Skip to Main content Skip to Navigation

inria-00596236v1  Journal articles
A. A. FallAbderrahman IggidrGauthier SalletJean-Jules Tewa. Epidemiological models and Lyapunov functions
Mathematical Modelling of Natural Phenomena, EDP Sciences, 2007, 2 (1), pp.62 - 83. ⟨10.1051/mmnp:2008011⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-02921643v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Discovery of Link Keys in RDF Data Based on Pattern Structures: Preliminary Steps
CLA 2020 - The 15th International Conference on Concept Lattices and Their Applications, Jun 2020, Tallinn / Virtual, Estonia
hal-02168775v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Linkex: A Tool for Link Key Discovery Based on Pattern Structures
ICFCA 2019 - workshop on Applications and tools of formal concept analysis, Jun 2019, Frankfurt, Germany. pp.33-38
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-03482955v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Non-Redundant Link Keys in RDF Data: Preliminary Steps
FCA4AI 2021 - 9th Workshop on What can FCA do for Artificial Intelligence?, Aug 2021, Montréal, Canada. pp.1-6
hal-03426543v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Sandwich: An Algorithm for Discovering Relevant Link Keys in an LKPS Concept Lattice
ICFCA 2021 - 16th international conference on formal concept analysis, Jun 2021, Strasbourg /Virtuel, France. pp.243-251, ⟨10.1007/978-3-030-77867-5_15⟩
hal-03512110v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. LKSA : un algorithme de sélection de clés de liage dans des données RDF guidée par des paires de classes
Extraction et Gestion des Connaissances EGC2021, Jan 2021, Montpellier, France. pp.205-216
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00099496v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
hal-03036350v1  Conference papers
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Online conference, France
hal-02547097v1  Conference papers
Ahmad AbboudAbdelkader LahmadiMichaël RusinowitchMiguel CouceiroAdel Bouhoula et al.  Double Mask: An efficient rule encoding for Software Defined Networking
ICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
hal-03036292v1  Poster communications
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks
CNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
tel-03508140v1  Theses
Ahmad Abboud. Efficient Rules Management Algorithms in Software Defined Networking
Computer Science [cs]. University of Lorraine, 2021. English
hal-00755739v1  Journal articles
Farah AbdallahSerge NicaiseJulie ValeinAli Wehbe. Stability results for the approximation of weakly coupled wave equations
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics, Elsevier, 2012, 350 (1-2), pp.29-34. ⟨10.1016/j.crma.2011.12.004⟩
hal-01654158v1  Journal articles
Meriem AbdallahMarie BlonskiSophie Wantz-MézièresYann GaudeauLuc Taillandier et al.  On the relevance of two manual tumor volume estimation methods for diffuse low-grade gliomas
Healthcare Technology Letters, The Institution of Engineering and Technology, 2018, 5 (1), pp.13-17. ⟨10.1049/htl.2017.0013⟩
inria-00403933v1  Conference papers
Rached AbdelkhalekHenri CalendraOlivier CoulaudGuillaume LatuJean Roman. Fast Seismic Modeling and Reverse Time Migration on a GPU Cluster
The 2009 High Performance Computing & Simulation - HPCS'09, Jun 2009, Leipzig, Germany
inria-00407782v1  Conference papers
Rached AbdelkhalekHenri CalandraOlivier CoulaudGuillaume LatuJean Roman. FDTD Based Seismic Modeling and Reverse Time Migration on a GPU Cluster
9th International Conference on Mathematical and Numerical Aspects of Waves Propagation - Waves 2009, 2009, Pau, France
inria-00405356v1  Journal articles
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP authentication
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2009, Special Issue on Access Control and Protcols, 4 (4), pp.311-318
inria-00326077v1  Conference papers
Humberto AbdelnurTigran AvanesovMichaël RusinowitchRadu State. Abusing SIP Authentication
Information Assurance and Security ( ISIAS), Sep 2008, Naples, Italy. pp.237-242, ⟨10.1109/IAS.2008.29⟩
inria-00619236v1  Conference papers
Mohamed Ahmed AbdelraheemCéline BlondeauMaria Naya-PlasenciaMarion VideauErik Zenner. Cryptanalysis of ARMADILLO2
Advances in cryptology - ASIACRYPT 2011, Dec 2011, Séoul, South Korea. pp.308-326, ⟨10.1007/978-3-642-25385-0⟩
hal-01933975v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheDjamal BenslimaneMatteo GolfarelliStéphane Jean et al.  New Trends in Model and Data Engineering
MEDI 2018 - International Workshops, DETECT, MEDI4SG, IWCFS, REMEDY, Oct 2018, Marrakesh, Morocco. Communications in Computer and Information Science, Communications in Computer and Information Science (929), Springer, 2018, 978-3-030-02851-0. ⟨10.1007/978-3-030-02852-7⟩
hal-03376084v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheMatteo GolfarelliDominique MéryCarlos Ordonez. Model and Data Engineering. 8th International Conference, MEDI 2018, Proceedings
Model and Data Engineering. 8th International Conference, MEDI 2018, Oct 2018, Marrakesh, Morocco. Springer, 2018, Lecture Notes in Computer Science, 978-3-030-00855-0. ⟨10.1007/978-3-030-00856-7⟩
hal-01897570v3  Reports
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisXavier Lorca et al.  A Framework for Edge Infrastructures Monitoring
[Research Report] RR-9215, Orange Labs; Inria Nancy - Grand Est; IMT-Atlantique. 2018, pp.1-14
hal-01987946v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre et al.  Efficient Resource Allocation for Multi-tenant Monitoring of Edge Infrastructures
PDP 2019 - 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Feb 2019, Pavie, Italy. pp.1-8, ⟨10.1109/EMPDP.2019.8671621⟩
hal-01591161v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre. A Holistic Monitoring Service for Fog/Edge Infrastructures: a Foresight Study
The IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud 2017), Aug 2017, Prague, Czech Republic. pp.337-344, ⟨10.1109/FiCloud.2017.30⟩
tel-03256970v1  Habilitation à diriger des recherches
Imine Abdessamad. Partage de Données dans les Systèmes Collaboratifs : De la Synchronisation à la Protection des Données
Calcul parallèle, distribué et partagé [cs.DC]. Université de Lorraine, 2016
inria-00107574v1  Conference papers
Imine AbdessamadPascal MolliGérald OsterMichaël Rusinowitch. Development of Transformation Functions Assisted by a Theorem Prover
Fourth International Workshop on Collaborative Editing 2002 - ACM CSCW'2002, 2002, Nouvelle-Orléans, USA, 8 p
hal-02378889v1  Journal articles
Mohammed Riyadh AbdmeziemFrançois Charoy. Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
Ad Hoc & Sensor Wireless Networks, PKP Publishing ServicesNetwork 2019
hal-01588490v2  Conference papers
Mohammed Riyadh AbdmeziemFrançois Charoy. Fault-tolerant and Scalable Key Management Protocol for IoT-based Collaborative Groups
SecureComm 2017 : 13th EAI International Conference on Security and Privacy in Communication Networks, Oct 2017, Niagara falls, Canada. pp.1-20
hal-02378897v1  Journal articles
Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode
International Journal of Information and Computer Security, Inderscience, 2019
hal-01874495v1  Conference papers
Badr AbdullahIrina IllinaDominique Fohr. Dynamic Extension of ASR Lexicon Using Wikipedia Data
IEEE Workshop on Spoken and Language Technology (SLT), Dec 2018, Athènes, Greece
halshs-01450319v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. L'analyse syntaxique des SN de la forme N
Deuxièmes journées romanes, 2005, Toulouse, Unknown Region
hal-01816256v3  Conference papers
Simon AbelardPierrick GaudryPierre-Jean Spaenlehauer. Counting points on genus-3 hyperelliptic curves with explicit real multiplication
ANTS-XIII - Thirteenth Algorithmic Number Theory Symposium, Jul 2018, Madison, United States. pp.1--19
hal-01613530v2  Journal articles
Simon AbelardPierrick GaudryPierre-Jean Spaenlehauer. Improved Complexity Bounds for Counting Points on Hyperelliptic Curves
Foundations of Computational Mathematics, Springer Verlag, 2019, 19 (3), pp.591-621. ⟨10.1007/s10208-018-9392-1⟩
hal-00922101v1  Master thesis
Younes Abid. In-network processing in Wireless Sensor Networks using a content centric approach
Networking and Internet Architecture [cs.NI]. 2013
hal-01092025v1  Conference papers
Younes AbidBilel SaadallahAbdelkader LahmadiOlivier Festor. Named data aggregation in wireless sensor networks
IEEE Network Operations and Management Symposium (NOMS), 2014, May 2014, cracovie, Poland. pp.1 - 8, ⟨10.1109/NOMS.2014.6838364⟩
hal-01649246v1  Conference papers
Younes AbidAbdessamad ImineAmedeo NapoliChedy RaïssiMichaël Rusinowitch. Two-phase preference disclosure in attributed social networks
DEXA 2017 - 28th International Conference on Database and Expert Systems Applications , Aug 2017, Lyon, France. pp.249-263, ⟨10.1007/978-3-319-64468-4_19⟩
tel-01863354v1  Theses
Younes Abid. Automated Risk Analysis on Privacy in Social Networks
Social and Information Networks [cs.SI]. Université de Lorraine, 2018. English. ⟨NNT : 2018LORR0088⟩
hal-01402062v1  Conference papers
Younes AbidAbdessamad ImineAmedeo NapoliChedy RaïssiMichaël Rusinowitch. Online link disclosure strategies for social networks
The 11th International Conference on Risks and Security of Internet and Systems, Sep 2016, Roscoff, France
hal-01939277v1  Conference papers
Younes AbidAbdessamad ImineMichaël Rusinowitch. Online Testing of User Profile Resilience Against Inference Attacks in Social Networks
ADBIS 2018 - First International Workshop on Advances on Big Data Management, Analytics, Data Privacy and Security, BigDataMAPS 2018, Sep 2018, Budapest, Hungary
hal-01939283v1  Conference papers
Younes AbidAbdessamad ImineMichaël Rusinowitch. Sensitive attribute prediction for social networks users
DARLI-AP 2018 - 2nd International workshop on Data Analytics solutions for Real-LIfe APplications, Mar 2018, Vienne, Austria
hal-01241619v1  Poster communications
Younes AbidAbdessamad ImineAmedeo NapoliChedy RaïssiMarc Rigolot et al.  Analyse d'activité et exposition de la vie privée sur les médias sociaux
16ème conférence francophone sur l'Extraction et la Gestion des Connaissances (EGC 2016), Jan 2016, Reims, France. 2016
hal-01377655v1  Conference papers
Eriká AbrahámJohn AbbottBernd BeckerAnna BigattiMartin Brain et al.  SC 2 : Satisfiability Checking meets Symbolic Computation (Project Paper)
Intelligent Computer Mathematics, Jul 2016, Bialystok, Poland
hal-01653557v1  Conference papers
Sansom AbramskiRui Soares BarbosaGiovanni CarùSimon Perdrix. A complete characterisation of All-versus-Nothing arguments for stabiliser states
14th International Conference on Quantum Physics and Logic (QPL), Jul 2017, Nijmegen, Netherlands
hal-01528687v1  Journal articles
Samson AbramskyRui Soares BarbosaGiovanni CarùSimon Perdrix. A complete characterisation of All-versus-Nothing arguments for stabiliser states
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, Royal Society, The, 2017, Second quantum revolution: foundational questions, 375 (2106), ⟨10.1098/rsta.2016.0385⟩
hal-01973285v2  Conference papers
Umut AcarVitaly AksenovArthur CharguéraudMike Rainey. Provably and Practically Efficient Granularity Control
PPoPP 2019 - Principles and Practice of Parallel Programming, Feb 2019, Washington DC, United States. ⟨10.1145/3293883.3295725⟩
hal-01937946v1  Conference papers
Umut AcarArthur CharguéraudAdrien GuattoMike RaineyFilip Sieczkowski. Heartbeat scheduling: provable efficiency for nested parallelism
PLDI’18 - 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, Jun 2018, Philadelphia, United States. ⟨10.1145/3192366.3192391⟩
hal-00917435v1  Master thesis
Jagdish Prasad Achara. Security Framework for Decentralized Shared Calendars
Distributed, Parallel, and Cluster Computing [cs.DC]. 2011
inria-00598651v1  Conference papers
Zied AchourAlexandre SavaNidhal Rezg. On the Supervisory Control of Marked Graphs
International Conference on Industrial Engineering and Engineering Management - IEEM'08, Dec 2008, Singapour, Singapore
hal-00141920v1  Journal articles
Andrew AckerAntoine HenrotMichael PoghosyanHenrik Shahgholian. The multi-layer free boundary problem for the $p$-Laplacian in convex domains
Interfaces and Free Boundaries, European Mathematical Society, 2004, 6 (1), pp.81-103
hal-01353925v1  Conference papers
Yinoussa AdagolodjoLaurent GoffinMichel de MathelinHadrien Courtecuisse. Inverse real-time Finite Element simulation for robotic control of flexible needle insertion in deformable tissues
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2016) , Oct 2016, Daejeon, South Korea
hal-01792837v1  Conference papers
Yinoussa AdagolodjoNicolas GolseEric VibertMichel de MathelinStéphane Cotin et al.  Marker-based Registration for Large Deformations -Application to Open Liver Surgery
ICRA 2018 - International Conference on Robotics and Automation, May 2018, Brisbane, Australia
hal-01578815v1  Conference papers
Yinoussa AdagolodjoRaffaella TrivisonneNazim HaouchineStéphane CotinHadrien Courtecuisse. Silhouette-based Pose Estimation for Deformable Organs Application to Surgical Augmented Reality
IROS 2017 - IEEE/RSJ International Conference on Intelligent Robots and Systems, Sep 2017, Vancouver, Canada
tel-01939268v1  Theses
Yinoussa Adagolodjo. Couplage de La rObotique et de la simulatioN médicalE pour des proCédures automaTisées (CONECT)
Optimisation et contrôle [math.OC]. Université de Strasbourg, 2018. Français
hal-00947922v1  Conference papers
Carole AdamWafa JohalIlef BenfarhatCéline JostHumbert Fiorino et al.  Etude de l'acceptabilité d'un robot moqueur
III 2013 - 2ième conférence sur l'Intercompréhension de l'Intraspécifique à l'Interspécifique, Workshop, Sep 2013, Lorient, France
hal-01078045v1  Conference papers
Gilles AddaLaurent BesacierAlain CouillaultKarën FortJoseph Mariani et al.  Where the data are coming from?" Ethics, crowdsourcing and traceability for Big Data in Human Language Technology
Crowdsourcing and human computation multidisciplinary workshop, CNRS, Sep 2014, Paris, France
hal-00764764v1  Conference papers
Philippe AddaLéontine Nkague NkambaGauthier SalletLorenzo Castelli. A SVEIR model with Imperfect Vaccine
CMPD 3 Conference on Computational and Mathematical Population Dynamics, May 2010, Bordeaux, France
hal-00675359v2  Journal articles
Philippe AddaDerdei Bichara. Global stability for SIR and SIRS models with differential mortality
International Journal of Pure and Applied Mathematics, Academic Publishing Ltd, 2012, GLOBAL STABILITY FOR SIR AND SIRS MODELS WITH DIFFERENTIAL MORTALITY, 80 (3), pp.425-433
halshs-01424902v1  Conference papers
Martine Adda-DeckerBarbara SchupplerLori LamelJuan Andrés Morales CordovillaGilles Adda. What we can learn from asr errors about low-resourced languages: a case-study of luxembourgish and austrian
Errors by Humans and Machines in Multimedia, Multimodal, Multilingual Data Processing (ERRARE 2013), Nov 2013, Ermenonville, France
hal-01170042v2  Conference papers
Bernardetta AddisDallal BelabedMathieu BouetStefano Secci. Virtual Network Functions Placement and Routing Optimization
CloudNet 2015 - IEEE 4th International Conference on Cloud Networking, Oct 2015, Niagara Falls, ON, Canada. pp.171-177, ⟨10.1109/CloudNet.2015.7335301⟩
hal-00946371v1  Conference papers
Bernardetta AddisGiuliana CarelloSara Mattia. Energy-aware survivable network management with shared protection
ROADEF - 15ème congrès annuel de la Société française de recherche opérationnelle et d'aide à la décision, Société française de recherche opérationnelle et d'aide à la décision, Feb 2014, Bordeaux, France