Skip to Main content Skip to Navigation

hal-02096764v1  Journal articles
Angela BonifatiUgo ComignaniEmmanuel CoqueryRomuald Thion. Interactive Mapping Specification with Exemplar Tuples
ACM Transactions on Database Systems, Association for Computing Machinery, 2019, 44 (3), pp.44
hal-02948164v1  Conference papers
Clément MalletFlorent LafargeMartyna PorebaE RupnikGaétan Bahl et al.  Preface: the 2020 edition of the XXIVth ISPRS congress
ISPRS 2020 - XXIVTH edition of the International Society for Photogrammetry and Remote Sensing, 2020, Nice / Virtual, France. pp.1-6, ⟨10.5194/isprs-annals-V-1-2020-1-2020⟩
hal-02138771v1  Conference papers
Angela BonifatiPeter FurnissAlastair GreenRuss HarmerEugenia Oshurko et al.  Schema validation and evolution for graph databases
ER 2019 - 38th International Conference on Conceptual Modeling, Nov 2019, Salvador, Brazil. pp.448-456, ⟨10.1007/978-3-030-33223-5_37⟩
hal-02435371v1  Journal articles
Angela BonifatiIrena HolubovàArnau Prat-PérezSherif Sakr. Graph Generators: State of the Art and Open Challenges
ACM Computing Surveys, Association for Computing Machinery, In press
hal-02096714v1  Conference papers
Angela BonifatiWim MartensThomas Timm. Navigating the Maze of Wikidata Query Logs
WWW 2019 - The World Wide Web Conference, May 2019, San Francisco, United States. pp.127-138, ⟨10.1145/3308558.3313472⟩
hal-02435355v1  Journal articles
Guillaume BaganAngela BonifatiBenoit Groz. A trichotomy for regular simple path queries on graphs
Journal of Computer and System Sciences, Elsevier, In press, 108, pp.29-48. ⟨10.1016/j.jcss.2019.08.006⟩
hal-02948678v1  Conference papers
Michel AbdallaManuel BarbosaTatiana BradleyStanisław JareckiJonathan Katz et al.  Universally Composable Relaxed Password Authenticated Key Exchange
CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.278-307, ⟨10.1007/978-3-030-56784-2_10⟩
hal-02948674v1  Conference papers
Michel AbdallaJunqing GongHoeteck Wee. Functional Encryption for Attribute-Weighted Sums from k-Lin
Advances in Cryptology – CRYPTO 2020, Aug 2020, Santa Barbara / Virtual, United States. pp.685-716, ⟨10.1007/978-3-030-56784-2_23⟩
hal-02948657v1  Conference papers
Michel AbdallaFlorian BourseHugo MarivalDavid PointchevalAzam Soleimanian et al.  Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
SCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩
hal-02948569v1  Journal articles
L. BecchettiA. ClementiEmanuele NataleF. PasqualeG. Posta. Self-stabilizing repeated balls-into-bins
Distributed Computing, Springer Verlag, 2019, 32 (1), pp.59-68. ⟨10.1007/s00446-017-0320-4⟩
hal-02948430v1  Patents
Rallou ThomopoulosJulien CufiMaxime Le BretonBosch Thomas. MyChoice software
France, Patent n° : IDDN.FR.001.280002.000.R.P.2020.000.20900. 2020
hal-01891182v1  Conference papers
Jérôme DavidJérôme EuzenatPierre GenevèsNabil Layaïda. Evaluation of Query Transformations without Data
WWW 2018 - Companion of The Web Conference, Apr 2018, Lyon, France. pp.1599-1602, ⟨10.1145/3184558.3191617⟩
hal-02948081v1  Reports
Julien BraineLaure Gonnord. Proving array properties using data abstraction
[Research Report] ENS Lyon, CNRS & INRIA. 2020
hal-02947251v1  Conference papers
Meghyn BienvenuCamille Bourgaux. Querying and Repairing Inconsistent Prioritized Knowledge Bases: Complexity Analysis and Links with Abstract Argumentation
KR 2020 - 17th International Conference on Principles of Knowledge Representation and Reasoning, Sep 2020, Rhodes / Virtual, Greece. pp.141-151, ⟨10.24963/kr.2020/15⟩
hal-02946930v2  Reports
Guillaume AmbalAlan SchmittSergueï Lenglet. Automatic Transformation of a Big-Step Skeletal Semantics into Small-Step
[Research Report] RR-9363, Inria Rennes - Bretagne Atlantique. 2020
hal-02947289v1  Journal articles
Jorge Corral-AceroFrancesca MargaraMaciej MarciniakCristobal RoderoFilip Loncaric et al.  The 'Digital Twin' to enable the vision of precision cardiology
European Heart Journal Supplements, Oxford University Press (OUP), In press, pp.1 - 11. ⟨10.1093/eurheartj/ehaa159⟩
tel-02947853v1  Theses
Julien Grange. On the Expressive Power of Invariant Logics over Sparse Classes of Structures
Logic in Computer Science [cs.LO]. ENS Paris, 2020. English
hal-02947359v1  Conference papers
Jérémy ChotardEdouard Dufour-SansRomain GayDuong Hieu PhanDavid Pointcheval. Dynamic Decentralized Functional Encryption
CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.747-775, ⟨10.1007/978-3-030-56784-2_25⟩
hal-02947353v1  Conference papers
Chloé HébantDuong Hieu PhanDavid Pointcheval. Linearly-Homomorphic Signatures and Scalable Mix-Nets
PKC 2020 - IACR International Conference on Practice and Theory of Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.597-627, ⟨10.1007/978-3-030-45388-6_21⟩
hal-02947265v1  Conference papers
Camille BourgauxAna OzakiRafael PeñalozaLivia Predoiu. Provenance for the Description Logic ELHr (Extended Abstract)
DL 2020 - 33rd International Workshop on Description Logics, Sep 2020, Rhodes / Virtual, Greece
hal-02947245v1  Conference papers
Yujiro OkuyaOlivier GladinNicolas LadevèzeCédric FleuryPatrick Bourdot. Investigating Collaborative Exploration of Design Alternatives on a Wall-Sized Display
CHI 2020 - ACM Conference on Human Factors in Computing Systems, Apr 2020, Honolulu, United States. pp.1-12, ⟨10.1145/3313831.3376736⟩
tel-02947185v1  Theses
Michele Orrù. Non-interactive arguments of knowledge
Cryptography and Security [cs.CR]. ENS Paris, 2020. English
hal-02947172v1  Conference papers
Luc SegoufinVictor Vianu. Projection Views of Register Automata
PODS'20: Proceedings of the 39th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, Jun 2020, Portland / Virtual, United States. pp.299-313, ⟨10.1145/3375395.3387651⟩
hal-02947058v1  Conference papers
Othmane BelmoukadamChadi Barakat. From Encrypted Video Traces to Viewport Classification
CNSM 2020 - 16th International Conference on Network and Service Management, Nov 2020, Virtual Conference, France
tel-02947051v1  Theses
Valentin Le Fevre. Resilient scheduling algorithms for large-scale platforms
Distributed, Parallel, and Cluster Computing [cs.DC]. Université de Lyon, 2020. English. ⟨NNT : 2020LYSEN019⟩
tel-02947048v1  Theses
Adrien Durier. Unique solution techniques for processes and functions
Programming Languages [cs.PL]. Université de Lyon; Università degli studi (Bologne, Italie), 2020. English. ⟨NNT : 2020LYSEN016⟩
hal-02947036v1  Conference papers
Fabio PizzatiPietro CerriRaoul de Charette. Model-based occlusion disentanglement for image-to-image translation
ECCV 2020 - European Conference on Computer Vision, Aug 2020, Glasgow / Virtual, United Kingdom
hal-02946949v1  Conference papers
Francis BordeleauBenoit CombemaleRomina EramoMark van den BrandManuel Wimmer. Towards Model-Driven Digital Twin Engineering: Current Opportunities and Future Challenges
ICSMM 2020 - International Conference on Systems Modelling and Management, Jun 2020, Bergen, Norway
hal-02946900v1  Conference papers
Lauren SauvanNatacha StolowyCarlos AguilarThomas FrançoisNúria Gala et al.  Text Simplification to Help Individuals With Low Vision Read More Fluently
LREC 2020 - Language Resources and Evaluation Conference, May 2020, Marseille, France. pp.11 - 16
hal-02946702v1  Conference papers
Long LiEtienne MéminDeremble Bruno. Stochastic modeling of the oceanic mesoscale eddies
Stochastic Transport in Upper Ocean Dynamics Workshop, Sep 2020, London, United Kingdom
hal-01522901v2  Conference papers
Caroline CollangeNicolas Brunie. Parcours par liste de chemins : une nouvelle classe de mécanismes de suivi de flot SIMT
ComPAS 2017 - Conférence d’informatique en Parallélisme, Architecture et Système, Jun 2017, Sophia Antipolis, France
hal-02946587v1  Poster communications
Lijie YaoAnastasia BezerianosPetra Isenberg. Situated Visualization in Motion
IEEE VIS 2020, Oct 2020, Salt Lake City, United States
hal-02882229v2  Conference papers
Sylvain GuyStéphane LathuilièrePablo MesejoRadu Horaud. Learning Visual Voice Activity Detection with an Automatically Annotated Dataset
International Conference on Pattern Recognition, Jan 2021, Milano, Italy
tel-02946569v1  Theses
Suelen Gasparin. Numerical methods for predicting heat and moisture transfer through porous building materials
Mathematical Physics [math-ph]. Université Grenoble Alpes; Pontifícia universidade católica do Paraná, 2019. Portuguese. ⟨NNT : 2019GREAM077⟩
tel-02946399v1  Theses
Mélissa Rossi. Extended Security of Lattice-Based Cryptography
Cryptography and Security [cs.CR]. Équipe CASCADE, Département d'Informatique de l'ENS de Paris; Université PSL, 2020. English
hal-02945929v1  Poster communications
Raphael CouronnéArnaud ValladierMarie VidhailletJean Christophe CorvolStéphane Lehéricy et al.  Modeling the progression of Parkinson's Disease: comparison of subjects with and without Sleep Disorders
CompAge - Computational approaches for ageing and age-related diseases, Sep 2020, Paris, France
hal-02945886v1  Conference papers
Mohamadou Malal DialloMark PotseRémi DuboisYves Coudière. Solving the ECGI problem with known locations of scar regions
CinC 2020 - Computing in Cardiology, Sep 2020, Rimini / Virtual, Italy
hal-02945690v1  Poster communications
Brahim BelaouchaThéodore Papadopoulo. Using Structural Connectivity to Reconstruct Brain Activation and Effective Connectivity
Organization for Human Brain Mapping annual Meeting, Jun 2020, Montreal, Canada. 2020
hal-02945405v1  Conference papers
Adrien GausseranFrédéric GiroireB. JaumardJoanna Moulierac. Be Scalable and Rescue My Slices During Reconfiguration
ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Jun 2020, Dublin, Ireland. pp.1-6, ⟨10.1109/ICC40277.2020.9148871⟩
hal-02945382v1  Book sections
Alexis JolyHervé GoëauStefan KahlBenjamin DeneuWillem-Pier Vellinga et al.  Overview of LifeCLEF 2020: A System-Oriented Evaluation of Automated Species Identification and Species Distribution Prediction
Experimental IR Meets Multilinguality, Multimodality, and Interaction. 11th International Conference of the CLEF Association, CLEF 2020, Thessaloniki, Greece, September 22–25, 2020, Proceedings, 12260, Springer, pp.342-363, 2020, Lecture Notes in Computer Science, 978-3-030-58218-0. ⟨10.1007/978-3-030-58219-7_23⟩
hal-02945354v1  Journal articles
Mathieu AndreuxTomás AnglesGeorgios ExarchakisRoberto LeonarduzziGaspar Rochette et al.  Kymatio: Scattering Transforms in Python
Journal of Machine Learning Research, Microtome Publishing, 2020, 21 (60), pp.1-6
hal-02945325v1  Conference papers
Luiz Alberto Serafim GuardiniAnne SpalanzaniChristian LaugierPhilippe MartinetAnh-Lam Do et al.  Employing Severity of Injury to Contextualize Complex Risk Mitigation Scenarios
IEEE IV 2020 – 2020 IEEE Intelligent Vehicles Symposium, Oct 2020, Las Vegas (Virtual), United States
hal-02944908v1  Conference papers
Patrick DerbezPaul HuynhVirginie LallemandMaría Naya-PlasenciaLéo Perrin et al.  Cryptanalysis Results on Spook: Bringing Full-round Shadow-512 to the Light
Advances in Cryptology – CRYPTO 2020, Aug 2020, Santa Barbara / Virtual, United States. ⟨10.1007/978-3-030-56877-1_13⟩
hal-02944825v1  Conference papers
Guilhem CastagnosDario CatalanoFabien LaguillaumieFederico SavastaIda Tucker. Bandwidth-Efficient Threshold EC-DSA
PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Jun 2020, Edinburgh / Virtual, United Kingdom. pp.266-296, ⟨10.1007/978-3-030-45388-6_10⟩
hal-02368832v1  Journal articles
Lucca HirschiDavid BaeldeStéphanie Delaune. A method for unbounded verification of privacy-type properties
Journal of Computer Security, IOS Press, 2019, 27 (3), pp.277-342. ⟨10.3233/JCS-171070⟩
hal-02368842v1  Book sections
David BasinLucca HirschiRalf Sasse. Symbolic Analysis of Identity-Based Protocols
Springer. Foundations of Security, Protocols, and Equational Reasoning, Springer (11565), pp.112-134, 2019, LNCS, ⟨10.1007/978-3-030-19052-1_9⟩
hal-01951956v2  Journal articles
Julien LavauzelleRazane TajeddineRagnar Freij-HollantiCamilla Hollanti. Private Information Retrieval Schemes with Product-Matrix MBR Codes
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2021, 16, pp.441-450. ⟨10.1109/TIFS.2020.3003572⟩
hal-02944663v1  Conference papers
Sandra RasoamiaramananaGilles Macario-RatMarine Minier. White-Box Traitor-Tracing from Tardos Probabilistic Codes
SecITC 2019: Innovative Security Solutions for Information Technology and Communications, Nov 2019, Bucharest, Romania. pp.125-141, ⟨10.1007/978-3-030-41025-4_9⟩
hal-02944654v1  Conference papers
Sandra RasoamiaramananaMarine MinierGilles Macario-Rat. A White-Box Encryption Scheme using Physically Unclonable Functions
17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.279-286, ⟨10.5220/0009781002790286⟩
hal-02942953v1  Poster communications
Jiayi HongFerran ArgelaguetAlain TrubuilTobias Isenberg. An Interactive System for Analyzing Plant Embryo Cell Division
Posters of IEEE Visualization, Oct 2020, Salt Lake City, United States. 2020
hal-02944531v1  Conference papers
Ali AtiIslam BoussaadaSilviu-Iulian NiculescuPierre-Henry Poret. Analysis of the Delayed Central Nervous System Action in the Regulation of a Third-order Muscle-Tendon Model
24th International Conference on System Theory, Control and Computing, Oct 2020, Sinaia, Romania
hal-01163342v1  Conference papers
Lakhdar AkrounLhouari NourineFarouk Toumani. Reasoning in description logics with variables: preliminary results regarding the EL logic.
28th International Workshop on Description Logics, Jun 2015, Athenes, Greece. pp.12
hal-02944369v1  Conference papers
Maria KabtoulPhilippe MartinetAnne Spalanzani. Proactive Longitudinal Velocity Control In Pedestrians-Vehicle Interaction Scenarios
The 23rd IEEE International Conference on Intelligent Transportation Systems, Sep 2020, Rhodes, Greece