Skip to Main content Skip to Navigation


...
hal-00927283v1  Conference papers
Radu TudoranAlexandru CostanGabriel Antoniu. DataSteward: Using Dedicated Compute Nodes for Scalable Data Management on Public Clouds
TrustCom 2013 - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Jul 2013, Melbourne, Australia. pp.1057--1064, ⟨10.1109/TrustCom.2013.129⟩
...
hal-00909293v1  Conference papers
Mounir AssafJulien SignolesFrédéric TronelEric Totel. Moniteur hybride de flux d'information pour un langage supportant des pointeurs
SARSSI - 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Sep 2013, Mont de Marsan, France
...
hal-00842076v1  Conference papers
Xiao LingShadi IbrahimHai JinSong WuSongqiao Tao. Exploiting Spatial Locality to Improve Disk Efficiency in Virtualized Environments
IEEE 21st International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Mascots 2013), Aug 2013, San Francisco, United States
...
hal-00840338v1  Conference papers
Christophe HauserFrédéric TronelColin FidgeLudovic Mé. Intrusion detection in distributed systems, an approach based on taint marking
IEEE ICC2013 - IEEE International Conference on Communications, Jun 2013, Budapest, Hungary
...
hal-00831401v1  Conference papers
Ehab ElsalamounyVladimiro Sassone. An HMM-based reputation model
Advances in Security of Information and Communication Networks, Sep 2013, Cairo, Egypt. pp.111-121, ⟨10.1007/978-3-642-40597-6_9⟩
...
hal-00862713v1  Conference papers
Quentin GalvaneMarc ChristieRémi RonfardChen-Kim LimMarie-Paule Cani. Steering Behaviors for Autonomous Cameras
MIG 2013 - ACM SIGGRAPH conference on Motion in Games, Nov 2013, Dublin, Ireland. pp.93-102, ⟨10.1145/2522628.2522899⟩
hal-00909298v1  Conference papers
Michel CatanRoberto Di CosmoAntoine EicheTudor Alexandru LascuMichael Lienhardt et al.  Aeolus: Mastering the Complexity of Cloud Application Deployment
ESOCC - European Conference on Service-Oriented and Cloud Computing - 2013, 2013, Malaga, Spain. pp.1-3, ⟨10.1007/978-3-642-40651-5_1⟩
...
hal-00814671v2  Conference papers
Mounir AssafJulien SignolesFrédéric TronelEric Totel. Program Transformation for Non-interference Verification on Programs with Pointers
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.231-244, ⟨10.1007/978-3-642-39218-4_18⟩
hal-00924716v1  Conference papers
Delphine DemangeVincent LaporteLei ZhaoDavid PichardieSuresh Jagannathan et al.  Plan B: A Buffered Memory Model for Java
Proc. of the 40th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2013, Jan 2013, Rome, Italy