Skip to Main content Skip to Navigation


...
inria-00596236v1  Journal articles
A. A. FallAbderrahman IggidrGauthier SalletJean-Jules Tewa. Epidemiological models and Lyapunov functions
Mathematical Modelling of Natural Phenomena, EDP Sciences, 2007, 2 (1), pp.62 - 83. ⟨10.1051/mmnp:2008011⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
...
hal-02921643v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Discovery of Link Keys in RDF Data Based on Pattern Structures: Preliminary Steps
The 15th International Conference on Concept Lattices and Their Applications, Jun 2020, Tallinn, Estonia
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
...
hal-02168775v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Linkex: A Tool for Link Key Discovery Based on Pattern Structures
ICFCA 2019 - workshop on Applications and tools of formal concept analysis, Jun 2019, Frankfurt, Germany. pp.33-38
hal-00773740v1  Journal articles
Lokman A. Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
...
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
...
hal-02547097v1  Conference papers
Ahmad AbboudAbdelkader LahmadiMichaël RusinowitchMiguel CouceiroAdel Bouhoula et al.  Double Mask: An efficient rule encoding for Software Defined Networking
ICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
hal-00755739v1  Journal articles
Farah AbdallahSerge NicaiseJulie ValeinAli Wehbe. Stability results for the approximation of weakly coupled wave equations
Comptes Rendus de l'Académie des Sciences - Series I - Mathematics, Elsevier, 2012, 350 (1-2), pp.29-34. ⟨10.1016/j.crma.2011.12.004⟩
...
hal-01654158v1  Journal articles
Meriem AbdallahMarie BlonskiSophie Wantz-MézièresYann GaudeauLuc Taillandier et al.  On the relevance of two manual tumor volume estimation methods for diffuse low-grade gliomas
Healthcare Technology Letters, The Institution of Engineering and Technology, 2018, 5 (1), pp.13-17. ⟨10.1049/htl.2017.0013⟩
...
inria-00403933v1  Conference papers
Rached AbdelkhalekHenri CalendraOlivier CoulaudGuillaume LatuJean Roman. Fast Seismic Modeling and Reverse Time Migration on a GPU Cluster
The 2009 High Performance Computing & Simulation - HPCS'09, Jun 2009, Leipzig, Germany
...
inria-00407782v1  Conference papers
Rached AbdelkhalekHenri CalandraOlivier CoulaudGuillaume LatuJean Roman. FDTD Based Seismic Modeling and Reverse Time Migration on a GPU Cluster
9th International Conference on Mathematical and Numerical Aspects of Waves Propagation - Waves 2009, 2009, Pau, France
...
inria-00619236v1  Conference papers
Mohamed Ahmed AbdelraheemCéline BlondeauMaria Naya-PlasenciaMarion VideauErik Zenner. Cryptanalysis of ARMADILLO2
Advances in cryptology - ASIACRYPT 2011, Dec 2011, Séoul, South Korea. pp.308-326, ⟨10.1007/978-3-642-25385-0⟩
hal-01933975v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheDjamal BenslimaneMatteo GolfarelliStéphane Jean et al.  New Trends in Model and Data Engineering
MEDI 2018 - International Workshops, DETECT, MEDI4SG, IWCFS, REMEDY, Oct 2018, Marrakesh, Morocco. Communications in Computer and Information Science, Communications in Computer and Information Science (929), Springer, 2018, 978-3-030-02851-0. ⟨10.1007/978-3-030-02852-7⟩
hal-01933977v1  Directions of work or proceedings
El Hassan AbdelwahedLadjel BellatrecheMatteo GolfarelliDominique MéryCarlos Ordonez. Model and Data Engineering
MEDI 2018 - International Workshops, DETECT, MEDI4SG, IWCFS, REMEDY, Oct 2018, Marrakech, Morocco. 11163, Springer, 2018, Lecture Notes in Computer Science, 978-3-030-00855-0
...
hal-01987946v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre et al.  Efficient Resource Allocation for Multi-tenant Monitoring of Edge Infrastructures
PDP 2019 - 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Feb 2019, Pavie, Italy. pp.1-8, ⟨10.1109/EMPDP.2019.8671621⟩
...
hal-01897570v3  Reports
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisXavier Lorca et al.  A Framework for Edge Infrastructures Monitoring
[Research Report] RR-9215, Orange Labs; Inria Nancy - Grand Est; IMT-Atlantique. 2018, pp.1-14
...
hal-01591161v1  Conference papers
Mohamed AbderrahimMeryem OuzzifKarine GuillouardJérôme FrançoisAdrien Lebre. A Holistic Monitoring Service for Fog/Edge Infrastructures: a Foresight Study
The IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud 2017), Aug 2017, Prague, Czech Republic. pp.337-344, ⟨10.1109/FiCloud.2017.30⟩
...
hal-01588490v2  Conference papers
Mohammed Riyadh AbdmeziemFrançois Charoy. Fault-tolerant and Scalable Key Management Protocol for IoT-based Collaborative Groups
SecureComm 2017 : 13th EAI International Conference on Security and Privacy in Communication Networks, Oct 2017, Niagara falls, Canada. pp.1-20
...
hal-02378897v1  Journal articles
Mohammed Riyadh Abdmeziem. Securing IoT-based collaborative applications using a new compressed and distributed MIKEY mode
International Journal of Information and Computer Security, Inderscience, 2019, x,No.x
...
hal-02378889v1  Journal articles
Mohammed Riyadh AbdmeziemFrançois Charoy. Securing IoT-based Groups: Efficient, Scalable and Fault-tolerant Key Management Protocol
Ad Hoc & Sensor Wireless Networks, PKP Publishing ServicesNetwork 2019
...
hal-01874495v1  Conference papers
Badr AbdullahIrina IllinaDominique Fohr. Dynamic Extension of ASR Lexicon Using Wikipedia Data
IEEE Workshop on Spoken and Language Technology (SLT), Dec 2018, Athènes, Greece
halshs-01450319v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. L'analyse syntaxique des SN de la forme N
Deuxièmes journées romanes, 2005, Toulouse, Unknown Region