Skip to Main content Skip to Navigation


...
inria-00596236v1  Journal articles
A. A. FallAbderrahman IggidrGauthier SalletJean-Jules Tewa. Epidemiological models and Lyapunov functions
Mathematical Modelling of Natural Phenomena, EDP Sciences, 2007, 2 (1), pp.62 - 83. ⟨10.1051/mmnp:2008011⟩
...
hal-01370430v1  Journal articles
Atte Aalto. Iterative observer-based state and parameter estimation for linear systems
ESAIM: Control, Optimisation and Calculus of Variations, EDP Sciences, 2018, 24 (1), pp.265-288. ⟨10.1051/cocv/2017005⟩
...
hal-01521955v3  Journal articles
Eddie AamariJisu KimFrédéric ChazalBertrand MichelAlessandro Rinaldo et al.  Estimating the Reach of a Manifold
Electronic Journal of Statistics , Shaker Heights, OH : Institute of Mathematical Statistics, 2019, ⟨10.1214/19-EJS1551⟩
...
hal-01516032v3  Journal articles
Eddie AamariClément Levrard. Non-Asymptotic Rates for Manifold, Tangent Space, and Curvature Estimation
Annals of Statistics, Institute of Mathematical Statistics, 2019, 47 (1), ⟨10.1214/18-AOS1685⟩
hal-01094867v1  Journal articles
Mridul AanjaneyaFrédéric ChazalDaniel ChenMarc GlisseLeonidas J. Guibas et al.  Metric Graph Reconstruction From Noisy Data
International Journal of Computational Geometry and Applications, World Scientific Publishing, 2012, 22 (4), pp.305-325. ⟨10.1142/S0218195912600072⟩
hal-00906576v1  Journal articles
J. AasiJ. AbadieB. P. AbbottR. AbbottT. Abbott et al.  A directed search for continuous Gravitational Waves from the Galactic Center
Physical Review D, American Physical Society, 2013, 88, 102002 [13 p.]. ⟨10.1103/PhysRevD.88.102002⟩
...
hal-01636616v1  Journal articles
Martín AbadiBruno BlanchetCédric Fournet. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication
Journal of the ACM (JACM), Association for Computing Machinery, 2017, 65 (1), pp.1 - 103. ⟨10.1145/3127586⟩
...
hal-02334088v1  Journal articles
Amar AbaneMehammed DaouiSamia BouzefranePaul Muhlethaler. A lightweight forwarding strategy for Named Data Networking in low-end IoT
Journal of Network and Computer Applications (JNCA), Elsevier, 2019, 148, pp.102445. ⟨10.1016/j.jnca.2019.102445⟩
hal-00784059v1  Journal articles
Th. AbballeGrégoire AllaireE. LaucoinPh. Montarnal. Application of a coupled FV/FE multiscale method to cement media
Networks and Heterogeneous Media, AIMS-American Institute of Mathematical Sciences, 2010, 5 (3), pp.603-615
...
hal-01768411v4  Journal articles
Mickaël AbbasAlexandre ErnNicolas Pignet. A Hybrid High-Order method for incremental associative plasticity with small deformations
Computer Methods in Applied Mechanics and Engineering, Elsevier, 2019, 346, pp.891-912. ⟨10.1016/j.cma.2018.08.037⟩
hal-01235328v1  Journal articles
Naeem AbbasSteven DerrienSanjay RajopadhyePatrice QuintonAlexandre Cornu et al.  Combining execution pipelines to improve parallel implementation of HMMER on FPGA
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2015, 39, pp.457-470. ⟨10.1016/j.micpro.2015.06.006⟩
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
...
hal-01586549v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. TR-Classifier and kNN Evaluation for Topic Identification tasks
International Journal on Information and Communication Technologies, Serials Publications, 2010, 3 (3), pp.10
...
hal-00867887v1  Journal articles
Lokman Abbas-TurkiDamien Lamberton. European Options Sensitivity with Respect to the Correlation for Multidimensional Heston Models
International Journal of Theoretical and Applied Finance, World Scientific Publishing, 2014, 17 (03), pp.DOI: 10.1142/S0219024914500150
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
hal-01666862v1  Journal articles
L. Abbas-TurkiBernard Lapeyre. American options by Malliavin calculus and nonparametric variance and bias reduction methods
SIAM Journal on Financial Mathematics, Society for Industrial and Applied Mathematics 2012, 3 (1), pp.479 - 510. ⟨10.1137/11083890X⟩
hal-01107836v1  Journal articles
Zeinab AbbassiNidhi HegdeLaurent Massoulié. Distributed Content Curation on the Web
ACM Transactions on Internet Technology, Association for Computing Machinery, 2014, pp.9. ⟨10.1145/2663489⟩
...
hal-01157814v1  Journal articles
N AbbassiD BenboudjemaStéphane DerrodeW Pieczynski. Optimal Filter Approximations in Conditionally Gaussian Pairwise Markov Switching Models
IEEE Transactions on Automatic Control, Institute of Electrical and Electronics Engineers, 2015, 60 (4), pp.1104-1109. ⟨10.1109/TAC.2014.2340591⟩
...
hal-02373325v1  Journal articles
Emanuela AbbateAngelo IolloGabriella Puppo. An asymptotic-preserving all-speed scheme for fluid dynamics and nonlinear elasticity
SIAM Journal on Scientific Computing, Society for Industrial and Applied Mathematics, 2019
hal-01940467v1  Journal articles
Emmanuel AbbeLaurent MassouliéAndrea MontanariAllan SlyNikhil Srivastava. Group synchronization on grids
Mathematical Statistics and Learning, EMS Publishing House, 2018
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
...
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
hal-00434649v1  Journal articles
Sophie S. AbbyVincent Daubin. Comparative genomics and the evolution of prokaryotes
Trends in Microbiology, Elsevier, 2007, 15, pp.135-141
...
hal-00752055v1  Journal articles
Sophie S. AbbyEric TannierManolo GouyVincent Daubin. Lateral gene transfer as a support for the tree of life.
Proceedings of the National Academy of Sciences of the United States of America , National Academy of Sciences, 2012, 109 (13), pp.4962-4967. ⟨10.1073/pnas.1116871109⟩
hal-00918504v1  Journal articles
Michel AbdallaYuval ShavittAvishai Wool. Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. ⟨10.1109/90.865073⟩
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-00918401v1  Journal articles
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
hal-01385178v1  Journal articles
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks
IET Information Security, Institution of Engineering and Technology, 2016, 10 (6), pp.288-303. ⟨10.1049/iet-ifs.2015.0500⟩
hal-01538113v1  Journal articles
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
Journal of Cryptology, Springer Verlag, 2018, 31 (2), pp.307-350. ⟨10.1007/s00145-017-9258-8⟩
inria-00637009v1  Journal articles
Adolf AbdallahAbdoulaye GamatiéJean-Luc Dekeyser. Modélisation UML/MARTE de SoC et analyse temporelle basée sur l'approche synchrone
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2011, Architecture des ordinateurs, 30 (9), pp.1089 -- 1114. ⟨10.3166/tsi.30.1089-1113⟩
...
hal-00840372v1  Journal articles
Rouwaida AbdallahLoïc HélouëtClaude Jard. Distributed Implementation of Message Sequence Charts
Software and Systems Modeling, Springer Verlag, 2015, 14, pp.10-32. ⟨10.1007/s10270-013-0357-1⟩
...
hal-01654158v1  Journal articles
Meriem AbdallahMarie BlonskiSophie Wantz-MézièresYann GaudeauLuc Taillandier et al.  On the relevance of two manual tumor volume estimation methods for diffuse low-grade gliomas
Healthcare Technology Letters, The Institution of Engineering and Technology, 2018, 5 (1), pp.13-17. ⟨10.1049/htl.2017.0013⟩
hal-00755739v1  Journal articles
Farah AbdallahSerge NicaiseJulie ValeinAli Wehbe. Stability results for the approximation of weakly coupled wave equations
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics, Elsevier, 2012, 350 (1-2), pp.29-34. ⟨10.1016/j.crma.2011.12.004⟩
hal-00758171v1  Journal articles
Adolf AbdallahAbdoulaye GamatiéRabie Ben AtitallahJean-Luc Dekeyser. Abstract Clock-Based Design of a JPEG Encoder
IEEE Embedded Systems Letters, Institute of Electrical and Electronics Engineers, 2012, 4 (2), pp.29 -32. ⟨10.1109/LES.2012.2189195⟩
...
inria-00405356v1  Journal articles
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP authentication
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2009, Special Issue on Access Control and Protcols, 4 (4), pp.311-318
...
inria-00337663v1  Journal articles
Humberto AbdelnurOlivier FestorRadu State. Fuzzing dans la sphère VoIP
MISC - Le journal de la sécurité informatique, Lavoisier, 2008
inria-00436373v1  Journal articles
Humberto AbdelnurRadu StateOlivier Festor. Fuzzing for vulnerabilities in the VoIP space
Journal in Computer Virology, Springer Verlag, 2009
hal-00768459v1  Journal articles
Mohamed AbdelwahedMohamed Amara. Numerical Analysis of a two phase flow model
International Journal of Computational Methods, World Scientific Publishing, 2012, 9 (3)
...
hal-02400019v1  Journal articles
Athena AbdiAlain GiraultHamid Zarandi. ERPOT: A Quad-Criteria Scheduling Heuristic to Optimize Execution Time, Reliability, Power Consumption and Temperature in Multicores
IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers, 2019, 30 (10), pp.2193-2210. ⟨10.1109/TPDS.2019.2906172⟩
...
hal-02378897v1  Journal articles
Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode
International Journal of Information and Computer Security, Inderscience, 2019
...
hal-02378889v1  Journal articles
Mohammed Riyadh AbdmeziemFrançois Charoy. Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
Ad Hoc & Sensor Wireless Networks, PKP Publishing ServicesNetwork 2019
...
hal-00750002v1  Journal articles
Ammar Hasan AbdoSégolène CabocheValérie LeclèrePhilippe JacquesMaude Pupin. A new fingerprint to predict nonribosomal peptides activity.
Journal of Computer-Aided Molecular Design, Springer Verlag, 2012, 26 (10), pp.1187-94. ⟨10.1007/s10822-012-9608-4⟩
...
hal-01090611v1  Journal articles
Ammar AbdoValérie LeclèrePhilippe JacquesNaomie SalimMaude Pupin. Prediction of New Bioactive Molecules using a Bayesian Belief Network
Journal of Chemical Information and Modeling, American Chemical Society, 2014, 54 (1), pp.30-36. ⟨10.1021/ci4004909⟩
hal-01221794v1  Journal articles
Hosam AbdoNathann CohenDarko Dimitrov. Graphs with maximal irregularity
Filomat, University of Nis, 2014, 28 (7), pp.1315-1322. ⟨10.2298/FIL1407315A⟩
hal-00968874v1  Journal articles
Assyr AbdulleMarcus J. GroteChristian Stohrer. FE heterogeneous multiscale method for long-time wave propagation
Comptes rendus de l'Académie des sciences. Série I, Mathématique, Elsevier, 2013, 351, pp.495-499. ⟨10.1016/j.crma.2013.06.002⟩
...
hal-00739754v2  Journal articles
Assyr AbdulleGilles VilmartKonstantinos Zygalakis. Weak second order explicit stabilized methods for stiff stochastic differential equations
SIAM Journal on Scientific Computing, Society for Industrial and Applied Mathematics, 2013, 35 (4), pp.1792-1814. ⟨10.1137/12088954X⟩