Skip to Main content Skip to Navigation


inria-00124270v1  Journal articles
Xiao-Shan GaoQiang LinGui-Fang Zhang. A C-tree decomposition algorithm for 2D and 3D geometric constraint solving
Computer-Aided Design, Elsevier, 2006, Computer-Aided Design, 38 (1), pp.1--13. ⟨10.1016/j.cad.2005.03.002⟩
...
hal-01252138v1  Conference papers
Guillaume BurelGilles DowekYing Jiang. A Completion Method to Decide Reachability in Rewrite Systems
International Symposium on Frontiers of Combining Systems FroCoS'15, Sep 2015, Wroclaw, Poland. pp.205-219, ⟨10.1007/978-3-319-24246-0_13⟩
...
hal-00919467v1  Preprints, Working Papers, ...
Gilles DowekYing Jiang. A Logical Approach to CTL
2014
...
hal-00966501v1  Journal articles
Philippe DumasHelger LipmaaJohan Wallén. Asymptotic behaviour of a non-commutative rational series with a nonnegative linear representation
Discrete Mathematics and Theoretical Computer Science, DMTCS, 2007, 9 (1), pp.247--272
...
hal-00763495v1  Conference papers
Frédéric BlanquiKim Quyen Ly. Automated verification of termination certificates
15th National Symposium of Selected ICT Problems, Dec 2012, Hanoi, Vietnam
hal-00880345v1  Journal articles
Marc F LensinkAiain H. MoalPaul A. BatesPanagiotis L. KastritisAdrien S. J. Melquiond et al.  Blind prediction of interfacial water positions in CAPRI
Proteins - Structure, Function and Bioinformatics, Wiley, 2014, 82 (4), pp.620-632. ⟨10.1002/prot.24439⟩
hal-00839625v1  Journal articles
Carole Delporte-GalletHugues FauconnierRachid GuerraouiAnne-Marie KermarrecEric Ruppert et al.  Byzantine agreement with homonyms
Distributed Computing, Springer Verlag, 2013, 26 (5-6), pp.321-340. ⟨10.1007/s00446-013-0190-3⟩
hal-00904144v1  Conference papers
Philippe JacquetDimitrios MiliorisWojciech Szpankowski. Classification of Markov Sources Through Joint String Complexity: Theory and Experiments
IEEE International Symposium on Information Theory, Jul 2013, Istanbul, Turkey
...
hal-01891762v1  Conference papers
William SchuellerVittorio LoretoPierre-Yves Oudeyer. Complexity Reduction in the Negotiation of New Lexical Conventions
40th Annual Conference of the Cognitive Science Society (CogSci 2018), Jul 2018, Madison, WI, United States
...
hal-01390478v1  Journal articles
Tobias MarschallManja MarzThomas AbeelLouis DijkstraBas E. Dutilh et al.  Computational pan-genomics: status, promises and challenges
Briefings in Bioinformatics, Oxford University Press (OUP), 2018, 19 (1), pp.118-135. ⟨10.1093/bib/bbw089⟩
...
inria-00392809v1  Conference papers
Valérie IssarnyBernhard SteffenBengt JonssonGordon BlairPaul Grace et al.  CONNECT Challenges: Towards Emergent Connectors for Eternal Networked Systems
14th IEEE International Conference on Engineering of Complex Computer Systems, Jun 2009, Postdam, Germany. pp.154-161, ⟨10.1109/ICECCS.2009.44⟩
hal-01411848v1  Journal articles
Zeinab HmedehHarry KourdounakisVassilis ChristophidesCédric Du MouzaMichel Scholl et al.  Content-Based Publish/Subscribe System for Web Syndication
Journal of Computer Science and Technology, Springer Verlag, 2016, 31, pp.359 - 380. ⟨10.1007/s11390-016-1632-8⟩
hal-00934144v1  Conference papers
Shlomi DolevSwan DuboisMaria Potop-ButucaruSébastien Tixeuil. Crash Resilient and Pseudo-Stabilizing Atomic Registers
OPODIS 2012 - 16th International Conference on Principles of Distributed Systems, Dec 2012, Rome, Italy. pp.135-150, ⟨10.1007/978-3-642-35476-2_10⟩
...
hal-01252135v1  Conference papers
Gilles DowekYing Jiang. Decidability, Introduction Rules and Automata
International Conferences on Logic for Programming, Artificial Intelligence and Reasoning, Nov 2015, Bula, Fiji. ⟨10.1007/978-3-662-48899-7_8⟩
...
hal-01063419v1  Journal articles
Mathieu AubrySylvain ParisSamuel HasinoffJan KautzFrédo Durand. Fast Local Laplacian Filters: Theory and Applications
ACM Transactions on Graphics, Association for Computing Machinery, 2014, 33 (5), pp.167.1-167.14. ⟨10.1145/2629645⟩
...
hal-00776876v1  Conference papers
Thomas BraibantAdam Chlipala. Formal Verification of Hardware Synthesis
Computer Aided Verification - 25th International Conference, Jul 2013, Saint Petersburg, Russia. pp.213-228, ⟨10.1007/978-3-642-39799-8_14⟩
...
hal-01294924v1  Conference papers
Srikanth SundaresanNick FeamsterRenata Teixeira. Home Network or Access Link? Locating Last-Mile Downstream Throughput Bottlenecks
PAM 2016 - Passive and Active Measurement Conference, Mar 2016, Heraklion, Greece. pp.111-123, ⟨10.1007/978-3-319-30505-9_9⟩
hal-00940548v1  Journal articles
François BaccelliAbbas El GamalDavid Tse. Interference Networks With Point-to-Point Codes
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2011, 57 (5), pp.2582-2596
...
hal-00793610v1  Journal articles
Pierre-Yves OudeyerFrédéric KaplanVéréna Hafner. Intrinsic Motivation for Autonomous Mental Development
IEEE Transactions on Evolutionary Computation, Institute of Electrical and Electronics Engineers, 2007, 11 (2), pp.265-286. ⟨10.1109/TEVC.2006.890271⟩
inria-00528319v1  Conference papers
Vincent DanosJerome FeretWalter FontanaRuss HarmerJean Krivine. Investigation of a biological repair scheme
the 9th Workshop on Membrane Computing - WMC9, Paun, G., Jul 2008, Edinburgh, United Kingdom. pp.1-12, ⟨10.1007/978-3-540-95885-7_1⟩
hal-01270324v1  Conference papers
Stéphane CaronBranislav KvetonMarc LelargeS. Bhagat. Leveraging Side Observations in Stochastic Bandits
UAI, Aug 2012, catalina island, United States
...
hal-01700786v1  Journal articles
Jordan AugeGiovanna CarofiglioGiulio GrassiLuca MuscarielloGiovanni Pau et al.  MAP-Me: Managing Anchor-less Producer Mobility in Content-Centric Networks
IEEE Transactions on Network and Service Management, IEEE, 2018, 15 (2), pp.596-610. ⟨10.1109/TNSM.2018.2796720⟩
...
hal-01100675v1  Conference papers
Srikanth SundaresanNick FeamsterRenata Teixeira. Measuring the Performance of User Traffic in Home Wireless Networks
Passive and Active Network Measurement Conference, Mar 2015, New York, United States
...
hal-01411910v1  Poster communications
Vasilis EfthymiouKostas StefanidisVassilis Christophides. Minoan ER: Progressive Entity Resolution in the Web of Data
19th International Conference on Extending Database Technology, EDBT 2016, Mar 2016, Bordeaux, France. 2016, ⟨10.5441/002/edbt.2016.79⟩
...
hal-01312248v1  Conference papers
Xueguang WuLiqian ChenAntoine MinéWei DongJi Wang. Numerical Static Analysis of Interrupt-Driven Programs via Sequentialization
EMSOFT 2015 - International Conference on Embedded Software, Oct 2015, Amsterdam, Netherlands. pp.55-64, ⟨10.1109/EMSOFT.2015.7318260⟩
...
hal-00717714v1  Conference papers
David BuchmanMark SchmidtShakir MohamedDavid PooleNando de Freitas. On Sparse, Spectral and Other Parameterizations of Binary Probabilistic Models
AISTATS 2012 - 15th International Conference on Artificial Intelligence and Statistics, Apr 2012, La Palma, Spain
hal-01111635v1  Conference papers
Jean-Paul DegabrieleAnja LehmannKenneth G. PatersonNigel P. SmartMario Strefler. On the Joint Security of Encryption and Signature in EMV
CT-RSA 2012 - The Cryptographers’ Track at the RSA Conference, Feb 2012, San Francisco, CA, United States. pp.116-135, ⟨10.1007/978-3-642-27954-6_8⟩
hal-01162402v1  Conference papers
Oana GogaPatrick LoiseauRobin SommerRenata TeixeiraKrishna P. Gummadi. On the Reliability of Profile Matching Across Large Online Social Networks
KDD'15: ACM SIGDD Conference on Knowledge Discovery and Data Mining, Aug 2015, Sydeny, Australia. ⟨10.1145/2783258.2788601⟩
...
inria-00517175v1  Journal articles
Jinsan ChengSylvain LazardLuis PeñarandaMarc PougetFabrice Rouillier et al.  On the topology of real algebraic plane curves
Mathematics in Computer Science, Springer, 2010, 4 (1), pp.113-137. ⟨10.1007/s11786-010-0044-3⟩
hal-01123697v1  Journal articles
Noga AlonHagit AttiyaShlomi DolevSwan DuboisMaria Potop-Butucaru et al.  Practically stabilizing SWMR atomic memory in message passing systems
Journal of Computer and System Sciences, Elsevier, 2015, 81 (4), pp.692-701. ⟨10.1016/j.jcss.2014.11.014⟩
...
hal-01053935v1  Conference papers
Tuan-Hung VuCatherine OlssonIvan LaptevAude OlivaJosef Sivic. Predicting Actions from Static Scenes
ECCV'14 - 13th European Conference on Computer Vision, Sep 2014, Zurich, Switzerland. pp.421-436, ⟨10.1007/978-3-319-10602-1_28⟩
hal-02177676v1  Conference papers
Anthony BarnettJoppe BosWouter CastryckCarl BootlandLouis Goubin et al.  Processing Encrypted Data Using Homomorphic Encryption
Workshop on Data Mining with Secure Computation, 2017, skopje, Macedonia. ⟨10.5281/zenodo.2594694⟩
...
hal-02430070v1  Conference papers
Guillaume BaudartLouis MandelMarc PouzetEric AtkinsonBenjamin Sherman et al.  Programmation d'Applications Réactives Probabilistes
JLFA 2020 - Journées Francophones des Langages Applicatifs, Jan 2020, Gruissan, France
...
hal-01251199v1  Conference papers
Cezara DrăgoiThomas HenzingerDamien Zufferey. PSYNC: A partially synchronous language for fault-tolerant distributed algorithms
POPL '16 - 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Jan 2016, Saint Petersburg, Florida, United States. pp.400-415, ⟨10.1145/2837614.2837650⟩
hal-00917425v1  Conference papers
Marc LelargeLaurent MassouliéJiaming Xu. Reconstruction in the Labeled Stochastic Block Model
IEEE Information Theory Workshop, Sep 2013, Seville, Spain
hal-00915836v1  Conference papers
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
TCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
inria-00527981v1  Book sections
Elaine MurphyVincent DanosJerome FeretJean KrivineRuss Harmer. Rule Based Modeling and Model Refinement
H. Lodhi and S. Muggleton. Elements of Computational Systems Biology, John Wiley & Sons, pp.83--114, 2010, Wiley Book Series on Bioinformatics, 978-0470180938. ⟨10.1002/9780470556757.ch4⟩
inria-00528364v1  Journal articles
Vincent DanosJerome FeretWalter FontanaRuss HarmerJean Krivine. Rule-Based Modelling and Model Perturbation
Transactions on Computational Systems Biology, Springer, 2009, Transactions on Computational Systems Biology XI, 5750, pp.116-137. ⟨10.1007/978-3-642-04186-0_6⟩
hal-00818204v1  Books
Pierre-Yves Oudeyer. Self-Organization in the Evolution of Speech
Oxford University Press, 6, pp.177, 2006, Studies in the Evolution of Language, 978-0-19-928915-8. ⟨10.1093/acprof:oso/9780199289158.001.0001⟩
hal-00934022v1  Journal articles
Swan DuboisMaria Potop-ButucaruMikhail NesterenkoSébastien Tixeuil. Self-stabilizing byzantine asynchronous unison
Journal of Parallel and Distributed Computing, Elsevier, 2012, 72 (7), pp.917-923. ⟨10.1016/j.jpdc.2012.04.001⟩
hal-01256013v1  Conference papers
Phong Q. NguyenJiang ZhangZhenfeng Zhang. Simpler Efficient Group Signatures from Lattices
Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, IACR, Mar 2015, Gaithersburg, United States. ⟨10.1007/978-3-662-46447-2_18⟩
...
hal-00723754v1  Journal articles
Ina SchaeferRick RabiserDavid ClarkeLorenzo BettiniDavid Benavides et al.  Software diversity: state of the art and perspectives
International Journal on Software Tools for Technology Transfer, Springer Verlag, 2012, 14 (5), pp.477-495. ⟨10.1007/s10009-012-0253-y⟩
...
hal-01251194v1  Conference papers
Cezara DrăgoiThomas HenzingerDamien Zufferey. The Need for Language Support for Fault-tolerant Distributed Systems
Leibniz International Proceedings in Informatics (LIPIcs) , May 2015, Dagstuhl, Germany. pp.90-102, ⟨10.4230/LIPIcs.SNAPL.2015.90⟩
...
hal-01338726v1  Conference papers
Michalis KatsarakisRenata TeixeiraMaria PapadopouliVassilis Christophides. Towards a Causal Analysis of Video QoE from Network and Application QoS
ACM SIGCOMM Workshop on QoE-based Analysis and Management of Data Communication Networks (Internet-QoE 2016), Aug 2016, Florianopolis, Brazil. ⟨10.1145/2940136.2940142⟩
...
hal-01970274v1  Journal articles
Ying JiangJian LiuGilles DowekKailiang Ji. Towards Combining Model Checking and Proof Checking
The Computer Journal, Oxford University Press (UK), In press, ⟨10.1093/comjnl/bxy112⟩
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩