Skip to Main content Skip to Navigation


hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00349883v1  Conference papers
Mehdi TalbiBenjamin MorinValérie Viet Triem TongAdel BouhoulaMohammed Mejri. Spécification Formelle des propriétés des Protocoles de Vote au moyen de la Logique ADM
Conférence sur la sécurité des Architectures Réseaux et des Systèmes d'Information, Oct 2008, Loctudy, France
...
hal-01629733v2  Conference papers
Lilian BessonEmilie Kaufmann. Multi-Player Bandits Revisited
Algorithmic Learning Theory, Mehryar Mohri; Karthik Sridharan, Apr 2018, Lanzarote, Spain
...
hal-01705292v1  Conference papers
Lilian BessonEmilie KaufmannChristophe Moy. Aggregation of Multi-Armed Bandits Learning Algorithms for Opportunistic Spectrum Access
IEEE WCNC - IEEE Wireless Communications and Networking Conference, Apr 2018, Barcelona, Spain. ⟨10.1109/wcnc.2018.8377070⟩
...
hal-02049824v2  Conference papers
Rémi BonnefoiLilian BessonJulio Manco-VasquezChristophe Moy. Upper-Confidence Bound for Channel Selection in LPWA Networks with Retransmissions
The 1st International Workshop on Mathematical Tools and technologies for IoT and mMTC Networks Modeling, Philippe Mary, Samir Perlaza, Petar Popovski, Apr 2019, Marrakech, Morocco
...
hal-02006825v1  Conference papers
Lilian BessonRémi BonnefoiChristophe Moy. GNU Radio Implementation of MALIN: "Multi-Armed bandits Learning for Internet-of-things Networks
IEEE WCNC 2019 - IEEE Wireless Communications and Networking Conference, Apr 2019, Marrakech, Morocco. ⟨10.1109/WCNC.2019.8885841⟩
...
hal-02013847v1  Poster communications
Lilian Besson. Multi-Player Bandits Revisited
Séminaire « IETR : Interagir Evaluer Transmettre Réunir », Jun 2018, Vannes, France
...
hal-02144465v1  Conference papers
Christophe MoyLilian Besson. Decentralized Spectrum Learning for IoT Wireless Networks Collision Mitigation
ISIoT 2019 - 1st International Workshop on Intelligent Systems for the Internet of Things, May 2019, Santorin, Greece
...
hal-02152243v1  Conference papers
Lilian BessonEmilie Kaufmann. Analyse non asymptotique d'un test séquentiel de détection de rupture et application aux bandits non stationnaires
GRETSI 2019 - XXVIIème Colloque francophone de traitement du signal et des images, Aug 2019, Lille, France
...
hal-01231807v1  Journal articles
Florent LoeteQinghua ZhangMichel Sorine. Experimental validation of the inverse scattering method for distributed characteristic impedance estimation
IEEE Transactions on Antennas and Propagation, Institute of Electrical and Electronics Engineers, 2015, 63 (6), pp.7. ⟨10.1109/TAP.2015.2417215⟩
...
hal-00606014v1  Conference papers
Guillaume AucherCatherine Barreau-SaliouGuido BoellaAnnie BlandinSébastien Gambs et al.  The Coprelobri project: the logical approach to privacy
2e Atelier Protection de la Vie Privée (APVP 2011), Jun 2011, Sorèze, France
...
hal-00408871v1  Conference papers
Emmanuelle AnceaumeRomaric LudinardFrédéric TronelF. BrasilieroBruno Sericola. Analytical Study of Adversarial Strategies in Cluster-based Overlays
2nd International Workshop on Reliability, Availability, and Security, 2009, Hiroshima, Japan. pp.12, ⟨10.1109/PDCAT.2009.62⟩
...
hal-00650086v1  Journal articles
Emmanuelle AnceaumeFrancisco BrasilieroRomaric LudinardBruno SericolaFrédéric Tronel. Dependability Evaluation of Cluster-based Distributed Systems
International Journal of Foundations of Computer Science, World Scientific Publishing, 2011, 22 (5), pp.1123-1142. ⟨10.1142/S0129054111008593⟩
...
hal-00650095v1  Conference papers
Emmanuelle AnceaumeBruno SericolaRomaric LudinardFrédéric Tronel. Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems
Proceedings of the 41rst 2011 International Conference on Dependable Systems and Networks (DSN), Jun 2011, Hong-Kong, China. pp.12
hal-00658239v1  Book sections
Jordi Perez-RomeroSergio PalazzoLaura GalluccioGiacomo MorabitoAlessandro Leonardi et al.  Heterogeneous and opportunistic wireless networks
Sergio Benedetto (Editor), Marco Luise (Editor), Luis Correia (Editor). The Newcom++ Vision Book: Perspectives of Research on Wireless Communications in Europe, Springer, pp.41-66, 2012, ⟨10.1007/978-88-470-1983-6_3⟩
inria-00450258v1  Journal articles
Benoit MiramondEmmanuel HuckFrançois VerdierMohamed El Amine BenkhelifaBertrand Granado et al.  OveRSoC : a Framework for the Exploration of RTOS for RSoC Platforms
International Journal of Reconfigurable Computing, Hindawi Publishing Corporation, 2009, 2009, pp.450607. ⟨10.1155/2009/450607⟩
...
hal-00156447v1  Conference papers
Valérie Viet Triem TongHervé SibertJérémy LecoeurMarc Girault. FingerKey, un cryptosystème biométrique pour l'authentification
Conférence sur la Sécurité et Architectures Réseaux, Jun 2007, annecy, France
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
...
hal-02013839v1  Poster communications
Rémi BonnefoiLilian Besson. Multi-Armed Bandit Learning in IoT Networks
Journée des Doctorants de l'IETR, Jul 2017, Rennes, France
hal-01382298v1  Conference papers
Salvatore d'OroPanayotis MertikopoulosAris L. MoustakasSergio Palazzo. Adaptive transmit policies for cost-efficient power allocation in multi-carrier systems
WiOpt '14: Proceedings of the 12th International Symposium and Workshops on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2014, Unknown, Unknown Region
hal-01382301v1  Conference papers
Panayotis MertikopoulosAris L. Moustakas. Entropy-Driven Optimization Dynamics for Gaussian Vector Multiple Access Channels
ICC '13: Proceedings of the 2013 IEEE International Conference on Communications, 2013, Unknown, Unknown Region
...
hal-01087505v2  Conference papers
Gwen SalaünLina Ye. Debugging Process Algebra Specifications
VMCAI 2015, Jan 2015, Mumbai, India. pp.18, ⟨10.1007/978-3-662-46081-8_14⟩