Skip to Main content Skip to Navigation


inria-00504558v1  Conference papers
Imed {hadj Kacem}Noura SellamiInbar FijalkowAline Roumy. {Training interval length optimization for MIMO flat fading channels using decision-directed channel estimation}
IEEE International Conference on Wireless and Mobile Computing (WiMob'09), 2009, Casablanca, Macau SAR China
inria-00504557v1  Conference papers
Imed {hadj Kacem}Noura SellamiInbar FijalkowAline Roumy. {Joint training interval length and power allocation optimization for MIMO flat fading channels}
IEEE International Symposium on Wireless Communication Systems 2009 (ISWCS'09), 2009, Sienna, Italy
inria-00504559v1  Conference papers
Imed {hadj Kacem}Noura SellamiAline RoumyInbar Fijalkow. {Training sequence optimization for frequency selective channels with MAP equalization}
Proc. of IEEE International Symposium on Communications, Control and Signal Processing ISCCSP, 2008, La Valette, Malta. pp.532-537
inria-00638560v1  Book sections
Gabriel A. WainerKhaldoon Al-ZoubiOlivier DalleSaurabh MittalJosé Luis Risco Martin et al.  Chapter 17: Standardizing DEVS model representation
Wainer, G. and Mosterman, P. Discrete-Event Modeling and Simulation: Theory and Applications, CRC press, pp.427--458, 2011, 978-1-4200-7233-4
inria-00638559v1  Book sections
Gabriel A. WainerKhaldoon Al-ZoubiOlivier DalleSaurabh MittalJosé L. Risco Martin et al.  Chapter 18: Standardizing DEVS Simulation Middleware
Wainer, G. and Mosterman, P. Discrete-Event Modeling and Simulation: Theory and Applications, CRC press, pp.459--494, 2011, 978-1-4200-7233-4
hal-01094867v1  Journal articles
Mridul AanjaneyaFrédéric ChazalDaniel ChenMarc GlisseLeonidas J. Guibas et al.  Metric Graph Reconstruction From Noisy Data
International Journal of Computational Geometry and Applications, World Scientific Publishing, 2012, 22 (4), pp.305-325. ⟨10.1142/S0218195912600072⟩
hal-00906576v1  Journal articles
J. AasiJ. AbadieB. P. AbbottR. AbbottT. Abbott et al.  A directed search for continuous Gravitational Waves from the Galactic Center
Physical Review D, American Physical Society, 2013, 88, 102002 [13 p.]. ⟨10.1103/PhysRevD.88.102002⟩
hal-01090879v1  Directions of work or proceedings
Martin AbadiSteve Kremer. Principles of Security and Trust
Martín Abadi and Steve Kremer. 3rd International Conference on Principles of Security and Trust (POST'14), France. 8414, Springer, 2014, Lecture Notes in Computer Science, 978-3-642-54791-1. ⟨10.1007/978-3-642-54792-8⟩
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
inria-00537591v1  Conference papers
Alexandre AbadieRomain CarpentierPierre HellierPierre JanninJean-Yves Gauvrit et al.  Une plateforme logicielle de neurochirurgie assistée par l'image
Congrès de la Société de Neurochirurgie de Langue Française, Dec 2010, Paris, France. ⟨10.1016/j.neuchi.2010.10.019⟩
inria-00578884v1  Conference papers
Ryma AbassiFlorent JacquemardMichaël RusinowitchSihem Guemara El Fatmi. XML Access Control: from XACML to Annotated Schemas
Second International Conference on Communications and Networking (ComNet), Nov 2010, Tozeur, Tunisia. pp.1-8, ⟨10.1109/COMNET.2010.5699810⟩
hal-01949202v1  Conference papers
Carmine AbateArthur Azevedo de AmorimRoberto BlancoAna Nora EvansGuglielmo Fachini et al.  When Good Components Go Bad
25th ACM Conference on Computer and Communications Security (CCS), Oct 2018, Toronto, Canada. pp.1351--1368, ⟨10.1145/3243734.3243745⟩
hal-02398915v1  Conference papers
Carmine AbateRoberto BlancoDeepak GargCătălin HriţcuMarco Patrignani et al.  Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
CSF 2019 - 32nd IEEE Computer Security Foundations Symposium, Jun 2019, Hoboken, United States. pp.256-271, ⟨10.1109/CSF.2019.00025⟩
hal-01662076v1  Directions of work or proceedings
Alessandro AbateSylvie Boldo. 10th International Workshop on Numerical Software Verification
10th International Workshop on Numerical Software Verification, France. Springer, 2017
hal-02568304v1  Conference papers
Hernan AbaunzaPedro Castillo GarciaDidier TheilliolAdel BelkadiLaurent Ciarletta. Cylindrical bounded quaternion control for tracking and surrounding a ground target using UAVs
21st International Federation of Automatic Control World Congress (IFAC WC 2020), Jul 2020, Berlin, Germany
hal-00663438v1  Conference papers
Katia AbbaciFernando LemosAllel HadjaliDaniela GrigoriLudovic Liétard et al.  An Approach Based on Fuzzy Sets to Selecting and Ranking Business Processes
IEEE 13th Conference on Commerce and Enterprise, Sep 2011, Luxembourg, Luxembourg. pp.213-218
hal-00663467v1  Conference papers
Katia AbbaciFernando LemosAllel HadjaliDaniela GrigoriLudovic Liétard et al.  Selecting and Ranking Business Processes with Preferences: An Approach Based on Fuzzy Sets
On the Move to Meaningful Internet Systems: OTM 2011, Oct 2011, Hersonissos, Greece. pp.38-55, ⟨10.1007/978-3-642-25109-2_4⟩
hal-00664237v1  Conference papers
Katia AbbaciMokrane BouzeghoubDaniela GrigoriAllel HadjaliFernando Lemos et al.  A Fuzzy Set Approach to Handle Preferences in Service Retrieval
27èmes journées Bases de Données Avancées, BDA 2011, Oct 2011, Rabat, Morocco
hal-00784059v1  Journal articles
Th. AbballeGrégoire AllaireE. LaucoinPh. Montarnal. Application of a coupled FV/FE multiscale method to cement media
Networks and Heterogeneous Media, AIMS-American Institute of Mathematical Sciences, 2010, 5 (3), pp.603-615
hal-01586544v1  Journal articles
Mourad AbbasKamel SmaïliDaoud Berkani. Evaluation of Topic Identification Methods on Arabic Corpora
Journal of Digital Information Management, Digital Information Research Foundation, 2011, 9 (5), pp.8 double column