Skip to Main content Skip to Navigation

hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
hal-00918504v1  Journal articles
Michel AbdallaYuval ShavittAvishai Wool. Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. ⟨10.1109/90.865073⟩
hal-00918401v1  Journal articles
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-01208387v1  Journal articles
Cédric AdjihEmmanuel BaccelliEric FleuryGaetan HarterNathalie Mitton et al.  FIT IoT-LAB: A Large Scale Open Experimental IoT Testbed – A valuable tool for IoT deployment in Smart Factories
IEEE Communications Society Multimedia Communications Technical Committee (ComSoc MMTC) E-Letter, IEEE, 2015, ⟨10.1109/WF-IoT.2015.7389098⟩
hal-00654544v1  Journal articles
Cédric AdjihEmmanuel BaccelliThomas Heide ClausenPhilippe JacquetGeorgios Rodolakis. Fish Eye OLSR Scaling Properties
Journal of Communications and Networks, IEEE & Korea Information and Communications Society, 2004, 6 (4), pp.352-361. ⟨10.1109/JCN.2004.6596835⟩
inria-00471715v1  Journal articles
Cédric AdjihPhilippe JacquetLaurent Viennot. Computing connected dominated sets with multipoint relays
Ad Hoc & Sensor Wireless Networks, PKP Publishing ServicesNetwork 2005, 1 (1-2), pp.27-39
inria-00459368v1  Journal articles
Cédric AdjihPascale MinetPaul MuhlethalerEmmanuel BaccelliThierry Plesse. QoS support, security and OSPF interconnection in a MANET using OLSR
Journal of Telecommunications and Information Technology, Instytut Łączności ; Państwowy Instytut Badawczy, 2008
hal-01739439v1  Journal articles
Cédric AdjihLeonidas GeorgiadisPhilippe JacquetW. Szpankowski. Multicast tree structure and the power law
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2006, 52 (4), pp.1508 - 1521. ⟨10.1109/TIT.2006.871602⟩
hal-00416485v1  Journal articles
Khaldoun Al AghaMarc-Henri BertinTuan DangAlexandre GuittonPascale Minet et al.  Which wireless technology for Industrial Wireless Sensors Network? The development of OCARI technology
IEEE Transactions on Industrial Electronics, Institute of Electrical and Electronics Engineers, 2009, 56 (10), pp.13
hal-01112976v1  Journal articles
Martin AlbrechtJean-Charles FaugèrePooya FarshimGottfried HeroldLudovic Perret. Polly Cracker, Revisited
Designs, Codes and Cryptography, Springer Verlag, 2011, pp.43
hal-00626846v1  Journal articles
David AldousCharles BordenaveMarc Lelarge. Dynamic programming optimization over random data : the scaling exponent for near optimal solutions
SIAM Journal on Computing, Society for Industrial and Applied Mathematics, 2009, 38 (6), pp.2382-2410. ⟨10.1137/070709037⟩
hal-01246570v1  Journal articles
Stéphanie AllassonnièreS DurrlemanE Kuhn. Bayesian Mixed Effect Atlas Estimation with a Diffeomorphic Deformation Model
SIAM Journal on Imaging Sciences, Society for Industrial and Applied Mathematics, 2015, 8 (3), pp.29. ⟨10.1137/140971762⟩
hal-01123697v1  Journal articles
Noga AlonHagit AttiyaShlomi DolevSwan DuboisMaria Potop-Butucaru et al.  Practically stabilizing SWMR atomic memory in message passing systems
Journal of Computer and System Sciences, Elsevier, 2015, 81 (4), pp.692-701. ⟨10.1016/j.jcss.2014.11.014⟩
hal-00948932v1  Journal articles
Bernd AmannIrini FundulakiMichel Scholl. Integrating ontologies and thesauri for RDF schema creation and metadata querying
International Journal on Digital Libraries, Springer Verlag, 2000, 3 (3), pp.221--236. ⟨10.1007/s007990000037⟩
hal-00729056v1  Journal articles
Ichrak AmdouniPascale MinetCédric Adjih. OSERENA: a Coloring Algorithm Optimized for Dense Wireless Networks
International Journal of Networked and Distributed Computing, Atlantis Press, 2012
hal-00916769v1  Journal articles
Emmanuelle AnceaumeRoy FriedmanMaria Gradinariu. Managed Agreement: Generalizing Two Fundamental Distributed Agreement Problems
Information Processing Letters, Elsevier, 2007, 101 (5), pp.190--198
hal-00937103v1  Journal articles
Nicolas AnciauxBenjamin NguyenMichalis Vazirgiannis. Exposition Minimum de Données pour des Applications à Base de Classifieurs
Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, Lavoisier, 2013, 18 (4), pp.59-85
inria-00333219v1  Journal articles
Nicolas AnciauxLuc BouganimPhilippe PucheralPatrick Valduriez. DiSC: Benchmarking Secure Chip DBMS
IEEE Transactions on Knowledge and Data Engineering, Institute of Electrical and Electronics Engineers, 2008, 20 (10), pp.1363-1377. ⟨10.1109/TKDE.2008.67⟩
inria-00416597v1  Journal articles
Charles AndréFrédéric Mallet. Les modèles de temps de MARTE et CCSL
Génie logiciel, C & S, 2009, pp.44-49
inria-00434462v1  Journal articles
Charles AndréFrédéric Mallet. Modèle de contraintes temporelles pour systèmes polychrones
Journal Européen des Systèmes Automatisés (JESA), Lavoisier, 2009, 7-9 (43), pp.725-739
hal-00770199v1  Journal articles
Iryna AndriyanovaJean-Pierre Tillich. Designing a Good Low-Rate Sparse-Graph Code
IEEE Transactions on Communications, Institute of Electrical and Electronics Engineers, 2012, pp.3181 - 3190. ⟨10.1109/TCOMM.2012.082712.100205⟩
inria-00000959v3  Journal articles
Nelson AntunesChristine FrickerPhilippe RobertDanielle Tibi. Analysis of Loss Networks with Routing
Annals of Applied Probability, Institute of Mathematical Statistics (IMS), 2006, 16 (4), pp.2007­-2026
hal-01088000v1  Journal articles
Marianna ApidianakiBenoît Sagot. Data-driven Synset Induction and Disambiguation for Wordnet Development
Language Resources and Evaluation, Springer Verlag, 2014, 48 (4), pp.655-677. ⟨10.1007/s10579-014-9291-2⟩
hal-01111966v1  Journal articles
Jean-Baptiste Apoung-KamgaPascal HaveJean HouotMichel KernAdrien Semin. Reactive Transport in Porous Media
ESAIM: Proceedings, EDP Sciences, 2009, CEMRACS 2008 - Modelling and Numerical Simulation of Complex Fluids, 28, pp.227 - 245. ⟨10.1051/proc/2009049⟩
hal-01197421v1  Journal articles
Luciana ArantesJonathan LejeuneMadeleine PiffarettiOlivier MarinPierre Sens et al.  Vers une plate-forme MapReduce tolérant les fautes byzantines
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (8-10), pp.1079-1099. ⟨10.3166/tsi.31.1079-1099⟩
hal-00919625v1  Journal articles
Pablo ArrighiGilles Dowek. Lineal: A linear-algebraic lambda-calculus
Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2013
hal-01097602v1  Journal articles
Ali AssafAlejandro Díaz-CaroSimon PerdrixChristine TassonBenoît Valiron. Call-by-value, call-by-name and the vectorial behaviour of the algebraic λ-calculus
Logical Methods in Computer Science, Logical Methods in Computer Science Association, 2014, 10:4 (8), pp.40. ⟨10.2168/LMCS-10(4:8)2014⟩