Skip to Main content Skip to Navigation


hal-02864914v1  Journal articles
Stefan KölblElmar TischhauserPatrick DerbezAndrey Bogdanov. Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (1), pp.91-117. ⟨10.1007/s10623-019-00673-2⟩
hal-02372730v1  Directions of work or proceedings
Eitan AltmanKonstantin AvrachenkovFrancesco de PellegriniRachid ElazouziHuijuan Wang. Multilevel Strategic Interaction Game Models for Complex Networks
Altman, Eitan; Avrachenkov, Konstantin E; De Pellegrini, Francesco; El-Azouzi, Rachid; Wang, Huijuan. Springer International Publishing, 2019, ⟨10.1007/978-3-030-24455-2⟩
hal-01872303v1  Conference papers
Ali MarandiTorsten BraunKavé SalamatianNikolaos Thomos. A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks
IEEE Symposium on Computer Communications (ISCC'18)., Jun 2018, Natal, Brazil
hal-01860823v1  Journal articles
Myriam Djoukwe TapiLeïla Bagny BeilheSamuel BowongYves Dumont. Models for Miridae, a cocoa insect pest. Application in control strategies
Mathematical Methods in the Applied Sciences, Wiley, In press, 41 (18), pp.8673-8696. ⟨10.1002/mma.5063⟩
hal-01378341v1  Conference papers
Zvika BrakerskiDavid CashRotem TsabaryHoeteck Wee. Targeted Homomorphic Attribute-Based Encryption
14th International Conference, TCC 2016-B, Oct 2016, Beijing, China. pp.330-360
hal-01326779v1  Conference papers
David EppsteinPhilipp KindermannStephen KobourovGiuseppe LiottaAnna Lubiw et al.  On the Planar Split Thickness of Graphs
LATIN 2016: Theoretical Informatics: 12th Latin American Symposium, Apr 2016, Ensenada, Mexico. pp.403-415, ⟨10.1007/978-3-662-49529-2_30⟩
hal-01421407v1  Conference papers
Moreno FalaschiMaurizio GabbrielliCarlos OlarteCatuscia Palamidessi. Slicing Concurrent Constraint Programs
Pre-proceedings of the 26th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2016), 2016, Edinburgh, United Kingdom
hal-01241081v1  Conference papers
Elena AndreevaBegül BilginAndrey BogdanovAtul LuykxFlorian Mendel et al.  PRIMATEs v2.0
DIAC 2015 - Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
hal-01206289v1  Conference papers
David BernhardVéronique CortierDavid GalindoOlivier PereiraBogdan Warinschi. A comprehensive analysis of game-based ballot privacy definitions
36th IEEE Symposium on Security and Privacy (S&P'15), May 2015, San Jose, United States. ⟨10.1109/SP.2015.37⟩
hal-01271650v1  Book sections
Davide ChiarugiMoreno FalaschiCarlos OlarteCatuscia Palamidessi. A Declarative View of Signaling Pathways
Chiara Bodei; Gian Luigi Ferrari; Corrado Priami. Programming Languages with Applications to Biology and Security, 9465, Springer, pp.183-201, 2015, Lecture Notes in Computer Science, 978-3-319-25526-2
hal-00919935v1  Conference papers
Ismael FigueroaTom SchrijversNicolas TabareauÉric Tanter. Compositional Reasoning About Aspect Interference
13th International Conference on Modularity (Modularity'14), Apr 2014, Lugano, Switzerland
hal-00922228v1  Conference papers
Dongxia BaiHongbo YuGaoli WangXiaoyun Wang. Improved Boomerang Attacks on SM3
ACISP 2013 - 18th Australasian Conference Information Security and Privacy, Jul 2013, Brisbane, Australia. pp.251-266, ⟨10.1007/978-3-642-39059-3_17⟩
hal-00865699v1  Conference papers
Joerg KappesBjoern AndresFred HamprechtChristoph SchnörrSebastian Nowozin et al.  A Comparative Study of Modern Inference Techniques for Discrete Energy Minimization Problems
IEEE Conference on Computer Vision and Pattern Recognition 2013, 2013, United States. pp.1-8
hal-00912561v1  Journal articles
Pierre FraigniaudAmos KormanDavid Peleg. Local Distributed Decision
Journal of the ACM (JACM), Association for Computing Machinery, 2013, pp.35
hal-00732904v1  Conference papers
David BernhardVéronique CortierOlivier PereiraBogdan Warinschi. Measuring Vote Privacy, Revisited.
19th ACM Conference on Computer and Communications Security (CCS'12), Oct 2012, Raleigh, United States
hal-00922231v1  Conference papers
Hongbo YuJiazhe ChenXiaoyun Wang. The Boomerang Attacks on the Round-Reduced Skein-512
SAC 2012 - 19th International Conference Selected Areas in Cryptography, Aug 2012, Windsor, Canada. pp.287-303, ⟨10.1007/978-3-642-35999-6_19⟩
hal-00725839v1  Conference papers
Ittai AbrahamShiri ChechikCyril Gavoille. Fully dynamic approximate distance oracles for planar graphs via forbidden-set distance labels
44th Annual ACM Symposium on Theory of Computing (STOC), May 2012, New-York, United States. pp.1199-1217, ⟨10.1145/2213977.2214084⟩
hal-00766871v1  Journal articles
Philippe DarondeauLaurie Ricker. Distributed Control of Discrete Event Systems: A First Step
LNCS Transactions on Petri Nets and Other Models of Concurrency, Springer, 2012, 6, pp.24-45
hal-01272900v1  Book sections
Ioannis Z. EmirisVictor Y. PanElias P. Tsigaridas. Algebraic and numerical algorithms
Algorithms and Theory of Computation Handbook, CRC Press Inc., pp.1-40, 2012
hal-00650973v1  Conference papers
Philippe DarondeauLaurie Ricker. Towards Distributed Control of Discrete Event Systems
ART2011 : Workshop on Applications of Region Theory, Jun 2011, Newcastle upon Tyne, United Kingdom. pp.63-78
inria-00638464v1  Conference papers
Frédéric HavetJørgen Bang-JensenNicolas Trotignon. Finding an induced subdivision of a digraph
VI Latin-American Algorithms, Graphs and Optimization Symposium (LAGOS 2011), Apr 2011, Bariloche, Argentina. pp.09--14
hal-01101279v1  Book sections
Rien van de WeygaertGert VegterHerbert EdelsbrunnerBernard JonesPratyush Pranav et al.  Alpha, Betti and the Megaparsec Universe: On the Topology of the Cosmic Web
Transactions on Computational Science XIV, Springer, pp.60-101, 2011, Lecture Notes in Computer Science, 978-3-642-25248-8. ⟨10.1007/978-3-642-25249-5_3⟩
inria-00530964v1  Book sections
Tibor CinklerDavid CoudertMichele FlamminiGianpiero MonacoLuca Moscardelli et al.  Traffic Grooming: Combinatorial Results and Practical Resolutions.
Arie Koster and Xavier Muñoz. Graphs and Algorithms in Communication Networks: Studies in Broadband, Optical, Wireless, and Ad Hoc Networks., XXVII, Springer, pp.63-94, 2010, EATCS Texts in Theoretical Computer Science, 978-3-642-02249-4. ⟨10.1007/978-3-642-02250-0⟩
inria-00388501v1  Journal articles
Peter KornerupChristoph LauterVincent LefèvreNicolas LouvetJean-Michel Muller. Computing Correctly Rounded Integer Powers in Floating-Point Arithmetic
ACM Transactions on Mathematical Software, Association for Computing Machinery, 2010, 37 (1), pp.4:1-4:23. ⟨10.1145/1644001.1644005⟩
hal-01148162v1  Journal articles
Bernd BankMarc GiustiJoos HeintzMohab Safey El DinÉric Schost. On the geometry of polar varieties
Applicable Algebra in Engineering, Communication and Computing, Springer Verlag, 2010, 21 (1), pp.33--83. ⟨10.1007/s00200-009-0117-1⟩
hal-00408725v1  Conference papers
Bilel DerbelCyril GavoilleDavid PelegLaurent Viennot. Local Computation of Nearly Additive Spanners
DISC, Sep 2009, Elche/Elx, Spain. pp.176-190
hal-00804527v1  Conference papers
Afzal GodilHelin DutagaciCeyhun Burak AkgülApostolos AxenopoulosBenjamin Bustos et al.  SHREC'09 Track: Generic Shape Retrieval
Eurographics workshop on 3D Object Retrieval, Eurographics, Mar 2009, Munich, Germany. ⟨10.2312/3DOR/3DOR09/061-068⟩
hal-00432732v1  Conference papers
Rubén MondéjarPedro GarciaCarles PairotPascal UrsoPascal Molli. Designing a distributed AOP runtime composition model
24th Annual ACM Symposium on Applied Computing - SAC 2009, Mar 2009, Honolulu, Hawaii, United States. pp.539-540, ⟨10.1145/1529282.1529395⟩
lirmm-00324589v1  Conference papers
David BremnerJonathan LenchnerGiuseppe LiottaChristophe PaulMarc Pouget et al.  A Note on α-Drawable k-Trees
CCCG'08: Canadian Conference on Computational Geometry, Canada. pp.23-27
hal-00343001v1  Conference papers
Cyril GavoilleBilel DerbelDavid PelegLaurent Viennot. On the Locality of Distributed Sparse Spanner Construction
27th Annual ACM Symposium on Principles of Distributed Computing (PODC), Aug 2008, Toronto, Canada. pp.273-282, ⟨10.1145/1400751.1400788⟩
hal-00368035v1  Conference papers
Cyril GavoilleBilel DerbelDavid PelegLaurent Viennot. Construction locale de sous-graphes couvrants peu denses
10ièmes Rencontres francophones sur les aspects algorithmiques des télécommunications (AlgoTel), Saint-Malo, France, 2008, May 2008, France. pp.105-108
hal-00341468v1  Journal articles
Nicolas HanusseDimitris KavvadiasEvangelos KranakisDanny Krizanc. Memoryless search algorithms in a network with faulty advice
Theoretical Computer Science, Elsevier, 2008, 402 (2-3), pp.190-198
inria-00347594v1  Journal articles
Dominique LavenierXianyang JiangStephen Yau. Coding Region Prediction Based on a Universal DNA Sequence Representation Method
Journal of Computational Biology, Mary Ann Liebert, 2008, 15 (10), pp.1237-1256. ⟨10.1089/cmb.2008.0041⟩
hal-01257282v1  Directions of work or proceedings
David Chi-Leung WongAlbert CohenMaría J. GarzaránChristian LengauerSamuel P. Midkiff. Dagstuhl Seminar 13142 on Programming Models for Ubiquitous Parallelism
David Chi-Leung Wong and Albert Cohen and Mar\'ıa J. Garzarán and Christian Lengauer and Samuel P. Midkiff. 1 (1), Dagstuhl Publishing, 2007, Dagstuhl Reports
hal-00371381v1  Conference papers
Cyril GavoilleBilel DerbelDavid Peleg. Deterministic Distributed Construction of Linear Stretch Spanners in Polygarithmic Time
21rst International Symposium on Distributed Computing (DISC), Lemesos, Chypre, 2007, Sep 2007, Lemesos, Cyprus. pp.179-192, ⟨10.1007/978-3-540-75142-7_16⟩
hal-00371393v1  Journal articles
Tamar EilamCyril GavoilleDavid Peleg. Average Stretch Analysis of Compact Routing Schemes
Discrete Applied Mathematics, Elsevier, 2007, 155, pp.598-610. ⟨10.1016/j.dam.2006.09.010⟩
inria-00124270v1  Journal articles
Xiao-Shan GaoQiang LinGui-Fang Zhang. A C-tree decomposition algorithm for 2D and 3D geometric constraint solving
Computer-Aided Design, Elsevier, 2006, Computer-Aided Design, 38 (1), pp.1--13. ⟨10.1016/j.cad.2005.03.002⟩
inria-00170535v1  Directions of work or proceedings
Bernard MourrainIoannis Z. EmirisVictor Y. Pan. Special Issue on Algebraic and Numerical Algorithms
Emiris, I. and Mourrain, B. and Pan, Y. V. 315, Elsevier, pp.310, 2004
inria-00505518v1  Journal articles
Jean-Claude BermondCharles J. ColbournAlan C H LingMin-Li Yu. Grooming in unidirectional rings : $K_4 -e$ designs.
Discrete Mathematics, Elsevier, 2004, 284 (1-3), pp.57-62