Skip to Main content Skip to Navigation

inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-03426543v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Sandwich: An Algorithm for Discovering Relevant Link Keys in an LKPS Concept Lattice
ICFCA 2021 - 16th international conference on formal concept analysis, Jun 2021, Strasbourg /Virtuel, France. pp.243-251, ⟨10.1007/978-3-030-77867-5_15⟩
inria-00000448v1  Conference papers
Mourad AbbasKamel Smaïli. Comparison of Topic Identification methods for Arabic Language
International Conference on Recent Advances in Natural Language Processing - RANLP 2005, Sep 2005, Borovets, Bulgaria
inria-00403102v1  Conference papers
Mourad AbbasKamel SmaïliDaoud Berkani. Multi-Category Support Vector Machines for Identifying Arabic Topics
10th International Conference on Intelligent Text Processing and Computational Linguistics - CICLing 2009, Mar 2009, Mexico, Mexico
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-01586533v1  Conference papers
Mourad AbbasKamel SmaïliD Berkani. Comparing TR-Classifier and KNN by using Reduced Sizes of Vocabularies
3rd International Conference on Arabic Language Processing, May 2009, Rabat, Morocco
hal-01586549v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. TR-Classifier and kNN Evaluation for Topic Identification tasks
International Journal on Information and Communication Technologies, Serials Publications, 2010, 3 (3), pp.10
hal-02168775v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Linkex: A Tool for Link Key Discovery Based on Pattern Structures
ICFCA 2019 - workshop on Applications and tools of formal concept analysis, Jun 2019, Frankfurt, Germany. pp.33-38
hal-02921643v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Discovery of Link Keys in RDF Data Based on Pattern Structures: Preliminary Steps
CLA 2020 - The 15th International Conference on Concept Lattices and Their Applications, Jun 2020, Tallinn / Virtual, Estonia
hal-00390289v1  Conference papers
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. High Dimensional Pricing of Exotic European Contracts on a GPU Cluster, and Comparison to a CPU Cluster
Second International Workshop on Parallel and Distributed Computing in Finance - PDCoF 2009, May 2009, Rome, Italy. Proceedings on CD-ROM (8 p.), ⟨10.1109/IPDPS.2009.5161143⟩
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
inria-00099496v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
inria-00099116v1  Conference papers
John AbbottVictor ShoupPaul Zimmermann. Factorization in Z[x]: the searching phase
International Symposium on Symbolic and Algebraic Computation - ISSAC 2000, Aug 2000, St Andrews/United Kingdom, pp.1--7
hal-02547097v1  Conference papers
Ahmad AbboudAbdelkader LahmadiMichaël RusinowitchMiguel CouceiroAdel Bouhoula et al.  Double Mask: An efficient rule encoding for Software Defined Networking
ICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
hal-03036292v1  Poster communications
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks
CNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
hal-03036350v1  Conference papers
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Online conference, France
inria-00405356v1  Journal articles
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP authentication
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2009, Special Issue on Access Control and Protcols, 4 (4), pp.311-318
tel-01748510v2  Theses
Humberto Abdelnur. Voice over IP Vulnerability Assessment
Networking and Internet Architecture [cs.NI]. Université Henri Poincaré - Nancy 1, 2009. English. ⟨NNT : 2009NAN10005⟩
inria-00166947v1  Conference papers
Humberto AbdelnurOlivier FestorRadu State. KiF: A stateful SIP Fuzzer
1st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), Columbia University, Jul 2007, New York, United States
inria-00326086v1  Conference papers
Humberto AbdelnurRadu StateOlivier Festor. Fuzzing for vulnerabilities in the VoIP space
17th EICAR Annual Conference, May 2008, Laval, France
inria-00326054v1  Conference papers
Humberto AbdelnurRadu StateOlivier Festor. Advanced Network Fingerprinting
Recent Advances in Intrusion Detection, MIT, Sep 2008, Boston, United States. pp.372-389, ⟨10.1007/978-3-540-87403-4⟩
inria-00167186v1  Conference papers
Humberto AbdelnurVincent CridligRadu StateOlivier Festor. VoIP Security Assessment: Methods and Tools
The 1st IEEE workshop on VoIP Management and Security: VoIP MaSe, IEEE/IFIP, Apr 2006, Vancouver, Canada. pp.29 - 34, ⟨10.1109/VOIPMS.2006.1638119⟩
inria-00337663v1  Journal articles
Humberto AbdelnurOlivier FestorRadu State. Fuzzing dans la sphère VoIP
MISC - Le journal de la sécurité informatique, Lavoisier, 2008
inria-00436373v1  Journal articles
Humberto AbdelnurRadu StateOlivier Festor. Fuzzing for vulnerabilities in the VoIP space
Journal in Computer Virology, Springer Verlag, 2009
inria-00326077v1  Conference papers
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP Authentication
Information Assurance and Security ( ISIAS), Sep 2008, Naples, Italy. pp.237-242, ⟨10.1109/IAS.2008.29⟩
inria-00148363v2  Conference papers
Humberto AbdelnurRadu StateIsabelle ChrismentCristian Popi. Assessing the security of VoIP Services
The Tenth IFIP/IEEE International Symposium on Integrated Network Management - IM 2007, IEEE Communication Society, May 2007, Munich, Germany. pp.373-382
inria-00619236v1  Conference papers
Mohamed Ahmed AbdelraheemCéline BlondeauMaria Naya-PlasenciaMarion VideauErik Zenner. Cryptanalysis of ARMADILLO2
Advances in cryptology - ASIACRYPT 2011, Dec 2011, Séoul, South Korea. pp.308-326, ⟨10.1007/978-3-642-25385-0⟩
hal-01933975v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheDjamal BenslimaneMatteo GolfarelliStéphane Jean et al.  New Trends in Model and Data Engineering
MEDI 2018 - International Workshops, DETECT, MEDI4SG, IWCFS, REMEDY, Oct 2018, Marrakesh, Morocco. Communications in Computer and Information Science, Communications in Computer and Information Science (929), Springer, 2018, 978-3-030-02851-0. ⟨10.1007/978-3-030-02852-7⟩
hal-03376084v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheMatteo GolfarelliDominique MéryCarlos Ordonez. Model and Data Engineering. 8th International Conference, MEDI 2018, Proceedings
Model and Data Engineering. 8th International Conference, MEDI 2018, Oct 2018, Marrakesh, Morocco. Springer, 2018, Lecture Notes in Computer Science, 978-3-030-00855-0. ⟨10.1007/978-3-030-00856-7⟩
hal-01987946v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre et al.  Efficient Resource Allocation for Multi-tenant Monitoring of Edge Infrastructures
PDP 2019 - 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Feb 2019, Pavie, Italy. pp.1-8, ⟨10.1109/EMPDP.2019.8671621⟩
hal-01591161v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre. A Holistic Monitoring Service for Fog/Edge Infrastructures: a Foresight Study
The IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud 2017), Aug 2017, Prague, Czech Republic. pp.337-344, ⟨10.1109/FiCloud.2017.30⟩
hal-01897570v3  Reports
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisXavier Lorca et al.  A Framework for Edge Infrastructures Monitoring
[Research Report] RR-9215, Orange Labs; Inria Nancy - Grand Est; IMT-Atlantique. 2018, pp.1-14
inria-00107574v1  Conference papers
Imine AbdessamadPascal MolliGérald OsterMichaël Rusinowitch. Development of Transformation Functions Assisted by a Theorem Prover
Fourth International Workshop on Collaborative Editing 2002 - ACM CSCW'2002, 2002, Nouvelle-Orléans, USA, 8 p
tel-03256970v1  Habilitation à diriger des recherches
Imine Abdessamad. Partage de Données dans les Systèmes Collaboratifs : De la Synchronisation à la Protection des Données
Calcul parallèle, distribué et partagé [cs.DC]. Université de Lorraine, 2016
hal-02378889v1  Journal articles
Mohammed Riyadh AbdmeziemFrançois Charoy. Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
Ad Hoc & Sensor Wireless Networks, PKP Publishing ServicesNetwork 2019
hal-01588490v2  Conference papers
Mohammed Riyadh AbdmeziemFrançois Charoy. Fault-tolerant and Scalable Key Management Protocol for IoT-based Collaborative Groups
SecureComm 2017 : 13th EAI International Conference on Security and Privacy in Communication Networks, Oct 2017, Niagara falls, Canada. pp.1-20
hal-02378897v1  Journal articles
Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode
International Journal of Information and Computer Security, Inderscience, 2019
hal-01874495v1  Conference papers
Badr AbdullahIrina IllinaDominique Fohr. Dynamic Extension of ASR Lexicon Using Wikipedia Data
IEEE Workshop on Spoken and Language Technology (SLT), Dec 2018, Athènes, Greece
halshs-00120275v1  Book sections
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. The syntax of French "à" and "de": an HPSG analysis
Patrick Saint-Dizier. Syntax and Semantics of Prepositions, Springer, pp.147-162, 2006
inria-00099757v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. The syntax of French "à" and "de": An HPSG analysis
ACL-SIGSEM Workshop on the linguistic dimensions of prepositions and their use in computational linguistics formalisms and applications, 2003, Toulouse, France, 12 p
halshs-01450319v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. L'analyse syntaxique des SN de la forme N
Deuxièmes journées romanes, 2005, Toulouse, Unknown Region
inria-00100023v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. The Syntax of French de-N' Phrases
11th International Conference on Head-Driven Phrase Structure Grammar - HPSG'2004, Frank Van Eynde, 2004, Leuven, Belgium, pp.6-26
halshs-01450233v1  Journal articles
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. Les syntagmes nominaux français de la forme de-N
Travaux de Linguistique : Revue Internationale de Linguistique Française, De Boeck Université, 2006, 50, pp.79\textendash95
hal-01613530v2  Journal articles
Simon AbelardPierrick GaudryPierre-Jean Spaenlehauer. Improved Complexity Bounds for Counting Points on Hyperelliptic Curves
Foundations of Computational Mathematics, Springer Verlag, 2019, 19 (3), pp.591-621. ⟨10.1007/s10208-018-9392-1⟩
hal-01816256v3  Conference papers
Simon AbelardPierrick GaudryPierre-Jean Spaenlehauer. Counting points on genus-3 hyperelliptic curves with explicit real multiplication
ANTS-XIII - Thirteenth Algorithmic Number Theory Symposium, Jul 2018, Madison, United States. pp.1--19
hal-00922101v1  Master thesis
Younes Abid. In-network processing in Wireless Sensor Networks using a content centric approach
Networking and Internet Architecture [cs.NI]. 2013
hal-01092025v1  Conference papers
Younes AbidBilel SaadallahAbdelkader LahmadiOlivier Festor. Named data aggregation in wireless sensor networks
IEEE Network Operations and Management Symposium (NOMS), 2014, May 2014, cracovie, Poland. pp.1 - 8, ⟨10.1109/NOMS.2014.6838364⟩
hal-01241619v1  Poster communications
Younes AbidAbdessamad ImineAmedeo NapoliChedy RaïssiMarc Rigolot et al.  Analyse d'activité et exposition de la vie privée sur les médias sociaux
16ème conférence francophone sur l'Extraction et la Gestion des Connaissances (EGC 2016), Jan 2016, Reims, France. 2016
hal-01649246v1  Conference papers
Younes AbidAbdessamad ImineAmedeo NapoliChedy RaïssiMichaël Rusinowitch. Two-phase preference disclosure in attributed social networks
DEXA 2017 - 28th International Conference on Database and Expert Systems Applications , Aug 2017, Lyon, France. pp.249-263, ⟨10.1007/978-3-319-64468-4_19⟩
tel-01863354v1  Theses
Younes Abid. Automated Risk Analysis on Privacy in Social Networks
Social and Information Networks [cs.SI]. Université de Lorraine, 2018. English. ⟨NNT : 2018LORR0088⟩
hal-01402062v1  Conference papers
Younes AbidAbdessamad ImineAmedeo NapoliChedy RaïssiMichaël Rusinowitch. Online link disclosure strategies for social networks
The 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France
hal-01939277v1  Conference papers
Younes AbidAbdessamad ImineMichaël Rusinowitch. Online Testing of User Profile Resilience Against Inference Attacks in Social Networks
ADBIS 2018 - First International Workshop on Advances on Big Data Management, Analytics, Data Privacy and Security, BigDataMAPS 2018, Sep 2018, Budapest, Hungary
hal-01939283v1  Conference papers
Younes AbidAbdessamad ImineMichaël Rusinowitch. Sensitive attribute prediction for social networks users
DARLI-AP 2018 - 2nd International workshop on Data Analytics solutions for Real-LIfe APplications, Mar 2018, Vienne, Austria
inria-00000565v1  Conference papers
Denis AbrahamDominique CansellPatrick DitschDominique MéryCyril Proch. Synthesis of the QoS for digital TV services
First International Workshop on Incentive Based Computing - IBC'05, Sep 2005, Amsterdam/Hollande
hal-01377655v1  Conference papers
Eriká AbrahámJohn AbbottBernd BeckerAnna BigattiMartin Brain et al.  SC 2 : Satisfiability Checking meets Symbolic Computation (Project Paper)
Intelligent Computer Mathematics, Jul 2016, Bialystok, Poland
hal-01653557v1  Conference papers
Sansom AbramskiRui Soares BarbosaGiovanni CarùSimon Perdrix. A complete characterisation of All-versus-Nothing arguments for stabiliser states
14th International Conference on Quantum Physics and Logic (QPL), Jul 2017, Nijmegen, Netherlands
hal-01528687v1  Journal articles
Samson AbramskyRui Soares BarbosaGiovanni CarùSimon Perdrix. A complete characterisation of All-versus-Nothing arguments for stabiliser states
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, Royal Society, The, 2017, Second quantum revolution: foundational questions, 375 (2106), ⟨10.1098/rsta.2016.0385⟩
inria-00099793v1  Conference papers
Jean-Raymond AbrialDominique CansellDominique Méry. Formal derivation of spanning trees algorithms
Third International Conference of B and Z Users - ZB'2003, Marina Walden, 2003, Turku, Finland, pp.457-476
inria-00099836v1  Conference papers
Jean-Raymond AbrialDominique Cansell. Click'n'Prove: Interactive Proofs Within Set Theory
16th International Conference on Theorem Proving in Higher Order Logics - TPHOLs'2003, 2003, Rome, Italy, pp.1-24
inria-00001245v1  Conference papers
Jean-Raymond AbrialDominique CansellDominique Méry. Refinement and Reachability in Event_B
ZB 2005 : Formal Specification and Development in Z and B : 4th International Conference of B and Z Users, Apr 2005, Guilford/UK, pp.222-241, ⟨10.1007/11415787_14⟩
inria-00000120v1  Journal articles
Jean-Raymond AbrialDominique Cansell. Formal Construction of a Non-blocking Concurrent Queue Algorithm (a Case Study in Atomicity)
Journal of Universal Computer Science, Springer, 2005, Atomicity in System Design and Execution (Proceedings of Dagstuhl-Seminar 04181), 11 (5), pp.744-770
hal-00917435v1  Master thesis
Jagdish Prasad Achara. Security Framework for Decentralized Shared Calendars
Distributed, Parallel, and Cluster Computing [cs.DC]. 2011
hal-01578815v1  Conference papers
Yinoussa AdagolodjoRaffaella TrivisonneNazim HaouchineStéphane CotinHadrien Courtecuisse. Silhouette-based Pose Estimation for Deformable Organs Application to Surgical Augmented Reality
IROS 2017 - IEEE/RSJ International Conference on Intelligent Robots and Systems, Sep 2017, Vancouver, Canada
hal-00947922v1  Conference papers
Carole AdamWafa JohalIlef BenfarhatCéline JostHumbert Fiorino et al.  Etude de l'acceptabilité d'un robot moqueur
III 2013 - 2ième conférence sur l'Intercompréhension de l'Intraspécifique à l'Interspécifique, Workshop, Sep 2013, Lorient, France
inria-00099950v1  Conference papers
Sébastien AdamMaurizio RigamontiEric ClavierJean-Marc OgierEric Trupin et al.  DocMining: A Document Analysis System Builder
6th IAPR International Workshop on Document Analysis Systems - DAS 2004, 2004, Florence, Italie, pp.472--483
hal-02754636v1  Conference papers
Katarzyna AdamczykFrédérique AngevinNathalie ColbachClaire LavigneFlorence Le Ber et al.  GENEXP, un logiciel simulateur de paysages agricoles pour l'étude de la diffusion de transgènes
Colloque International de Géomatique et d'Analyse Spatiale, Recherches et Développements - SAGEO-2006, 2006, Strasbourg, France. ⟨10.3166/GEO.17.⟩
hal-01078045v1  Conference papers
Gilles AddaLaurent BesacierAlain CouillaultKarën FortJoseph Mariani et al.  Where the data are coming from?" Ethics, crowdsourcing and traceability for Big Data in Human Language Technology
Crowdsourcing and human computation multidisciplinary workshop, CNRS, Sep 2014, Paris, France