D. Alistarh, M. A. Bender, S. Gilbert, and R. Guerraoui, How to Allocate Tasks Asynchronously, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp.331-340, 2012.
DOI : 10.1109/FOCS.2012.41

C. Basu, H. Hirsh, W. W. Cohen, and C. Nevill-manning, Recommending papers by mining the web, Proc. of the IJCAI Workshop on Learning about Users, 1999.

S. Benferhat and J. Lang, Conference paper assignment, International Journal of Intelligent Systems, vol.18, issue.10, pp.1183-1192, 2001.
DOI : 10.1002/int.1055

G. Bosilca, A. Bouteiller, É. Brunet, F. Cappello, J. Dongarra et al., Unified model for assessing checkpointing protocols at extreme-scale, Concurrency and Computation: Practice and Experience, vol.9, issue.16, pp.262727-2810, 2013.
DOI : 10.1002/cpe.3173

URL : https://hal.archives-ouvertes.fr/hal-00696154

H. Casanova, F. Dufossé, Y. Robert, and F. Vivien, Mapping applications on volatile resource, The International Journal of High Performance Computing Applications, vol.27, issue.4, p.19, 2015.
DOI : 10.1177/1094342013518806