Skip to Main content Skip to Navigation

hal-02423973v2  Journal articles
Moreno FalaschiMaurizio GabbrielliCarlos OlarteCatuscia Palamidessi. Dynamic slicing for Concurrent Constraint Languages
Fundamenta Informaticae, Polskie Towarzystwo Matematyczne, 2020, 177 (3-4), pp.331-357. ⟨10.3233/FI-2020-1992⟩
hal-03035419v1  Conference papers
Jørgen Bang-JensenJonas Ferreira da SilvaFrédéric Havet. Inversion number of an oriented graph and related parameters
ALGOS 2020 - 1st International Conference on Algebras, Graphs and Ordered Sets, Aug 2020, Nancy / Virtual, France
hal-02917644v1  Conference papers
Graeme ZinckLaurie RickerHervé MarchandLoïc Hélouët. Enforcing Opacity in Modular Systems
IFAC 2020 - Ifac world Congress, Nov 2020, Virtual, Germany. pp.1-8
hal-02864914v1  Journal articles
Stefan KölblElmar TischhauserPatrick DerbezAndrey Bogdanov. Troika: a ternary cryptographic hash function
Designs, Codes and Cryptography, Springer Verlag, 2020, 88 (1), pp.91-117. ⟨10.1007/s10623-019-00673-2⟩
hal-01400682v1  Conference papers
M. FerociE. BozzoS. BrandtM. HernanzM. van der Klis et al.  The LOFT mission concept: a status update
2016SPIE.9905E.1RF - Proceedings of the SPIE, Space Telescopes and Instrumentation 2016: Ultraviolet to Gamma Ray - Volume 9905, id. 99051R 20 pp. (2016), held 30-06 au 01-07-2016 in Edimbourg - Ecosse, Jun 2016, Edinburgh, United Kingdom. ⟨10.1117/12.2233161⟩
hal-01851462v1  Journal articles
Kathrin SmetanaOlivier ZahmAnthony T Patera. Randomized residual-based error estimators for parametrized equations
SIAM Journal on Scientific Computing, Society for Industrial and Applied Mathematics, 2019, 41 (2), pp.A900-A926. ⟨10.1137/18M120364X⟩
hal-01196827v1  Book sections
Robert BasmadjianPascal BouvryGeorges da CostaLászló GyarmatiDzmitry Kliazovich et al.  Green Data Centers
Large-Scale Distributed Systems and Energy Efficiency, Wiley, pp.159-196, 2015, ⟨10.1002/9781118981122.ch6⟩
hal-02372730v1  Directions of work or proceedings
Eitan AltmanKonstantin AvrachenkovFrancesco de PellegriniRachid ElazouziHuijuan Wang. Multilevel Strategic Interaction Game Models for Complex Networks
Altman, Eitan; Avrachenkov, Konstantin E; De Pellegrini, Francesco; El-Azouzi, Rachid; Wang, Huijuan. Springer International Publishing, 2019, ⟨10.1007/978-3-030-24455-2⟩
hal-02283189v1  Conference papers
Josu DoncelNicolas GastMirco TribastoneMax TschaikowskiAndrea Vandin. UTOPIC: Under-Approximation Through Optimal Control
QEST 2019 - 16th International Conference on Quantitative Evaluation of SysTems, Sep 2019, Glasgow, United Kingdom. pp.277-291, ⟨10.1007/978-3-030-30281-8_16⟩
hal-01985374v2  Conference papers
Umberto BosiAllan P. Engsig-KarupClaes EskilssonMario RicchiutoElie Solai. A high-order spectral element unified boussinesq model for floating point absorbers
36th International Conference on Coastal Engineering, Jul 2018, Baltimore, United States. pp.57
hal-01912958v1  Conference papers
Maurizio GabbrielliSaverio GiallorenzoIvan LaneseStefano Zingaro. A Language-based Approach for Interoperability of IoT Platforms
Hawaii International Conference on System Science, Nov 2018, Waikoloa Village, United States
hal-01879108v1  Conference papers
Shohreh AhvarJagruti SahooEhsan AhvarMouhamad DieyeRoch Glitho et al.  PCPV: Pattern-based Cost-efficient Proactive VNF placement and chaining for value-added services in content delivery networks
NETSOFT 2018: 4th IEEE Conference on Network Softwarization and Workshops, Jun 2018, Montreal, Canada. pp.313-317, ⟨10.1109/NETSOFT.2018.8459986⟩
hal-01627391v2  Journal articles
Anthony BonatoNancy ClarkeDanielle CoxStephen FinbowFionn Mc Inerney et al.  Hyperopic Cops and Robbers
Theoretical Computer Science, Elsevier, 2019, 794, pp.59-68
hal-01886156v1  Conference papers
Loïc HélouëtHervé MarchandLaurie Ricker. Opacity with powerful attackers
WODES 2018 - 14th IFAC Workshop on Discrete Event Systems, May 2018, Sorrento, Italy. pp.464 - 471, ⟨10.1016/j.ifacol.2018.06.341⟩
hal-01872303v1  Conference papers
Ali MarandiTorsten BraunKavé SalamatianNikolaos Thomos. A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks
IEEE Symposium on Computer Communications (ISCC'18)., Jun 2018, Natal, Brazil
hal-01378906v2  Conference papers
Cyril CohenThierry CoquandSimon HuberAnders Mörtberg. Cubical Type Theory: a constructive interpretation of the univalence axiom
21st International Conference on Types for Proofs and Programs, May 2015, Tallinn, Estonia. pp.262, ⟨10.4230/LIPIcs.TYPES.2015.5⟩
hal-01529154v2  Journal articles
David BremnerOlivier DevillersMarc GlisseSylvain LazardGiuseppe Liotta et al.  Monotone Simultaneous Paths Embeddings in $\mathbb{R}^d$
Discrete Mathematics and Theoretical Computer Science, DMTCS, 2018, 20 (1), pp.1-11. ⟨10.23638/DMTCS-20-1-1⟩
hal-01535513v2  Journal articles
Elise BarelliPeter BeelenMrinmoy DattaVincent NeigerJohan Rosenkilde. Two-Point Codes for the Generalized GK Curve
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, In press, ⟨10.1109/TIT.2017.2763165⟩
hal-01590438v1  Conference papers
Laurie RickerT LidbetterHervé Marchand. Inferencing and beyond: further adventures with parity-based architectures for decentralized discrete-event systems
20th World Congress The International Federation of Automatic Control, Jul 2017, Toulouse, France. pp.6
hal-01457979v2  Conference papers
Vincent NeigerThi Xuan Vu. Computing Canonical Bases of Modules of Univariate Relations
ISSAC '17 - 42nd International Symposium on Symbolic and Algebraic Computation, Jul 2017, Kaiserslautern, Germany. pp.8
hal-00867040v5  Journal articles
Claude-Pierre JeannerodPeter KornerupNicolas LouvetJean-Michel Muller. Error bounds on complex floating-point multiplication with an FMA
Mathematics of Computation, American Mathematical Society, 2017, 86 (304), pp. 881-898. ⟨10.1090/mcom/3123⟩
hal-01421407v1  Conference papers
Moreno FalaschiMaurizio GabbrielliCarlos OlarteCatuscia Palamidessi. Slicing Concurrent Constraint Programs
Pre-proceedings of the 26th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2016), 2016, Edinburgh, United Kingdom
hal-00749187v1  Journal articles
Jørgen Bang-JensenFrédéric HavetNicolas Trotignon. Finding an induced subdivision of a digraph.
Theoretical Computer Science, Elsevier, 2012, 443, pp.10--24
hal-01111374v1  Journal articles
Jørgen Bang-JensenFrédéric HavetAna Karolinna Maia de Oliviera. Finding a subdivision of a digraph
Theoretical Computer Science, Elsevier, 2015, 562, pp.20
hal-01378341v1  Conference papers
Zvika BrakerskiDavid CashRotem TsabaryHoeteck Wee. Targeted Homomorphic Attribute-Based Encryption
14th International Conference, TCC 2016-B, Oct 2016, Beijing, China. pp.330-360
hal-01373709v1  Conference papers
Laurie RickerHervé Marchand. Finding the weakest link(s): Coalition games for decentralized discrete-event control
55th IEEE Conference on Decision and Control , Dec 2016, Las-Vegas, United States
hal-01366148v1  Conference papers
David BremnerOlivier DevillersMarc GlisseSylvain LazardGiuseppe Liotta et al.  Monotone Simultaneous Paths Embeddings in $\mathbb{R}^d$
24th International Symposium on Graph Drawing & Network Visualization, Sep 2016, Athens, Greece
hal-01175756v3  Journal articles
Emma BarmeJulien BensmailJakub PrzybyłoMariusz Woźniak. On a directed variation of the 1-2-3 and 1-2 Conjectures
Discrete Applied Mathematics, Elsevier, 2017, 217 (2), pp.123-131
hal-01341060v1  Conference papers
Ouassim BaraMichel FliessCédric JoinJudy DaySeddik Djouadi. Model-free immune therapy: A control approach to acute inflammation
15th European Control Conference, ECC'16, Jun 2016, Aalborg, Denmark
hal-01326779v1  Conference papers
David EppsteinPhilipp KindermannStephen KobourovGiuseppe LiottaAnna Lubiw et al.  On the Planar Split Thickness of Graphs
LATIN 2016: Theoretical Informatics: 12th Latin American Symposium, Apr 2016, Ensenada, Mexico. pp.403-415, ⟨10.1007/978-3-662-49529-2_30⟩
hal-01147155v2  Reports
Guillaume AupyJulien HerrmannPaul HovlandYves Robert. Optimal Multistage Algorithm for Adjoint Computation
[Research Report] RR-8721, LIP - ENS Lyon; Argonne National Laboratory; INRIA; Vanderbilt University. 2014
hal-01279332v1  Reports
Jørgen Bang-JensenFrédéric Havet. Finding good 2-partitions of digraphs I. Hereditary properties
[Research Report] RR-8867, INRIA Sophia Antipolis - I3S. 2016
hal-01273718v1  Reports
Matthieu DorierRobert SisnerosLeonardo Bautista-GomezTom PeterkaLeigh Orf et al.  Performance-Constrained In Situ Visualization of Atmospheric Simulations
[Research Report] RR-8855, INRIA Rennes - Bretagne Atlantique. 2016, pp.27
hal-01272900v1  Book sections
Ioannis Z. EmirisVictor Y. PanElias P. Tsigaridas. Algebraic and numerical algorithms
Algorithms and Theory of Computation Handbook, CRC Press Inc., pp.1-40, 2012
hal-01271650v1  Book sections
Davide ChiarugiMoreno FalaschiCarlos OlarteCatuscia Palamidessi. A Declarative View of Signaling Pathways
Chiara Bodei; Gian Luigi Ferrari; Corrado Priami. Programming Languages with Applications to Biology and Security, 9465, Springer, pp.183-201, 2015, Lecture Notes in Computer Science, 978-3-319-25526-2
hal-01257282v1  Directions of work or proceedings
David Chi-Leung WongAlbert CohenMaría J. GarzaránChristian LengauerSamuel P. Midkiff. Dagstuhl Seminar 13142 on Programming Models for Ubiquitous Parallelism
David Chi-Leung Wong and Albert Cohen and Mar\'ıa J. Garzarán and Christian Lengauer and Samuel P. Midkiff. 1 (1), Dagstuhl Publishing, 2007, Dagstuhl Reports
hal-01241081v1  Conference papers
Elena AndreevaBegül BilginAndrey BogdanovAtul LuykxFlorian Mendel et al.  PRIMATEs v2.0
DIAC 2015 - Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
hal-01206289v1  Conference papers
David BernhardVéronique CortierDavid GalindoOlivier PereiraBogdan Warinschi. A comprehensive analysis of game-based ballot privacy definitions
36th IEEE Symposium on Security and Privacy (S&P'15), May 2015, San Jose, United States. ⟨10.1109/SP.2015.37⟩
hal-01204628v1  Conference papers
Stojan TrajanovskiFernando Antonio KuipersYezekael HayelEitan AltmanPiet van Mieghem. Designing virus-resistant networks: a game-formation approach
IEEE 54th Annual Conference on Decision and Control (CDC), Dec 2015, Osaka, Japan
hal-01204599v1  Conference papers
Gaëtan GilbertOlivier Hermant. Normalization by Completeness with Heyting Algebras
LPAR 20 : 20th International Conference on Logic for Programming, Artificial Intelligence and Reasoning, Nov 2015, Suva, Fiji
hal-01194847v1  Conference papers
Jurek CzyzowiczLeszek GasieniecAdrian KosowskiEvangelos KranakisDanny Krizanc et al.  When Patrolmen Become Corrupted: Monitoring a Graph using Faulty Mobile Robots
26th International Symposium on Algorithms and Computation (ISAAC 2015), Proceedings, Dec 2015, Nagoya, Japan. pp.343-354, ⟨10.1007/978-3-662-48971-0_30⟩
hal-01185566v1  Conference papers
Philippe JacquetCharles KnesslWojciech Szpankowski. Counting Markov Types
21st International Meeting on Probabilistic, Combinatorial, and Asymptotic Methods in the Analysis of Algorithms (AofA'10), 2010, Vienna, Austria. pp.387-400, ⟨10.1109/TIT.2012.2191476⟩
hal-01148162v1  Journal articles
Bernd BankMarc GiustiJoos HeintzMohab Safey El DinÉric Schost. On the geometry of polar varieties
Applicable Algebra in Engineering, Communication and Computing, Springer Verlag, 2010, 21 (1), pp.33--83. ⟨10.1007/s00200-009-0117-1⟩
hal-01101279v1  Book sections
Rien van de WeygaertGert VegterHerbert EdelsbrunnerBernard JonesPratyush Pranav et al.  Alpha, Betti and the Megaparsec Universe: On the Topology of the Cosmic Web
Transactions on Computational Science XIV, Springer, pp.60-101, 2011, Lecture Notes in Computer Science, 978-3-642-25248-8. ⟨10.1007/978-3-642-25249-5_3⟩
hal-01088664v1  Reports
Jørgen Bang-JensenFrédéric HavetAnders Yeo. The complexity of finding arc-disjoint branching flows
[Research Report] RR-8640, INRIA Sophia Antipolis; INRIA. 2014
hal-01079368v1  Conference papers
Szabolcs IvánÁdám LelkesJudit Nagy-GyörgyBalázs SzörényiGyörgy Turán. Biclique Coverings, Rectifier Networks and the Cost of ε-Removal
16th International Workshop on Descriptional Complexity of Formal Systems, Proceedings, Aug 2014, Turku, Finland. pp.174 - 185, ⟨10.1007/978-3-319-09704-6_16⟩
hal-01058073v1  Conference papers
Thanh-Do TranRamiro VarelaInés González-RodríguezEl-Ghazali Talbi. Solving Fuzzy Job-Shop Scheduling Problems with a Multiobjective Optimizer
The Fifth International Conference on Knowledge and Systems Engineering (KSE), Oct 2013, Hanoi, Vietnam. ⟨10.1007/978-3-319-02821-7_19⟩
hal-01054710v1  Conference papers
Yezekael HayelStojan TrajanovskiEitan AltmanHuijuan WangPiet van Mieghem. Complete game-theoretic characterization of SIS epidemics protection strategies
IEEE 53rd Annual Conference on Decision and Control (CDC 2014), Dec 2014, Los Angeles, United States
hal-01018734v1  Book sections
Amel BennaceurRobert FranceGiordano TamburrelliThomas VogelPieter J. Mosterman et al.  Mechanisms for Leveraging Models at Runtime in Self-adaptive Software
Nelly Bencomo; Robert France; Betty H. Cheng; Uwe Assmann. Models@run.time, 8378, Springer, pp.19-46, 2014, Lecture Notes in Computer Science, 978-3-319-08914-0. ⟨10.1007/978-3-319-08915-7_2⟩
hal-00980584v1  Conference papers
Victor Y. PanElias Tsigaridas. Accelerated Approximation of the Complex Roots of a Univariate Polynomial (Extended Abstract)
SNC '14 - Symposium on Symbolic-Numeric Computation, Jul 2014, Shanghai, China. pp.132-134, ⟨10.1145/2631948.2631973⟩
hal-00980591v1  Conference papers
Victor Y. PanElias Tsigaridas. Nearly Optimal Computations with Structured Matrices
SNC '14 - Symposium on Symbolic-Numeric Computation, Jul 2014, Shanghai, China. pp.21-30, ⟨10.1145/2631948.2631954⟩
hal-00974335v2  Book sections
Michael WybrowNiklas ElmqvistJean-Daniel FeketeTatiana von LandesbergerJarke van Wijk et al.  Interaction in the Visualization of Multivariate Networks
Kerren, Andreas; Purchase, Helen; Ward, Matthew O. Multivariate Network Visualization, 8380, Springer, pp.XV, 237, 2014, Lecture Notes in Computer Science, 978-3-319-06792-6
hal-00963520v1  Poster communications
Kevin BuchinOlivier DevillersWolfgang MulzerOkke SchrijversJonathan Shewchuk. Vertex Deletion for 3D Delaunay Triangulations
ACM. Symposium on Theory of Computing, 2013, Palo Alto, United States. 2013
hal-00945462v1  Journal articles
Moreno FalaschiCarlos OlarteCatuscia Palamidessi. Abstract Interpretation of Temporal Concurrent Constraint Programs
Theory and Practice of Logic Programming, Cambridge University Press (CUP), 2015, 15 (3), pp.312-357