oral presentations and discussions, readings
Course Policies : On-time attendance is mandatory
This course consists of three essential elements:
(1) 'Getting to know yourself' - understanding the drivers of your own behavior. This is the basis of any personal development and is critical for developing effective interaction with others whether as a team member, or as a team leader.
(2) 'Working with others' - building on the self-knowledge mentioned above, this core element allows you to explore, understand, and practice ways of working with others that are both more enjoyable and more effective. This is critical given that almost everyone works as part of a team.
(3) 'What's next?' - building on both the above sections, this element helps you take the next steps in your career: setting objectives, selecting target organizations, applying for jobs, and effective interviewing.
Teaching and Learning Methods: Lectures, team exercises, and presentations
Course Policies: On-time class attendance is mandatory (discipline is the core of personal development); three unapproved absences mean exclusion.
This course provides a solid introduction to European Business law from a managerial and strategic perspective taking an international and comparative approach.The course is the study of how companies manage legal perspectives in order to create value for the company through corporate and contract issues.The course will focus on the main laws that regulate various aspects of establishing and running a business within the European Union.
Teaching and Learning Methods :
Goals:
- To acquire basic legal knowledge in European Business law
- To have an overview of the company set up process
- To learn about the majors principles of contract law
With cases, materials and theoretical approach
Course Policies : Course lectures
Adversary style debates
Case Studies
This 21-hour course aims to provide students with the theoretical (concepts and methodologies) and operational (empirical knowledge and practical exercises) foundations necessary to design a high-performance website that fits perfectly into the company's strategy and takes into account existing processes while propelling the company into tomorrow's economy.
This course will take place over 7 sessions of 3 hours which will be structured in such a way as to develop both the conceptual and methodological bases and the practical-empirical approach of the theme.
The lectures will be punctuated by practical exercises in groups and individuals and will be completed by readings and a group project that will be presented in the last class.