Skip to Main content Skip to Navigation

inria-00504558v1  Conference papers
Imed {hadj Kacem}Noura SellamiInbar FijalkowAline Roumy. {Training interval length optimization for MIMO flat fading channels using decision-directed channel estimation}
IEEE International Conference on Wireless and Mobile Computing (WiMob'09), 2009, Casablanca, Macau SAR China
inria-00504557v1  Conference papers
Imed {hadj Kacem}Noura SellamiInbar FijalkowAline Roumy. {Joint training interval length and power allocation optimization for MIMO flat fading channels}
IEEE International Symposium on Wireless Communication Systems 2009 (ISWCS'09), 2009, Sienna, Italy
inria-00504559v1  Conference papers
Imed {hadj Kacem}Noura SellamiAline RoumyInbar Fijalkow. {Training sequence optimization for frequency selective channels with MAP equalization}
Proc. of IEEE International Symposium on Communications, Control and Signal Processing ISCCSP, 2008, La Valette, Malta. pp.532-537
inria-00638559v1  Book sections
Gabriel A. WainerKhaldoon Al-ZoubiOlivier DalleSaurabh MittalJosé L. Risco Martin et al.  Chapter 18: Standardizing DEVS Simulation Middleware
Wainer, G. and Mosterman, P. Discrete-Event Modeling and Simulation: Theory and Applications, CRC press, pp.459--494, 2011, 978-1-4200-7233-4
inria-00638560v1  Book sections
Gabriel A. WainerKhaldoon Al-ZoubiOlivier DalleSaurabh MittalJosé Luis Risco Martin et al.  Chapter 17: Standardizing DEVS model representation
Wainer, G. and Mosterman, P. Discrete-Event Modeling and Simulation: Theory and Applications, CRC press, pp.427--458, 2011, 978-1-4200-7233-4
hal-01094867v1  Journal articles
Mridul AanjaneyaFrédéric ChazalDaniel ChenMarc GlisseLeonidas J. Guibas et al.  Metric Graph Reconstruction From Noisy Data
International Journal of Computational Geometry and Applications, World Scientific Publishing, 2012, 22 (4), pp.305-325. ⟨10.1142/S0218195912600072⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00537591v1  Conference papers
Alexandre AbadieRomain CarpentierPierre HellierPierre JanninJean-Yves Gauvrit et al.  Une plateforme logicielle de neurochirurgie assistée par l'image
Congrès de la Société de Neurochirurgie de Langue Française, Dec 2010, Paris, France. ⟨10.1016/j.neuchi.2010.10.019⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-01662076v1  Directions of work or proceedings
Alessandro AbateSylvie Boldo. 10th International Workshop on Numerical Software Verification
10th International Workshop on Numerical Software Verification, France. Springer, 2017
hal-01949202v1  Conference papers
Carmine AbateArthur Azevedo de AmorimRoberto BlancoAna Nora EvansGuglielmo Fachini et al.  When Good Components Go Bad
25th ACM Conference on Computer and Communications Security (CCS), Oct 2018, Toronto, Canada. pp.1351--1368, ⟨10.1145/3243734.3243745⟩
hal-02398915v1  Conference papers
Carmine AbateRoberto BlancoDeepak GargCătălin HriţcuMarco Patrignani et al.  Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
CSF 2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.256-271, ⟨10.1109/CSF.2019.00025⟩
hal-00663467v1  Conference papers
Katia AbbaciFernando LemosAllel HadjaliDaniela GrigoriLudovic Liétard et al.  Selecting and Ranking Business Processes with Preferences: An Approach Based on Fuzzy Sets
On the Move to Meaningful Internet Systems: OTM 2011, Oct 2011, Hersonissos, Greece. pp.38-55, ⟨10.1007/978-3-642-25109-2_4⟩
hal-00663438v1  Conference papers
Katia AbbaciFernando LemosAllel HadjaliDaniela GrigoriLudovic Liétard et al.  An Approach Based on Fuzzy Sets to Selecting and Ranking Business Processes
IEEE 13th Conference on Commerce and Enterprise, Sep 2011, Luxembourg, Luxembourg. pp.213-218
hal-00664237v1  Conference papers
Katia AbbaciMokrane BouzeghoubDaniela GrigoriAllel HadjaliFernando Lemos et al.  A Fuzzy Set Approach to Handle Preferences in Service Retrieval
27èmes journées Bases de Données Avancées, BDA 2011, Oct 2011, Rabat, Morocco
hal-00784059v1  Journal articles
Th. AbballeGrégoire AllaireE. LaucoinPh. Montarnal. Application of a coupled FV/FE multiscale method to cement media
Networks and Heterogeneous Media, AIMS-American Institute of Mathematical Sciences, 2010, 5 (3), pp.603-615
inria-00554191v1  Conference papers
Naeem AbbasSteven DerrienPatrice QuintonSanjay Rajopadhye. Accelerating HMMER on FPGA using Parallel Prefixes and Reductions
Proc. of the IEEE International Conference on Field-Programmable Technology (FPT'10), Dec 2010, Beijing, China, China. x-proceedings = yes, x-international-audience = yes, x-editorial-board = yes, x-invited-conference
hal-01235328v1  Journal articles
Naeem AbbasSteven DerrienSanjay RajopadhyePatrice QuintonAlexandre Cornu et al.  Combining execution pipelines to improve parallel implementation of HMMER on FPGA
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2015, 39, pp.457-470. ⟨10.1016/j.micpro.2015.06.006⟩
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column
hal-00390289v1  Conference papers
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. High Dimensional Pricing of Exotic European Contracts on a GPU Cluster, and Comparison to a CPU Cluster
Second International Workshop on Parallel and Distributed Computing in Finance - PDCoF 2009, May 2009, Rome, Italy. Proceedings on CD-ROM (8 p.), ⟨10.1109/IPDPS.2009.5161143⟩
hal-00773740v1  Journal articles
Lokman Abbas-TurkiStéphane VialleBernard LapeyrePatrick Mercier. Pricing derivatives on graphics processing units using Monte Carlo simulation
Concurrency and Computation: Practice and Experience, Wiley, 2014, 26 (9), pp.1679-1697. ⟨10.1002/cpe.2862⟩
hal-01107836v1  Journal articles
Zeinab AbbassiNidhi HegdeLaurent Massoulié. Distributed Content Curation on the Web
ACM Transactions on Internet Technology, Association for Computing Machinery, 2014, pp.9. ⟨10.1145/2663489⟩
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00329730v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. An inference system for detecting firewall filtering rules anomalies
23rd Annual ACM Symposium on Applied Computing - SAC'08, 2008, Fortaleza, Brazil. pp.2122-2128
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
hal-00350939v1  Conference papers
Samy AbbesAlbert BenvenisteStefan Haar. A Petri net model for distributed estimation
Sixteenth International Symposium on Mathematical Theory of Networks and Systems, 2004, Louvain, Belgium. pp.ISBN 90-5682-517-8
inria-00528201v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Efficient Decision Tree for Protocol Analysis in Intrusion Detection
International Journal of Security and Networks, Inderscience, 2010, 5 (4), pp.220-235. ⟨10.1504/IJSN.2010.037661⟩
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00099116v1  Conference papers
John AbbottVictor ShoupPaul Zimmermann. Factorization in Z[x]: the searching phase
International Symposium on Symbolic and Algebraic Computation - ISSAC 2000, Aug 2000, St Andrews/United Kingdom, pp.1--7
hal-01432705v1  Conference papers
Gabriel AbdallaCarlos DamascenoMilena GuessiFlavio OquendoElisa Nakagawa. A Systematic Literature Review on Knowledge Representation Approaches for Systems-of-Systems
9th Brazilian Symposium on Components, Architectures and Reuse Software (SBCARS 2015), Sep 2015, Belo Horizonte, Brazil. pp.70-79, ⟨10.1109/SBCARS.2015.18⟩
hal-01538113v1  Journal articles
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
Journal of Cryptology, Springer Verlag, 2018, 31 (2), pp.307-350. ⟨10.1007/s00145-017-9258-8⟩
hal-02391547v1  Conference papers
Michel AbdallaSara MinerChanathip Namprempre. Forward-Secure Threshold Signature Schemes
Topics in Cryptology - 2001, Apr 2001, San Francisco, United States. pp.441-456, ⟨10.1007/3-540-45353-9_32⟩