Skip to Main content Skip to Navigation

tel-00004633v1  Theses
Romuald Ginhoux. Compensation des mouvements physiologiques en chirurgie robotisée par commande prédictive
Automatique / Robotique. Université Louis Pasteur - Strasbourg I, 2003. Français
inria-00000408v1  Conference papers
Alessandro ArmandoDavid BasinYohan BoichutYannick ChevalierLuca Compagna et al.  The AVISPA Tool for the automated validation of internet security protocols and applications
17th International Conference on Computer Aided Verification - CAV 2005, Jul 2005, Edinburgh, Scotland/UK, France. pp.281-285
inria-00000409v1  Directions of work or proceedings
Laurent Vigneron. Proceedings of the 19th International Workshop on Unification
A05-R-022 (A05-R-022), LORIA, pp.143, 2005
inria-00000426v1  Journal articles
Abdessamad ImineMichaël RusinowitchGérald OsterPascal Molli. Formal Design and Verification of Operational Transformation Algorithms for Copies Convergence
Theoretical Computer Science, Elsevier, 2006, Algebraic Methodology and Software Technology, 351 (2), pp.167--183. ⟨10.1016/j.tcs.2005.09.066⟩
inria-00000427v1  Conference papers
Abdessamad IminePascal MolliGérald OsterMichaël Rusinowitch. Towards Synchronizing Linear Collaborative Objects with Operation Transformation
International Conference on Formal Techniques for Networked and Distributed Systems - FORTE 2005, Oct 2005, Taipei/Taiwan, pp.411-427
inria-00000428v1  Conference papers
Gérald OsterPascal UrsoPascal MolliAbdessamad Imine. Edition collaborative sur réseau pair-à-pair à large échelle
Journées Francophones sur la Cohérence des Données en Univers Réparti - CDUR 2005, Nov 2005, Paris/France, pp.42-47
inria-00000481v1  Conference papers
Pascal FontaineSilvio RaniseCalogero Zarba. Combining Lists with Non-Stably Infinite Theories
11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'04), Mar 2005, Montevideo/Uruguay, pp.51--66, ⟨10.1007/b106931⟩
inria-00000553v1  Journal articles
Hubert Comon-LundhVéronique Cortier. Tree automata with one memory, set constraints and cryptographic protocols
Theoretical Computer Science, Elsevier, 2005, 331 (1), pp.143-214
inria-00000554v1  Conference papers
Martin AbadiVéronique Cortier. Deciding knowledge in security protocols under (many more) equational theories
CSFW 2005 - 18th IEEE Computer Security Foundations Workshop, Jun 2005, Aix-en-Provence, France. pp.62-76, ⟨10.1109/CSFW.2005.14⟩
inria-00000555v1  Conference papers
Mathieu BaudetVéronique CortierSteve Kremer. Computationally Sound Implementations of Equational Theories against Passive Adversaries
32nd International Colloquium on Automata, Languages and Programming - ICALP 2005, Jul 2005, Lisbonne/Portugal, pp.652-663, ⟨10.1007/11523468⟩
inria-00000556v1  Conference papers
Véronique CortierBogdan Warinschi. Computationally Sound, Automated Proofs for Security Protocols
14th European Symposium on Programming - ESOP 2005, Apr 2005, Edinburgh/United Kingdom, pp.157-171, ⟨10.1007/b107380⟩
inria-00000557v1  Conference papers
Véronique CortierMichaël RusinowitchEugen Zalinescu. A resolution Strategy for Verifying Cryptographic Protocols with CBC Encryption and Blind Signatures
7th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming - PPDP'05, Jul 2005, Lisbonne/Portugal, pp.12-22
inria-00000570v1  Conference papers
Silvio RaniseChristophe RingeissenCalogero Zarba. Combining data structures with nonstably infinite theories using many-sorted logic
5th International Workshop on Frontiers of Combining Systems - FroCoS'05, Sep 2005, Vienna/Austria, pp.48--64, ⟨10.1007/11559306⟩
inria-00000586v1  Conference papers
Hélène KirchnerSilvio RaniseChristophe RingeissenDuc-Khanh Tran. On Superposition-Based Satisfiability Procedures and their Combination
2nd International Colloquium on Theoretical Aspects of Computing - ICTAC'05, Oct 2005, Hanoi/Vietnam, pp.594--608, ⟨10.1007/11560647⟩
inria-00000606v1  Conference papers
Najah ChridiLaurent Vigneron. Modélisation des propriétés de sécurité de protocoles de groupe
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes, CRiSIS, Oct 2005, Bourges, France, pp.119-132
inria-00000607v1  Conference papers
Judson Santos SantiagoLaurent Vigneron. Study for Automatically Analysing Non-repudiation
1er Colloque sur les Risques et la Sécurité d'Internet et des Systèmes- CRiSIS 2005, Oct 2005, Bourges/France, pp.157--171
hal-00013870v1  Journal articles
Pascal HebrardAntoine Henrot. A spillover phenomenon in the optimal location of actuators
SIAM Journal on Control and Optimization, Society for Industrial and Applied Mathematics, 2005, 44 (1), pp.349--366. ⟨10.1137/S0363012903436247⟩
inria-00000889v1  Journal articles
Patricio CumsilleMarius Tucsnak. Wellposedness for the Navier-Stokes flow in the exterior of a rotating obstacle
Mathematical Methods in the Applied Sciences, Wiley, 2006, 29 (5), pp.595--623. ⟨10.1002/mma.702⟩
inria-00000894v1  Conference papers
Takéo TakahashiMarius TucsnakKarim Ramdani. Internal and boundary controllability of the plate equation and of the Schrödinger equation
44th IEEE Conference on Decision and Control and European Control Conference ECC 2005, Dec 2005, Séville, Spain
hal-00020156v1  Journal articles
Céline BarangerGérard BaudinLaurent BoudinBruno DesprésFrédéric Lagoutière et al.  Liquid jet generation and break-up
IRMA - Lectures in Mathematics and Theoretical Physics, EMS, 2005, 7, pp.149-176. ⟨10.4171/012-1/8⟩