Skip to Main content Skip to Navigation

inria-00596236v1  Journal articles
A. A. FallAbderrahman IggidrGauthier SalletJean-Jules Tewa. Epidemiological models and Lyapunov functions
Mathematical Modelling of Natural Phenomena, EDP Sciences, 2007, 2 (1), pp.62 - 83. ⟨10.1051/mmnp:2008011⟩
inria-00172999v3  Reports
Mridul AanjaneyaMonique Teillaud. Triangulating the Real Projective Plane
[Research Report] RR-6296, INRIA. 2007, pp.11
hal-01558062v1  Book sections
Nassim AbbasYoucef ChibaniArnaud MartinFlorentin Smarandache. The effective use of the DSmT for multi-class classification
Advances and Applications of DSmT for Information Fusion, 4, 2015
hal-01235328v1  Journal articles
Naeem AbbasSteven DerrienSanjay RajopadhyePatrice QuintonAlexandre Cornu et al.  Combining execution pipelines to improve parallel implementation of HMMER on FPGA
Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2015, 39, pp.457-470. ⟨10.1016/j.micpro.2015.06.006⟩
hal-01342029v1  Conference papers
Nivine AbbasThomas BonaldBerna Sayrac. Mobility-aware Scheduler in CoMP Systems
PIMRC, Sep 2016, Valencia, Spain
hal-01157814v1  Journal articles
N AbbassiD BenboudjemaStéphane DerrodeW Pieczynski. Optimal Filter Approximations in Conditionally Gaussian Pairwise Markov Switching Models
IEEE Transactions on Automatic Control, Institute of Electrical and Electronics Engineers, 2015, 60 (4), pp.1104-1109. ⟨10.1109/TAC.2014.2340591⟩
hal-01202019v1  Conference papers
Emanuela AbbateNejib ZemzemiYves CoudièreJean-Frédéric Gerbeau. In silico assessment of drugs effects on human embryonic stem cells derived cardiomyocytes electrical activity
LACM 2015 (2nd International Workshop on Latest Advances in Cardiac Modeling), Mar 2015, German Heart Center, Munich, Germany
hal-02800293v1  Conference papers
Jessica AbbateMaxime GalanYannick ChavalCécile GottelandEmmanuelle Gilot-Fromont et al.  Pathobiome diversity and co-infection patterns in a community of rodents
First International congress on Pathobiome: Pathogens in microbiotas in hosts, 2015, Paris, France
hal-01320646v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Detection of firewall configuration errors with updatable tree
International Journal of Information Security, Springer Verlag, 2016, 15 (3), pp.301-317. ⟨10.1007/s10207-015-0290-0⟩
hal-01254179v1  Conference papers
Yacine AbboudAnne BoyerArmelle Brun. Predict the emergence - Application to competencies in job offers
International Conference on Tools with Artificial Intelligence (ICTAI) , Nov 2015, Vietri Sul Mare, Italy
hal-00434649v1  Journal articles
Sophie S. AbbyVincent Daubin. Comparative genomics and the evolution of prokaryotes
Trends in Microbiology, Elsevier, 2007, 15, pp.135-141
hal-01380726v1  Reports
Michel AbdallaFlorian BourseAngelo de CaroDavid Pointcheval. Better Security for Functional Encryption for Inner Product Evaluations
[Technical Report] Cryptology ePrint Archive: Report 2016/011, IACR. 2016
hal-01380730v1  Reports
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
[Technical Report] Cryptology ePrint Archive: Report 2016/123, IACR. 2016
hal-01380699v1  Conference papers
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
ESORICS 2016 - 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.61-79, ⟨10.1007/978-3-319-45741-3_4⟩
hal-01380735v1  Reports
Michel AbdallaRomain GayMariana RaykovaHoeteck Wee. Multi-Input Inner-Product Functional Encryption from Pairings
[Technical Report] Cryptology ePrint Archive: Report 2016/425, IACR. 2016
hal-01432705v1  Conference papers
Gabriel AbdallaCarlos DamascenoMilena GuessiFlavio OquendoElisa Nakagawa. A Systematic Literature Review on Knowledge Representation Approaches for Systems-of-Systems
9th Brazilian Symposium on Components, Architectures and Reuse Software (SBCARS 2015), Sep 2015, Belo Horizonte, Brazil. pp.70-79, ⟨10.1109/SBCARS.2015.18⟩
hal-01175785v1  Conference papers
Michel AbdallaFabrice BenhamoudaPhilip Mackenzie. Security of the J-PAKE Password-Authenticated Key Exchange Protocol
2015 IEEE Symposium on Security and Privacy, May 2015, San Jose, United States. pp.571-587, ⟨10.1109/SP.2015.41⟩
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
hal-02472149v1  Journal articles
Michel AbdallaPierre-Alain FouqueVadim LyubashevskyMehdi Tibouchi. Tightly Secure Signatures From Lossy Identification Schemes.
Journal of Cryptology, Springer Verlag, 2016, 29 (3), pp.597-631