Skip to Main content Skip to Navigation

inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
inria-00000448v1  Conference papers
Mourad AbbasKamel Smaïli. Comparison of Topic Identification methods for Arabic Language
International Conference on Recent Advances in Natural Language Processing - RANLP 2005, Sep 2005, Borovets, Bulgaria
hal-02921643v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Discovery of Link Keys in RDF Data Based on Pattern Structures: Preliminary Steps
CLA 2020 - The 15th International Conference on Concept Lattices and Their Applications, Jun 2020, Tallinn / Virtual, Estonia
inria-00403102v1  Conference papers
Mourad AbbasKamel SmaïliDaoud Berkani. Multi-Category Support Vector Machines for Identifying Arabic Topics
10th International Conference on Intelligent Text Processing and Computational Linguistics - CICLing 2009, Mar 2009, Mexico, Mexico
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-01586533v1  Conference papers
Mourad AbbasKamel SmaïliD Berkani. Comparing TR-Classifier and KNN by using Reduced Sizes of Vocabularies
3rd International Conference on Arabic Language Processing, May 2009, Rabat, Morocco
hal-01586549v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. TR-Classifier and kNN Evaluation for Topic Identification tasks
International Journal on Information and Communication Technologies, Serials Publications, 2010, 3 (3), pp.10
hal-02168775v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. Linkex: A Tool for Link Key Discovery Based on Pattern Structures
ICFCA 2019 - workshop on Applications and tools of formal concept analysis, Jun 2019, Frankfurt, Germany. pp.33-38
hal-03482955v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Non-Redundant Link Keys in RDF Data: Preliminary Steps
FCA4AI 2021 - 9th Workshop on What can FCA do for Artificial Intelligence?, Aug 2021, Montréal, Canada. pp.1-6
hal-03426543v1  Conference papers
Nacira AbbasAlexandre BazinJérôme DavidAmedeo Napoli. Sandwich: An Algorithm for Discovering Relevant Link Keys in an LKPS Concept Lattice
ICFCA 2021 - 16th international conference on formal concept analysis, Jun 2021, Strasbourg /Virtuel, France. pp.243-251, ⟨10.1007/978-3-030-77867-5_15⟩
hal-03512110v1  Conference papers
Nacira AbbasJérôme DavidAmedeo Napoli. LKSA : un algorithme de sélection de clés de liage dans des données RDF guidée par des paires de classes
Extraction et Gestion des Connaissances EGC2021, Jan 2021, Montpellier, France. pp.205-216
hal-00390289v1  Conference papers
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. High Dimensional Pricing of Exotic European Contracts on a GPU Cluster, and Comparison to a CPU Cluster
Second International Workshop on Parallel and Distributed Computing in Finance - PDCoF 2009, May 2009, Rome, Italy. Proceedings on CD-ROM (8 p.), ⟨10.1109/IPDPS.2009.5161143⟩
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00099496v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Filtrage Efficace Pour la Détection d'Intrusions
Conférence Francophone sur Sécurité et Architecture Réseaux (SAR'03), Jul 2003, Nancy, France, 10 p
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00099116v1  Conference papers
John AbbottVictor ShoupPaul Zimmermann. Factorization in Z[x]: the searching phase
International Symposium on Symbolic and Algebraic Computation - ISSAC 2000, Aug 2000, St Andrews/United Kingdom, pp.1--7
tel-01977804v1  Theses
Yacine Abboud. Fouille de motifs : entre accessibilité et robustesse
Intelligence artificielle [cs.AI]. Université de Lorraine, 2018. Français. ⟨NNT : 2018LORR0176⟩
hal-01254179v1  Conference papers
Yacine AbboudAnne BoyerArmelle Brun. Predict the emergence - Application to competencies in job offers
International Conference on Tools with Artificial Intelligence (ICTAI) , Nov 2015, Vietri Sul Mare, Italy
hal-01569008v1  Conference papers
Yacine AbboudAnne BoyerArmelle Brun. CCPM: A Scalable and Noise-Resistant Closed Contiguous Sequential Patterns Mining Algorithm
13th International Conference on Machine Learning and Data Mining MLDM 2017, Jul 2017, New York, United States. pp.15, ⟨10.1016/j.knosys.2015.06.014⟩
hal-02547097v1  Conference papers
Ahmad AbboudAbdelkader LahmadiMichaël RusinowitchMiguel CouceiroAdel Bouhoula et al.  Double Mask: An efficient rule encoding for Software Defined Networking
ICIN 2020 - 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops, Feb 2020, Paris, France. pp.186--193
hal-03036350v1  Conference papers
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. Efficient Distribution of Security Policy Filtering Rules in Software Defined Networks
NCA 2020 - 19th IEEE International Symposium on Network Computing and Applications, Nov 2020, Online conference, France
hal-03036292v1  Poster communications
Ahmad AbboudRémi GarciaAbdelkader LahmadiMichaël RusinowitchAdel Bouhoula. R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks
CNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
hal-02388968v1  Conference papers
Ahmad AbboudAli JaberJean-Pierre CancesVahid Meghdadi. CSI map for indoor massive MIMO
2017 Computing Conference, Jul 2017, London, France. pp.1305-1311, ⟨10.1109/SAI.2017.8252259⟩
tel-03508140v1  Theses
Ahmad Abboud. Efficient Rules Management Algorithms in Software Defined Networking
Computer Science [cs]. University of Lorraine, 2021. English
hal-00918854v1  Book sections
Faiza AbdatMarine AmourouxYann GuermeurWalter Blondel. Spectroscopie d'autofluorescence in vivo résolue spatialement : multiclassification SVM d'états précancéreux améliorée par fusion de sources
Stéphane Mottin and Gérard Lelièvre. Biophotonique Générale Optique & Imageries pour le Diagnostic dans les Sciences du Vivant et en Médecine, Publications Mission ressources et compétences technologiques CNRS, Meudon (Hauts-de-Seine), pp.556, 2013, Intégrations des savoirs et des savoir-faire, 978-2-918701-11-8
tel-01748510v2  Theses
Humberto Abdelnur. Voice over IP Vulnerability Assessment
Networking and Internet Architecture [cs.NI]. Université Henri Poincaré - Nancy 1, 2009. English. ⟨NNT : 2009NAN10005⟩
inria-00166947v1  Conference papers
Humberto AbdelnurOlivier FestorRadu State. KiF: A stateful SIP Fuzzer
1st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTComm), Columbia University, Jul 2007, New York, United States