This thesis assesses the surveillance operated on the mobile phone network by governmental actors (intelligence agencies, police, army) and the relationship between monitored spaces and their users. Indeed, some new surveillance devices used by intelligenc ...
In this article, I discuss the process of designing an object to protest against a specific surveillance device: the IMSI catcher, a controversial object used to monitor GSM networks. Being widely used in protests, I develop a tactical approach based on ob ...
Immune-checkpoint inhibitors (ICIs), including anti-cytotoxic T lymphocyte antigen 4 (CTLA-4), anti-programmed cell death 1 (PD-1) and anti-programmed cell death 1 ligand 1 (PD-L1) antibodies, are arguably the most important development in cancer therapy o ...
Swarms of indoor flying robots are promising for many applications, including searching tasks in collapsing buildings, or mobile surveillance and monitoring tasks in complex man-made structures. For tasks that employ several flying robots, spatial-coordina ...
A computer implemented method measures a performance of surveillance system. A site model, a sensor model and a traffic model are selected respectively from a set of site models, a set of sensor models, and a set of traffic models to form a surveillance mo ...
Spark-assisted chemical engraving (SACE) is a promising micro-machining technology for the low-cost machining of holes and channels in non-conducting materials, such as glass and some ceramics. Despite the complexity of SACE due to the interdependency of t ...