Skip to Main content Skip to Navigation

hal-03168834v1  Reports
Ankica BarisicDušan SavićRima Al-AliIvan RuchkinDominique Blouin et al.  Systematic Literature Review on Multi-Paradigm Modelling for Cyber-Physical Systems
[Technical Report] COST European Cooperation in Science and Technology. 2019
hal-03559687v1  Conference papers
Xiao WuHan QiuShuyi ZhangGerard MemmiKeke Gai et al.  ChainIDE 2.0: Facilitating Smart Contract Development for Consortium Blockchain
IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Jul 2020, Toronto, France. pp.388-393, ⟨10.1109/INFOCOMWKSHPS50562.2020.9163051⟩
hal-03559698v1  Journal articles
Han QiuTian DongTianwei ZhangJialiang LuGerard Memmi et al.  Adversarial Attacks Against Network Intrusion Detection in IoT Systems
IEEE internet of things journal, IEEE, 2021, 8 (13), pp.10327-10335. ⟨10.1109/JIOT.2020.3048038⟩
hal-01622778v1  Conference papers
Karel de VogeleerKameswar Rao VaddinaFlorian BrandnerPierre JouvelotGérard Memmi. Modeling the energy consumption of programs: thermal aspects and Energy/Frequency Convexity Rule
The Ninth International Conference on Wireless Communications and Signal Processing (WCSP 2017), Oct 2017, Nanjing, China. pp.1-10
hal-02449653v1  Conference papers
Chloe BarnesKirstie BellmanJean F BotevAda DiaconescuLukas Esterle et al.  CHARIOT - Towards a Continuous High-Level Adaptive Runtime Integration Testbed
2019 IEEE 4th International Workshops on Foundations and Applications of Self* Systems (FAS*W), Jun 2019, Umea, France. pp.52-55, ⟨10.1109/FAS-W.2019.00026⟩
hal-02287379v1  Conference papers
Matthieu Rambaud. optimal Chudnovsky Chudnovsky multiplication algorithms
WAIFI 2014, Jul 2015, gebze, Turkey
hal-02287625v1  Journal articles
Ada DiaconescuJeremy Pitt. Technological Impacts in Socio-Technical Communities. Values and Pathologies
IEEE Technology and Society Magazine, Institute of Electrical and Electronics Engineers, 2017
hal-02287645v1  Conference papers
Han QiuGérard MemmiHassan Noura. An efficient Secure Storage Scheme Based on Information Fragmentation
4th IEEE Int. Conf. on Cyber Security and Cloud Computing, Jun 2017, New-York, United States. pp.108-113
hal-02287944v1  Conference papers
Ziad IsmailJean LeneutreAlia Fourati. Optimal Deployment of Security Policies: Application to Industrial Control Systems
14th European Dependable Computing Conference (EDCC 2018), Sep 2018, Iasi, Romania
hal-02287383v1  Journal articles
Ada DiaconescuJeremy Pitt. Holonic Institutions for Multi-Scale Polycentric Self-Governance
Coordination, Organizations, Institutions, and Norms in Agent Systems X, Springer Lecture Notes in Computer Science, 2015, 9372, pp.19-35
hal-02287375v1  Journal articles
Gérard Memmi. Deux retours d’expérience avec la méthodologie SCRUM
Genie Logiciel, 2011, 98, pp.52-58
hal-02288310v1  Conference papers
Elie Najm. Controllability of Orchestrated Sessions
Invited Talk - WWV'11, 7th Int'l Workshop on Automated Specification and Verification of Web Systems, Jun 2011, Reykjavik, Iceland
hal-02287737v1  Conference papers
Ziad IsmailJ. LeneutreAlia Fourati. An Attack Execution Model for Industrial Control Systems Security Assessment.
CyberICS/WOS-CPS@ESORICS 2015, Jan 2015, Vienna, Austria. pp.157-167
cea-02321547v1  Reports
Petr KuznetsovThibault RieutordSara Tucci-Piergiovanni. Reconfigurable Lattice Agreement and Applications
[Research Report] Institut Polytechnique Paris; CEA List. 2019
hal-02286685v1  Conference papers
Sylvain FreyAda DiaconescuMenga DavidIsabelle Demeure. Towards a reference model for multi-goal, highly-distributed and dynamic autonomic systems
10th International Conference on Autonomic Computing (ICAC), Self-aware Internet of Things (Self-IoT) track, Jun 2013, San Jose, Ca, United States
hal-02354922v1  Conference papers
Mayssa JemelMounira MsahliAhmed Serhrouchni. SyncDS: A digital safe based file synchronization approach
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Jan 2016, Las Vegas, France. pp.317-318, ⟨10.1109/CCNC.2016.7444796⟩
hal-02354926v1  Conference papers
Mounira MsahliMohamed Tahar HammiAhmed Serhrouchni. Safe box cloud authentication using TLS extesion
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC), Aug 2015, Shanghai, France. pp.1-6, ⟨10.1109/SSIC.2015.7245679⟩
hal-02354919v1  Conference papers
Mayssa JemelMounira MsahliAhmed Serhrouchni. Digital safe: Secure synchronization of shared files
2015 11th International Conference on Information Assurance and Security (IAS), Dec 2015, Marrakech, France. pp.67-72, ⟨10.1109/ISIAS.2015.7492747⟩
hal-02354920v1  Conference papers
Mayssa JemelMounira MsahliAhmed Serhrouchni. Towards an Efficient File Synchronization between Digital Safes
2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Mar 2017, Taipei, France. pp.136-143, ⟨10.1109/AINA.2017.115⟩
hal-02287223v1  Conference papers
Petr KuznetsovSrivatsan Ravi. Progressive Transactional Memory in Time and Space
PaCT, Sep 2015, Petrozavodsk, Russia
hal-02412405v1  Conference papers
Vitaly AksenovPetr KuznetsovAnatoly Shalyto. Parallel Combining: Benefits of Explicit Synchronization
22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China, 2018, Hong Kong, China. pp.11:1-11:16, ⟨10.4230/LIPIcs.OPODIS.2018.11⟩