Skip to Main content Skip to Navigation
New interface

Search by documents



hal-03781631v1  Book sections
Samih SouissiLayth SlimanBenoit Charroux. A Novel Security Architecture Based on Multi-level Rule Expression Language
Hybrid Intelligent Systems, 420, Springer International Publishing, pp.259-269, 2016, Advances in Intelligent Systems and Computing, ⟨10.1007/978-3-319-27221-4_22⟩
hal-02287054v1  Book sections
Claude ChaudetYoram Haddad. Wireless Software Defined Networking
Software Defined Mobile Networks (SDMN): Beyond LTE Network Architecture, Wiley, 2015
hal-02287311v1  Book sections
Tuan DangPascale MinetPatrick BellotChristophe MozzatiErwan Livolant. Industrial IoT : Mobility Support and Service Discovery for Industrial Process Monitoring
Internet of Things : Novel Advances and Envisioned Applications, Springer, pp. 57-85, 2016
...
hal-01499921v1  Book sections
G. NogueiraB. BaynatM. MaqboolM. Coupechoux. Performance Evaluation and Dimensioning of WiMAX
WiMAX Networks Planning and Optimization, CRC Press, pp.405-430, 2008
...
hal-01652582v1  Book sections
Rim KaddahDaniel KofmanFabien MathieuMichal Pioro. Semi-Distributed Demand Response Solutions for Smart Homes
Information Innovation Technology in Smart Cities, pp.17 (163--179), 2017, 978-981-10-1741-4
hal-00922774v2  Book sections
Damien SaucezLuigi IannoneOlivier Bonaventure. The Map-and-Encap Locator/Identifier separation paradigm: a Security Analysis
Mohamed Boucadair and David Binet. Solutions for Sustaining Scalability in Internet Growth, IGI Global, pp.148-163, 2013, ⟨10.4018/978-1-4666-4305-5.ch008⟩
...
hal-00614801v1  Book sections
Jean-Louis Dessalles. Altruism, status, and the origin of relevance
Approaches to the evolution of language: Social and cognitive bases, Cambridge University Press, pp.130-147, 1998
hal-00616430v1  Book sections
Jean-Louis Dessalles. Pragmatics and evolution
The Cambridge encyclopedia of the language sciences, Cambridge University Press, pp.649-651, 2011
hal-02931167v1  Book sections
Alain CouvreurHugues Randriambololona. Algebraic geometry codes and some applications
W. Cary Huffman, Jon-Lark Kim, Patrick Solé. A Concise Encyclopedia of Coding Theory, Chapman and Hall/CRC, pp.998, 2021, A Concise Encyclopedia of Coding Theory, 9781138551992
...
hal-01369077v1  Book sections
Hiep LeThomas RebeleFabian Suchanek. Open Digital Forms
Research and Advanced Technology for Digital Libraries - 20th International Conference on Theory and Practice of Digital Libraries, TPDL 2016, Hannover, Germany, September 5-9, 2016, Proceedings, pp.454-458, 2016, ⟨10.1007/978-3-319-43997-6_43⟩
hal-03296928v1  Book sections
Ahmed SerhrouchniFouad Amine GuenaneMichele NogueiraDonghyun Kim. Toward Reliable and Secure Data Access for Big Data Service
Fei Hu. Big Data: Storage, Sharing, and Security, CRC Press, pp.227, 2016, 978-1-4987-3486-8
hal-03800630v1  Book sections
Thomas AttemaRonald CramerMatthieu Rambaud. Compressed Σ-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures
Advances in Cryptology – ASIACRYPT 2021, 13093, Springer International Publishing, pp.526-556, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-92068-5_18⟩
hal-03022508v1  Book sections
Olivier Hudry. Resolution of a Routing and Wavelength Assignment Problem by Independent Sets in Conflict Graphs
Proceedings of the 7th International Conference on Control, Decision and Information Technologies (CoDIT’20), IEEE, 2021
hal-02286688v1  Book sections
Laurent PautetB. Zalila. Model-Based Code Generation
Embedded Systems : analysis and modeling with SysML, UML and AADL, Wiley, 2013
hal-02286710v1  Book sections
J. Sakarovitch. Automata and expressions
AutoMathA Handbook, European Mathematical Society, 2015
hal-03559661v1  Book sections
Qinkai ZhengHan QiuTianwei ZhangGerard MemmiMeikang Qiu et al.  Resisting Adversarial Examples via Wavelet Extension and Denoising
Smart Computing and Communication, 12608, Springer International Publishing, pp.204-214, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-74717-6_22⟩
hal-02287022v1  Book sections
Jeremy PittAda Diaconescu. The Algorithmic Governance Of Common-Pool Resources
From Bitcoin to Burning Man and Beyond: The Quest for Identity and Autonomy in a Digital Society, Edited by John H. Clippinger and David Bollier, Published by ID3 in cooperation with Off the Common Books, pp.133-145, 2014
hal-01615143v1  Book sections
Loic BesnardThierry GautierPaul Le GuernicClément GuyJean-Pierre Talpin et al.  Formal Semantics of Behavior Specifications in the Architecture Analysis and Design Language Standard
Cyber-Physical System Design from an Architecture Analysis Viewpoint, Springer, 2017, Cyber-Physical System Design from an Architecture Analysis Viewpoint, ⟨10.1007/978-981-10-4436-6_3⟩
hal-02278635v1  Book sections
P. N. TranNadia Boukhatem. IP-based RFID location system
Radio Frequency Identification Fundamentals and Applications, INTECH, 2010
hal-02278612v1  Book sections
Irène CharonOlivier Hudry. 3 : Branch-and-bound methods
Concepts of Combinatorial Optimization, Wiley-ISTE Ltd, pp.41-69, 2010
hal-01416381v1  Book sections
Tuan DangPascale MinetPatrick BellotChristophe MozzatiErwan Livolant. Industrial IoT: Mobility Support and Service Discovery for Industrial Process Monitoring
D. P. Acharjya Internet of Things: Novel Advances and Envisioned Applications, Springer Verlag, 2016
hal-01318315v1  Book sections
Stéphane BalletJulia PieltantMatthieu RambaudJeroen Sijsling. On some bounds for symmetric tensor rank of multiplication in finite fields
Alp Bassa, Alain Couvreur and David Kohel. ARITHMETIC, GEOMETRY, CRYPTOGRAPHY AND CODING THEORY, 686, AMER MATHEMATICAL SOC, pp.93 - 121, 2017, Contemporary Mathematics, 978-1-4704-2810-5. ⟨10.1090/conm/686/13779⟩
...
hal-03860813v1  Book sections
Mingming QiuElie NajmRémi SharrockBruno Traverson. PBRE: A Rule Extraction Method from Trained Neural Networks Designed for Smart Home Services
Christine Strauss; Alfredo Cuzzocrea; Gabriele Kotsis; A Min Tjoa; Ismail Khalil. Database and Expert Systems Applications. 33rd International Conference, DEXA 2022, Vienna, Austria, August 22–24, 2022, Proceedings, Part II, 13427, Springer International Publishing, pp.158-173, 2022, Lecture Notes in Computer Science, 978-3-031-12425-9. ⟨10.1007/978-3-031-12426-6_13⟩
hal-02287015v1  Book sections
Fabian M. Suchanek. Information Extraction for Ontology Learning
Perspectives on Ontology Learning, IOS Press, 2014
hal-03773135v1  Book sections
Giuseppe PersianoDuong Hieu PhanMoti Yung. Anamorphic Encryption: Private Communication Against a Dictator
Advances in Cryptology – EUROCRYPT 2022, 13276, Springer International Publishing, pp.34-63, 2022, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-07085-3_2⟩
hal-03084720v1  Book sections
Olivier Hudry. Complexity of voting procedures
Complex Social and Behavioral Systems. Encyclopedia of Complexity and Systems Science, 2020