Skip to Main content Skip to Navigation

hal-01112891v1  Conference papers
Kamel SmaïliFrançois CharpilletJean-Paul Haton. A new algorithm for Automatic Word Classification based on an Improved Simulated Annealing Technique
The 5th International Conference on the Cognitive Science of Natural Language Processing, 1996, Dublin, Ireland
hal-01098490v1  Conference papers
François CharpilletAnne Boyer. Composing and Monitoring Non Deterministic Design-to-time Methods
AAAI Fall Symposium on Flexible Computation in Intelligent Systems, Nov 1996, Boston, United States
hal-01112900v1  Conference papers
Dominique FohrJ.-P HatonJean-François MariKamel SmaïliImed Zitouni. Towards an oral interface for data entry: The MAUD System
European Research Consortium for Informatics and Mathematics User Interfaces for AII, 1997, Nancy, France
hal-01112905v1  Conference papers
Kamel SmaïliImed ZitouniFrançois CharpilletJean-Paul Haton. An Hybrid Language Model for a Continuous Dictation Prototype
5th European Conference on Speech Communication and Technology, Sep 1997, Rhodes, Greece
hal-01112917v1  Conference papers
Imed ZitouniKamel SmaïliJean-Paul Haton. Variable-length class sequences based on a hierarchical approach: MCnv
SPECOM 1998 - 3rd International Workshop on Speech and Computer, Oct 1998, Saint-Petersbourg, Russia
inria-00100916v1  Conference papers
Yannick ChevalierLaurent Vigneron. Automated Unbounded Verification of Security Protocols
14th International Conference on Computer Aided Verification - CAV'2002, 2002, Copenhaguen, Denmark, pp.324-337
inria-00107574v1  Conference papers
Imine AbdessamadPascal MolliGérald OsterMichaël Rusinowitch. Development of Transformation Functions Assisted by a Theorem Prover
Fourth International Workshop on Collaborative Editing 2002 - ACM CSCW'2002, 2002, Nouvelle-Orléans, USA, 8 p
inria-00107572v1  Conference papers
Gilles SimonMarie-Odile Berger. Real time registration of known or recovered multi-planar structures: application to AR
13th British Machine Vision Conference 2002 - BMVC'2002, 2002, Cardiff, United Kingdom, France. pp.567-576
hal-00956165v1  Journal articles
Jean-Michel DischlerKarl MaritaudBruno LévyDjamchid Ghazanfarpour. Texture Particles
Computer Graphics Forum, Wiley, 2002, 21 (3), pp.401-410. ⟨10.1111/1467-8659.t01-1-00600⟩
inria-00100915v1  Conference papers
Alessandro ArmandoDavid BasinMehdi BouallaguiYannick ChevalierLuca Compagna et al.  The AVISS Security Protocol Analysis Tool
14th International Conference on Computer Aided Verification - CAV'2002, Jul 2002, Copenhaguen, Denmark, pp.349-353
inria-00103879v1  Conference papers
Mehdi BouallaguiYannick ChevalierMichaël RusinowitchMathieu TuruaniLaurent Vigneron. Analyse Automatique de Protocoles de Sécurité avec CASRUL
Sécurité et Architecture Réseaux - SAR'2002, Jul 2002, Marrackech, Maroc, Morocco
inria-00099700v1  Conference papers
Abdessamad IminePascal MolliGérald OsterPascal Urso. VOTE: Group Editors Analyzing Tool
Fourth International Workshop on First-Order Theorem Proving - FTP'03, 2003, Valencia, Spain, pp.153-161, ⟨10.1016/S1571-0661(04)80660-1⟩
inria-00107652v1  Conference papers
Abdessamad IminePascal MolliGérald OsterMichaël Rusinowitch. Proving Correctness of Transformation Functions in Real-Time Groupware
8th European Conference of Computer-supported Cooperative Work - ECSCW'03, 2003, Helsinki, Finland, 18 p
inria-00107740v1  Reports
Pascal MolliGérald OsterHala Skaf-MolliAbdessamad Imine. Safe Generic Data Synchronizer
[Intern report] A03-R-062 || molli03a, 2003, 8 p
inria-00103985v1  Journal articles
Michaël RusinowitchMathieu Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete.
Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (299), pp.451-475. ⟨10.1016/S0304-3975(02)00490-5⟩
inria-00104145v1  Journal articles
François LaroussiniePhilippe SchnoebelenMathieu Turuani. On the expressivity and complexity of quantitative branching-time temporal logics.
Theoretical Computer Science, Elsevier, 2003, Theoretical Computer Science, 1-3 (297), pp.297-315. ⟨10.1016/S0304-3975(02)00644-8⟩
inria-00099513v1  Directions of work or proceedings
Ingo DahnLaurent Vigneron. 4th International Workshop on First-Order Theorem Proving- FTP'2003
1 (1), Elsevier Science Publishers, 2003, Electronic Notes in Theoretical Computer Science
hal-02556177v1  Conference papers
Haoxun ChenLionel AmodeoLydia Boudjeloud-Assala. Supply chain optimization with Petri Nets and Genetic Algorithms
International Conference on Industrial Engineering and Production Management, May 2003, Porto, Portugal
hal-00433115v1  Conference papers
Abdessamad IminePascal Urso. Automatic Detection of Copies Divergence in Collaborative Editing Systems
Eighth International Workshop on Formal Methods for Industrial Critical Systems - FMICS'03, Jun 2003, Trondheim, Norway. pp.92-108, ⟨10.1016/S1571-0661(04)80811-9⟩
inria-00103954v1  Conference papers
Yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR
18th IEEE Symposium on Logic in Computer Science (LICS 2003), Jun 2003, Ottawa, Canada, pp.261-270
inria-00099514v1  Conference papers
Yannick ChevalierRalf KüstersMichaël RusinowitchMathieu TuruaniLaurent Vigneron. Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions
Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, pp.128-141
inria-00099815v1  Conference papers
Pascal MolliGérald OsterHala Skaf-MolliAbdessamad Imine. Using the Transformational Approach to Build a Safe and Generic Data Synchronizer
International Conference on Supporting Group Work - Group 2003, ACM SIGGROUP, Nov 2003, Sanibel Island, Florida, USA, pp.212-220, ⟨10.1145/958160.958194⟩
inria-00103935v1  Conference papers
Yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Dec 2003, Mumbai, India, pp.124-135
inria-00099882v1  Conference papers
Yannick ChevalierLuca CompagnaJorge CuellarPaul Hankes DrielsmaJacopo Mantovani et al.  A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols
Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, 13 p
inria-00099986v1  Conference papers
Abdessamad IminePascal MolliGérald OsterMichaël Rusinowitch. Deductive Verification of Distributed Groupware Systems
Tenth International Conference on Algebraic Methodology and Software Technology - AMAST 2004, 2004, Stirling, Scotland, United Kingdom, pp.226-240
inria-00099991v1  Conference papers
David BasinMichaël Rusinowitch. Automated Reasoning
Second International Joint Conference on Automated Reasoning - IJCAR'2004, 2004, Cork, Irlande, France. XII-491 p
inria-00099993v1  Conference papers
Michaël Rusinowitch. A Decidable Analysis of Security Protocols
18th IFIP World Computer Congress on Theoretical Computer Science - TCS'2004, 2004, Toulouse, France, 1 p
inria-00099985v1  Conference papers
Silvio RaniseChristophe RingeissenDuc-Khanh Tran. Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn
First International Colloquium on Theoretical Aspects of Computing - ICTAC 2004, Keijiro Araki, Zhiming Liu, 2004, Guiyang, Chine, 15 p
inria-00100005v1  Journal articles
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. On the Fly Pattern Matching For Intrusion Detection with Snort
Annals of Telecommunications - annales des télécommunications, Springer, 2004, 59 (9-10), pp.941--967
inria-00100008v1  Conference papers
Tarek AbbesAlakesh HaloiMichaël Rusinowitch. High Performance Intrusion Detection using Traffic Classification
International Conference on Advances in Intelligent Systems - Theory and Applications - AISTA 2004, 2004, Luxembourg
inria-00100031v1  Directions of work or proceedings
Deepak KapurLaurent Vigneron. Special issue on First-Order Theorem Proving of the Journal of Automated Reasoning
Deepak Kapur and Laurent Vigneron. 33 / n°3-4, Kluwer, pp.219-383, 2004
inria-00099945v1  Journal articles
Yannick ChevalierLaurent Vigneron. Strategy for Verifying Security Protocols with Unbounded Message Size
Journal of Automated Software Engineering, Springer, 2004, 11 (2), pp.141-166
inria-00099981v1  Journal articles
Hubert Comon-LundhVéronique Cortier. Security properties: two agents are sufficient
Science of Computer Programming, Elsevier, 2004, 50 (1-3), pp.51-71
inria-00070767v1  Reports
Calogero G. Zarba. C-tableaux
[Research Report] RR-5229, INRIA. 2004, pp.31
hal-01079278v1  Conference papers
Maxime AmblardAlain LecomteChristian Retoré. Syntax and Semantics interacting in a Minimalist theory
Prospect and advance in the syntax/semantic interface, Jan 2004, Nancy, France
hal-02314741v1  Journal articles
Pierre-Etienne MoreauOlivier Zendra. GC2: a generational conservative garbage collector for the ATerm library
Journal of Logic and Algebraic Programming, Elsevier, 2004, 59 (1-2), pp.5-34. ⟨10.1016/j.jlap.2003.12.003⟩
inria-00100006v1  Conference papers
Tarek AbbesAdel BouhoulaMichaël Rusinowitch. Protocol Analysis in Intrusion Detection Using Decision Tree
International Conference on Information Technology: Coding and Computing - ITCC'04, Apr 2004, Las Vegas, Nevada, USA, pp.404--408
inria-00329994v1  Conference papers
Jean-François CouchotFrédéric DadeauDavid DéharbeSilvio Ranise. Proving and Debugging Set-Based Specifications
6th Brazilian Workshop on Formal Methods, May 2004, Campina Grande, Brazil. pp.189-208, ⟨10.1016/j.entcs.2004.04.012⟩
inria-00100007v1  Conference papers
Tarek AbbesMichaël Rusinowitch. Fast Multipattern Matching for Intrusion Detection
13th Annual Conference on European Institute for Computer Anti-virus Research - EICAR'2004, May 2004, Luxemburg, Luxembourg, 22 p
inria-00099888v1  Conference papers
Yannick ChevalierLaurent Vigneron. Rule-based Programs describing Internet Security Protocols
5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97
inria-00099889v1  Conference papers
Yannick Chevalier. A Simple Constraint-solving Decision Procedure for Protocols with Exclusive or
18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 15 p
inria-00100032v1  Conference papers
Laurent Vigneron. Automatic Verification of Security Protocols
18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 2 p
inria-00100013v1  Conference papers
Yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. Deciding the Security of Protocols with Commuting Public Key Encryption.
Workshop on Automated Reasoning for Security Protocol Analysis - ARSPA'2004, Jul 2004, Cork, Ireland. 11 p
inria-00099982v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under equational theories
ICALP 2004 - The 31st International Colloquium on Automata, Languages and Programming, Jul 2004, Turku, Finland. pp.148-164, ⟨10.1007/978-3-540-27836-8_7⟩
inria-00103807v1  Journal articles
Yannick ChevalierRalf KüstersMichaël RusinowitchMathieu Turuani. An NP Decision Procedure for Protocol Insecurity with XOR
Theoretical Computer Science, Elsevier, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274
inria-00070512v1  Reports
Yannick ChevalierMichaël Rusinowitch. Combining Intruder Theories
[Research Report] RR-5495, INRIA. 2005, pp.37
inria-00000553v1  Journal articles
Hubert Comon-LundhVéronique Cortier. Tree automata with one memory, set constraints and cryptographic protocols
Theoretical Computer Science, Elsevier, 2005, 331 (1), pp.143-214
hal-01564249v1  Conference papers
Salma JamoussiKamel SmaïliJean-Paul Haton. From speech to SQL queries : a speech understanding system
The twentieth national Conference on Artificial Intelligence workshop on spoken language understanding, 2005, Pittsburg, United States
halshs-01450319v1  Conference papers
Anne AbeilléOlivier BonamiDanièle GodardJesse Tseng. L'analyse syntaxique des SN de la forme N
Deuxièmes journées romanes, 2005, Toulouse, Unknown Region
inria-00000481v1  Conference papers
Pascal FontaineSilvio RaniseCalogero Zarba. Combining Lists with Non-Stably Infinite Theories
11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'04), Mar 2005, Montevideo/Uruguay, pp.51--66, ⟨10.1007/b106931⟩
inria-00329986v1  Conference papers
Fabrice BouquetFrédéric DadeauJulien Groslambert. Checking JML Specifications with B Machines
International Conference on Formal Specification and Development in Z and B - ZB'05, Apr 2005, Guildford, United Kingdom. pp.434-453, ⟨10.1007/b135596⟩
inria-00329995v1  Conference papers
Fabrice BouquetFrédéric DadeauBruno LegeardMarc Utting. JML-Testing-Tools: a Symbolic Animator for JML Specifications using CLP
International Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS'05, Apr 2005, Edinburgh, United Kingdom. pp.551-556, ⟨10.1007/b107194⟩
inria-00000556v1  Conference papers
Véronique CortierBogdan Warinschi. Computationally Sound, Automated Proofs for Security Protocols
14th European Symposium on Programming - ESOP 2005, Apr 2005, Edinburgh/United Kingdom, pp.157-171, ⟨10.1007/b107380⟩
inria-00000409v1  Directions of work or proceedings
Laurent Vigneron. Proceedings of the 19th International Workshop on Unification
A05-R-022 (A05-R-022), LORIA, pp.143, 2005
hal-01079268v1  Conference papers
Maxime Amblard. Counting dependencies and Minimalist Grammars
Logical Aspects of Computational Linguistics, student session, Apr 2005, Bordeaux, France
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
inria-00103647v1  Conference papers
Michael BackesAnupam DattaAnte DerekJohn C. MitchellMathieu Turuani. Compositional Analysis of Contract Signing Protocols
18th IEEE Computer Security Foundations Workshop - CSFW 2005, Jun 2005, Aix-en-Provence/France, pp.94-110
inria-00000555v1  Conference papers
Mathieu BaudetVéronique CortierSteve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩
inria-00000557v1  Conference papers
Véronique CortierMichaël RusinowitchEugen Zalinescu. A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22
inria-00000408v1  Conference papers
Alessandro ArmandoDavid BasinYohan BoichutYannick ChevalierLuca Compagna et al.  The AVISPA Tool for the automated validation of internet security protocols and applications
17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285
inria-00329983v1  Conference papers
Fabrice BouquetFrédéric DadeauBruno LegeardMarc Utting. Symbolic Animation of JML Specifications
International Conference on Formal Methods - FM'05, Jul 2005, Newcastle upon Tyne, United Kingdom. pp.75-90, ⟨10.1007/b27882⟩
inria-00329989v1  Conference papers
Fabrice BouquetFrédéric DadeauBruno Legeard. Using Constraint Logic Programming for the Symbolic Animation of Formal Models
Proceedings of the International Workshop on Constraints in Formal Verification - CFV'05, Jul 2005, Tallinn, Estonia. pp.32-46
inria-00103654v1  Conference papers
Anupam DattaAnte DerekJohn C. MitchellVitaly ShmatikovMathieu Turuani. Probabilistic Polynomial-time Semantics for a Protocol Security Logic
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbon/Portugal, pp.16--29