Accéder directement au contenu Accéder directement à la navigation

hal-01090043v1  Article dans une revue
Vincent DrevelleJérémy Nicola. VIBes: A Visualizer for Intervals and Boxes
Mathematics in Computer Science, Springer, 2014, Mathematics in Computer Science, 8 (3-4), pp.563-572. ⟨10.1007/s11786-014-0202-0⟩
hal-00873841v1  Communication dans un congrès
Zoé DreyJosé MoralesManuel HermenegildoManuel Carro. Reversible languages and their application to debugging
Fifteenth International Symposium on Practical Aspects of Declarative Languages(PADL 2013), Jan 2013, Rome, Italy. pp.206-221, ⟨10.1007/978-3-642-45284-0⟩
hal-02123046v1  Communication dans un congrès
Bastien DrouotJoël Champeau. Model Federation based on Role Modeling
MODELSWARD 2019 - 7th International Conference on Model-Driven Engineering and Software Development 2019, Feb 2019, Prague, Czech Republic. pp.74-85
hal-02461502v1  Communication dans un congrès
Bastien DrouotFahad Rafique GolraJoël Champeau. A Role Modeling Based Approach for Cyber Threat Analysis
MODELSWARD 2019 - 7th International Conference on Model-Driven Engineering and Software Development, Feb 2019, Prague, Czech Republic. pp.76-100, ⟨10.1007/978-3-030-37873-8_4⟩
hal-02924428v1  Chapitre d'ouvrage
Didier DuboisLuc JaulinHenri Prade. Thick sets, multiple-valued mappings, and possibility theory
Vladik Kreinovich. Statistical and Fuzzy Approaches to Data Processing, with Applications to Econometrics and Other Areas, 892, Springer, pp.101-109, 2021, Studies in Computational Intelligence, 978-3-030-45618-4. ⟨10.1007/978-3-030-45619-1_8⟩
hal-03085342v1  Communication dans un congrès
Quentin DucassePascal CotretLoïc LagadecRob Stewart. Benchmarking Quantized Neural Networks on FPGAs with FINN
DATE Friday Workshop on System-level Design Methods for Deep Learning on Heterogeneous Architectures, Feb 2021, Grenoble, France
hal-02502398v1  Communication dans un congrès
Sabrine EddedSihem SassiRaúl MazoCamille SalinesiHenda Hajjami Ben Ghézala. Preference-based Conflict Resolution for Collaborative Configuration of Product Lines
International Conference on Evaluation of Novel Approaches to Software Engineering, Mar 2020, Prague, Czech Republic
hal-01867767v1  Communication dans un congrès
Ahmad Hani El FawalAli MansourM. NajemFrederic Le RoyDenis Le Jeune. CTMC modeling for M2M/H2H coexistence in a NB-IoT Adaptive eNodeB
11th IEEE International Conference on Internet of Things (iThings-2018), Jul 2018, Halifax, Canada
hal-02304760v1  Chapitre d'ouvrage
Ahmad Hani El FawalAli MansourMohamad Najem. V2V Influence on M2M and H2H Traffics During Emergency Scenarios
Global Advancements in Connected and Intelligent Mobility: Emerging Research and Opportunities, IGI Global, pp.93-134, 2019, 9781522590194. ⟨10.4018/978-1-5225-9019-4.ch003⟩
hal-01707168v1  Communication dans un congrès
Ahmad Hani El FawalAli MansourMohamad NajemFrédéric Le RoyDenis Le Jeune. LTE-M adaptive eNodeB for emergency scenarios
ICTC: Information and Communication Technology Convergence, Oct 2017, Jeju Island, South Korea. ⟨10.1109/ICTC.2017.8191035⟩
tel-02374816v1  Thèse
Ahmad Hani El Fawal. Machine-to-machine communication congestion mechanism
Networking and Internet Architecture [cs.NI]. ENSTA Bretagne - École nationale supérieure de techniques avancées Bretagne, 2018. English. ⟨NNT : 2018ENTA0010⟩
hal-01719919v1  Communication dans un congrès
Ahmad-Hani El-FawalAli MansourFrédéric Le RoyDenis Le JeuneAli Hamié. RACH overload congestion mechanism for M2M communication in LTE-A: issues and approaches
2017 International Symposium on Networks, Computers and Communications (ISNCC), May 2017, Marrakech, Morocco. ⟨10.1109/ISNCC.2017.8071981⟩
hal-01611549v1  Communication dans un congrès
Rémi EmmetiereJulien BonnelMarie Gehant PernotThierry Chonavel. Source depth discrimination using the array invariant
Accoustics 2017 : Joint Meeting of the Acoustical Society of America and the European Acoustics Association, Jun 2017, Boston, United States. ⟨10.1121/1.4989130⟩
hal-02084333v1  Article dans une revue
Remi EmmetiereJulien BonnelXavier CristolMarie GéhantThierry Chonavel. Passive source depth discrimination in deep-water
IEEE Journal of Selected Topics in Signal Processing, IEEE, 2019, 13 (1), pp.185-197. ⟨10.1109/JSTSP.2019.2899968⟩
hal-01203649v1  Communication dans un congrès
Khaoula Es-SalhiSiham Rim BoudaoudCiprian TeodorovZoé DreyVincent Ribaud. KriQL: a query language for the diagnosis of transition systems
15th International Workshop on Automated Verification of Critical Systems - AVOCS'15, Sep 2015, Edimburgh, United Kingdom. pp.151-165
hal-01623030v1  Communication dans un congrès
Erwan FabianiLoïc LagadecMohamed Ben HammoudaCiprian Teodorov. Asserting causal properties in High Level Synthesis
2017 IEEE 2nd International Verification and Security Workshop (IVSW), Jul 2017, Thessaloniki, Greece
hal-01864787v1  Communication dans un congrès
Obeid FadiPhilippe Dhaussy. Model-checking for Secured Component Implementation.
17th International Conference on Security and Management (SAM’18), Jul 2018, Las Vegas, United States
hal-01864790v1  Communication dans un congrès
Obeid FadiPhilippe Dhaussy. Secure Communication Protocol: Application to Large Number of Distributed Sensors
17th International Conference on Security and Management (SAM’18), Jul 2018, Las Vegas, United States
hal-01864805v1  Communication dans un congrès
Obeid FadiPhilippe Dhaussy. Validation formelle d’architecture logicielle basée sur des patrons de sécurité
17e journées AFADL 2018, Approches Formelles dans l’Assistance au Développement de Logiciel, Jun 2018, Grenoble, France
hal-01236692v1  Communication dans un congrès
R. dos Santos FagundesD. Le JeuneA. MansourF. Le RoyMohamad-Raafat Lababidi. Wideband High Dynamic Range Surveillance
EUSIPCO 2015, Université de Sophia Antipolis, Aug 2015, Nice, France
hal-01867913v1  Rapport
Cyrielle Feron. PAnTHErS: User Guide
[Technical Report] ENSTA Bretagne; Lab-STICC. 2018
hal-02960569v2  Article dans une revue
Cyrielle FeronLoïc LagadecVianney Lapotre. Automated Exploration of Homomorphic Encryption Scheme Input Parameters
Journal of Information Security and Applications, 2020, 55, pp.102627. ⟨10.1016/j.jisa.2020.102627⟩