726 résultats  enregistrer la recherche


lirmm-00395080v1  Communication dans un congrès
Serge BurckelEmeric GioanEmmanuel ThoméMapping Computation with No Memory
UC'2009: 8th International Conference on Unconventional Computation, Sep 2009, Ponta Delgada, Portugal. Springer, 5715 (5715), pp.85-97, 2009, LNCS. <10.1007/978-3-642-03745-0_15>
lirmm-00287659v1  Communication dans un congrès
Emeric GioanSerge BurckelIn Situ Design of Register Operations
ISVLSI'08: IEEE Computer Society Annual Symposium on Very-Large-Scale Integration, Apr 2008, Montpellier, France, IEEE Computer Society, Trends in VLSI Technology and Design, pp.4, 2008, <http://www.lirmm.fr/isvlsi2008/>
...
hal-01475884v2  Rapport
Loris MarchalLouis-Claude CanonFrédéric VivienLow-Cost Approximation Algorithms for Scheduling Independent Tasks on Hybrid Platforms
[Research Report] RR-9029, Inria - Research Centre Grenoble – Rhône-Alpes. 2017
...
hal-00842857v1  Article dans une revue
Marie LefevreValentin ButoianuPhilippe DaubiasLucie DaubigneyFrançoise Greffier et al.  Personnalisation de l'apprentissage : confrontation entre besoins et approches.
Sciences et Technologies
 de l'Information et de la Communication
 pour l'Éducation et la Formation (STICEF), ATIEF, 2012, 19, pp.1-23
hal-01206297v1  Article dans une revue
Véronique CortierFormal verification of e-voting: solutions and challenges
SigLog Newsletter, ACM Special Interest Group on Logic and Computation, 2015, 2, pp.25-34. <10.1145/2728816.2728823>
hal-01338054v1  Communication dans un congrès
Jannik DreierRosario GiustolisiAli KassemPascal LafourcadeGabriele Lenzini et al.  Formal Analysis of Electronic Exams
First Symposium on Digital Trust in Auvergne (SDTA'14), Dec 2014, Clermont-Ferrand, France
...
hal-01155626v1  Direction d'ouvrage, Proceedings
Frédéric DadeauPascale Le GallActes des 14e journées sur les Approches Formelles dans l'Assistance au Développement de Logiciels
Dadeau, Frédéric; Le Gall, Pascale. Approches Formelles dans l'Assistance au Développement de Logiciels, Jun 2015, Bordeaux, France. pp.88, 2015, <http://events.femto-st.fr/afadl-2015>
...
hal-01090874v1  Article dans une revue
Véronique CortierSteve KremerFormal Models and Techniques for Analyzing Security Protocols: A Tutorial
Foundations and Trends in Programming Languages, Now Publishers, 2014, 1 (3), pp.117. <10.1561/2500000001>
...
hal-01338064v1  Communication dans un congrès
Jannik DreierPascal LafourcadeYassine LakhnechA Formal Taxonomy of Privacy in Voting Protocols
First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), Jun 2012, Ottawa, Canada. <10.1109/ICC.2012.6364938>
...
hal-01206276v1  Communication dans un congrès
Rémy ChrétienVéronique CortierStéphanie DelauneDecidability of trace equivalence for protocols with nonces
28th IEEE Computer Security Foundations Symposium (CSF'15), Jul 2015, Verona, Italy. Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF'15), <10.1109/CSF.2015.19>
...
hal-01338067v1  Rapport
Jannik DreierPascal LafourcadeYassine LakhnechA formal taxonomy of privacy in voting protocols
[Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2011
hal-01206289v1  Communication dans un congrès
David BernhardVéronique CortierDavid GalindoOlivier PereiraBogdan WarinschiA comprehensive analysis of game-based ballot privacy definitions
36th IEEE Symposium on Security and Privacy (S&P'15), May 2015, San Jose, United States. <10.1109/SP.2015.37>
...
hal-01338070v1  Communication dans un congrès
Jannik DreierPascal LafourcadeYassine LakhnechVote-Independence: A Powerful Privacy Notion for Voting Protocols
4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), May 2011, Paris, France. 2012, <10.1007/978-3-642-27901-0_13>
...
hal-01206669v1  Communication dans un congrès
Serdar ErbaturDeepak KapurAndrew MarshallPaliath NarendranChristophe RingeissenUnification and Matching in Hierarchical Combinations of Syntactic Theories
Carsten Lutz and Silvio Ranise. Frontiers of Combining Systems - 10th International Symposium, FroCoS 2015, Sep 2015, Wroclaw, Poland. Springer, 9322, pp.291--306, Lecture Notes in Computer Science. <10.1007/978-3-319-24246-0_18>
...
tel-01248018v1  Thèse
Jean-Marie GauthierCombining Discrete and Continuous Domains for SysML-Based Simulation and Test Generation
Software Engineering [cs.SE]. Université de Franche-Comté, 2015. English
...
hal-00878632v1  Communication dans un congrès
Steve KremerRobert KünnemannGraham SteelUniversally Composable Key-Management
Crampton, Jason and Jajodia, Sushil. 18th European Symposium on Research in Computer Security (ESORICS'13), 2013, Egham, United Kingdom. Springer, 8134, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-40203-6_19>
hal-01347712v1  Communication dans un congrès
Béatrice BérardOlga KouchnarenkoJohn MullinsMathieu SassolasPreserving opacity on Interval Markov Chains under simulation
WODES 2016 - 13th International Workshop on Discrete Event Systems , May 2016, Xi'an, China. Proceedings of 13th International Workshop on Discrete Event Systems (WODES) 2016, IEEE, pp.319-324, 2016, <Christos G. Cassandras and Alessandro Giua and Zhiwu Li>. <10.1109/WODES.2016.7497866>
...
hal-01384153v1  Rapport
Béatrice BérardOlga KouchnarenkoJohn MullinsMathieu SassolasOpacity for Linear Constraint Markov Chains
[Research Report] LIP6 UMR 7606 UPMC Sorbonne Universités, France; Univ. de Franche-Comté; Ecole Polytechnique de Montréal; LACL, Université Paris-Est. 2016
...
hal-01246025v1  Communication dans un congrès
Jean-Marie GauthierFabrice BouquetAhmed HammadFabien PeureuxTooled Process for Early Validation of SysML Models using Modelica Simulation
Mehdi Dastani; Marjan Sirjani. 6th Fundamentals of Software Engineering (FSEN), 2015, Tehran, Iran. Springer, Lecture Notes in Computer Science, LNCS-9392, pp.230-237, 2015, Fundamentals of Software Engineering. <10.1007/978-3-319-24644-4_16>
...
hal-00729091v1  Communication dans un congrès
Stéphanie DelauneSteve KremerDaniel PasailaSecurity protocols, constraint systems, and group theories
6th International Joint Conference on Automated Reasoning (IJCAR'12), Jun 2012, Manchester, United Kingdom. Springer, 7364, pp.164-178, 2012, Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12). <10.1007/978-3-642-31365-3_15>
...
hal-01091241v1  Communication dans un congrès
Steve KremerRobert KünnemannAutomated Analysis of Security Protocols with Global State
IEEE Computer Society. 35th IEEE Symposium on Security and Privacy (S&P'14), May 2014, San Jose, United States. pp.163-178, Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14). <10.1109/SP.2014.18>
...
hal-00732905v1  Communication dans un congrès
Rohit ChadhaStefan CiobacaSteve KremerAutomated verification of equivalence properties of cryptographic protocols
Helmut Seidl. 21th European Symposium on Programming (ESOP'12), Mar 2012, Talinn, Estonia. Springer, 7211, pp.108-127, 2012, Proceedings of the 21th European Symposium on Programming (ESOP'12). <10.1007/978-3-642-28869-2_6>
...
hal-01103545v1  Communication dans un congrès
Véronique CortierFabienne EignerSteve KremerMatteo MaffeiCyrille WiedlingType-Based Verification of Electronic Voting Protocols
4th Conference on Principles of Security and Trust (POST), Apr 2015, London, United Kingdom. Springer, Proceedings of the 4th Conference on Principles of Security and Trust (POST)
...
hal-01224144v1  Communication dans un congrès
Tushant JhaWalid BelkhirYannick ChevalierMichael RusinowitchExpressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata
FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India
...
hal-01228995v1  Communication dans un congrès
Richard GenestierAlain GiorgettiGuillaume PetiotSequential generation of structured arrays and its deductive verification
TAP 2015, 9th Int. Conf. of Tests and Proofs, 2015, L'Aquila, Italy. Springer, 9154, pp.109--128, 2015, LNCS
...
hal-01233555v1  Article dans une revue
Jannik DreierJean-Guillaume DumasPascal LafourcadeBrandt's fully private auction protocol revisited
Journal of Computer Security, IOS Press, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. <10.3233/JCS-150535>