Recent Publications
Journal
Conference proceedings
Conference, workshop
Book, proceedings
HDR, PhD thesis
Book part
Research/contract report
Standardization
Small Cell Deployment Along Roads: Coverage Analysis and Slice-Aware RAT Selection.
G. Ghatak, A. De Domenico et M. Coupechoux.
IEEE Transactions on Communications, Mai 2019.
Weighted Sum-Rate Maximization in Multicarrier NOMA with Cellular Power Constraint.
L. Salaun, Ch. S. C. Chen et M. Coupechoux.
IEEE International Conference on Computer Communications (INFOCOM), pp. 1-9, Paris, France, Avril 2019.
Optimal Trajectories of a UAV Base Station Using Lagrangian Mechanics.
M. Coupechoux, J. Darbon, J.-M. Kélif et M. Sigelle.
IEEE International Conference on Computer Communications (INFOCOM), Workshop on Mission-Oriented Wireless Sensor, UAV and Robot Networking (MISARN), pp. 1-6, Paris, France, Avril 2019.
Computing the $k$-coverage of a wireless network.  
A. Vergne, L. Decreusefond et Ph. Martins.
Valuetools 2019, Palma de Mallorca, Spain, Mars 2019.
The OPC UA Galaxy.
P. Bellot et Z. Liu.
Mars 2019.
Query Answering with Transitive and Linear-Ordered Data.  
A. Amarilli, M. Benedikt, P. Bourhis et M. Vanden Boom.
JAIR, Janvier 2019.
Evaluating Datalog via Tree Automata and Cycluits.  
A. Amarilli, P. Bourhis, M. Monet et P. Senellart.
ToCS, Janvier 2019.
Shedding the Shackles of Time-Division Multiplexing.
F. Hebbache, M. Jan, F. Brandner et L. Pautet.
Real-Time Systems Symposium , pp. 13, Nashville, USA, DOI: 10.1109/RTSS.2018.00059, Janvier 2019.
Procédé de gestion d?un message transmis parune station émettrice d?un système de transport intelligent.
J.-Ph. Monteuuis, S. Mafrica, A. Servel et J. Zhang.
Janvier 2019.
C-ITS PKI protocol: Performance Evaluation in a Real Environment.  
F. haidar, A. KAISER, B. Lonc et p. urien.
WONS 2019 15 th Wireless On-demand Network systems and Services Conference, Wengen, Switzerland, Janvier 2019.
QKD Deployment Parameters.
R. Alléaume et al..
ETSI, n° ETSI GS QKD 0012 V1.1.4 , Janvier 2019.
Game Theory for Networking Applications.
J. B. Song, H. Li et M. Coupechoux.
Springer, 2019.
Merit-guided dynamic feature selection filter for data streams.
J. P. Barddal, F. Enembreck, H. M. Gomes, A. Bifet et B. Pfahringer.
Expert Syst. Appl., vol. 116, pp. 227--242, DOI: 10.1016/j.eswa.2018.09.031, 2019.
On learning guarantees to unsupervised concept drift detection on data streams.
R. F. de Mello, Y. Vaz, C. H. G. Ferreira et A. Bifet.
Expert Syst. Appl., vol. 117, pp. 90--102, DOI: 10.1016/j.eswa.2018.08.054, 2019.
Des intelligences TRES artificielles.  
J.-L. Dessalles.
Odile Jacob, Paris, DOI: 978-2-7381-4714-1, 2019.
Information, the hidden side of life.  
C. Gaucherel, P.-H. Gouyon et J.-L. Dessalles.
ISTE Wiley, London, UK, DOI: 978-1-78630-424-7, 2019.
Introduction à l?optimisation continue et discrète.
I. Charon et O. Hudry.
Lavoisier, 2019.
Provenance and Probabilities in Relational Databases: From Theory to Practice.  
P. Senellart.
SIGMOD Record, vol. 46, n° 4, Décembre 2018.
Self-sacrifice as social signal (Commentary on H. Whitehouse: Dying for the group: Towards a general theory of extreme self-sacrifice).  
J.-L. Dessalles.
Behavioral and Brain Sciences, vol. 41, pp. e200, Décembre 2018.
Performance Evaluation of Millimeter Wave Full-Duplex Cellular Networks.
H. F. Arrano, J.-M. Kélif et M. Coupechoux.
IEEE Global Communications Conference (GLOBECOM Workshops), pp. 1-7, Abu Dhabi, UAE, Décembre 2018.
A Dynamic Scalable Blockchain Based Communication Architecture for IoT.
H. Qiu, M. Qiu, M. Liu, Z. Ming et G. Memmi.
SmartBlock'18, vol. LNCS 11371, pp. 159-166, Tokyo, Japon, Décembre 2018.
An empirical investigation of botnet as a service for cyberattacks.  
B. Hammi, S. Zeadally et R. Khatoun.
Transactions on Emerging Telecommunications Technologies (ETT), Décembre 2018.
Real-time enforcement of local energy market transactions respecting distribution grid constraints.
J. Horta, E. Altman, m. Caujolle, D. Menga et D. Kofman.
SmartGridComm 2018, Aalborg, Denmark, Décembre 2018.
Method for managing a group of electrical energy consuming devices, and electrical energy management module.
S. Al Zahr, M. Rousselle et Ph. Forestier.
Décembre 2018.
On the Cost of Geographic Forwarding for Information-Centric Things.
M. Enguehard, R. E. Droms et D. Rossi.
IEEE Transactions on Green Communications and Networking, vol. 2, n° 4, pp. 1150 - 1163, Décembre 2018.
Proceedings of the ACM on Measurement and Analysis of Computing Systems.
Th. Bonald et N. Duffield.
ACM, vol. 2, n° 3, Décembre 2018.
Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things. .
S. Coroller, S. Chabridon, M. Laurent, D. Conan et J. Leneutre.
5th Workshop on Middleware and Applications for the Internet of Things, M4IoT@Middleware , Rennes, France, Décembre 2018.
Misbehavior Reporting Protocol for C-ITS.  
J. Kamel, I. Jemaa, A. KAISER et p. urien.
2018 IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan, province of china, Décembre 2018.
Video conference in the fog: an economical approach based on enterprise desktop grid.  
R. Sorokin et J.-L. Rougier.
Annals of Telecommunications, DOI: 10.1007/s12243-017-0613-4, Novembre 2018.
How Memorizing Positions or Directions Affects Gesture Learning?.  
B. Fruchard, E. Lecolinet et O. Chapuis.
ACM ISS'18: Interactive Surfaces and Spaces, Novembre 2018.
Towards information modeling for a QoS-aware support in the lifecycle of virtual networks.
G. Diaz, M. Sibilla et N. Simoni.
ITNAC'18, Sydney, Australia, Novembre 2018.
High-Speed Software Data Plane via Vectorized Packet Processing.
D. Barach, L. LINGUAGLOSSA, D. Marion, P. Pfister, S. Pontarelli et D. Rossi.
IEEE Communications Magazine , vol. 56, n° 12, pp. 97 - 103, Novembre 2018.
On Blockchain technology: Overview of bitcoin and future insights.
H. Hellani, A. E. Samhat, M. Chamoun, H. El Gohr et A. Serhrouchni.
IMCET'18, Beirut, Lebanon, Novembre 2018.
Set Labelling using Multi-label Classification.
N. A. Sanjaya, J. Read, T. Abdessalem et S. Bressan.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications \& Services (iiWAS 2018), pp. 216--220, Yogyakarta, Indonesia, DOI: 10.1145/3282373.3282391, Novembre 2018.
Harnessing Truth Discovery Algorithms On The Topic Labelling Problem.
N. A. Sanjaya, M. L. Ba, T. Abdessalem et S. Bressan.
Proceedings of the 20th International Conference on Information Integration and Web-based Applications \& Services (iiWAS 2018), pp. 8--14, Yogyakarta, Indonesia, DOI: 10.1145/3282373.3282390, Novembre 2018.
MobiLimb: Augmenting Mobile Devices with a Robotic Limb.  
M. Teyssier, G. Bailly, C. Pelachaud et E. Lecolinet.
UIST'18: Proceedings of the ACM Symposium on User Interface Software and Technology, pp. 53-63, DOI: https://doi.org/10.1145/3242587.3242626, Octobre 2018.
Representativeness of Knowledge Bases with the Generalized Benford?s Law.
A. Soulet, A. Giacometti, B. Bouchou Markhoff et F. M. Suchanek.
ISWC, Monterey, CA, United states, Octobre 2018.
Mémorisation de Commandes : Positions Spatiales versus Gestes Directionnels.  
B. Fruchard, E. Lecolinet et O. Chapuis.
IHM'18: Conférence francophone sur l'Interaction Homme Machine, Octobre 2018.
Adaptive Collaborative Topic Modeling for Online Recommendation.
M. Al-Ghossein, P.-A. Murena, T. Abdessalem, A. Barré et A. Cornuéjols.
12th ACM Conference on Recommender Systems (RecSys 2018), Vancouver, Canada, Octobre 2018.
Bash Datalog: Answering Datalog Queries with Unix Shell Commands.  
Th. Rebele, Th. Pellissier Tanon et F. M. Suchanek.
ISWC, Octobre 2018.
An adaptive authentication and authorization scheme for IoT?s gateways: a blockchain based approach.
A. FAYAD, B. Hammi et R. Khatoun.
Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, Octobre 2018.
CDBE: A cooperative way to improve end-to-end congestion control in mobile network.
Z. Zhong, I. Hamchaoui, A. Ferrieux, R. Khatoun et A. Serhrouchni.
14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 216-223, Limassol, Cyprus, Octobre 2018.
A Case Study for Practical Issues of DCT based Bitmap Selective Encryption Methods.
Nathalie Enfrin, H. Qiu et G. Memmi.
Conf. on Security of Smart cities, Industrial Control System and Communications, Shanghai, China, Octobre 2018.
Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure.
K. Kapusta et G. Memmi.
CSS?18, 10th International Symposium on Cyberspace Safety and Security, Amalfi, Italy, Octobre 2018.
POSTER: Circular AON: A very fast Scheme to protect Encrypted Data Against Key Exposure.
K. Kapusta et G. Memmi.
ACM CCS?18, Toronto, Canada, Octobre 2018.
Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor Networks.  
H. Choi, Y.-B. Ko et K.-W. Lim.
2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, Chine, DOI: 10.1109/SSIC.2018.8556816, Octobre 2018.
Crypto Terminal for Blockchains, Trust for Blockchain Serv.
P. Urien.
AMUSEC 2018, Marseille, France, Octobre 2018.
Improving data collection in complex networks with failure-prone agents via local marking.
J. Gomez, A. Rodriguez, N. Botina et A. Diaconescu.
6th International Symposium of Language and Knowledge Engineering (LKE 2018), Octobre 2018.
2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).
H. Labiod, A. E. Yves-Christian, B. Hammi et A. Serhrouchni.
IEEE , pp. 1-7, Octobre 2018.
Analysis of Cryptographic Algorithms on IOT Hardware Platforms.
A. Serhrouchni et al..
CSNET'18, Paris, France, Octobre 2018.
Total Eclipse: how to completely isolate a bitcoin peer.
A. Serhrouchni, H. Labiod et al..
SSIC'18, Shangai, Chine, Octobre 2018.
Cross-Domain Recommendation in the Hotel Sector.
M. Al-Ghossein, T. Abdessalem et A. Barré.
Proceedings of the Workshop on Recommenders in Tourism, RecTour 2018, co-located with the 12th ACM Conference on Recommender Systems (RecSys 2018), pp. 1--6, Vancouver, Canada, Octobre 2018.
Optimal Deployment of Security Policies: Application to Industrial Control Systems.
Z. Ismail, J. Leneutre et A. Fourati.
14th European Dependable Computing Conference (EDCC 2018), Iasi, Romania, Septembre 2018.
Locator/ID Separation Protocol (LISP) Map-Versioning.
L. Iannone, D. Saucez et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-6834bis-02, Septembre 2018.
Virtualization YANG Servise Model (VYSM).
D. Shytyi, L. Beylier et L. Iannone.
Internet Engineering Task Force (IETF), n° draft-shytyi-netmod-vysm-00.txt, Septembre 2018.
A Fast and Scalable Fragmentation Algorithm For Data Protection For Multi-Storage Over Independent Locations.
K. Kapusta et G. Memmi.
Esorics?18, STM workshop, Barcelona, Spain, Septembre 2018.
A Popularity-Based Approach for Effective Cloud Offload in Fog Deployments.
M. Enguehard, G. CAROFIGLIO et D. Rossi.
ITC 18, Vienne, Autriche, Septembre 2018.
Speed Index: Relating the Industrial Standard for User Perceived Web Performance to web QoE.
T. Hoßfeld, F. Metzger et D. Rossi.
Tenth International Conference on Quality of Multimedia Experience (QoMEX), Cagliari, Italy, Septembre 2018.
Neurophysiological Profile of Antismoking Campaigns.
E. Modica, G. Cartocci, D. Perrotta, P. Di Feo, M. Mancini, P. Aricò, B. M. S. Inguscio, F. Babiloni et D. Rossi.
Computational Intelligence and Neuroscience, Septembre 2018.
Neurophysiological Responses to Different Product Experiences.
E. Modica, G. Cartocci, A. Martinez Levy, P. Cherubino, A. G. Maglione, G. Di Flumeri, M. Mancini, M. Montanari, D. Perrotta, P. Di Feo, A. Vozzi, V. Ronca, P. Aricò, F. Babiloni et D. Rossi.
Computational Intelligence and Neuroscience, Septembre 2018.
Weighted Spectral Embedding of Graphs.
Th. Bonald, A. Hollocou et M. Lelarge.
arXiv preprint arXiv, Septembre 2018.
The Forward-Backward Embedding of Directed Graphs.
N. De Lara et Th. Bonald.
openreview.net, Septembre 2018.
Arabic Cyberbullying detection: using deep learning.
A. Serhrouchni et al..
ICCCE'18, Kuala Lumpur, Malaysia, Septembre 2018.
Event Detection in wireless body area networks using Kalman filter and power divergence.
A. Serhrouchni et al..
IEEE Trans. on Network and service management, vol. 15, n° 3, pp. 1018-1034, Septembre 2018.
Combining quantum and computational approaches to upgrade secure networks .
R. Alléaume.
Septembre 2018.
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks.
P. Gu, C. Hua, R. Khatoun, Y. Wu et A. Serhrouchni.
IEEE Transactions on Vehicular Technology (IEEE VTT), vol. 67, n° 8, pp. 7033-7046, Août 2018.
A Repetition Scheme for MBSFN Based Mission-Critical Communications.
A. Daher, M. S. Ali, M. Coupechoux, Ph. Godlewski, P. Ngouat et P. Minot.
IEEE 88th Vehicular Technology Conference (VTC Fall), pp. 1-7, Chicago, US, Août 2018.
Enhancing data protection with a structure-wise fragmentation and dispersal of encrypted data.
K. Kapusta et G. Memmi.
TrustCom'18, New-York, USA, Août 2018.
Accurate Characterization of Dynamic Cell Load in Noise-Limited Random Cellular Networks.  
G. Ghatak, A. De Domenico et M. Coupechoux.
IEEE 88th Vehicular Technology Conference (VTC Fall), pp. 1-5, Chicago, USA, Août 2018.
Predicting attributes and friends of mobile users from AP-Trajectories.
P. Wang, F. Sun, D. Wang, J. Tao, X. Guan et A. Bifet.
Inf. Sci., vol. 463-464, pp. 110--128, DOI: 10.1016/j.ins.2018.06.029, Août 2018.
Explicit formulas for photon number discrimination with on/off detectors.  
F. M. Miatto, A. Safari et R. W. Boyd.
Applied optics, vol. 57, n° 23, pp. 6750-6754, Août 2018.
ProvSQL: Provenance and Probability Management in PostgreSQL.  
P. Senellart, L. Jachiet, S. Maniu et Y. Ramusat.
Proceedings of the VLDB Endowment (PVLDB), vol. 11, n° 12, pp. 2034--2037, DOI: 10.14778/3229863.3236253, Août 2018.
Fair dropping for multi-resource fairness in software routers Extended Abstract.
V. ADDANKI, L. LINGUAGLOSSA, J. Roberts et D. Rossi.
ACM SIGCOMM 2018, Budapest, Hungary, Août 2018.
A practical method for measuring Web above-the-fold time.
D. N. da Hora, V. Christophides, R. Teixeira et D. Rossi.
ACM SIGCOMM 2018, Budapest, Hungary, Août 2018.
Telemetry-based stream-learning of BGP anomalies.
A. Putina, P. Nivaggioli, C. Precup, D. Pletcher, A. Bifet et D. Rossi.
Big-DAMA '18, Budapest, Hungary, Août 2018.
A pratical method for measuring web above the fold time.
D. DA HORA, V. Christophides, R. Teixeira et D. Rossi.
ACM SIGCOMM 2018, Budapest, Hungary, Août 2018.
ALGeoSPF: A Hierarchical Factorization Model for POI Recommendation.
J.-B. Griesner, T. Abdessalem, H. Naacke et P. Dosne.
IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, pp. 87--90, Barcelona, Spain, DOI: 10.1109/ASONAM.2018.8508249, Août 2018.
Securing Delay-Tolerant IoT Uplink Communications Against Eavesdropping.
S. Iellamo, R. Guiazon, M. Coupechoux et K.-K. Wong.
Cloudification of the Internet of Things Conference (CIoT), pp. 1-8, Paris, France, Juillet 2018.
An Information Theory based Approach to Multisource Clustering.
P.-A. Murena et al..
IJCAI-ECAI-2018 (Int. Joint Conf. on Artificial Intelligence), Stockholm, Suède, Juillet 2018.
Opening the parallelogram: Considerations on non-Euclidean analogies.
P.-A. Murena, A. Cornuéjols et J.-L. Dessalles.
International Conference on Case-Based Reasoning (ICCBR 2018), Stockholm, Suède, Juillet 2018.
An Asynchronous Computability Theorem for Fair Adversaries.
P. Kuznetsov, Th. Rieutord et Y. He.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, PODC 2018, Juillet 2018.
Brief Announcement: Performance Prediction for Coarse-Grained Locking.
V. Aksenov, D. Alistarh et P. Kuznetsov.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, PODC 2018, Juillet 2018.
Holonic Cellular Automata: Modelling Multi-level Self-organisation of Structure and Behaviour.
A. Diaconescu, S. Tomforde et Ch. Müller-Schloer.
International Conference on Artificial Life, Tokyo, Japan, Juillet 2018.
Public Privacy and Brick Houses Made of Glass.
S. Marsh, A. Diaconescu et al..
12th IFIP International Conference on Trust Management, Juillet 2018.
Qualifying Causes as Pertinent.  
G. Sileno et J.-L. Dessalles.
40th Annual Conference of the Cognitive Science Society, pp. 2488-2493, Madison, WI, USA, Juillet 2018.
Network-level strategies for best use of optical functionalities.
A. Minakhmetov, H. Chouman, L. Iannone, M. Lourdiane et C. Ware.
Juillet 2018.
The Crypto-Agility Properties.  
H. Aissaoui-Mehrez et O. El Omri.
IMSCI 2018, vol. Volume 1, pp. 99-103, ISBN 978-1-941763-85-8, Orlando, Florida, United states, Juillet 2018.
Semiring Provenance over Graph Databases.  
Y. Ramusat, S. Maniu et P. Senellart.
10th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2018), London, United kingdom, Juillet 2018.
Two Routes to Automata Minimization and the Ways to Reach It Efficiently.
S. Lombardy et J. Sakarovitch.
International Conference on Implementation and Application of Automata, CIAA 2018, vol. 10977, pp. 248-260, Charlottetown, Canada, DOI: 10.1007/978-3-319-94812-6\_21, Juillet 2018.
An Innovative Four-Quarter IoT Secure Architecture Based on Secure Element.
P. Urien.
CIoT?2018, 2018 3rd Cloudification of the Internet of Things (CIoT), Paris, France, DOI: 10.1109/CIOT.2018.8627112, Juillet 2018.
Learning Graph Representations by Dendrograms.
B. Charpentier et Th. Bonald.
arxiv.org, Juillet 2018.
Homodyne detector blinding attack in continuous-variable quantum key distribution.
H. Qin, R. Kumar, V. Makarov et R. Alléaume.
Phys. Rev. A, vol. 012312, Juillet 2018.
Implementation Security of Quantum Cryptography: Introduction, challenges, solutions.
R. Alléaume et al..
ETSI White Paper , vol. 27, pp. 28, Juillet 2018.
Exploiting Contextual and External Data for Hotel Recommendation.
M. Al-Ghossein, T. Abdessalem et A. Barré.
Adjunct Publication of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP 2018), pp. 323--328, Singapore, Singapore, DOI: 10.1145/3213586.3225245, Juillet 2018.
Coordination de gestion de consommation d'énergie électrique .
S. Al Zahr, Ph. Forestier et M. Rousselle.
Juin 2018.
When Can We Answer Queries Using Result-Bounded Data Interfaces?.  
A. Amarilli et M. Benedikt.
PODS, Juin 2018.
Interference Analysis in Dynamic TDD System Combined or not With Cell Clustering Scheme.  
J. Rachad, R. Nasri et L. Decreusefond.
VTC, Porto, Portugal, Juin 2018.
Impact of Semantic Aids on Command Memorization for On-Body Interaction and Directional Gestures.  
B. Fruchard, E. Lecolinet et O. Chapuis.
AVI'18: International Conference on Advanced Visual Interfaces, n° Article No. 14 (9 pages), Grosseto, Italie, DOI: 10.1145/3206505.3206524, Juin 2018.
Localization Data-Rate Trade-off in Small Cells and Service Differentiation for 5G Networks.
G. Ghatak, R. Koirala, A. De Domenico, B. Denis, D. Dardari et B. Uguen.
IEEE 87th Vehicular Technology Conference: (VTC2018-Spring), pp. 1-5, Porto, Portugal, Juin 2018.
Optimization of wireless sensor networks deployment with coverage and connectivity constraints.
S. Elloumi, O. Hudry, E. Marie, A. Martin, A. Plateau et S. Rovedakis.
Annals of Operations Research, Juin 2018.
Text to brain: predicting the spatial distribution of neuroimaging observations from text reports.
J. Dockès, D. Wasserman, R. Poldrack, F. M. Suchanek, B. Thirion et G. Varoquaux.
MICCAI, Juin 2018.
Topological Sorting with Regular Constraints.  
A. Amarilli et Ch. Paperman.
ICALP, vol. 107, Juin 2018.
Demoing Platypus ? A Multilingual Question Answering Platform for Wikidata.  
Th. Pellissier Tanon, M. Dias De Assuncao, E. Caron et F. M. Suchanek.
Extended Semantic Web Conference, Heracklion, Greece, Juin 2018.
WebLinux: a scalable in-browser and client-side Linux and IDE.
R. Sharrock, L. Angrave et E. Hamonic.
L@S'18: ACM Conference on Learning @ Scale, n° Article No. 45, Londres, Grande Bretagne, DOI: 10.1145/3231644.3231703, Juin 2018.
Questioning the security and efficiency of the ESIoT approach.
A. Diop, S. Gharout, M. Laurent, J. Leneutre et J. Traoré.
1th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2018), Stockholm, Sweden, Juin 2018.
Linear UCB for Online SON Management.  
T. Daher, S. Jemaa et L. Decreusefond.
2018 IEEE 87th Vehicular Technology Conference: VTC2018-Spring, Porto, Portugal, Juin 2018.
Augmenting DER hosting capacity of distribution grids through local energy markets and dynamic phase switching.
J. Horta, D. Kofman, D. Menga et m. Caujolle.
e-Energy 2018, Karlsruhe, Germany, Juin 2018.
FlowMon-DPDK: Parsimonious Per-Flow Software Monitoring at Line Rate.
T. ZHANG, L. LINGUAGLOSSA, M. Gallo, P. GIACCONE et D. Rossi.
TMA 18, Vienne, Autriche, Juin 2018.
Form Filling based on Constraint Solving.  
B. Spencer, M. Benedikt et P. Senellart.
ICWE (International Conference on Web Engineering), pp. 95-113, Cáceres, Spain, Juin 2018.
Focused Crawling through Reinforcement Learning.  
M. Han, P.-H. Wuillemin et P. Senellart.
18th International Conference on Web Engineering (ICWE 2018), vol. 10845, pp. 261--278, Cáceres, Spain, DOI: 10.1007/978-3-319-91662-0_20, Juin 2018.
A simple yet effective network-assisted signal for enhanced DASH quality of experience.
D. Rossi, J. Samain, G. CAROFIGLIO et M. Tortelli.
28th ACM SIGMM, Amsterdam, Netherlands , Juin 2018.
Parallel Simulation of Very Large-Scale General Cache Networks.
M. Tortelli, E. Leonardi et D. Rossi.
IEEE Journal on Selected Areas in Communications, vol. 36, n° 8, pp. 1871 - 1886, Juin 2018.
An Innovative Four-Quarter IoT Secure Architecture Based on Secure Element.
P. Urien.
IWCMC 2018, 14th International Wireless Communications & Mobile Computing Conference, Limassol, Chypre, DOI: 10.1109/IWCMC.2018.8450435, Juin 2018.
Hierarchical Graph Clustering using Node Pair Sampling.
B. Charpentier, Th. Bonald, A. Galland et A. Hollocou.
arXiv preprint arXiv, Juin 2018.
Flow-level traffic model for adaptive streaming services in mobile networks.
L. Yu-Ting, Th. Bonald et S.-E. ELAYOUBI.
Computer Networks, vol. 137, pp. 1-16, Juin 2018.
LISP-Views: Monitoring LISP at Large Scale.
Y. Li, A. Abouseif, D. Saucez et L. Iannone.
Rencontres Francophones sur la Conception de Protocoles, l?Évaluation de Performance et l?Expérimentation des Réseaux de Communication (CoRES'18), Roscoff, France, Juin 2018.
Feasibility Study of Misbehavior Detection Mechanisms in Cooperative Intelligent Transport Systems (C-ITS).  
J. Kamel, A. KAISER, I. Jemaa, P. Cincilla et p. urien.
2018 IEEE 87th Vehicular Technology Conference: VTC2018-Spring, Porto, Portugal, Juin 2018.
Quantum Cryptography at the Computational Frontier .
R. Alléaume.
Juin 2018.
Full and Half Duplex-Switching Policy for Cellular Networks under Uplink Degradation Constraint.
H. F. Arrano, J.-M. Kélif et M. Coupechoux.
IEEE International Conference on Communications (ICC), pp. 1-7, Kansas City, USA, Mai 2018.
Optimal Joint Subcarrier and Power Allocation in NOMA is Strongly NP-Hard.
L. Salaun, Ch. S. C. Chen et M. Coupechoux.
IEEE International Conference on Communications (ICC), pp. 1-7, Kansas City, USA, Mai 2018.
A stochastic model for vehicle clustering performance analysis.
M. REN, J. Zhang, L. Khoukhi, H. Labiod et v. Vèque.
IEEE International Conference on Communications, Kansas City, MO, USA, Mai 2018.
An M:N Shared Regenerator Protection Scheme in Translucent WDM Networks.
E. Doumith et S. Al Zahr.
NETWORKING, Mai 2018.
The First Summer School on Practice and Theory of Concurrent Computing SPTCC 2017.
P. Kuznetsov.
SIGACT News, vol. 49, n° 1, pp. 81--90, DOI: 10.1145/3197406.3197421, Mai 2018.
Inherent limitations of hybrid transactional memory.
D. Alistarh, J. Kopinsky, P. Kuznetsov, S. Ravi et N. Shavit.
Distributed Computing, vol. 31, n° 3, pp. 167--185, DOI: 10.1007/s00446-017-0305-3, Mai 2018.
Coverage Analysis and Load Balancing in HetNets With Millimeter Wave Multi-RAT Small Cells.  
G. Ghatak, A. De Domenico et M. Coupechoux.
IEEE Transactions on Wireless Communications, vol. 17, n° 5, pp. 3154-3169, DOI: 10.1109/TWC.2018.2807426, Mai 2018.
TCP Congestion Control in Datacenter Optical Packet Networks on Hybrid Switches.
A. Minakhmetov, C. Ware et L. Iannone.
J. Opt. Commun. Netw., vol. 10, n° 7, pp. B71--B81, DOI: 10.1364/JOCN.10.000B71, Mai 2018.
Teaching Linux and C programming in MOOCs with a scalable in-browser and 100% client-side Linux IDE.
R. Sharrock, E. Hamonic, P. Taylor et M. Goudzwaard.
OpenedX, Montreal, Canada, Mai 2018.
Codecast: an interactive tutorial tool to teach and learn the C programming language effectively in a MOOC.
R. Sharrock, P. Taylor, E. Hamonic et M. Goudzwaard.
L@S'18: ACM Conference on Learning @ Scale, pp. 147-148, Montreal, Canada, DOI: 10.1145/3051457.3053970, Mai 2018.
On Helping and Stacks.
V. Aksenov et P. Kuznetsov.
Networked Systems - 6th International Conference, NETYS 2018, Mai 2018.
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
Y. Xu et al..
IEEE Trans. Information Theory, vol. 64, n° 1, pp. 367-383, Mai 2018.
Amélioration du débit des réseaux optiques via TCP Stop-and-Wait sur les commutateurs hybrides.  
A. Minakhmetov, C. Ware et L. Iannone.
ALGOTEL 2018 - 20èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Roscoff, France, Mai 2018.
Cooperative Relay Beamforming for Control Channel Jamming in Vehicular Networks.
P. Gu, C. Hua, Y. Wu, R. Khatoun et A. Serhrouchni.
16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Shanghai, China, Mai 2018.
Controlling software router resource sharing by fair packet dropping.
V. ADDANKI, L. LINGUAGLOSSA, J. Roberts et D. Rossi.
IFIP Networking 2018, Zurich, Switzerland, Mai 2018.
An online sampling approachfor controlled experimentation and QoE modeling.
M. KHOKHAR, T. SPETEBROOT, D. DA HORA et D. Rossi.
IEEE International Conference on Communications 2018, Kansas City,USA, Mai 2018.
Un seul serveur vous manque, et tout est découplé!.
Th. Bonald, C. Comte et F. Mathieu.
ALGOTEL 2018-20èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Roscoff, France, Mai 2018.
Tuple Reconstruction.
N. A. S. Er, M. L. Ba, T. Abdessalem et S. Bressan.
DASFAA 2018 International Workshops: BDMS, BDQM, GDMA, and SeCoP, pp. 239--254, Gold Coast, QLD, Australia, DOI: 10.1007/978-3-319-91455-8\_21, Mai 2018.
An Online Approach to D2D Trajectory Utility Maximization Problem.
A. Singh Bedi, K. Rejawat et M. Coupechoux.
IEEE International Conference on Computer Communications (INFOCOM), pp. 1-9, Honolulu, USA, Avril 2018.
Are All People Married? Determining Obligatory Attributes in Knowledge Bases.
J. Lajus et F. M. Suchanek.
WWW, Lyon, France, Avril 2018.
Self-integrating Organic Control Systems: from Crayfish to Smart Homes.
A. Diaconescu, P. Mata et K. Bellman.
6th International Workshop on Self-Optimisation in Autonomic and Organic Computing Systems (SAOS'18), part of ARCS'18, pp. 8, Braunschweig, Germany, Avril 2018.
Home energy management system considering modular and deferrable electric loads under time-variable pricing scheme.
S. Al Zahr.
IEEE MENACOMM, Jounieh, Liban, Avril 2018.
Self-awareness and Decision-taking in Socio-Cyber-Physical Systems. An Architectural Perspective.
A. Diaconescu et J. Pitt.
3rd International Workshop on Self-Awareness in Cyber-Physical Systems (SelPhyS'18), Birmingham, UK, Avril 2018.
On subtrees of the representation tree in rational base numeration systems.
S. Akiyama, V. Marsault et J. Sakarovitch.
Discrete Mathematics \& Theoretical Computer Science, vol. 20, n° 1, Avril 2018.
BCTrust: A decentralized authentication blockchain-based mechanism.
M. T. Hammi, P. Bellot et A. Serhrouchni.
IEEE Wireless Communications and Networking Conference (WCNC), pp. 6, Barcelone, Espagne, Avril 2018.
Descent with mutations applied to the linear ordering problem.
O. Hudry.
International Symposium on Combinatorial Optimization, vol. 10856, pp. 253-264, Marrakech, Maroc, Avril 2018.
Self-Reflection and Personal Physicalization Construction.
A. Thudt, U. Hinrichs, S. Huron et S. Carpendale.
CHI'18: ACM SIGCHI Conference on Human Factors in Computing Systems, DOI: 10.1145/3173574.3173728, Avril 2018.
Property Label Stability in Wikidata.  
Th. Pellissier Tanon et L.-A. Kaffee.
Companion of the The Web Conference 2018, Lyon, France, DOI: 10.1145/3184558.3191643, Avril 2018.
Making Sense of Data Workers' Sense Making Practices.  
J. Liu, N. Boukhelifa et J. Eagan.
Extended Abstracts of the 2018 CHI Conference, Montréal, Québec, Canada, Avril 2018.
Softwarized and Distributed Learning for SON Management Systems.  
T. Daher, S. Jemaa et L. Decreusefond.
IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, province of china, Avril 2018.
Flexibility and dynamicity for open network-as-a-service: From VNF and architecture modeling to deployment.
a. Boubendir, E. Bertin et N. Simoni.
NOMS'18, Taipei, Taiwan, Avril 2018.
Batched packet processing for high-speed software data plane functions.
D. Barach, L. LINGUAGLOSSA, M. Damjan, P. Pfister, S. Pontarelli, D. Rossi et J. Tollet.
IEEE INFOCOM 2018, Honolulu, HI, USA, Avril 2018.
Introduction to special issue: ACM SIGMETRICS 2016.
Th. Bonald et A. Ganesh.
Queueing Systems, pp. 1-2, Avril 2018.
The perils of confounding factors: how Fitt's Law Experiments can lead to false conclusions.
J. Gori, Y. Guiard, O. Rioul et M. beaudoin-lafon.
CHI'18, Montreal, Canada, Avril 2018.
Dynamic Local Models for Online Recommendation.
M. Al-Ghossein, T. Abdessalem et A. Barré.
Companion of the The Web Conference 2018 on The Web Conference 2018 (WWW 2018), pp. 1419--1423, Lyon, France, DOI: 10.1145/3184558.3191586, Avril 2018.
Quantum Technologies : Impact on Cybersecurity (and AI) .
R. Alléaume.
Avril 2018.
Connecting Width and Structure in Knowledge Compilation.  
A. Amarilli, M. Monet et P. Senellart.
ICDT, Mars 2018.
Enumeration on Trees under Relabelings.  
A. Amarilli, P. Bourhis et S. Mengel.
ICDT, Mars 2018.
Experimental detection of steerability in Bell local states with two measurement settings.
A. Orieux, M. Kaplan, V. Venuti, T. Pramanik, I. Zaquine et E. Diamanti.
Journal of Optics, vol. 20, n° 4, Mars 2018.
Optical Networks Throughput Enhancement via TCP Stop-and-Wait on Hybrid Switches.
A. Minakhmetov, C. Ware et L. Iannone.
The Optical Networking and Communication Conference (OFC), San Diego, CA, USA, Mars 2018.
Availability Enhancement and Analysis for Mixed-Criticality Systems on Multi-core.  
R. Medina, E. Borde et L. Pautet.
Design Automation and Test in Europe (DATE), Dresden, Germany, Mars 2018.
A closer look at IP-ID behavior in the Wild .  
F. Salutari, D. Cicalese et D. Rossi.
International Conference on Passive and Active Network Measurement (PAM) , Berlin, Germany, Mars 2018.
Narrowing the gap between QoS metrics and Web QoE using Above-the-fold metrics.  
d. H. Diego, A. Alemnew, V. Christophides, R. Teixeira et D. Rossi.
International Conference on Passive and Active Network Measurement (PAM), Berlin, Germany, Mars 2018.
Leveraging Inter-domain Stability for BGP Dynamics Analysis.  
Th. Green, A. Lambert, C. Pelsser et D. Rossi.
International Conference on Passive and Active Network Measurement (PAM), Berlin, Germany, Mars 2018.
Large scale learning tools to teach C and Linux.
R. Sharrock.
Berkley education technologies seminar, Mars 2018.
Narrowing the gap between QoS.
D. Rossi, A. Alemnew, V. Christophides et R. Teixeira.
PAM 2018, Berlin, Allemagne, Mars 2018.
Multiple Local Community Detection.
M. Lelarge, A. Hollocou et Th. Bonald.
ACM SIGMETRICS Performance Evaluation Review, vol. 45, n° 2, pp. 76-83, Mars 2018.
Efficient Context-Aware K-Nearest Neighbor Search.
M. H. Chehreghani et M. H. Chehreghani.
Advances in Information Retrieval - 40th European Conference on IR Research (ECIR 2018), pp. 466--478, Grenoble, France, DOI: 10.1007/978-3-319-76941-7\_35, Mars 2018.
Analysis of Preemption Costs for the Stack Cache.
N. Amine, S. Abbaspour, F. Brandner et M. Jan.
Real-Time Systems Journal, DOI: 10.1007/s11241-018-9298-7, Février 2018.
Fourth International Conference on Mobile and Secure Services (MobiSecServ).
S. Piramuthu et P. Urien.
MOBISECSERV, Piscataway, NJ IEEE , DOI: ISBN 9781538632536, Février 2018.
Coding Tutorials for any Programming Language or Interactive Tutorials for C and Arduino.
R. Sharrock, B. Gaultier, P. Taylor, M. Goudzwaard, M. Hiron et E. Hamonic.
SIGCSE'18: ACM Technical Symposium on Computer Science Education, Baltimore, USA, DOI: https://dl.acm.org/citation.cfm?doid=3159450.3162381, Février 2018.
Weblinux: run linux 100% client-side in the browser.
R. Sharrock.
HarvardX seminar, Harvard university, USA, Février 2018.
How to build leverage, maintain and assess motivation in online learning environments.
R. Sharrock.
Stanford Digital Learning Initiative, Stanford, California, USA, Février 2018.
Cognitive Policy Based SON Management Demonstrator.  
T. Daher, S. Jemaa et L. Decreusefond.
ICIN 2018, paris, France, Février 2018.
Performance evaluation of CQIC and TCP BBR in mobile network.
Z. Zhong, I. Hamchaoui, R. Khatoun et A. Serhrouchni.
21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, Février 2018.
Caching Encrypted Content Via Stochastic Cache Partitioning.
A. Araldo, D. György et D. Rossi.
IEEE/ACM Transactions on Networking, vol. 26, n° 1, pp. 548 - 561, Février 2018.
Experimental demonstration of practical unforgeable quantum money.
M. Bozzio, A. Orieux, L. Trigo Vidarte, I. Zaquine, I. Kerenidis et E. Diamanti.
npj (nature partner journal) Quantum information, vol. 4, n° 5, Janvier 2018.
Remembered events are unexpected (Commentary on Mahr \& Csibra: Why do we remember? The communicative function of episodic memory).  
J.-L. Dessalles.
Behavioral and Brain Sciences, vol. 41, pp. 22, DOI: 10.1017/S0140525X17001315, Janvier 2018.
ALGeoSPF: Un modèle de factorisation basé sur du clustering géographique pour la recommandation de POI.
J.-B. Griesner, T. Abdessalem, H. Naacke et P. Dosne.
Extraction et Gestion de Connaissances (EGC'2018), pp. 12, Saint Denis, France, Janvier 2018.
Defining services and service orchestrators acting on shared sensors and actuators.
R. Baghli, E. Najm et B. Traverson.
6th International Conference on Model-Driven Engineering and Software Development (ModelsWard'18), Funchal, Madère, Janvier 2018.
BGP Extended Communities LCAF Type.
D. Saucez et L. Iannone.
Janvier 2018.
A longitudinal study of IP Anycast .  
D. Cicalese et D. Rossi.
ACM SIGCOMM Computer Communication Review, Janvier 2018.
Caching Encrypted Content via Stochastic Cache Partitioning .  
A. Araldo, G. Dan et D. Rossi.
IEEE/ACM Transactions on Networking, vol. 26, n° 1, pp. 548--561, Janvier 2018.
A Survey on Game Theoretic Approaches for Intrusion Detection and Response Optimization .
Ch. Kiennert, Z. Ismail, H. Debar et J. Leneutre.
ACM Computing Surveys (CSUR), Janvier 2018.
"My autonomous car is an elephant": A Machine Learning based Detector for Implausible Dimension.
J.-Ph. Monteuuis, J. Petit, J. Zhang, H. Labiod, S. Mafrica et A. Servel.
3\textsuperscriptrd International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1--8, Janvier 2018.
Inherent limitations of hybrid transactional memory.
D. Alistarh, J. Kopinsky, P. Kuznetsov, S. Ravi et N. Shavit.
Distributed Computing, vol. 31, n° 3, pp. 167--185, DOI: 10.1007/s00446-017-0305-3, Janvier 2018.
The First Summer School on Practice and Theory of Concurrent Computing SPTCC 2017.
P. Kuznetsov.
SIGACT News, vol. 49, n° 1, pp. 81--90, DOI: 10.1145/3197406.3197421, Janvier 2018.
On Helping and Stacks.
V. Aksenov, P. Kuznetsov et A. Shalyto.
Networked Systems - 6th International Conference, NETYS 2018, Essaouira, Morocco, May 9-11, 2018, Revised Selected Papers, pp. 107--121, DOI: 10.1007/978-3-030-05529-5\_8, Janvier 2018.
Parallel Combining: Benefits of Explicit Synchronization.
V. Aksenov, P. Kuznetsov et A. Shalyto.
22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China, pp. 11:1--11:16, DOI: 10.4230/LIPIcs.OPODIS.2018.11, Janvier 2018.
Task Computability in Unreliable Anonymous Networks.
P. Kuznetsov et N. Yanagisawa.
22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China, pp. 23:1--23:13, DOI: 10.4230/LIPIcs.OPODIS.2018.23, Janvier 2018.
An Asynchronous Computability Theorem for Fair Adversaries.
P. Kuznetsov, Th. Rieutord et Y. He.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, PODC 2018, Egham, United Kingdom, July 23-27, 2018, pp. 387--396, Janvier 2018.
AT2: Asynchronous Trustworthy Transfers.
R. Guerraoui, P. Kuznetsov, M. Monti, M. Pavlovic et D.-A. Seredinschi.
CoRR, vol. abs/1812.10844, Janvier 2018.
Availability enhancement and analysis for mixed-criticality systems on multi-core.
R. Medina, E. Borde et L. Pautet.
2018 Design, Automation \& Test in Europe Conference \& Exhibition, DATE 2018, Dresden, Germany, March 19-23, 2018, pp. 1271--1276, DOI: 10.23919/DATE.2018.8342210, Janvier 2018.
Scheduling Multi-periodic Mixed-Criticality DAGs on Multi-core Architectures.
R. Medina, E. Borde et L. Pautet.
2018 IEEE Real-Time Systems Symposium, RTSS 2018, Nashville, TN, USA, December 11-14, 2018, pp. 254--264, DOI: 10.1109/RTSS.2018.00042, Janvier 2018.
Shedding the Shackles of Time-Division Multiplexing.
F. Hebbache, M. Jan, F. Brandner et L. Pautet.
2018 IEEE Real-Time Systems Symposium, RTSS 2018, Nashville, TN, USA, December 11-14, 2018, pp. 456--468, DOI: 10.1109/RTSS.2018.00059, Janvier 2018.
High-speed per-flow software monitoring with limited resources.
T. ZHANG, L. LINGUAGLOSSA, M. Gallo, P. GIACCONE et D. Rossi.
SIGCOMM Posters and Demos 2018, Budapest, Hungary, Janvier 2018.
Stability and throughput of FAST TCP traffic in bidirectional connections.
Th. Bonald et ....
Resource Allocation and Performance Optimization in Communication Networks and the Internet, vol. 21, n° 4, pp. 1-20, Janvier 2018.
A Unified Framework of Clustering Approach in Vehicular Ad Hoc Networks.
H. Labiod, M. REN, J. Zhang, L. Khoukhi et v. Vèque.
IEEE Transactions on Intelligent Transportation Systems, vol. 19, n° 5, pp. 1401-1414, Janvier 2018.
Lecture on Continuous-Variable Quantum Key Distribution.
R. Alléaume.
Janvier 2018.
On q-ary (partially) bent and plateaued functions over F_q.  
S. Mesnager, F. Ozbudak, A. Smak et G. Cohen.
European Journal of Combinatorics, 2018.
Unique (Optimal) Solutions: Complexity Results for Identifying and Locating-Dominating Codes.
O. Hudry et A. Lobstein.
Theoretical Computer Science, DOI: 10.1016/j.tcs.2018.09.034, 2018.
Application of the ?descent with mutations? metaheuristic to a clique partitioning problem.
O. Hudry.
RAIRO - Operations Research, DOI: 10.1051/ro/2018048, 2018.
Detecting Botclouds at Large Scale: a Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments.
R. Cogranne, G. Doyen, N. Ghadbane et B. Hammi.
IEEE Transactions on Network and Service Management, vol. 15, n° 1, pp. 68--82, 2018.
Listing k-cliques in Large Real-world Graphs.
M. Danisch, O. D. Balalau et M. Sozio.
Proceeding of the World Wide Web Conference (WWW), Lyon, France, 2018.
Fully Dynamic k-center Clustering.
A. Guerquin, T.-H. H. Chan et M. Sozio.
Proceedings of the World Wide Web Conference (WWW), Lyon, France, 2018.
Thoughts and Recommendations from the ACM SIGCOMM 2017 Reproducibility Workshop.
D. Saucez et L. Iannone.
2018.
A Survey on Artifacts from CoNEXT, ICN, IMC, and SIGCOMM Conferences in 2017.
M. Flittner, M. N. Mahfoudi, D. Saucez, M. Waehlisch, L. Iannone, V. Bajpai et A. Afanasyev.
2018.
Assessing Locator/Identifier Separation Protocol interworking performance through RIPE Atlas.
Y. Li et L. Iannone.
2018.
Thoughts and Recommendations from the ACM SIGCOMM 2017 Reproducibility Workshop.
D. Saucez et L. Iannone.
2018.
C-ITS use cases: study, extension and classification methodology.
F. haidar, A. KAISER, B. Lonc, p. urien et R. Denis.
2018.
Adding Missing Words to Regular Expressions.
Th. Rebele, A. Tzompanaki et F. M. Suchanek.
Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Melbourne, Australia, 2018.
A Knowledge Base for Personal Information Management.
D. Montoya, Th. Tanon, S. Abiteboul, P. Senellart et F. M. Suchanek.
Linked Open Data Workshop at the World Wide Web Conference, Lyon, France, 2018.
Game Theory for Security and Risk Management.
Z. Ismail, J. Leneutre, D. Bateman et L. Chen.
2018.
Bubbles of Trust: a decentralized Blockchain-based authentication system for IoT.
M. T. Hammi, B. Hammi, P. Bellot et A. Serhrouchni.
Computers & Security, Elsevier, pp. 15, 2018.
Operations Research and Enterprise Systems.
O. Hudry.
2018.
Shaping photon-pairs time-frequency correlations in inhibited-coupling hollow-core fibers.
M. Cordier, A. Orieux, B. Debord, F. Gérome, A. Gorse, M. Chafer, E. Diamanti, Ph. Delaye, F. Benabid et I. Zaquine.
CLEO: QELS\_Fundamental Science, pp. FM4G--4, 2018.
Adaptive Window Strategy for Topic Modeling in Document Streams.
P.-A. Murena, M. Al-Ghossein, T. Abdessalem et A. Cornuéjols.
International Joint Conference on Neural Networks, 2018.
Online Learning with Reoccurring Drifts: The Perspective of Case-Based Reasoning.
M. Al-Ghossein, P.-A. Murena, A. Cornuéjols et T. Abdessalem.
Third Workshop on Synergies between CBR and Data Mining, ICCBR-2018, 2018.
Ubiquitous Artificial Intelligence and Dynamic Data Streams.
A. Bifet et J. Read.
DEBS, pp. 1--6, 2018.
Scalable Model-Based Cascaded Imputation of Missing Data.
J. Montiel, J. Read, A. Bifet et T. Abdessalem.
PAKDD (3), vol. 10939, pp. 64--76, 2018.
Efficient Exact and Approximate Algorithms for Computing Betweenness Centrality in Directed Graphs.
M. H. Chehreghani, A. Bifet et T. Abdessalem.
PAKDD (3), vol. 10939, pp. 752--764, 2018.
Hamiltonians for one-way quantum repeaters.
F. M. Miatto, M. Epping et N. Lutkenhaus.
Quantum, vol. 2, pp. 75, 2018.
Discriminative Distance-Based Network Indices with Application to Link Prediction.
M. H. Chehreghani, A. Bifet et T. Abdessalem.
The Computer Journal, vol. 61, n° 7, pp. 998--1014, DOI: 10.1093/comjnl/bxy040, 2018.
Open data in the hotel industry: leveraging forthcoming events for hotel recommendation.
M. Al-Ghossein, T. Abdessalem et A. Barré.
Information Technology \& Tourism, 2018.
Machine Learning for Data Streams with Practical Examples in MOA.
A. Bifet, R. Gavaldà, G. Holmes et B. Pfahringer.
MIT Press, 2018.
Scikit-Multiflow: A Multi-output Streaming Framework.
J. Montiel, J. Read, A. Bifet et T. Abdessalem.
Journal of Machine Learning Research, vol. 19, 2018.
Adaptive random forests for data stream regression.
H. M. Gomes, J. P. Barddal, L. E. B. Ferreira et A. Bifet.
26th European Symposium on Artificial Neural Networks, ESANN 2018, Bruges, Belgium, April 25-27, 2018, 2018.
Bitcoin Volatility Forecasting with a Glimpse into Buy and Sell Orders.
T. Guo, A. Bifet et N. Antulov-Fantulin.
IEEE International Conference on Data Mining, ICDM 2018, Singapore, November 17-20, 2018, pp. 989--994, 2018.
Unsupervised real-time detection of BGP anomalies leveraging high-rate and fine-grained telemetry data.
A. Putina, S. Barth, A. Bifet, D. Pletcher, C. Precup, P. Nivaggioli et D. Rossi.
IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2018, Honolulu, HI, USA, April 15-19, 2018, pp. 1--2, DOI: 10.1109/INFCOMW.2018.8406838, 2018.
Telemetry-based stream-learning of BGP anomalies.
A. Putina, D. Rossi, A. Bifet, S. Barth, D. Pletcher, C. Precup et P. Nivaggioli.
Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, Big-DAMA@SIGCOMM 2018, Budapest, Hungary, August 20, 2018, pp. 15--20, 2018.
Building a coverage hole-free communication tree.  
A. Vergne, L. Decreusefond et Ph. Martins.
ACM Q2SWinet Symposium, Montréal, Canada, 2018.
Malliavin and Dirichlet structures for independent random variables.  
L. Decreusefond et H. Halconruy.
Stochastic Processes and their Applications, 2018.
A Sketch-Based Naive Bayes Algorithms for Evolving Data Streams.
M. Bahri, S. Maniu et A. Bifet.
2018 IEEE International Conference on Big Data, BigData 2018, 2018.
Learning Fast and Slow - A Unified Batch/Stream Framework.
J. Montiel, A. Bifet, V. Losing et T. A. Jesse Read.
2018 IEEE International Conference on Big Data, BigData 2018, 2018.
SARA: Security Automotive Risk Analysis Method.
J.-Ph. Monteuuis, A. Boudguiga, J. Zhang, H. Labiod, A. Servel et p. urien.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, pp. 3--14, 2018.
Attacker model for Connected and Automated Vehicles.
J.-Ph. Monteuuis, J. Petit, J. Zhang, H. Labiod, S. Mafrica et A. Servel.
2nd Computer Science in Cars Symposium - Future Challenges in Artificial Intelligence \& Security for Autonomous Vehicles, pp. 3--14, 2018.
Stabilization, Safety, and Security of Distributed Systems - 20th International Symposium, SSS 2018, Tokyo, Japan, November 4-7, 2018, Proceedings.
T. Izumi et P. Kuznetsov.
Springer, DOI: 10.1007/978-3-030-03232-6, 2018.
Inherent limitations of hybrid transactional memory.
D. Alistarh, J. Kopinsky, P. Kuznetsov, S. Ravi et N. Shavit.
Distributed Computing, vol. 31, n° 3, pp. 167--185, DOI: 10.1007/s00446-017-0305-3, 2018.
The First Summer School on Practice and Theory of Concurrent Computing SPTCC 2017.
P. Kuznetsov.
SIGACT News, vol. 49, n° 1, pp. 81--90, DOI: 10.1145/3197406.3197421, 2018.
On Helping and Stacks.
V. Aksenov, P. Kuznetsov et A. Shalyto.
Networked Systems - 6th International Conference, NETYS 2018, Essaouira, Morocco, May 9-11, 2018, Revised Selected Papers, pp. 107--121, DOI: 10.1007/978-3-030-05529-5\_8, 2018.
Parallel Combining: Benefits of Explicit Synchronization.
V. Aksenov, P. Kuznetsov et A. Shalyto.
22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China, pp. 11:1--11:16, DOI: 10.4230/LIPIcs.OPODIS.2018.11, 2018.
Task Computability in Unreliable Anonymous Networks.
P. Kuznetsov et N. Yanagisawa.
22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China, pp. 23:1--23:13, DOI: 10.4230/LIPIcs.OPODIS.2018.23, 2018.
An Asynchronous Computability Theorem for Fair Adversaries.
P. Kuznetsov, Th. Rieutord et Y. He.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, PODC 2018, Egham, United Kingdom, July 23-27, 2018, pp. 387--396, 2018.
AT2: Asynchronous Trustworthy Transfers.
R. Guerraoui, P. Kuznetsov, M. Monti, M. Pavlovic et D.-A. Seredinschi.
CoRR, vol. abs/1812.10844, 2018.
An In-depth Comparison of Group Betweenness Centrality Estimation Algorithms.
M. H. Chehreghani, A. Bifet et T. Abdessalem.
IEEE International Conference on Big Data, Big Data 2018, Seattle, WA, USA, December 10-13, 2018, pp. 2104--2113, 2018.
DyBED: An Efficient Algorithm for Updating Betweenness Centrality in Directed Dynamic Graphs.
M. H. Chehreghani, A. Bifet et T. Abdessalem.
IEEE International Conference on Big Data, Big Data 2018, Seattle, WA, USA, December 10-13, 2018, pp. 2114--2123, 2018.
BTOOLS: Trusted Transaction Generation for Bitcoin and Ethereum Blockchain Based on Crypto Currency SmartCard.
P. Urien et al..
ICDT 2018 - The Thirteenth International Conference on Digital Telecommunications, Athènes, Grèces, DOI: ISBN: 978-1-61208-623-1, 2018.
Knowledge Management for Democratic Governance of Socio-Technical Systems.
J. Pitt, A. Diaconescu et J. Ober.
DOI: 10.1007/978-3-030-05333-8_42018.
Hierarchical Self-awareness and Authority for Scalable Self-integrating Systems.
A. Diaconescu, B. Porter, R. Rodriguez et E. Pournaras.
2018.
Shaping photon-pairs time-frequency correlations in inhibited-coupling hollow-core fibers.
M. Cordier, A. Orieux, B.?t. Debord, F. Gérôme, A. Gorse, M. Chafer, E. Diamanti, Ph. Delaye, F. Benabid et I. Zaquine.
2018 Conference on Lasers and Electro-Optics (CLEO), pp. 1--2, 2018.
Modeling and Analysis of HetNets with mm-Wave Multi-RAT Small Cells Deployed Along Roads.
G. Ghatak, A. De Domenico et M. Coupechoux.
IEEE Global Communications Conference (GLOBECOM), pp. 1-7, Singapore, Singapore, Décembre 2017.
Impact of Information in Greedy Submodular Maximization.  
D. Grimsman, M. S. Ali, J. P. Hespanha et J. R. Marden.
IEEE Conference on Decision and Control (CDC), pp. 1-7, Melbourne, Australia, Décembre 2017.
Advanced Demand Response Considering Modular and Deferrable Loads Under Time-Variable Rates.
S. Al Zahr, E. Doumith et Ph. Forestier.
GLOBECOM 2016, Singapour, Singapour, DOI: 10.1109/GLOCOM.2017.8255068, Décembre 2017.
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks.
P. Gu, C. Hua, Y. Wu, R. Khatoun et A. Serhrouchni.
IEEE GLOBECOM 2017, Singapore, Décembre 2017.
Link Duration Prediction in VANETs via AdaBoost.
J. Zhang, M. REN, H. Labiod et L. Khoukhi.
IEEE GLOBECOM 2017, Singapore, Décembre 2017.
Cournot-Nash Equilibria for Bandwidth Allocation under Base-Station Cooperation.  
J.-S. Gomez, A. Vergne, P. Martins, L. Decreusefond et W. Chen.
IEEE Globecom, Singapore, Singapore, Décembre 2017.
A computational model of moral and legal responsibility via simplicity theory.  
G. Sileno, A. Saillenfest et J.-L. Dessalles.
30th international conference on Legal Knowledge and Information Systems (JURIX 2017), vol. 302, pp. 171-176, Luxembourg, Luxembourg, DOI: 10.3233/978-1-61499-838-9-171, Décembre 2017.
A Streaming Algorithm for Graph Clustering.  
A. Hollocou, J. Maudet, Th. Bonald et M. Lelarge.
NIPS 2017 - Wokshop on Advances in Modeling and Learning Interactions from Complex Data, pp. 1--12, Long Beach, United states, Décembre 2017.
Visualizing the addition of missing words to regular expressions .
Th. Rebele, K. Tzompanaki et F. M. Suchanek.
ISWC demo track, Décembre 2017.
VICKEY: Mining Conditional Keys on Knowledge Bases .
D. Symeonidou, L. Galárraga, N. Pernelle, F. Saïs et F. M. Suchanek.
ISWC, Décembre 2017.
Relating Brain Structures To Open-Ended Descriptions Of Cognition .
J. Dockès, O. Grisel, J. Massich, F. M. Suchanek, B. Thirion et G. Varoquaux.
CCN short paper track, Décembre 2017.
Performance of Balanced Fairness in Resource Pools: A Recursive Approach.  
Th. Bonald, C. Comte et F. Mathieu.
Proceedings of the ACM on Measurement and Analysis of Computing Systems , vol. 1, n° 2, DOI: 10.1145/3154500, Décembre 2017.
Dynamic Arbitration of Memory Requests with TDM-like Guarantees.
F. Hebbache, M. Jan, F. Brandner et L. Pautet.
Workshop on Compositional Theory and Technology for Real-Time Embedded Systems , Paris, France, Décembre 2017.
Massive Online Analytics for the Internet of Things (IoT).  
A. Bifet.
Décembre 2017.
Taxonomy of authentication techniques in Internet of Things (IoT).
M. El-Hajj, M. Chamoun, A. Fadlallah et A. Serhrouchni.
IEEE 15th Student Conference on Research and Development (SCOReD), Putrajaya, Malaysia, Décembre 2017.
Large scale automated assesment tools for code grading.
R. Sharrock.
Microsoft symposium on large scale assessment, Adealide University, Australia, Décembre 2017.
Performance Analysis of Online Matching Algorithms for D2D Communications.
L. Zorello, M. Rojas, M. Coupechoux, R. Vaze et T. Carvalho.
IEEE Latin-American Conference on Communications (LATINCOM), pp. 1-6, Guatemala City, Guatemala, Novembre 2017.
, Leveraging interdomain stability for squeezed and juicy BGP dynamics.
Th. Green, A. Lambert, C. Pessler et D. Rossi.
ACM Internet Measurement Conference (IMC), Poster session,, Novembre 2017.
ALGeoSPF: A Hierarchical Geographical Factorization Model for POI Recommendation.
H. Naacke, J.-B. Griesner, T. Abdessalem et P. Dosne.
Journées Bases de Données Avancées (BDA), pp. 11, Nancy, France, Novembre 2017.
Etude Billetique Mobile HCE.
p. urien.
Agence française pour l?information multimodale et la billettique (AFIMB), Novembre 2017.
IP Video Conferencing: A Tutorial.  
R. Sorokin et J.-L. Rougier.
Video Conferencing, Paris, DOI: arXiv:1711.03418, Novembre 2017.
Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain.
M. JEMEL et A. Serhrouchni.
IEEE 14th International Conference on e-Business Engineering (ICEBE), Shanghai, China, Novembre 2017.
Possible and Certain Answers for Queries over Order-Incomplete Data.
A. Amarilli, M. L. Ba, D. Deutch et P. Senellart.
TIME 2017, Mons, Belgique, DOI: 10.4230/LIPIcs.TIME.2017.4, Octobre 2017.
Auto-Adaptive Multi-Hop Clustering for Hybrid Cellular-Vehicular Networks.
J. Garbiso, A. Diaconescu, M. Coupechoux et B. Leroy.
IEEE International Conference on Intelligent Transportation Systems (ITSC), pp. 1-6, Yokohama, JAPAN, Octobre 2017.
ODMAC++: An IoT Communication Manager Based on Energy Harvesting Prediction.
S. Perez, J. A. Cordero Fuertes et M. Coupechoux.
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1-7, Montreal, Canada, Octobre 2017.
Using Butterfly Keys: a Performance Study of Pseudonym Certificates Requests in C-ITS.
B. Hammi, J.-Ph. Monteuuis, H. Labiod, R. Khatoun et A. Serhrouchni.
1st Cyber Security in Networking Conference, Rio de Janeiro, Brésil, Octobre 2017.
A Study of the Impact of Merging Schemes on Cluster Stability in VANETs.  
M. REN, J. Zhang, L. Khoukhi, H. Labiod et v. Vèque.
2017 PIMRC, Montreal, Canada, Octobre 2017.
Optimize Wireless Networks for Energy Saving by Distributed Computation of ?ech Complex.  
N.-K. Le, A. Vergne, Ph. Martins et L. Decreusefond.
IEEE WiMob 2017, Rome, Italy, Octobre 2017.
Dynamic Adaptive Video Streaming: Towards a systematic comparison of ICN and TCP/IP.  
J. Samain, G. Carofiglio, L. Muscariello, M. Papalini, M. Sardara, M. Tortelli et D. Rossi.
IEEE Transactions on Multimedia, vol. 19, n° 10, pp. 2166-2181, Octobre 2017.
Modeling the Energy Consumption of Programs: Thermal Aspects and Energy/Frequency Convexity Rule.
K. De Vogeleer, K. R. Vaddina, F. Brandner, P. Jouvelot et G. Memmi.
WCSP, Nanjing, China, Octobre 2017.
A Requirements Engineering Approach for Usability-Driven DSL Development.
A. Barisic, D. Blouin, V. Amaral et M. Goulao.
International Conference on Software Language Engineering, Vancouver, Canada, Octobre 2017.
Secure and Resilient Scheme for Data Protection in Unattanded Wireless Sensor Networks.
K. Kapusta, G. Memmi et H. Noura.
1st IEEE-IFIP CSNet, Rio de Janero, Bresil, Octobre 2017.
Using YAGO for the Humanities.
Th. Rebele, A. Nekoei et F. M. Suchanek.
Workshop on Humanities in the Semantic Web - WHiSe II, Vienna, Austria, Octobre 2017.
Blockchain: making money and business from networks and energy: the new internet age ?.
p. urien.
Octobre 2017.
La sécurité de l?IOT.
p. urien.
Octobre 2017.
Massive Online Analytics for the Internet of Things (IoT).  
A. Bifet.
Octobre 2017.
Codestrates: Literate Computing with Webstrates.
R. Rädle, M. Nouwens, K. Antonsen, J. Eagan et C. Klokmose.
The 30th Annual ACM Symposium on User Interface Software and Technology, Québec City, Canada, DOI: 10.1145/3126594.3126642, Octobre 2017.
Proceedings on Cyber Security in Networking.  
R. Khatoun, D. Menezes et O. C. M.B Duarte.
CSNET'2017, IEEE xplore, Octobre 2017.
Identity-based cryptography based key management system for industrial control systems .
Z. DRIAS, A. Serhrouchni et O. VOGEL.
IFIP, 1st Cyber Security in Networking Conference (CSNet) , Rio de Janeiro. Brazil, Octobre 2017.
A Game Theoretical Model for Optimal Distribution of Network Security Resources.
Z. Ismail, Ch. Kiennert, J. Leneutre et L. Chen.
Conference on Decision and Game Theory for Security (GAMESEC 2018), Vienna, Austria, Octobre 2017.
Multilingual cyberbullying detection system: Detecting cyberbullying in Arabic content.
B. Haidar, M. Chamoun et A. Serhrouchni.
IEEE, IFIP, 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil , Octobre 2017.
Analysis of authentication techniques in Internet of Things (IoT).
M. El-Hajj, M. Chamoun, A. Fadlallah et A. Serhrouchni.
IEEE, IFIP, 1st Cyber Security in Networking Conference (CSNet) , Rio de Janeiro, Brazil , Octobre 2017.
Novel market approach for locally balancing renewable energy production and flexible demand.
J. Horta, D. Kofman, D. Menga et A. Silva.
IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, Octobre 2017.
A Lightweight IoT Security Protocol.
M. T. Hammi, E. Livolant, P. Bellot, A. Serhrouchni et P. Minet.
Cyber Security in Networking Conference (CSNet), pp. 8, Rio de Janeiro, Brésil, Octobre 2017.
SINR Model for MBSFN Based Mission Critical Communications.
A. Daher, M. Coupechoux, Ph. Godlewski, J.-M. Kélif, P. Ngouat et P. Minot.
IEEE Vehicular Technology Conference (VTC Fall), pp. 1-5, Toronto, Canada, Septembre 2017.
Experimental demonstration of practical unforgeable quantum money.  
M. Bozzio, A. Orieux, L. Trigo Vidarte, I. Zaquine, I. Kerenidis et E. Diamanti.
Qcrypt, Cambridge UK, Septembre 2017.
Experimental detection of steerability for Bell-local states with two measurement settings.  
E. Diamanti, A. Orieux, I. Zaquine, M. Kaplan, T. Pramanik et V. Venuti.
Qcrypt, Cambridge UK, Septembre 2017.
Parameter sensitivity analysis of the Energy/Frequency Convexity Rule for application processors.
K. De Vogeleer, G. Memmi et P. Jouvelot.
Journal of Sustainable Computing, Informatics and Systems, vol. 15, pp. 16-27, Septembre 2017.
One Fitts' law, two metrics.  
J. Gori, O. Rioul, Y. Guiard et M. Beaudouin-Lafon.
16th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT'17), Mumbai, India, Septembre 2017.
Information-theoretic analysis of human performance for command selection.  
W. Liu, O. Rioul, M. Beaudouin-Lafon et Y. Guiard.
16th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT'17), Mumbai, India, Septembre 2017.
Distributive Justice for Fair Auto-adaptive Clusters of Connected Vehicles.
J. Garbiso, A. Diaconescu, M. Coupechoux et B. Leroy.
International Workshop on Self-Adaptive and Self-Organising Socio-Technical Systems (SASO^ST 2017), pp. 1-6, Tucson, US, Septembre 2017.
Experimental Energy Profiling of Energy-Critical Embedded Applications.
K. R. Vaddina, F. Brandner, G. Memmi et P. Jouvelot.
Symposium on Green Networking and Computing (SGNC), Split, DOI: 10.23919/SOFTCOM.2017.8115536, Septembre 2017.
Knowledge Management Processes and Design Principles for Self-Governing Socio-Technical Systems.
J. Pitt, J. Ober et A. Diaconescu.
5th International Workshop on Self-Adaptive and Self-Organising Socio-Technical Systems (SASO-ST), , Tucson AZ, USA,, Septembre 2017.
A Semi-Automated Approach for the Co-refinement of Requirements and Architecture Models.
M. Barkowski, M. Schneider, H. Giese, J. Dyck, D. Tamzalit, D. Blouin, E. Borde et J. Noppen.
MoDRE, Lisboa, Portugal, Septembre 2017.
CAM-Infrastructure: a novel solution for service advertise- ment in Cooperative Intelligent Transportation Systems.  
B. Hammi, H. Labiod, G. Segarra, A. Servel et J.-Ph. Monteuuis.
Advances in Science, Technology and Engineering Systems Journal. Special Issue on Recent Advances in Engineering Systems 2017, vol. 2, n° 3, pp. 10, Septembre 2017.
A Unified Framework of Clustering Approach in vehicular ad-hoc networks (VANETs).  
M. REN, J. Zhang, L. Khoukhi, H. Labiod et v. Vèque.
IEEE Transactions on Intelligent Transportation Systems, DOI: 10.1109/TITS.2017.2727226, Septembre 2017.
Protocol for preserving privacy in distributed system (PPDS).
A. Aloui, M. Msahli, T. Abdessalem, S. Bressan et S. Mesnager.
Wireless Communications and Mobile Computing Conference (IWCMC), 2017 13th International, pp. 1885--1890, Septembre 2017.
Towards an Efficient File Synchronization between Digital Safes.
M. JEMEL, M. Msahli et A. Serhrouchni.
Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on, pp. 136--143, Septembre 2017.
TLS for Cooperative ITS Services.
M. Msahli, A. Serhrouchni, H. Labiod, A. KAISER et B. Lonc.
IOV, Septembre 2017.
Internet of Things (IoT) Technologies for Smart Cities.
B. Hammi, R. Khatoun, S. Zeadally, A. FAYAD et L. Khoukhi.
IET Networks, Septembre 2017.
Distributed Simplicial Homology Based Load Balancing Algorithm for Cellular Networks.  
N.-K. Le, A.?s. Vergne, Ph. Martins et L. Decreusefond.
IEEE VTC 2017 Fall, Toronto, Canada, Septembre 2017.
A Hybrid Methodology for the Performance Evaluation of Internet-scale Cache Networks .  
E. Leonardi, D. Rossi et M. Tortelli.
Elsevier Computer Networks, vol. 125, pp. 146--159, Septembre 2017.
Exploiting Parallelism in Hierarchical Content Stores for High-speed ICN Routers.  
R. Mansilha, M. Barcellos, E. Leonardi et D. Rossi.
Elsevier Computer Networks, vol. 125, pp. 132--145, Septembre 2017.
Impact of CPU load on video conferencing quality.  
R. Sorokin, J.-L. Rougier, P.-V. Ricardo et T. Nicolas.
Principles, Systems and Applications of IP Telecommunications (IPTComm), vol. 2017, Chicago, IL, USA, DOI: 10.1109/IPTCOMM.2017.8169753, Septembre 2017.
LISP-Views: Monitoring LISP at Large Scale.
Y. Li, A. Abouseif, L. Iannone et D. Saucez.
29th International Teletraffic Conference (ITC), Genova (IT), Septembre 2017.
One-to-One Matching of RTT and Path Changes.  
S. Wenqin, J.-L. Rougier, A. Paris, F. Devienne et M. Viste.
Teletraffic Congress (ITC 29), 2017 29th International, Genoa, Italy, DOI: 10.23919/ITC.2017.8064356, Septembre 2017.
LISP EID Block.
L. Iannone, D. Lewis, D. Meyer et V. Fuller.
Septembre 2017.
LISP EID Block.
L. Iannone, D. Lewis, D. Meyer et V. Fuller.
Septembre 2017.
Grab 'n' Drop: User Configurable Toolglasses.  
J. Eagan.
16th IFIP Conference on Human-Computer Interaction (INTERACT 2017), vol. 10515, pp. 315--334, Mumbai, India, DOI: 10.1007/978-3-319-67687-6_21, Septembre 2017.
2017.
J. Eagan.
HM'17: Conférence francophone sur l'Interaction Homme Machine, Septembre 2017.
Translation of ATL to AGT and Application to a Code Generator for Simulink.
E. Richa, E. Borde et L. Pautet.
Software and Systems Modeling, Août 2017.
Directed Acyclic Graph Scheduling for Mixed-Criticality Systems.
R. Medina, E. Borde et L. Pautet.
Reliable Software Technologies - Ada-Europe 2017 - 22nd Ada-Europe International Conference on Reliable Software Technologies, Vienna, Austria, June 12-16, 2017, Proceedings, pp. 217--232, DOI: 10.1007/978-3-319-60588-3_14, Août 2017.
Technological Impacts in Socio-Technical Communities. Values and Pathologies.
A. Diaconescu et J. Pitt.
IEEE Technology and Society Magazine - special issue based on the Dagstuhl seminar (15482) on "Social Concepts in Self-organising Systems" (11/2015) , Août 2017.
Localization of multiple jamming attackers in vehicular ad hoc network .
L. Pang, X. Chen, Y. Shi, X. Zhi et R. Khatoun.
International Journal of Distributed Sensor Networks, vol. 13, n° 8, Août 2017.
Revue et Perspectives du Toucher Social en IHM.  
M. Teyssier, G. Bailly, E. Lecolinet et C. Pelachaud.
IHM'17: Conférence francophone sur l'Interaction Homme Machine, DOI: 10.1145/3132129.3132135, Août 2017.
Securing PKI Requests for C-ITS systems.
J.-Ph. Monteuuis, B. Hammi, E. Salles Daniel, H. Labiod, R. Blancher, E. Abalea et B. Lonc.
3rd International Workshop on Vehicular Networking and Intelligent Transportation Systems. Held within the 26th International Conference on Computer Communications and Networks (ICCCN 2017), Vancouver, Canada, Août 2017.
Practical implementation of M4 for web visualization service.  
P. Bae, K.-W. Lim, W.-S. Jung et Y.-B. Ko.
Journal of Communications and Networks, vol. 19, n° 4, pp. 384-391, Août 2017.
Démonstration de MarkPad : Augmentation du pavé tactile pour la sélection de commandes.  
B. Fruchard, E. Lecolinet et O. Chapuis.
IHM'17: 29ème conférence francophone sur l'Interaction Homme-Machine, pp. 2, Poitiers, France, Août 2017.
Interaction Techniques Exploiting Memory to Facilitate Command Activation.  
B. Fruchard, E. Lecolinet et O. Chapuis.
29ème conférence francophone sur l'Interaction Homme-Machine, pp. 5, Poitiers, France, Août 2017.
Truthfulness of Candidates in Set of t-uples Expansion.
N. A. S. Er, M. L. Ba, T. Abdessalem et S. Bressan.
Proc. of the 28th International Conference on Database and Expert Systems Applications (DEXA 2017), pp. 314--323, Lyon, France, DOI: 10.1007/978-3-319-64468-4_24, Août 2017.
MASSIVE ONLINE ANALYTICS FOR THE INTERNET OF THINGS (IOT).
A. Bifet.
Août 2017.
Investigating the Design Space of Smartwatches Combining Physical Rotary Inputs.
E. Brulé, G. Bailly, M. Serrano, M. Teyssier, Th. Jacob et S. Huron.
HM'17: Conf\'erence francophone sur l'Interaction Homme Machine, Août 2017.
Interactional Justice for Sustainable Management of Common-Pool Resources.
J. Pitt et A. Diaconescu.
XVI Biennial IASC Conference "Practicing the commons: self-governance, cooperation, and institutional change, Utrecht, Netherlands, Juillet 2017.
Cost-constrained Viterbi Algorithm for Resource Allocation in Solar Base Stations.
V. H. Tran et M. Coupechoux.
IEEE Transactions on Wireless Communications, vol. 16, n° 7, pp. 4166 - 4180, Juillet 2017.
A Circuit-Based Approach to Efficient Enumeration.  
A. Amarilli, P. Bourhis, L. Jachiet et S. Mengel.
ICALP 2017, Varsovie, Pologne, Juillet 2017.
Raman tailored photonic-crystal-fiber for telecom band photon-pair generation.  
M. Cordier, A. Orieux, R. Gabet, Th. Harlé, N. Dubreuil, E. Diamanti, Ph. Delaye et I. Zaquine.
Optics Letters, vol. 42, n° 13, pp. 2583-2586, Juillet 2017.
A complexity based approach for solving Hofstadter's analogies.  
P.-A. Murena, J.-L. Dessalles et A. Cornuéjols.
International Conference on Case-Based Reasoning (ICCBR 2017), pp. 53--62, Trondheim, Nor, Juillet 2017.
Incremental learning with the minimum description length principle.  
P.-A. Murena, A. Cornuéjols et J.-L. Dessalles.
International Joint Conference on Neural Networks (IJCNN 2017), Anchorage, Alaska USA, Juillet 2017.
Conversational topic connectedness predicted by Simplicity Theory.  
J.-L. Dessalles.
Proceedings of the 39th Annual Conference of the Cognitive Science Society, pp. 1914-1919, Austin, TX, Juillet 2017.
Every Dog Has Its Day: a Comparative Study of Clustering Algorithms in VANETs.
J. Zhang, M. REN, H. Labiod et L. Khoukhi.
IEEE ISCC 2017, Héraklion, Grèce, Juillet 2017.
Transport Layer Security (TLS) Authentication using ITS ETSI and IEEE certificates.  
M. Msahli, H. Labiod, A. Serhrouchni et al..
IETF, Juillet 2017.
Monitoring as-a-service to drive more efficient future system design.  
T. Aubonnet, L. Henrio, S. Kessal, f. Lemoine, E. Madelaine et N. Simoni.
European Alliance for Innovation - Endorsed Transactions on Cloud Systems, vol. 3, n° 9, pp. 1-15, DOI: 10.4108/eai.28-6-2017.152754, Juillet 2017.
Introducing TLS/DTLS Secure Access Modules for IoT frameworks: Concepts and experiments.
p. urien.
2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Grèce, DOI: 10.1109/ISCC.2017.8024533, Juillet 2017.
BGP Extended Communities LCAF Type.
D. Saucez et L. Iannone.
Internet Engineering Task Force - (IETF), n° draft-saucez-lisp-lcaf-bgp-communities-02.txt, Juillet 2017.
PROCEDE DE GESTION D'UN ENSEMBLE D'APPAREILS CONSOMMATEURS D'ENERGIE ELECTRIQUE, ET MODULE GESTIONNAIRE D'ENERGIE ELECTRIQUE.
S. Al Zahr, M. Rousselle et Ph. Forestier.
Juin 2017.
SC-PTM or MBSFN for Mission Critical Communications?.  
A. Daher, M. Coupechoux, Ph. Godlewski, P. Ngouat et P. Minot.
IEEE Vehicular Technology Conference (VTC-Spring), pp. 1-6, Sydney, Australia, Juin 2017.
Complexity results on dominating codes.
O. Hudry et A. Lobstein.
The Second Malta Conference in Graph Theory and Combinatorics, Qawra, Malta., Juin 2017.
Adaptive random forests for evolving data stream classification.  
H. M. Gomes, A. Bifet, J. Read, J. P. Barddal, F. Enembreck, B. Pfharinger, G. Holmes et T. Abdessalem.
Machine Learning, DOI: 10.1007/s10994-017-5642-8, Juin 2017.
A Survey on Ensemble Learning for Data Stream Classification.  
H. M. Gomes, J. P. Barddal, F. Enembreck et A. Bifet.
ACM Computing Surveys (CSUR), vol. 50, n° 2, pp. 23, DOI: 10.1145/3054925, Juin 2017.
Data stream classification using random feature functions and novel method combinations.  
D. Marrón, J. Read, A. Bifet et N. Navarro.
Journal of Systems and Software, vol. 127, pp. 195--204, Juin 2017.
Correlation engineering for a flexible Raman free fibered photon source.  
M. Cordier, Ph. Delaye, E. Diamanti, N. Dubreuil, R. Gabet, Th. Harlé, A. Orieux et I. Zaquine.
CLEO-Europe, Munich, Allemagne, Juin 2017.
Influence of fibre homogeneity on Four Wave Mixing pairs generation.  
Th. Harlé, M. Barbier, M. Cordier, A. Orieux, E. Diamanti, I. Zaquine et Ph. Delaye.
CLEO-Europe, Munich, Allemagne, Juin 2017.
Scalable Energy Efficient Routing in Multi-Layer Femtocell Networks.
J. Zhang, H. Labiod, S. e. Hammami et H. Afifi.
IWCMC 2017, Valencia, Espagne, Juin 2017.
Worst-Case Execution Time Analysis of Predicated Architectures.  
F. Brandner et N. Amine.
Workshop on Worst-Case Execution Time Analysis, vol. 57, pp. 1-13, Dubrovnik, Croatia, DOI: 10.4230/OASIcs.WCET.2017.6, Juin 2017.
Democratisation of the SmartGrid and the Active Participation of Prosumers.
J. Pitt, A. Diaconescu et A. Bourazeri.
26th IEEE International Symposium on Industrial Electronics (ISIE), Edinburgh, Scotland, UK,, Juin 2017.
An efficient Secure Storage Scheme Based on Information Fragmentation.
H. Qiu, G. Memmi et H. Noura.
4th IEEE Int. Conf. on Cyber Security and Cloud Computing, pp. 108-113, New-York, USA, Juin 2017.
Replication-Based Self-healing of Mobile Agents Exploring Complex Networks.
A. Rodriguez, J. Gomez et A. Diaconescu.
15th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS), Springer LNAI, , pp. 222--233, Porto, Portugal, DOI: 10.1007/978-3-319-59930-4_18, Juin 2017.
Bounded network coding redundancy for multi-layer video streaming.
H. Baccouch, P.-L. Ageneau, N. Tizon, N. Boukhatem et Th. M. T. Nguyen.
IWCMC, Valencia, Spain, Juin 2017.
Constraint-aware Multi-Path Intra-Flow Network Coding in Wireless Mesh Networks .
P.-L. Ageneau, N. Boukhatem et M. Gerla.
IWCMC 2017, Valencia, Spain, Juin 2017.
A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System.
p. urien et al..
2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, USA, DOI: 10.1109/ICDCSW.2017.22, Juin 2017.
A lightweight mutual authentication protocol for the IoT .
M. T. Hammi, E. Livolant, P. Bellot, A. Serhrouchni et P. Minet.
iCatse International Conference on Mobile and Wireless Technology (ICMWT), pp. 10, Kuala lumpur, Malaisie, Juin 2017.
How Data Workers Cope with Uncertainty: A Task Characterisation Study.  
N. Boukhelifa, M.-E. Perrin, S. Huron et J. Eagan.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 3645-3656, DOI: 10.1145/3025453.3025738, Mai 2017.
MarkPad: Augmenting Touchpads for Command Selection.  
B. Fruchard, E. Lecolinet et O. Chapuis.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 5630-5642, Denver, Colorado, Etats-Unis, DOI: 10.1145/3025453.3025486, Mai 2017.
CoReach: Cooperative Gestures for Data Manipulation on Wall-sized Displays.  
C. Liu, O. Chapuis, M. Beaudouin-Lafon et E. Lecolinet.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 6730-6741 , DOI: 10.1145/3025453.3025594, Mai 2017.
BIGnav: Bayesian Information Gain for Guiding Multiscale Navigation.  
W. Liu, R. Lucas DOliveira, M. Beaudouin-Lafon et O. Rioul.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 5869-5880, Denver, Colorado, USA, DOI: 10.1145/3025453.3025524, Mai 2017.
Effects of Frequency Distribution on Linear Menu Performance.  
W. Liu, G. Bailly et A. Howes.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 1307-1312, Denver, Colorado, USA, DOI: 10.1145/3025453.3025707, Mai 2017.
IconHK: Using Toolbar button Icons to Communicate Keyboard Shortcuts.  
E. Giannisakis, G. Bailly, S. Malacria et F. Chevalier.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 4715-4726, Denver, Colorado, Etats-Unis, DOI: 10.1145/3025453.3025595, Mai 2017.
Passive yet Expressive TouchTokens.  
R. Morales, C. Appert, G. Bailly et E. Pietriga.
In CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 3741-3745 , DOI: 10.1145/3025453.3025894, Mai 2017.
To Miss is Human: Information-Theoretic Rationale for Target Misses in Fitts' Law.  
J. Gori, O. Rioul et Y. Guiard.
CHI'17: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 260-264, Denver, USA, DOI: 10.1145/3025453.3025660, Mai 2017.
Subcarrier and Power allocation for Sum Rate Maximization in Multicarrier NOMA Systems.  
Y. Fu, L. Salaun, Ch. W. Sung, Ch. S. C. Chen et M. Coupechoux.
IEEE International Conference on Communications (ICC), Paris, France, Mai 2017.
Path separation by short cycles.  
G. Cohen, E. Fachini et J. Korner.
Journal of Graph Theory, vol. 85, n° 1, pp. 107-114, Mai 2017.
Conjunctive Queries on Probabilistic Graphs: Combined Complexity.  
A. Amarilli, M. Monet et P. Senellart.
PODS 2017, Chicago, États-Unis, Mai 2017.
Optimal Distributed Channel Assignment in D2D Networks Using Learning in Noisy Potential Games.  
M. S. Ali, P. Coucheney et M. Coupechoux.
IEEE Infocom 5G & Beyond Workshop, pp. 1-6, Atlanta, US, Mai 2017.
Rules for Computing Resistance of Transitions of Learning Algorithms in Games.  
M. S. Ali, P. Coucheney et M. Coupechoux.
EAI International Conference on Game Theory for Networks (GAMENET), pp. 1-8, Knoxville, US, Mai 2017.
ConnexSensors: An open IoT solution designed for and by industrials.
C. Devic, E. Livolant, J.-P. Carrié, P. Minet et P. Bellot.
International Conference on Software & Systems Engineering and their Applications (ICSSEA 2017), Paris, France, Mai 2017.
VersaPen: An Adaptable, Modular and Multimodal I/O Pen.  
M. Teyssier, G. Bailly et E. Lecolinet.
CHI'17 Extended Abstracts: ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 2155-2163, Denver, USA, DOI: 10.1145/3027063.3053159, Mai 2017.
VersaPen: Exploring Multimodal Interactions with a Programmable Modular Pen.  
M. Teyssier, G. Bailly et E. Lecolinet.
CHI'17 Extended Abstracts (demonstration): ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 377 - 380, Denver, USA, DOI: 10.1145/3027063.3052964, Mai 2017.
ASN.1 specification for ETSI certificates and encoding performance study.
B. Hammi, J.-Ph. Monteuuis, E. Salles Daniel et H. Labiod.
18th IEEE International Conference on Mobile Data Management, pp. 291--298, Corée du sud, Mai 2017.
Practical Random Linear Coding for Multi-Path TCP : MPC-TCP.
P.-L. Ageneau, N. Boukhatem et M. Gerla.
ICT 2017, Cyprus, Mai 2017.
Back to the future, Les défis de la sécurité de l'internet of things.
p. urien.
CRYPTO'PUCES 2017, Porquerolles, France, Mai 2017.
Internet of Things (IoT) Analytics.  
A. Bifet.
Mai 2017.
Collapsing the layers: 6Stor, a scalable and IPv6-centric distributed storage system.  
G. Ruty, A. Surcouf et J.-L. Rougier.
Software Defined Systems (SDS), 2017 Fourth International Conference on, Valencia, Spain, DOI: 10.1109/SDS.2017.7939145, Mai 2017.
Malleable User Interface Toolkits for Cross-Surface Interaction.  
J. Eagan.
HCI.Tools: Strategies and Best Practices for Designing, Evaluating, and Sharing Technical HCI Toolkits workshop at CHI 2017, Denver, United states, Mai 2017.
Analysis of the influence of diversity in collaborative and multi-view clustering.  
J. Sublime, B. Matei et P.-A. Murena.
IJCNN-2017 (Int. Joint Conf. on Neural Networks), Anchorage, USA, Mai 2017.
On a generalised combinatorial conjecture involving addition mod 2^k -1 .  
J.-P. Flori et G. Cohen.
Int. J. Information and Coding Theory, vol. 4, n° 2/3, pp. 107-115, Avril 2017.
CODECAST: an innovative technology to facilitate teaching and learning computer programming in a C Language online course.
R. Sharrock, E. Hamonic, M. Hiron et S. Carlier.
Learning at scale, Cambridge, USA, Avril 2017.
Incentive-oriented Task Assignment in Holonic Organic Systems.
J. Kantert, S. Tomforde, A. Diaconescu et Ch. Müller-Schloer.
5th International Workshop on "Self-Optimisation in Autonomic and Organic Computing Systems, SAOS@ARCS 2017, Vienna, Austria, Avril 2017.
A Stochastic Approach for Packet Dropping Attacks Detection in Mobile Ad hoc Networks.  
M. Rmayti, R. Khatoun, Y. Begriche, L. Khoukhi et D. Gaïti.
Journal of Computer Networks,, Avril 2017.
A Statistical Detection Mechanism for Node Misbehaviors in Wireless Mesh Networks (WMNs).
R. Khatoun, Y. Begriche et L. Khoukhi.
International Journal of Ad Hoc and Ubiquitous Computing, Avril 2017.
Optimization of wireless sensor networks deployment with coverage and connectivity constraints.
S. Elloumi, O. Hudry, E. Marie, A. Plateau et S. Rovedakis.
4th International Conference on Control, Decision and Information Technologies (CoDIT'17), pp. 336-341, Barcelone, Espagne, Avril 2017.
Fast algebraic immunity of Boolean functions.  
S. Mesnager et G. Cohen.
Advances in Mathematics of Communications, vol. 11, n° 2, pp. 373-377, Avril 2017.
Multi-User Quantum Key Distribution With Entangled Photons From A Semiconductor Chip.
C. Autebert, E. Diamanti, S. Ducci, C. Gomez-Carbonnel, A. Lemaître, A. Orieux, J. Trapateau et I. Zaquine.
Quantum Information and Measurement, pp. QT6A.20, Paris, Avril 2017.
Liquid Filled Photonic Crystal Fiber : A Flexible Tool For Fibered Photon-Pair Generation.
M. Cordier, Ph. Delaye, E. Diamanti, N. Dubreuil, R. Gabet, Th. Harlé, A. Orieux et I. Zaquine.
Quantum Information and Measurement, pp. QW3C.5, Paris, Avril 2017.
Constraints on photonic crystal fibers homogeneity for photon pair generation.
Th. Harlé, M. Barbier, M. Cordier, A. Orieux, E. Diamanti, I. Zaquine et Ph. Delaye.
Quantum Information and Measurement, pp. QT6A.19 , Avril 2017.
The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience.  
E. Bocchi, L. De Cicco, M. Mellia et D. Rossi.
Passive and Active Measurements, pp. --, Sydney, Australia, Avril 2017.
Codecast: a step-by-step online execution tool to learn how to program in C.
R. Sharrock.
MIT Learning seminar, Cambridge, MA, USA, Avril 2017.
Integration of learning tools using LTI on edX.
R. Sharrock.
Boston University Digital Learning Seminars, Boston, USA, Avril 2017.
Three tools to learn C programming online.
R. Sharrock.
HarvardX seminar, Cambridge, MA, USA, Avril 2017.
Présentation de l'outil Codecast.
R. Sharrock.
Journée Comité des Usages Mutualisés du numérique pour l'Enseignement, Université Paris Descartes, Avril 2017.
Tabu search heuristic for competitive base station location problem.  
M. Coupechoux, I. Davydov et S. Iellamo.
Mars 2017.
Top-k Queries on Unknown Values under Order Constraints.  
A. Amarilli, Y. Amsterdamer, T. Milo et P. Senellart.
ICDT 2017, Venice, Italy, Mars 2017.
Combined Tractability of Query Evaluation via Tree Automata and Cycluits.  
A. Amarilli, P. Bourhis, M. Monet et P. Senellart.
ICDT 2017, Venice, Italy, Mars 2017.
Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks.
P. Gu, R. Khatoun, Y. Begriche et A. Serhrouchni.
Wireless Networks of the IEEE WCNC 2017 conference, San Francisco, CA, USA, Mars 2017.
Upper and lower bounds for the q-entropy of network models with application to network model selection.  
M. H. Chehreghani et T. Abdessalem.
Information Processing Letters, vol. 119, pp. 1-8, Mars 2017.
A Controlled Matching Game for WLANs.
M. Touati, R. Elazouzi, M. Coupechoux, E. Altman et J.-M. Kélif.
IEEE Journal on Selected Areas in Communications, Special Issue on Game Theory for Networks, vol. 35, n° 3, pp. 1-14, Mars 2017.
Note sur la cryptanalyse de Diffie-Hellman.
m. rambaud et G. Memmi.
Génie Logiiel, n° 120, pp. 56-60, Mars 2017.
Traffic Analysis with Off-the-Shelf Hardware: Challenges and Lessons Learned.  
T. Martino, A. Finamore, M. Mellia, M. Munafo et D. Rossi.
IEEE Communication Magazine, vol. 55, n° 3, pp. 163 - 169, Mars 2017.
Network Coding Schemes for Multi-Layer Video Streaming on Multi-Hop Wireless Networks.
H. Baccouch, P.-L. Ageneau, N. Tizon et N. Boukhatem.
WCNC, San Francisco, USA, Mars 2017.
Community Detection in Signed Networks Based on Extended Signed Modularity.
T. Murata, T. Sugihara et T. Abdessalem.
Proceedings of the 8th Conference on Complex Networks CompleNet 2017, Dubrovnik, Croatia, DOI: 10.1007/978-3-319-54241-6_6, Mars 2017.
Deploy-As-You-Go Wireless Relay Placement: An Optimal Sequential Decision Approach using the Multi-Relay Channel Model.
A. Chattopadhyay, A. Sinha, M. Coupechoux et A. Kumar.
IEEE Transactions on Mobile Computing, vol. 16, n° 2, pp. 341 - 354, Février 2017.
Towards combining Admission Control and Link Scheduling in 802.11-based Wireless Mesh Networks.
J. Dromard, R. Khatoun, L. Khoukhi et Y. Begriche.
Telecommunication Systems, Février 2017.
k-Nearest Neighbours Classification Based Sybil Attack Detection in Vehicular Networks.
P. Gu, R. Khatoun, Y. Begriche et A. Serhrouchni.
Third Conference On Mobile And Secure Services, Florida, USA, Février 2017.
Operations Research and Voting Theory.
O. Hudry.
Février 2017.
Grasping the gap between blocking and non-blocking transactional memories.
P. Kuznetsov et S. Ravi.
J. Parallel Distrib. Comput., vol. 101, pp. 1--16, Février 2017.
Grasping the gap between blocking and non-blocking transactional memories.
P. Kuznetsov et S. Ravi.
J. Parallel Distrib. Comput., vol. 101, pp. 1--16, Février 2017.
Self-Aware Computing Systems.
J. Camara, K. Bellman, J. Kephart, M. Autili, N. Bencomo, A. Diaconescu, H. Giese, S. Gotz, P. Inverardi, S. Kounev et al..
DOI: 10.1007/978-1-4471-5007-7Février 2017.
Challenges, Solutions and Implications for Large Scale Enterprise Systems: OR in the Age of Big Data.
O. Hudry.
Février 2017.
Optimal Distributed Channel Assignment in D2D Networks Using Learning in Noisy Potential Games.
M. Coupechoux.
IIT Kanpur Seminar, Kanpur, India, Février 2017.
Towards secure Bitcoin fast trading: Designing secure elements for digital currency.
p. urien.
2017 Third International Conference on Mobile and Secure Services (MobiSecServ), Miami, USA, DOI: 10.1109/MOBISECSERV.2017.7886560, Février 2017.
Set of tuples expansion by example with reliability.
N. A. S. Er, M. L. Ba, T. Abdessalem et S. Bressan.
International Journal of Web Information Systems (IJWIS), vol. 13, n° 4, pp. 425--444, DOI: 10.1108/IJWIS-04-2017-0037, Février 2017.
Self-coherent phase reference sharing for continuous-variable quantum key distribution.
A. Marie et R. Alléaume.
Physical Review A, vol. 95, n° 1, pp. 012316, Février 2017.
Proceedings of the 2017 Third Conference on Mobile and Secure Services (MOBISECSERV).
S. Piramuthu et P. Urien.
MOBISECSERV, Piscataway, NJ IEEE, DOI: ISBN 9781509036325, Février 2017.
Cybersecurity and Privacy Solutions in Smart Cities.
R. Khatoun et S. Zeadally.
IEEE Communications Magazine, Janvier 2017.
What if machines could be creative?.
F. M. Suchanek, C. Menard, M. Bienvenu et C. Chapellier.
ISWC (demo), Janvier 2017.
Predicting Completeness in Knowledge Bases.
L. Galárraga, S. Razniewski, A. Amarilli et F. M. Suchanek.
WSDM, Janvier 2017.
Multi-objective exploration of architectural designs by composition of model transformations.  
S. Rahmoun, A. Mehiaoui-Hamitou, E. Borde, L. Pautet et E. Soubiran.
Software and Systems Modeling, pp. 1-21, DOI: 10.1007/s10270-017-0580-2, Janvier 2017.
Prioritized network coding scheme for multi-layer video streaming.
H. Baccouch, P.-L. Ageneau, N. Tizon et N. Boukhatem.
CCNC, Las Vegas, USA, Janvier 2017.
Securing the IoT with TLS/DTLS server stacks embedded in secure elements: An ePlug usecase.
p. urien.
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, DOI: 10.1109/CCNC.2017.7983170, Janvier 2017.
Un Modèle de Factorisation de Poisson pour la Recommandation de Points d'Intérêt.
J.-B. Griesner, T. Abdessalem et H. Naacke.
17ème Journées Francophones Extraction et Gestion des Connaissances (EGC 2017), pp. 411--416, Grenoble, France, Janvier 2017.
Iannone. BGP Extended Communities LCAF Type.
D. Saucez et L. Iannone.
Internet Engineering Task Force (IETF), n° Draft-saucez-lisp-lcaf-bgp-communities-01.txt, Janvier 2017.
More Results on the Complexity of Domination Problems in Graphs.  
O. Hudry et A. Lobstein.
International Journal of Information and Coding Theory, vol. 4, n° 2/3, pp. 129-144, 2017.
The signature of rational languages.
V. Marsault et J. Sakarovitch.
Theoretical Computer Science, vol. 658, pp. 216-234, DOI: 10.1016/j.tcs.2016.04.023, 2017.
Proposal of new solution for service advertisement for ETSI ITS environments: CAM-Infrastructure.  
H. Labiod, A. Servel, G. Segarra, B. Hammi, J.-Ph. Monteuuis et al..
the 8th IFIP International Conference on New Technologies, Mobility and Security, pp. 1-4, Larnaca, Cyprus, 2017.
Self-Aware Computing Systems.
S. Kounev, P. Lewis, K. Bellman, N. Bencomo, J. Camara, A. Diaconescu, L. Esterle, K. Geihs, H. Giese, S. Gotz, P. Inverardi, J. Kephart et A. Zisman.
2017.
Self-Aware Computing Systems.
P. Lewis, K. Bellman, Ch. Landauer, L. Esterle, K. Glette, A. Diaconescu et H. Giese.
2017.
Self-Aware Computing Systems.
J. Kephart, M. Maggio, A. Diaconescu, H. Giese, H. Hoffmann, S. Kounev, A. Koziolek, P. Lewis, A. Robertsson et S. Spinner.
2017.
Self-Aware Computing Systems.
H. Giese, Th. Vogel, A. Diaconescu, S. Gotz et S. Kounev.
2017.
Self-Aware Computing Systems.
H. Giese, Th. Vogel, A. Diaconescu, S. Gotz et K. Bellman.
2017.
Self-Aware Computing Systems.
A. Diaconescu, K. Bellman, L. Esterle, H. Giese, S. Gotz, P. Lewis et A. Zisman.
2017.
Self-Aware Computing Systems.
H. Giese, Th. Vogel, A. Diaconescu, P. Lewis, S. Gotz, N. Bencomo, K. Geihs, S. Kounev, K. Bellman et P. Inverardi.
2017.
Self-Aware Computing Systems.
J. Kephart, A. Diaconescu, H. Giese, A. Robertsson, T. Abdelzaher, P. Lewis, A. Filieri, L. Esterle et S. Frey.
2017.
Self-Aware Computing Systems.
M. Autili, K. Bellman, A. Diaconescu, L. Esterle, M. Tivoli et A. Zisman.
2017.
Organic Computing: Technical Systems for Survival in the Real World.  
A. Diaconescu.
2017.
Organic Computing: Technical Systems for Survival in the Real World,.  
A. Diaconescu.
2017.
Cognitive Management of Self -Organized Radio Networks Based on Multi Armed Bandit.  
T. Daher, S. Jemaa et L. Decreusefond.
PIMRC 2017 28th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications , Montreal, Canada, 2017.
A Spectral Algorithm with Additive Clustering for the Recovery of Overlapping Communities in Networks.  
E. Kaufmann, Th. Bonald et M. Lelarge.
Journal of Theoretical Computer Science (TCS), 2017.
Fair throughput allocation in Information-Centric Networks.  
Th. Bonald, L. Mekinda et L. Muscariello.
Computer Networks, vol. 125, pp. 122 -- 131, DOI: 10.1016/j.comnet.2017.05.019, 2017.
Balanced Fair Resource Sharing in Computer Clusters.  
Th. Bonald et C. Comte.
Performance Evaluation, DOI: 10.1016/j.peva.2017.08.006, 2017.
Poly-symmetry in processor-sharing systems.  
Th. Bonald, C. Comte, V. Shah et G. De Veciana.
Queueing Systems, DOI: 10.1007/s11134-017-9525-2, 2017.
Convergence to multi-resource fairness under end-to-end window control.  
Th. Bonald, J. Roberts et Ch. Vitale.
IEEE INFOCOM, Atlanta, United states, 2017.
A Minimax Optimal Algorithm for Crowdsourcing.  
Th. Bonald et R. Combes.
NIPS, Los Angeles, United states, 2017.
Multiple Local Community Detection.  
A. Hollocou, Th. Bonald et M. Lelarge.
Performance Evaluation, New York City, United states, 2017.
Towards a Self-healing Multi-agent Platform for Distributed Data Management.
A. Rodriguez, J. Gomez et A. Diaconescu.
DOI: 10.1007/978-3-319-59930-4_362017.
Large Scale Density-friendly Graph Decomposition via Convex Programming.
M. Danisch, T.-H. H. Chan et M. Sozio.
Proceedings of the World Wide Web Conference, 2017.
On the uncontended complexity of anonymous agreement.
C. Capdevielle, C. Johnen, P. Kuznetsov et A. Milani.
Distributed Computing, vol. 30, n° 6, pp. 459--468, DOI: 10.1007/s00446-017-0297-z, 2017.
Non-interference and local correctness in transactional memory.
P. Kuznetsov et S. Peri.
Theor. Comput. Sci., vol. 688, pp. 103--116, DOI: 10.1016/j.tcs.2016.06.021, 2017.
A Concurrency-Optimal Binary Search Tree.
V. Aksenov, V. Gramoli, P. Kuznetsov, A. Malova et S. Ravi.
Euro-Par 2017: Parallel Processing - 23rd International Conference on Parallel and Distributed Computing, Santiago de Compostela, Spain, August 28 - September 1, 2017, Proceedings, pp. 580--593, DOI: 10.1007/978-3-319-64203-1_42, 2017.
Agreement Functions for Distributed Computing Models.
P. Kuznetsov et Th. Rieutord.
Networked Systems - 5th International Conference, NETYS 2017, Marrakech, Morocco, May 17-19, 2017, Proceedings, pp. 175--190, DOI: 10.1007/978-3-319-59647-1_14, 2017.
Brief Announcement: Compact Topology of Shared-Memory Adversaries.
P. Kuznetsov, Th. Rieutord et Y. He.
31st International Symposium on Distributed Computing, DISC 2017, October 16-20, 2017, Vienna, Austria, pp. 56:1--56:4, DOI: 10.4230/LIPIcs.DISC.2017.56, 2017.
Progress-Space Tradeoffs in Single-Writer Memory Implementations.
D. Imbs, P. Kuznetsov et Th. Rieutord.
CoRR, vol. abs/1709.01879, 2017.
Parallel Combining: Making Use of Free Cycles.
V. Aksenov et P. Kuznetsov.
CoRR, vol. abs/1710.07588, 2017.
How to Find the Best Rated Items on a Likert Scale and How Many Ratings Are Enough.
Q. Liu, D. Basu, S. Goel, T. Abdessalem et S. Bressan.
Database and Expert Systems Applications - 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part II, pp. 351--359, DOI: 10.1007/978-3-319-64471-4_28, 2017.
Proceedings of the Workshop on IoT Large Scale Learning from Data Streams co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18-22.
M. S. Mouchaweh, A. Bifet, H. Bouchachia, J. Gama et R. P. Ribeiro.
CEUR-WS.org, 2017.
Trends in Social Network Analysis - Information Propagation, User Behavior Modeling, Forecasting, and Vulnerability Assessment.
R. missaoui, T. Abdessalem et M. Latapy.
Springer International Publishing, New York, USA, DOI: 10.1007/978-3-319-53420-6, 2017.
LISP EID Block.
L. Iannone, D. Lewis, D. Meyer et V. Fuller.
Internet Engineering Task Force - (IETF), 2017.
LISP EID Block Management Guidelines.
L. Iannone, R. Jorgensen, D. Conrad et G. Huston.
Internet Engineering Task Force - (IETF), 2017.
On metric convexity, the discrete Hahn-Banach theorem, separating systems and sets of points forming only acute angles.
H. Randriambololona.
Int. J. of Information and Coding Theory, vol. 4, n° 2/3, pp. 159-169, 2017.
Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions.
C. Carlet, S. Mesnager, F. Ozbudak et A. Sinak.
C2SI-2017, 2017.
New bent functions from permutations and linear translators.
S. Mesnager, P. Ongan et F. Ozbudak.
C2SI-2017, 2017.
A new class of three-weight linear codes from weakly regular plateaued functions.
S. Mesnager, F. Ozbudak et A. Sinak.
WCC 2017, 2017.
Fiber-Wireless Convergence in Next-Generation Communications Networks.
M. Gagnaire.
DOI: 10.2017.
Resilience by design et prévision de défaillances des capteurs dans le véhicule autonome et connecté.
J.-Ph. Monteuuis, H. Labiod, S. Mafrica, A. Servel, p. urien et J. Zhang.
2017.
Trees and languages with periodic signature.
V. Marsault.
Indagationes Mathematicae, vol. 28, pp. 221-246, 2017.
Multi-user quantum key distribution with entangled photons from an AlGaAs chip.
C. Autebert, J. Trapateau, A. Orieux, A. Lemaître, C. Gomez-Carbonnel, E. Diamanti, I. Zaquine et S. Ducci.
Quantum Science and Technology, vol. 1, pp. 1, Décembre 2016.
Visual Menu Techniques.  
G. Bailly, E. Lecolinet et L. Nigay.
ACM Computer Surveys, vol. 49, n° 4, pp. 41 pages, DOI: 10.1145/3002171, Décembre 2016.
Online Budgeted Truthful Matching.
R. Vaze et M. Coupechoux.
ACM SIGMETRICS Performance Evaluation , vol. 44, n° 3, pp. 3-6, Décembre 2016.
A Mobility-based Scheme for Dynamic Clustering in Vehicular Ad -hoc Networks (VANETs).  
M. REN, L. Khoukhi, H. Labiod, J. Zhang et v. Vèque.
Elsevier Vehicular Communications, DOI: https://doi.org/10.1016/j.vehcom.2016.12.003, Décembre 2016.
Securite de l?Internet des choses.
p. urien.
Décembre 2016.
Missing measurements on RIPE Atlas.  
S. Wenqin, J.-L. Rougier, F. Devienne et M. Viste.
CoNEXT Student Workshop 2016, Irvine, California, USA, DOI: arXiv:1701.00938, Décembre 2016.
Systeme de securite pour systeme de controle industriel.
Z. DRIAS.
Décembre 2016.
Security Incident Response: Towards a Novel Decision-Making System.
S. Souissi, A. Serhrouchni, L. Sliman et B. Charroux.
International Conference on Intelligent Systems Design and Applications, Porto, Portugal, Décembre 2016.
The Cloud of Secure Elements: Virtualization of trust and security for a connected world. Cloud, Access Control and Payment applications.
P. Urien.
Novembre 2016.
Dynamic Cluster Size Optimization in Hybrid Cellular-Vehicular Networks.
J. Garbiso, A. Diaconescu, M. Coupechoux et B. Leroy.
IEEE Intelligent Transportation Systems Conference, pp. 1-7, Rio de Janeiro, Brazil, Novembre 2016.
La sécurité dans les systèmes de transports intelligents..
J.-Ph. Monteuuis, J. Huor, E. Daniel et R. Khatoun.
Multi-System & Internet Security Cookbook (MISC), Novembre 2016.
Stability and Consistency of the LISP Pull Routing Architecture.
Y. Li, D. Saucez, L. Iannone et B. Donnet.
10th IEEE Workshop on Network Measurements (WNM?16), Dubai, UAE, Novembre 2016.
Performance Evaluation of Link Metrics in Vehicle Networks: a Study from the Cologne Case.  
J. Zhang, M. REN et H. Labiod.
the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, Malta, Malta, DOI: 10.1145/2989275.2989292, Novembre 2016.
Energy efficient multi-layer femtocell networks.
J. Zhang et H. Labiod.
IFIP NTMS 2016, Larnaca Bay, Cyprus, Novembre 2016.
Formal semantics of behavior specifications in the architecture analysis and design language standard.  
L. Besnard, Th. Gautier, C. Guy, P. Le Guernic, J.-P. Talpin, B. Larson et E. Borde.
IEEE International High Level Design Validation and Test Workshop, pp. 30-39, Santa Cruz, USA, DOI: 10.1109/HLDVT.2016.7748252, Novembre 2016.
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures.  
Z. Ismail, J. Leneutre, D. Bateman et L. Chen.
Seventh Conference on Decision and Game Theory for Security (GameSec 2016), LNCS, vol. 9996, pp. 159-171, New York, USA, Novembre 2016.
Adaptive redundancy scheme for scalable video traffic using network coding.
H. Baccouch, P.-L. Ageneau et N. Boukhatem.
NOF, BUZIOS, Brésil, Novembre 2016.
Three Innovative Directions Based on Secure Elements for Trusted and Secured IoT Platforms.
p. urien.
8th IFIP International Conference on New Technologies, Mobility and Security, NTMS'2016, Lanarca, Chypre, DOI: 10.1109/NTMS.2016.7792482, Novembre 2016.
Internet of Things And Security.
p. urien.
Novembre 2016.
Tamper resistance, secure communications, and storage: three prerequisites for the Internet of Things.
p. urien.
Novembre 2016.
Set of t-uples expansion by example.
N. A. S. Er, T. Abdessalem et S. Bressan.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services (iiWAS 2016), pp. 221--230, Singapore, Singapore, DOI: 10.1145/3011141.3011144, Novembre 2016.
Massive Online Analytics for the Internet of Things (IoT).  
A. Bifet.
Novembre 2016.
Revisiting NFV Orchestration with Routing Games.
M. Obadia, J.-L. Rougier, L. I. V. Conan et M. Bouet.
IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Palo Alto Ca. (USA), Novembre 2016.
Revisiting NFV orchestration with routing games.  
M. Obadia, J.-L. Rougier, L. Iannone, V. Conan et M. Bouet.
Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE Conference on, Palo Alto, CA, USA, DOI: 10.1109/NFV-SDN.2016.7919484, Novembre 2016.
Un phénomène biologique unique.  
J.-L. Dessalles.
TDC, vol. 1106, pp. 52-57, Novembre 2016.
MAC Sub-Layer Node Authentication in OCARI.
M. T. Hammi, E. Livolant, P. Bellot, A. Serhrouchni et P. Minet.
IFIP International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN), pp. 6, Paris, France, Novembre 2016.
Large scale learning tools.
R. Sharrock.
Edx Global Forum, Paris, France, Novembre 2016.
Multi-user quantum key distribution with a semi-conductor source of entangled photon pairs.
C. Autebert, J. Trapateau, A. Orieux, A. Lemaître, C. Gomez-Carbonnel, E. Diamanti, I. Zaquine et S. Ducci.
Frontiers in Optics, Rochester, USA, Octobre 2016.
Desktop Orbital Camera Motions Using Rotational Head Movements.  
Th. Jacob, G. Bailly, E. Lecolinet, G. Casiez et M. Teyssier.
SUI'16: ACM Symposium on Spatial User Interaction, pp. 139-148, Tokyo, Japon, DOI: 10.1145/2983310.2985758, Octobre 2016.
Impact of Motorized Projection Guidance on Spatial Memory.  
H. Gacem, G. Bailly, J. Eagan et E. Lecolinet.
SUI'16: ACM Symposium on Spatial User Interaction, pp. 51-59, Tokyo, Japan, DOI: 10.1145/2983310.2985751, Octobre 2016.
A control theoretic analysis of low-priority congestion controlreprioritization under AQM.  
L. De Cicco, Y. Gong, D. Rossi et E. Leonardi.
ACM Transactions on Modeling and Performance Evaluation of Computer Systems, vol. 1, n° 4, pp. 17:1--17:33, Octobre 2016.
Framework, Models and Controlled Experiments of NetworkTroubleshooting.  
F. Espinet, D. Joumblatt et D. Rossi.
Elsevier Computer Networks, vol. 107, pp. 36-54, Octobre 2016.
Eliciting Strategies and Tasks in Uncertainty-Aware Data Analytics.  
N. Boukhelifa, M.-E. Perrin, S. Huron et J. Eagan.
IEEE VAST '16 Compendium: IEEE Conference on Visual Analytics Science and Technology Posters Compendium, pp. 2, Octobre 2016.
A joint active time and flow selection model for cellular content retrieval through ITS.  
G.E.M. Zhioua, J. Zhang, H. Labiod, N. Tabbane et S. Tabbane.
Computer Networks, vol. 107, n° 2, pp. 220-232, DOI: 10.1016/j.comnet.2016.03.015, Octobre 2016.
A non?biased trust model for wireless mesh networks.  
T. Heng Chuan, M. Ma, H. Labiod, P.H.J. Chong et J. Zhang.
WileyInternational journal of communication systems, DOI: 10.1002/dac.3200, Octobre 2016.
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks.  
T. Heng Chuan, M. Ma, H. Labiod, A. Boudguiga, J. Zhang et P.H.J. Chong.
IEEE Transactions on Vehicular Technology, DOI: 10.1109/TVT.2016.2621354, Octobre 2016.
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation.
K. Kapusta, G. Memmi et H. Noura.
ACM Conference on Computer and Communications Security 2016, Vienna, Austria, Octobre 2016.
Network service description for virtual network deployment: A constraints based OVF extension proposal.
N. Simoni et Diaz Gldys.
CNSM, pp. 363-366, Octobre 2016.
On-demand, dynamic and at-the-edge VNF deployment model application to Web Real-Time Communications.
a. Boubendir, E. Bertin et N. Simoni.
CNSM, pp. 318-323, Octobre 2016.
Exploring Complex Networks with Failure-prone Agents.
A. R. Portadela, J. Gomez et A. Diaconescu.
15th Mexican International Conference on Artificial Intelligence (MICAI'16), Springer LNCS, Cancun, Mexico,, Octobre 2016.
Energy balancing in a microgrid based on sources and loads classification.
M. Gagnaire, S. Al Zahr et Y. Kacem.
2016 Global Information Infrastructure and Networking Symposium (GIIS), pp. 1-8, Porto, Portugal, DOI: 10.1109/GIIS.2016.7814946, Octobre 2016.
Towards Trusted Operated Services in the Internet of Things.
p. urien.
The Tenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM 2016, Venise, Italie, Octobre 2016.
Security Issues for the IoT: Dealing with Mobile Payments and Secure Element for Objects.
p. urien.
Octobre 2016.
Big Data Stream Mining: Large Scale Real-Time Analytics.
A. Bifet.
Habilitation à diriger des recherches (HDR), Octobre 2016.
Top-k Queries Over Uncertain Scores.
Q. Liu, D. Basu, T. Abdessalem et S. Bressan.
On the Move to Meaningful Internet Systems (OTM-CoopIS 2016), pp. 245--262, Rhodes, Greece, DOI: 10.1007/978-3-319-48472-3_14, Octobre 2016.
Detecting Communities of Commuters: Graph Based Techniques Versus Generative Models.
A. Dandekar, S. Bressan, T. Abdessalem, H. Wu et W. S. Ng.
On the Move to Meaningful Internet Systems (OTM-CoopIS 2016), pp. 485--502, Rhodes, Greece, DOI: 10.1007/978-3-319-48472-3_29, Octobre 2016.
Trajectory simulation in communities of commuters.
A. Dandekar, S. Bressan, T. Abdessalem, H. Wu et W. S. Ng.
International Conference on Advanced Computer Science and Information Systems (ICACSIS), pp. 39-42, Malang, Indonesia, Octobre 2016.
Performance Analysis of Hybrid Opto-Electronic Packet Switch.
W. Samoud.
Thèse de doctorat, Octobre 2016.
Uplink Energy-Delay Trade-off under Optimized Relay Placement in Cellular Networks.
M. Minelli, M. Ma, M. Coupechoux, J.-M. Kélif, M. Sigelle et Ph. Godlewski.
IEEE Transactions on Mobile Computing, vol. 15, n° 9, pp. 2376?2387, Septembre 2016.
SOSAP: A Pareto-efficient Spectrum Access Protocol for Cognitive Radio Networks.
S. Iellamo, M. Coupechoux et Z. Khan.
IEEE Vehicular Technology Conference (VTC-Fall), pp. 1-5, Montréal, Canada, Septembre 2016.
Goal-oriented Holonics for Complex System (Self-)Integration: Concepts and Case Studies.
A. Diaconescu, S. Frey, Ch. Müller-Schloer, J. Pitt et S. Tomforde.
10th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2016), pp. 10, Augsburg, Germany, Septembre 2016.
Interactive Self-Governance and Value-Sensitive Design for Self-Organising Socio-Technical Systems.
J. Pitt et A. Diaconescu.
Fourth International Workshop on Self-Adaptive and Self-Organising Socio-Technical Systems (SASO^ST@SASO2016), Ausgburg, Germany, Septembre 2016.
Logical and inequality based contextuality for qudits.
A. Sohbi, I. Zaquine, E. Diamanti et D. Markham.
Physical Review A, vol. 94, n° 3, pp. 32114, Septembre 2016.
Elastic Network Service Provisioning with VNF Auctioning.
M. Obadia, M. Bouet, V. Conan, L. Iannone et J.-L. Rougier.
28th co-sponsored IEEE, ACM SIGCOMM, and ITG VDE International Teletraffic Congres (ITC 28), Wuerzburg, Germany, Septembre 2016.
Multi-user quantum key distribution with a semi-conductor source of entangled photon pairs.
C. Autebert, J. Trapateau, A. Orieux, A. Lemaître, C. Gomez-Carbonnel, E. Diamanti, I. Zaquine et S. Ducci.
Single Photons and Single Spins Meeting, Oxford, Royaume Uni, Septembre 2016.
Performance of spatial Multi-LRU caching under traffic with temporal locality.  
A. Apostolos et A. Giovanidis.
9th International Symposium on Turbo Codes & Iterative Information Processing (ISTC) 2016, Brest, France, Septembre 2016.
Tabu Search Approach for the Bi-Level Competitive Base Station Location Problem.
I. Davydov, M. Coupechoux et S. Iellamo.
Int. Conf. on Discrete Optimization and Operation Research (DOOR), Vladivostok, Russia, Septembre 2016.
Stochastic Dynamic Cache Partitioning for Encrypted Content Delivery.  
A. Araldo, G. Dan et D. Rossi.
ITC28, pp. --, Wuerzburg, Germany, Septembre 2016.
ModelGraft: Accurate, Scalable, and Flexible Performance Evaluation of General Cache Networks .  
M. Tortelli, D. Rossi et E. Leonardi.
ITC28,, pp. --, Wuerzburg, Germany, Septembre 2016.
Running ModelGraft to Evaluate Internet-scale ICN.  
M. Tortelli, D. Rossi et E. Leonardi.
ACM ICN, Demo session, pp. 213-214 , Kyoto, Japan, Septembre 2016.
On the Cost of Secure Association of Information Centric Things.  
M. Enguehard, R. Droms et D. Rossi.
ACM ICN, Poster session, pp. 207--208, Kyoto, Japan, Septembre 2016.
SLICT: Secure Localized Information Centric Things.  
M. Enguehard, R. Droms et D. Rossi.
ACM ICN, IC5G workshop, pp. 255--260, Kyoto, Japan, Septembre 2016.
Towards Inconsistency Tolerance by Quantification of Semantic Inconsistencies.  
I. David, E. Syriani, C. Verbrugge, D. Buchs, D. Blouin, A. Cicchetti et K. Vanherpen.
1st Int. Workshop on Collaborative Modelling in MDE, St-Malo, France, Septembre 2016.
Structure informatique perfectionnée d?un objet connecté.
R. Baghli, E. Najm et B. Traverson.
Septembre 2016.
A new mobility-based clustering algorithm for vehicular ad hoc networks (VANETs.  
M. REN, J. Zhang, L. Khoukhi, H. Labiod et v. Vèque.
2016 NOMS, Turkey, DOI: 10.1109/NOMS.2016.7502988, Septembre 2016.
SyncDS: A digital safe based file synchronization approach.
M. JEMEL, M. Msahli et A. Serhrouchni.
Consumer Communications \& Networking Conference (CCNC), 2016 13th IEEE Annual, pp. 317--318, Septembre 2016.
Mobility-aware Scheduler in CoMP Systems.  
N. Abbas, Th. Bonald et B. Sayrac.
PIMRC, Valencia, Spain, Septembre 2016.
Redundancy Adaptation for Multi-Path Intra-Flow Network Coding in Wireless Mesh Networks .
P.-L. Ageneau, Ch. Wu, N. Boukhatem et M. Gerla.
VTC Fall 2016, Montréal, Septembre 2016.
Elastic Network Service Provisioning with VNF Auctioning.  
M. Obadia, M. Bouet, V. Conan, L. Iannone et J.-L. Rougier.
Teletraffic Congress (ITC 28), 2016 28th International, Würzburg, Germany, DOI: 10.1109/ITC-28.2016.152, Septembre 2016.
Self-coherent phase reference sharing for continuous-variable quantum key distribution.
A. Marie et R. Alléaume.
SPIE, Edinborough, UK, Septembre 2016.
Smart Cities: Basic Concepts, Architectural Issues, and Research Opportunities.
R. Khatoun et S. Zeadally.
Communications of the ACM (CACM), vol. 59, n° 8, pp. 46-57, Août 2016.
Local Triangle-Densest Subgraphs.
R. Samusevich, M. Danisch et M. Sozio.
ASONAM, San Francisco, USA, Août 2016.
Measuring the Quality of Experience of Web users.  
E. Bocchi, L. De Cicco et D. Rossi.
2016 Workshop on QoE-based Analysis and Management of Data Communication Networks (SIGCOMM Workshops 2016), pp. 37-42 , Florianopolis, Brésil, DOI: 10.1145/2940136.2940138, Août 2016.
Model-Based Verification Directed by Structural Coverage and Functional Requirements.
Y. Sun, G. Memmi et S. Vignes.
Model-Based Verification & Validation (MVV), Vienna, Autriche, Août 2016.
Clustering methods comparison: application to source based detection of botclouds.
B. Hammi, M.-C. Rahal et R. Khatoun.
The second International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC'2016), Paris, France, Août 2016.
Performance Evaluation of Locator/Identifier Separation Protocol through RIPE Atlas.
Y. Li et L. Iannone.
2016 conference on ACM SIGCOMM (SIGCOMM?16) Student Workshop, Florianopolis, Brazil, Août 2016.
Cooperation Behavior of Vehicles in an Evolutionary Game for Information Dissemination.  
J. Zhang, H. Labiod, M. REN et T. Heng Chuan.
2016 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Paris, France, DOI: 10.1109/SSIC.2016.7571811, Août 2016.
Auditing a Cloud Provider?s Compliance With Data Backup Requirements: A Game Theoretical Analysis.  
Z. Ismail, Ch. Kiennert, J. Leneutre et L. Chen.
IEEE Transactions on Information Forensics and Security, vol. 11, n° 8, pp. 1685-1699, Août 2016.
Proceedings of the 5th International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, BigMine 2016.  
W. Fan, A. Bifet, J. Read, Q. Yang et Ph. S. Yu.
5th International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, BigMine 2016,, JMLR.org, Août 2016.
Load Balancing in Heterogeneous Networks Based on Distributed Learning in Near-Potential Games.
M. S. Ali, P. Coucheney et M. Coupechoux.
IEEE Transactions on Wireless Communications, vol. 15, n° 7, pp. 5046-5059, Juillet 2016.
Modélisation de la consommation énergétique des programmes : aspects thermiques et loi de convexité énergie-fréquence.
P. Jouvelot, K. De Vogeleer et G. Memmi.
Genie Logiciel, vol. 117, pp. 47-59, Juillet 2016.
Eager Stack Cache Memory Transfers.
N. Amine et F. Brandner.
Workshop on Worst-Case Execution Time Analysis, Toulouse, France, Juillet 2016.
On some bounds for symmetric tensor rank of multiplication in finite fields.
J. Pieltant, m. rambaud et al..
15th International Conference Arithmetic, Geometry, Crypto.. 2016, Juillet 2016.
V ERS UNE SOURCE DE PAIRES DE PHOTONS AUX LONGUEURS D ? ONDE TELECOM EN FIBRE A C?UR LIQUIDE.
M. Cordier, A. Orieux, R. Gabet, Th. Harlé, N. Dubreuil, E. Diamanti, Ph. Delaye et I. Zaquine.
JNOG, Bordeaux, Juillet 2016.
Distribution de clés quantiques multi-utilisateurs avec une source semi-conductrice.
C. Autebert, J. Trapateau, A. Orieux, A. Lemaître, C. Gomez-Carbonnel, E. Diamanti, I. Zaquine et S. Ducci.
COLOQ'15, Bordeaux, Juillet 2016.
Information Centric Things: Running ICN over RIOT.  
M. Enguehard.
Juillet 2016.
BGP Extended Communities LCAF Type.
D. Saucez et L. Iannone.
Internet Engineering Task Force (IETF), n° draft-sauces-lisp-lcaf-bgp-communities-00.txt, Juillet 2016.
Multi-user quantum key distribution with a semi-conductor source of entangled photon pairs.
C. Autebert, J. Trapateau, A. Orieux, A. Lemaître, C. Gomez-Carbonnel, E. Diamanti, I. Zaquine et S. Ducci.
Juillet 2016.
A new approach to investigate IoT threats based on a four layer model.
p. urien et al..
2016 13th International Conference on New Technologies for Distributed Systems (NOTERE), Paris, France, DOI: 10.1109/NOTERE.2016.7745830, Juillet 2016.
Proceedings on Cyber Security of Smart Cities, Industrial Control System and Communications.  
R. Khatoun, X. Chen et A. Serhrouchni.
SSIC'2016, IEEE xplore, Juillet 2016.
Minimum Description Length Principle applied to Structure Adaptation for Classification under Concept Drift.  
P.-A. Murena et A. Cornuéjols.
IJCNN-2016 (Int. Joint Conf. on Neural Networks), Vancouver, Canada, Juillet 2016.
Functional Poisson approximation in Kantorovich-Rubinstein distance with applications to U-statistics and stochastic geometry.  
L. Decreusefond, M. Schülte et Ch. Thäle.
Annals of probability, vol. 44, n° 3, pp. 2147-2197, Juin 2016.
Online Budgeted Truthful Matching.
R. Vaze et M. Coupechoux.
ACM SIGMETRICS NetEcon, pp. 1-4, Juan-les-Pins, Juin 2016.
But What Do We Actually Know?.  
S. Razniewski, F. M. Suchanek et W. Nutt.
Workshop on Automated Knowledge Base Construction, Juin 2016.
Tractable Lineages on Treelike Instances: Limits and Extensions.  
A. Amarilli, P. Bourhis et P. Senellart.
PODS (Principles of Database Systems), pp. 355-370, San Francisco, USA, Juin 2016.
Challenges for Efficient Query Evaluation on Structured Probabilistic Data.  
A. Amarilli, S. Maniu et M. Monet.
SUM, Juin 2016.
Query Answering with Transitive and Linear-Ordered Data.
A. Amarilli, M. Benedikt, P. Bourhis et M. Vanden Boom.
IJCAI, Juin 2016.
Role of simplicity in creative behaviour: The case of the poietic generator.  
A. Saillenfest, J.-L. Dessalles et O. Auber.
International Conference on Computational Creativity, Paris, France, Juin 2016.
he SIMulation Project: Demonstrating Mobile Payments Based on Cloud Services.
p. urien et al..
SEVENTEENTH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, Coimbra, Portugal, DOI: 10.1109/WoWMoM.2016.7523535, Juin 2016.
Statistical Network Monitoring: Methodology and Application to Carrier-Grade NAT.  
E. Bocchi, A. Safari Khatouni, S. Traverso, A. Finamore, M. Munafo, M. Mellia et D. Rossi.
Computer Networks "Special issue on Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting", pp. pp, DOI: 10.1016/j.comnet.2016.06.018, Juin 2016.
About Joint Stable User Association and Resource Allocation in Multi-Rate IEEE 802.11 WLANs.
M. Touati, R. Elazouzi, M. Coupechoux, E. Altman et J.-M. Kélif.
Séminaire GDR-ISIS, Learning in Networks and Beyond, Paris, France, Juin 2016.
Spatial Multi-LRU Caching for Wireless Networks with Coverage Overlaps.  
A. Giovanidis et A. Apostolos.
SIGMETRICS'16, vol. 44, Antibes Juan-Les-Pines, France, DOI: 10.1145/2964791.2901483, Juin 2016.
Latency-Based Anycast Geolocalization: Algorithms, Software and Datasets . .  
D. Cicalese, D. Joumblatt, D. Rossi, J. Augé, M.-O. Buob et T. Friedman.
IEEE Journal on Selected Areas of Communications,, vol. 34, n° 6, pp. 1889-1903, Juin 2016.
Adaptive model rules from high-speed data streams.  
J. Duarte, J. Gama et A. Bifet.
ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 10, n° 3, pp. 30, Juin 2016.
A streaming flow-based technique for traffic classification applied to 12+ 1 years of Internet traffic.  
V. Carela-Español, P. Barlet-Ros, A. Bifet et K. Fukuda.
Telecommunication Systems, vol. 63, n° 2, pp. 191--204, Juin 2016.
Iot big data stream mining.  
G. De Francisci Morales, A. Bifet, L. Khan, J. Gama et W. Fan.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2119--2120, Juin 2016.
VHT: Vertical hoeffding tree.  
N. Kourtellis, G. D. F. Morales, A. Bifet et A. Murdopo.
Big Data (Big Data), 2016 IEEE International Conference on, pp. 915--922, Juin 2016.
On dynamic feature weighting for feature drifting data streams.  
J. P. Barddal, H. M. Gomes, F. Enembreck, B. Pfahringer et A. Bifet.
Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 129--144, Juin 2016.
Echo State Hoeffding Tree Learning.  
D. Marrón, J. Read, A. Bifet, T. Abdessalem, E. Ayguadé et J. Herrero.
Asian Conference on Machine Learning, pp. 382--397, Juin 2016.
Deferral classification of evolving temporal dependent data streams.  
M. Mayo et A. Bifet.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 952--954, Juin 2016.
Social Media Marketing Analytics: a Multicultural Approach Applied to the Beauty \& cosmetics Sector.
H. Kefi, S. Indra et T. Abdessalem.
20th Pacific Asia Conference on Information Systems (PACIS 2016), pp. 176, Chiayi, Taiwan, Juin 2016.
draft-urien-core-identity-module-coap-00.  
p. urien.
IETF, Juin 2016.
More Results on the Complexity of Identifying Problems in Graphs.  
O. Hudry et A. Lobstein.
Theoretical Computer Science , vol. 626, pp. 1-12, Mai 2016.
LivingDesktop: Augmenting Desktop Workstation with Actuated Devices.
G. Bailly, S. Sahdev, S. Malacria et Th. Pietrzak.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, San Jose, USA, DOI: 10.1145/2858036.2858208, Mai 2016.
TouchTokens: Guiding Touch Patterns with Passive Tokens.
R. Morales, C. Appert, G. Bailly et E. Pietriga.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, San Jose, USA, DOI: 10.1145/2858036.2858041, Mai 2016.
MapSense: Multi-Sensory Interactive Maps for Children Living with Visual Impairments.
E. Brulé, G. Bailly, A. Brock, F. Valentin, G. Denis et Ch. Jouffrais.
CHI'16: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, Mai 2016.
Shared Interaction on a Wall-Sized Display in a Data Manipulation Task.  
C. Liu, O. Chapuis, M. Beaudouin-Lafon et E. Lecolinet.
CHI'16: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 2075-2086, DOI: 10.1145/2858036.2858039, Mai 2016.
A 3D Beamforming Analytical Model for 5G Wireless Networks.
J.-M. Kélif, M. Coupechoux et M. Mansanarez.
Int. Symp. on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), pp. 1-8, Tempe, USA, Mai 2016.
Performance Analysis of Two-Tier Networks with Closed Access Small-Cells.
G. Ghatak, A. De Domenico et M. Coupechoux.
Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN) in conjunction with WiOpt, Tempe, USA, Mai 2016.
SAFE - Sensor & Actuator for Contextual Services and Predictive Maintenance : A Low Cost Industrial IoT Implementation for Industry 4.0.
T. Dang, P. Minet, P. Bellot, Ch. Mozzati, E. Livolant, D. Brezak et M. T. Hammi.
27th International Conference on Software & Systems Engineering and their applications, ICSSEA'16, Paris, France, Mai 2016.
Learning Annealing Schedule of Log-Linear Algorithms for Load Balancing in HetNets.
M. S. Ali, P. Coucheney et M. Coupechoux.
European Wireless (EW) Conference, Workshop on Competitive and Cooperative Approaches for 5G, pp. 1-6, Oulu, Finland, Mai 2016.
Lexicographic decomposition of preferences into partial orders.
O. Hudry.
European Chapter on Combinatorial Optimization XXIX (ECCO XXIX), Budapest, Hongrie, Mai 2016.
Learning in Near-Potential Games for Distributed Load Balancing in Heterogeneous Networks.
M. S. Ali, P. Coucheney et M. Coupechoux.
Séminaire GDR-ISIS, Les réseaux de communications sans fil : problèmes non-centralisés et solutions, Paris, France, Mai 2016.
On the Minimal Recognition of Rights in Holonic Institutions.
J. Pitt, J. Jiang et A. Diaconescu.
Cranefield, S., Mahmoud, S., Padget, J., Rocha, A.P. (Eds.), "Coordination, Organizations, Institutions, and Norms in Agent Systems XII", Lecture Notes in Artificial Intelligence, Springer, 2017--Revised Selected Papers from COIN@AAMAS and COIN@ECAI 2016, pp. 149-169, Mai 2016.
The Effects of Mobility on the Hit Performance of Cached D2D Networks.  
Ch. Jarray et A. Giovanidis.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Tempe, United States, DOI: 10.1109/WIOPT.2016.7492958, Mai 2016.
Representation Selection Problem: Optimizing Video Delivery through Caching .  
A. Araldo, F. Martignon et D. Rossi.
IFIP Networking, pp. 323-331, Wien, Austria, Mai 2016.
Human-oriented Infrastructures for Multi-surface Environments.  
M.-E. Perrin, J. Eagan et M. Beaudouin-Lafon.
Second International Workshop on Interacting with Multi-Device ecologies in the wild, pp. 4, San José, California, Mai 2016.
Availability analysis for synchronous data-flow graphs in mixed-criticality systems.  
R. Medina, E. Borde et L. Pautet.
IEEE Symposium on Industrial Embedded Systems, pp. 205-210, Krakow, Poland, DOI: 10.1109/SIES.2016.7509431, Mai 2016.
Controlled Components for Internet of Things As-AService.  
T. Aubonnet, a. Boubendir, f. Lemoine et N. Simoni.
Open Journal of Internet of Things (OJIOT),, vol. 2, n° 1, pp. 1-18, DOI: 10.19210/1005.2.1.16, Mai 2016.
Video conference based on enterprise desktop grid.  
R. Sorokin et J.-L. Rougier.
Telecommunications (ICT), 2016 23rd International Conference on, Thessaloniki, Greece, DOI: 10.1109/ICT.2016.7500380, Mai 2016.
Phase reference sharing schemes for continuous-variable quantum cryptography.
R. Alléaume et A. Marie.
Mai 2016.
Perfect Failure Detection with Very Few Bits.
P. Fraigniaud, S. Rajsbaum, C. Travers, P. Kuznetsov et T. Rieutord.
Stabilization, Safety, and Security of Distributed Systems - 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings, pp. 154--169, Mai 2016.
Scheduling Impact on the Performance of Relay-Enhanced LTE-A Networks.
M. Minelli, M. Ma, M. Coupechoux et Ph. Godlewski.
IEEE Transactions on Vehicular Technology, vol. 65, n° 4, pp. 2496?2508, Avril 2016.
Necessary and sufficient conditions for the existence of $\alpha$-determinantal processes.
F. Maunoury.
Séminaire de probabilités XLVIII, Avril 2016.
Scalable BGP Prefix Selection for Effective Inter-domain Traffic Engineering.
W. Shao, L. Iannone, J.-L. Rougier, F. Devienne et M. Viste.
IEEE/IFIP Network Operations and Management Symposium (NOMS'16), Istanbul, Turkey, Avril 2016.
Cost Minimization and Social Fairness for Spatial Crowdsourcing Tasks.  
Q. Liu, T. Abdessalem, H. Wu, Z. Yuan et S. Bressan.
The 21st International Conference on Database Systems for Advanced Applications , Dallas, USA, Avril 2016.
SoMap: Dynamic Clustering and Ranking of Geotagged Posts.  
M. Al-Ghossein et T. Abdessalem.
The 25th international World Wide Web Conference, Montréal, Canada, Avril 2016.
Errors Announcing 32-bit ASNs in BGP Routes.  
R. Mazloum, J. Augé, D. Rossi et T. Friedman.
11th International Conference on Design of Reliable Communication Networks (DRCN), Kansas City, USA, Avril 2016.
Secure Mobile Payments Based on Cloud Services: Concepts And Experiments.
p. urien et al..
IEEE International Conference on Intelligent Data and Security, New York, USA, DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.48 , Avril 2016.
Innovative Mobile Payments in the Cloud for Connected Citizen: the MobiSIM Project.
p. urien.
18th Mediterranean Electrotechnical Conference Intelligent & Efficient Technologies & Services For The Citizen 2016, Limassol, Chypre, DOI: 10.1109/MELCON.2016.7495436 , Avril 2016.
MAGMA: Network Behavior Classifier for Malware Traffic.  
E. Bocchi, L. Grimaudo, M. Mellia, E. Baralis, S. Saha, S. Miskovic, G. Modelo-Howard et S.-J. Lee.
Computer Networks "Special issue on Traffic and Performance in the Big Data Era", pp. pp, DOI: 10.1016/j.comnet.2016.03.021, Avril 2016.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° RFC 7834, Avril 2016.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° RFC 7835, Avril 2016.
LISP EID Block Management Guidelines.
L. Iannone, R. Jorgensen, D. Conrad et G. Huston.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-07.txt, Avril 2016.
ICN software tools: survey and cross-comparison.  
M. Tortelli, D. Rossi, G. Boggia et A. Grieco.
Elsevier Simulation Modelling Practice and Theory,, vol. 63, pp. 23--46, Avril 2016.
A First Characterization of Anycast Traffic from Passive Traces . .  
D. Giordano, D. Cicalese, A. Finamore, M. Mellia, M. Munafo, D. Joumblatt et D. Rossi.
IFIP workshop on Traffic Monitoring and Analysis (TMA), pp. 30-38, ouvain La Neuve, Belgium, Avril 2016.
Web QoE: Moving beyond Google's SpeedIndex ..  
E. Bocchi, L. De Cicco et D. Rossi.
Finalist at the IEEE INFOCOM Innovation Challenge, pp. --, San Francisco, USA, Avril 2016.
Improve round-trip time measurement quality via clustering in inter-domain traffic engineering.  
W. Shao, J.-L. Rougier, F. Devienne et M. Viste.
Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, Istanbul, Turkey, DOI: 10.1109/NOMS.2016.7502970, Avril 2016.
Scalable BGP prefix selection for effective inter-domain traffic engineering.  
W. Shao, L. Iannone, J.-L. Rougier, F. Devienne et M. Viste.
Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP, Istanbul, Turkey, DOI: 10.1109/NOMS.2016.7502827, Avril 2016.
Electric Vehicle recharge pricing under competition, a game theoretic approach.  
I. Amigo et M. Gagnaire.
ENERGYCON, Leuven, Belgium, Avril 2016.
Practical challenges in quantum key distribution.
E. Diamanti, H.-K. Lo, B. Qi et Z. Yuan.
npj Quantum Information, vol. 2, pp. 16025, Avril 2016.
Webstrates: demonstrating the potential of Shareable Dynamic Media.  
C. Klokmose, J. Eagan, S. Baader, W. Mackay et M. Beaudouin-Lafon.
ACM CSCW '16 Companion: Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 61--64, San Francisco, California, USA, DOI: 10.1145/2818052.2874325, Mars 2016.
L'émergence du sens au cours de l'évolution.  
J.-L. Dessalles.
Langages, vol. 201, pp. 129-142, Mars 2016.
CRE MobiSIM.
p. urien.
Orange, Mars 2016.
Topology design of fully connected hierarchical Mobile Ad-Hoc Networks.
L. Mroueh, A. Kessab, Ph. Martins, S. Hethuin et I. Bucaille.
International Symposium on Wireless Communication Systems, ISWCS 2016, Poznan, Poland, September 20-23, 2016, pp. 104--108, Poznan, Pologne, DOI: 10.1109/ISWCS.2016.7600883, Mars 2016.
Optimizing end-to-end propagation delays in hybrid satellite-maritime mobile ad hoc networks.
A. Kessab, L. Mroueh, Ph. Martins et I. Bucaille.
24th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2016, Split, Croatia, September 22-24, 2016, pp. 1--5, Split, Croatie, DOI: 10.1109/SOFTCOM.2016.7772170, Mars 2016.
Impact of the ITU-R maritime propagation on the dimensioning of a centralized LTE MANET.
A. Kessab, L. Mroueh, Ph. Martins et S. Hethuin.
IEEE Wireless Communications and Networking Conference, WCNC 2016, Doha, Qatar, April 3-6, 2016, pp. 1--5, Doha,Qatar, DOI: 10.1109/WCNC.2016.7564896, Mars 2016.
Smart Fridge / Dumb Grid? Demand Dispatch for the Power Grid of 2020.
J. Mathias, R. Kaddah, A. Busic et S. Meyn.
International Conference on System Sciences (HICSS), pp. 2498-2507, Mars 2016.
Towards secure elements for the Internet of Things: The eLock use case.
p. urien.
MobiSecServ 2016, Gainesville, FL, USA, DOI: 10.1109/MOBISECSERV.2016.7440228 , Février 2016.
A Model-Based Testing Process for Enhancing Structural Coverage in Functional Testing.
Y. Sun, G. Memmi et S. Vignes.
Int. Conf. CSDM Asia, pp. 171-180, Singapore, Singapore, Février 2016.
LISP EID Block.
L. Iannone, D. Lewis, D. Meyer et V. Fuller.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-13.txt, Février 2016.
In-Band Synchronization for Distributed SDN Control Planes.
L. Schiff, S. Schmid et P. Kuznetsov.
Computer Communication Review, vol. 46, n° 1, pp. 37--43, Février 2016.
Read-Write Memory and k-Set Consensus as an Affine Task.
E. Gafni, Y. He, P. Kuznetsov et al..
OPODIS, Février 2016.
Set-Consensus Collections are Decidable.
C. Delporte-Gallet, H. Fauconnier, E. Gafni et P. Kuznetsov.
OPODIS, Février 2016.
Towards a Multi-Leveled Architecture for the Internet of Things.
R. Baghli, E. Najm et B. Traverson.
Enterprise Distributed Object Computing Workshop (EDOCW), Vienna, Austria, Février 2016.
Exploring Complex Networks with Failure-prone Agents.
A. Rodriguez, J. Gomez et al..
15th Mexican International Conference on Artificial Intelligence (MICAI 2016), Cancun, Mexico, Février 2016.
Yet another variation on minimal linear codes.  
G. Cohen, S. Mesnager et H. Randriambololona.
Advances in mathmatics of Communications, vol. 10, n° 1, pp. 53-61, Février 2016.
CoAP Secure Elements: Use Cases for the IoT.
p. urien.
Connect Security World - Embedding Trust in IoT Systems and Connected Hardware, Marseille, France, Février 2016.
Finding Heaviest k-Subgraphs and Events in Social Media.
L. Matthaios, O. D. Balalau, M. Danisch, E. Orsini et M. Sozio.
ICDM Workshop, Février 2016.
Experimental verification of multipartite entanglement in quantum networks.
W. McCutcheon, A. Pappa, B. Bell, A. McMillan, A. Chailloux, T. Lawson, M. Mafu, D. Markham, E. Diamanti, I. Kerenidis et others.
Nature communications, vol. 7, pp. 13251, Février 2016.
Derandomizing quantum circuits with measurement-based unitary designs.
P. S. Turner et D. Markham.
Physical review letters, vol. 116, n° 20, pp. 200501, Février 2016.
Enhanced delegated computing using coherence.
S. Barz, V. Dunjko, F. Schlederer, M. Moore, E. Kashefi et I. A. Walmsley.
Physical Review A, vol. 93, n° 3, pp. 032339, Février 2016.
Verifiable Quantum Computing.
E. Kashefi.
APS Meeting Abstracts, Février 2016.
Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution.
H. Qin, R. Kumar et R. Alléaume.
Physical Review A, vol. 94, n° 1, pp. 012325, Février 2016.
Kumori: Steering Cloud traffic at IXPs to improve resiliency.  
A. Fressancourt, C. Pelsser et M. Gagnaire.
12th International Conference on the Design of Reliable Communication Networks (DRCN), Paris, France, Février 2016.
Mining Internet of Things (IoT) Big Data Streams.
A. Bifet.
Février 2016.
Read-Write Memory and k-Set Consensus as an Affine Task.
E. Gafni, Y. He, P. Kuznetsov et T. Rieutord.
OPODIS, Février 2016.
Proceedings of the 2016 Second Conference on Mobile and Secure Services (MOBISECSERV), .
S. Piramuthu et P. Urien.
MOBISECSERV, Piscataway, NJ IEEE, DOI: ISBN 9781479974283, Février 2016.
SchemeLens: A Content-Aware Vector-Based Fisheye Technique for Navigating Large Systems Diagrams.  
A. Cohé, B. Liutkus, G. Bailly, J. Eagan et E. Lecolinet.
Transactions on Visualization & Computer Graphics (TVCG), vol. 22, n° 1, pp. 330--338, DOI: 10.1109/TVCG.2015.2467035, Janvier 2016.
Applications of Cognitive Radio Networks: Recent Advances and Future Directions.
S. W. Kim, M. Pan, G. P. Joshi, O. Gazi, J. He et M. Coupechoux.
International Journal of Distributed Sensor Networks, vol. 2016, n° Article ID 4964068, pp. 1-2, Janvier 2016.
Controlled Matching Games for Resource Allocation and User Association in Wireless Networks.
M. Coupechoux, M. Touati, R. Elazouzi, E. Altman et J.-M. Kélif.
TPT/COMELEC Seminar, Paris, France, Janvier 2016.
Controlled Matching Games for Resource Allocation and User Association in Multi-Rate WiFi Networks.
M. Coupechoux, M. Touati, R. Elazouzi, E. Altman et J.-M. Kélif.
CEA LETI, Grenoble, France, Janvier 2016.
Intégration des Influences Géographique et Temporelle pour la Recommandation de Points d'Intérêt.
J.-B. Griesner, T. Abdessalem et H. Naacke.
16ème conférence internationale francophone sur l'extraction et la gestion des connaissances (EGC 2016), pp. 153-158, Reims, France, Janvier 2016.
Zero-error capacity of binary channels with memory.  
G. Cohen, E. Fachini et J. Korner.
IEEE Transactions Information Th., vol. 62, pp. 3-7, Janvier 2016.
Innovative DTLS/TLS Security Modules Embedded in SIM Cards for IoT Trusted and Secure Services.
p. urien.
IEEE CCNC 2016, Las Vegas, USA, DOI: 10.1109/CCNC.2016.7444778 , Janvier 2016.
Experiences of Cloud Storage Service Monitoring: Performance Assessment and Comparison.  
E. Bocchi, I. Drago et M. Mellia.
DOI: 10.5281/zenodo.44783Janvier 2016.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-15.txt, Janvier 2016.
Can you imagine... a language for combinatorial creativity?.
F. M. Suchanek, C. Menard, M. Bienvenu et C. Chapellier.
ISWC, Janvier 2016.
Thymeflow, a personal knowledge base with spatio-temporal data.
D. Montoya, Th. Pellissier Tanon, S. Abiteboul et F. M. Suchanek.
CIKM (demo), Janvier 2016.
Ten Years of Knowledge Harvesting: Lessons and Challenges.
G. Weikum, J. Hoffart et F. M. Suchanek.
Janvier 2016.
Open Digital Forms.  
H. Le, Th. Rebele et F. M. Suchanek.
Research and Advanced Technology for Digital Libraries - 20th International Conference on Theory and Practice of Digital Libraries, TPDL 2016, Hannover, Germany, September 5-9, 2016, Proceedings, Janvier 2016.
YAGO: A Multilingual Knowledge Base from Wikipedia, Wordnet, and Geonames..  
Th. Rebele, F. M. Suchanek, J. Hoffart, J. Biega, E. Kuzey et G. Weikum.
International Semantic Web Conference, Janvier 2016.
Optimal Relay Configuration for Power Line Communication Networks.
I. Rubin, Y. Lin et D. Kofman.
IEEE Trans Comm, vol. 64, n° 1, pp. 130-140, Janvier 2016.
Multi-Path TCP over Network Coding for Wireless Networks.
P.-L. Ageneau et N. Boukhatem.
IEEE CCNC 2016, Las Vegas, Janvier 2016.
Advanced Demand Response Solutions for Capacity Markets.
R. Kaddah, D. Kofman, F. Mathieu et M. Pioro.
IEEE International Conference on Innovations in Information Technology (IIT), pp. 23-28, Dubai, United Arab Emirates, Janvier 2016.
Communications with everlasting security from short-term-secure encrypted communication,.
R. Alléaume.
Janvier 2016.
Quantum-enhanced secure delegated classical computing.
V. Dunjko, Th. Kapourniotis et E. Kashefi.
Quantum Information and Computation, vol. 16, pp. 61-86, Janvier 2016.
Handbook of Computational Social Choice.
F. Fischer, O. Hudry et R. Niedermeier.
2016.
Handbook of Communication Science.  
J.-L. Dessalles.
DOI: 978-3-11-025545-42016.
On the Ensemble of Optimal Identifying Codes in a Twin-Free Graph.
I. Honkala, O. Hudry et A. Lobstein.
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, vol. 8, pp. 139-153, 2016.
A Framework for Sampling-Based XML Data Pricing.  
R. Tang, A. Amarilli, P. Senellart et S. Bressan.
TLDKS (Transactions on Large-Scale Data- and Knowledge-Centered Systems), vol. 24, pp. 116-138, 2016.
Determinantal point processes.  
L. Decreusefond, I. Flint, N. Privault et G. L. Torrisi.
2016.
Industrial IoT : Mobility Support and Service Discovery for Industrial Process Monitoring.
T. Dang, P. Minet, P. Bellot, Ch. Mozzati et E. Livolant.
2016.
Le fil de la vie - La face immatérielle du vivant.  
J.-L. Dessalles, C. Gaucherel et P.-H. Gouyon.
Odile Jacob, Paris, France, DOI: 978-2-7381-3395-3, 2016.
Trees and languages with periodic signature.
V. Marsault et J. Sakarovitch.
LATIN 2016, vol. LNCS, n° 9644, pp. 605-618, 2016.
Performance evaluation of intra-site coordination schemes in cellular networks.  
A. Khlass, Th. Bonald et S.-E. ELAYOUBI.
Performance Evaluation, DOI: 10.1016/j.peva.2015.12.001, 2016.
In the Search for Optimal Concurrency.
V. Gramoli, P. Kuznetsov et al..
Structural Information and Communication Complexity - 23rd International Colloquium, SIROCCO 2016, Helsinki, Finland, July 19-21, 2016, Revised Selected Papers, pp. 143--158, 2016.
Perfect Failure Detection with Very Few Bits.
P. Fraigniaud, S. Rajsbaum, C. Travers, P. Kuznetsov et al..
Stabilization, Safety, and Security of Distributed Systems - 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings, pp. 154--169, 2016.
Principles and Practice of Multi-Agent Systems, LNAI 9935.  
J.-L. Dessalles.
DOI: 10.1007/978-3-319-46218-9_12016.
Extending TLS with KMIP Protocol for Cloud Computing.
M. Msahli, A. Serhrouchni et M. Badra.
New Technologies, Mobility and Security (NTMS), 2016 8th IFIP International Conference on, pp. 1--6, 2016.
The multi-source model for dimensioning data networks.  
Th. Bonald et C. Comte.
Computer Networks, DOI: 10.1016/j.comnet.2016.03.019, 2016.
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.
A. Mrabet, N. El-Mrabet, R. Lashermes, J. Rigaud, B. Bouallegue, S. Mesnager et M. Machhout.
Space 2016, 2016.
Partially homomorphic encryption schemes over finite fields.
J. Liu, S. Mesnager et L. Chen.
Space 2016, 2016.
On constructions of bent functions from involutions.
S. Mesnager.
ISIT 2016, 2016.
Condillac, philosophe du langage ?.
J.-L. Dessalles.
2016.
Command Selection and User Expertise.
G. Bailly.
2016.
Toward a Raman-free fibered photon pair source at telecom wavelength.
M. Cordier, A. Orieux, R. Gabet, E. Diamanti, I. Zaquine, Th. Harlé, N. Dubreuil et Ph. Delaye.
EOS Annual meeting" EOS Topical meeting on Nonlinear Optics and Photonics", 2016.
Les services s'orchestrent.
P. Bellot, D. Brezak, M. T. Hammi, F. Pebay-Peyroula et J. Anthoine.
2016.
A Statistical Trust System in Wireless Mesh Networks.
R. Khatoun, Y. Begriche, J. Dromard, L. Khoukhi et A. Serhrouchni.
Annals of Telecommunications, Décembre 2015.
Core Stable Algorithms for Coalition Games with Complementarities and Peer Effects.
M. Touati, R. Elazouzi, M. Coupechoux, E. Altman et J.-M. Kélif.
ACM SIGMETRICS Performance Evaluation Review, vol. 43, n° 3, pp. 72-75, Décembre 2015.
Multi-objectives Refinement of AADL Models for the Synthesis Embedded Systems (mu-RAMSES).
S. Rahmoun, E. Borde et L. Pautet.
ICECCS, pp. 21--30, Gold Coast, Australia, Décembre 2015.
Présentation de la plateforme LISP-Lab.
Y. Li, P. Raad, Ch. Jacquenet, S. Secci et L. Iannone.
Journées Réseaux , Montpellier, France, Décembre 2015.
Measuring In-Band Overhead of SDN Controller Clusters.
Y. Zhao, L. Iannone et R. Michel.
CoNEXT'15 Student Workshop, Heidelberg, Germany, Décembre 2015.
Adaptation of Topology-Based Routing Protocols for Data Gathering Applications in VANETs.
D. Pacheco-Paramo, L. Iannone, D. Kofman, A. Carneiro Viana, G. Mermoud et J.-Ph. Vasseur.
IEEE Vehicular Networking Conference (VNC), Kyoto, Japan, Décembre 2015.
Adaptive Web Crawling through Structure-Based Link Classification.  
M. Faheem et P. Senellart.
ICADL (International Conference on Asian Digital Libraries), pp. 39-51, Seoul, Korea, Décembre 2015.
On existence (based on an arithmetical problem) and constructions of bent functions.  
S. Mesnager, G. Cohen et D. Madore.
IMACC , vol. LNCS 9496, pp. 3-19, Décembre 2015.
Characterizing IPv4 Anycast Adoption and Deployment.  
D. Cicalese, J. Augé, D. Joumblatt, T. Friedman et D. Rossi.
ACM CoNEXT, Heidelberg, Germany, Décembre 2015.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-14.txt, Décembre 2015.
CALCULATEUR COMPRENANT UN PROCESSEUR MULTICOEUR ET PROCEDE DE CONTROLE D'UN TEL CALCULATEUR .  
X. Jean, M. Gatti, D. Faura et Th. Robert.
Décembre 2015.
Optimal Probabilistic Generation of XML Documents.  
S. Abiteboul, Y. Amsterdamer, D. Deutch, T. Milo et P. Senellart.
Theory of Computing Systems, vol. 57, n° 4, pp. 806-842, Novembre 2015.
Sequential Decision Algorithms for Measurement-Based Impromptu Deployment of a Wireless Relay Network along a Line.
A. Chattopadhyay, M. Coupechoux et A. Kumar.
IEEE Transactions on Networking, vol. 24, n° 5, pp. 2954 - 2968, Novembre 2015.
Generalized mixed-criticality scheduling based on RUN.  
R. Gratia, Th. Robert et L. Pautet.
23rd International Conference on Real Time and Networks Systems , pp. Pages 267-276 , DOI: 10.1145/2834848.2834873, Novembre 2015.
A Comparative Study of the Precision of Stack Cache Occupancy Analyses.  
N. Amine et F. Brandner.
9th Junior Researcher Workshop on Real-Time Computing, pp. 13-16, Lille, France, Novembre 2015.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), Novembre 2015.
On the Performance of SDN Controllers: A Reality Check.
Y. Zhao, L. Iannone et R. Michel.
IEEE Conference on Network Function Virtualisation & Software Defined Networks, San Francisco, USA, Novembre 2015.
Hup-Me: Inferring and Reconciling a Timeline of User Activity with Smartphone and Personal Data.  
D. Montoya, S. Abiteboul et P. Senellart.
SIGSPATIAL (Special Interest Group on Spatial Information), Seattle, USA, Novembre 2015.
Quantum fingerprinting with coherent states for multiple clients.
N. Kumar, E. Diamanti et I. Kerenidis.
GdR "Information Quantique : Fondements et Applications" Colloquium, Palaiseau, France, Novembre 2015.
Efficient Context Switching for the Stack Cache: Implementation and Analysis.
S. Abbaspour, F. Brandner, N. Amine et M. Jan.
23th International Conference on Real-Time and Network Systems, Lille, France, DOI: 10.1145/2834848.2834861, Novembre 2015.
"Holonic Institutions for Multi-Scale Polycentric Self-Governance.
A. Diaconescu et J. Pitt.
Coordination, Organizations, Institutions, and Norms in Agent Systems X, Springer Lecture Notes in Computer Science, vol. 9372 , pp. 19-35 , Novembre 2015.
On the use of BGP communities for fine-grained inbound traffic engineering.  
S. Wenqin, F. Devienne, L. Iannone et J.-L. Rougier.
Telecom ParisTech / Border6, n° 0, DOI: In the context of Border Gateway Protocol (BGP), inbound inter-domain traffic engineering (TE) remains a difficult problem without panacea. Each of previously investigated method solves a part of the problem. In this study, we try to complement the map by, Novembre 2015.
A note on the simulation of the Ginibre point process.  
L. Decreusefond, I. Flint et A. Vergne.
Journal of Applied Probability, vol. 52, n° 4, Octobre 2015.
The Stein-Dirichlet-Malliavin method.  
L. Decreusefond.
ESAIM : proceedings and surveys, vol. 51, pp. 49-59, DOI: 10.1051/proc/201551003, Octobre 2015.
Webstrates: Shareable Dynamic Media.
C. Klokmose, J. Eagan, S. Baader, W. Mackay et M. Beaudouin-Lafon.
UIST '15: Proceedings of the ACM Symposium on User Interface Software and Technology, pp. 11, Charlotte, NC, USA, Octobre 2015.
vSP: building a virtual Service Provider with off-the-shelf cloud service.
D. Saucez, D. Farinacci, W. Haddad et L. Iannone.
Proceedings of 4th IEEE International Conference on Cloud Networking (CloudNet'15) , IEEE, Octobre 2015.
Performance analysis of Evolutionary Game Theory-Based Information Dissemination Schemes.  
J. Zhang et H. Labiod.
Télécom ParisTech, n° JH2015, Octobre 2015.
Inherent Limitations of Hybrid Transactional Memory.
D. Alistarh, J. Kopinsky, P. Kuznetsov, S. Ravi et N. Shavit.
DISC, Tokyo, Japan, Octobre 2015.
Grasping the Gap Between Blocking and Non-Blocking Transactional Memories.
P. Kuznetsov et S. Ravi.
DISC, Tokyo, Japan, Octobre 2015.
Etude du contrôle du point de vue 3D à partir de la tête et des épaules.  
Th. Jacob, G. Bailly et E. Lecolinet.
IHM?15: Conférence francophone sur l?Interaction Homme Machine, Toulouse, France, DOI: 10.1145/2820619.2825005, Octobre 2015.
SpotPad, LociPad, ChordPad & InOutPad : Exploration de l?interaction gestuelle sur pavé tactile.  
M. Berthellemy, E. Cayez, M. Ajem, G. Bailly, S. Malacria et E. Lecolinet.
Proceedings of the 27th Conference on l'Interaction Homme-Machine (IHM '15). ACM, New York, NY, USA, pp. 6 pages, Toulouse, France, DOI: 10.1145/2820619.2820623, Octobre 2015.
A hybrid security model for quantum cryptography allowing to design practical schemes for long-distance key distribution with everlasting security.
R. Alléaume.
QCrypt 2015, Tokyo, Japan, Octobre 2015.
Personal Cloud Storage: Usage, Performance and Impact of Terminals.  
E. Bocchi, I. Drago et M. Mellia.
4th IEEE International Conference on Cloud Networking (IEEE CloudNet 2015), pp. 106--111, Niagara Falls, Canada, Octobre 2015.
Exchange between the German and French Compiler Communities.  
J. Knoop et F. Brandner.
18. Kolloquium Programmiersprachen und Grundlagen der Programmierung , pp. 83-84, Pörtschach am Wörthersee, Austria, Octobre 2015.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), Octobre 2015.
Distributing secret keys using quantum continuous variables.
E. Diamanti.
Octobre 2015.
Continuous-variable quantum cryptography on silicon.
E. Diamanti.
Octobre 2015.
Towards a New Generation of NFC Secure Mobile Services.
p. urien.
The Eleventh International Conference on Wireless and Mobile Communications, Sliema, Malte, Octobre 2015.
Innovative TLS/DTLS Security Modules for IoT Applications: Concepts and Experiments.
p. urien.
Second International Conference on Safety and Security in Internet of Things, Rome, Italie, DOI: 10.1007/978-3-319-47063-4_1, Octobre 2015.
MULTI-USER DISTRIBUTION OF POLARIZATION ENTANGLED PHOTON PAIRS.  
J. Trapateau, J. Ghalbouni, A. Orieux, E. Diamanti et I. Zaquine.
Journal of Applied Physics, vol. 118, pp. 143106-1 à 6, Octobre 2015.
A Two-stage QoT-Aware Protection Procedure for Dependable Connection Establishment in Survivable SRLG-constrained WDM Translucent Networks.  
M. Bakri, M. Koubaa, A. Bouallegue et M. Gagnaire.
7th IEEE International Workshop on Reliable Networks Design and Modeling (RNDM), Munich-Germany, Octobre 2015.
An EMG-Based Human-Machine Interface to Control Multimedia Player.
M. T. Hammi, O. Salem et A. Mehaoua.
International Conference on E-health Networking, Application & Services (HealthCom), pp. 6, Boston, USA, Octobre 2015.
Practical Quantum Cryptography with everlasting security.
R. Alléaume.
Octobre 2015.
Identifier les besoins des enfants en situation de déficience visuelle : état de l'art et étude de terrain.
E. Brulé, G. Bailly et A. Gentes.
IHM'17: Conférence francophone sur l'Interaction Homme Machine, Octobre 2015.
Glass+Skin: An Empirical Evaluation of the Added Value of Finger Identification to Basic Single-Touch Interaction on Touch Screens.  
Q. Roy, Y. Guiard, G. Bailly, E. Lecolinet et O. Rioul.
INTERACT'15: IFIP International Conference on Human-Computer Interaction, pp. 55-71, Bamberg, Germany, DOI: 10.1007/978-3-319-22723-8_5, Septembre 2015.
Finding Objects Faster in Dense Environments using a Projection Augmented Robotic Arm.  
H. Gacem, G. Bailly, J. Eagan et E. Lecolinet.
INTERACT'15: IFIP International Conference on Human-Computer Interaction, pp. 221-238, Bamberg, Germany, DOI: 10.1007/978-3-319-22698-9_15, Septembre 2015.
Cost-Model Oblivious Database Tuning with Reinforcement Learning.  
D. Basu, Q. Lin, W. Chen, H. T. Vo, Z. Yuan, P. Senellart et S. Bressan.
DEXA, pp. 253-268, Valencia, Spain, Septembre 2015.
Apprentissage par renforcement pour optimiser les bases de donnéees indépendamment du modèle de coût.  
D. Basu, Q. Lin, Z. Yuan, P. Senellart et S. Bressan.
BDA, Porquerolles, France, Septembre 2015.
Circuits de provenance pour les arbres et les instances quasi-arborescentes.  
A. Amarilli, P. Bourhis et P. Senellart.
BDA, Porquerolles, France, Septembre 2015.
Requêtes sur des données à ordre incomplet.  
A. Amarilli, M. L. Ba, D. Deutch et P. Senellart.
BDA, Porquerolles, France, Septembre 2015.
Limiting the Power of 4G Dynamic Green Cellular Networks: Impact on Capacity and Quality of Service.
J.-M. Kélif, M. Coupechoux et F. Marache.
IEEE Sarnoff Symposium, pp. 1-6, Newark, USA, Septembre 2015.
Controlled Matching Game for User Association and Resource Allocation in Multi-Rate WLANs.
M. Touati, R. Elazouzi, M. Coupechoux, E. Altman et J.-M. Kélif.
Allerton Conference on Communication, Control, and Computing, pp. 1-10, Monticello, USA, Septembre 2015.
About Joint Stable User Association and Resource Allocation in Multi-Rate IEEE 802.11 WLANs.
M. Touati, R. Elazouzi, M. Coupechoux, E. Altman et J.-M. Kélif.
ACM SIGMETRICS Performance Evaluation Review, vol. 43, n° 2, pp. 30-31, Septembre 2015.
Progressive Transactional Memory in Time and Space.
P. Kuznetsov et S. Ravi.
PaCT, Petrozavodsk, Russia, Septembre 2015.
Scheduling of mixed-criticality systems with RUN.  
R. Gratia, Th. Robert et L. Pautet.
IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), 2015 , pp. 8, Luxembourg, DOI: 10.1109/ETFA.2015.7301484, Septembre 2015.
Un bus d'objet métier capable d'orchestrer les services de façon sécurisée.
P. Bellot, D. Brezak et M. T. Hammi.
Télécom ParisTech, n° CPO1212 - Cluster Conenxion, Septembre 2015.
Rupesh Kumar, Hao Qin and Romain Alléaume. Challenges in practical CV-QKD: deployment over DWDM networks and practical security.
R. Kumar, H. Qin et R. Alléaume.
QCMC, Leeds, UK, Septembre 2015.
Quantum hacking on practical continuous-variable quantum cryptosystem by inserting an external light.
H. Qin, R. Kumar et R. Alléaume.
SPIE Security+Defense, Quantum Information Science and Technology, Toulouse, France, Septembre 2015.
Automatic selection and composition of model transformations alternatives using evolutionary algorithms.
S. Rahmoun, E. Borde et L. Pautet.
ECSA Workshops 2015, pp. 25:1--25:7, Dubrovnik/Cavtat, Croatia, Septembre 2015.
POI Recommendation: Towards Fused Matrix Factorization with Geographical and Temporal Influences.
J.-B. Griesner, T. Abdessalem et H. Naacke.
9th ACM Conference on Recommender Systems (RecSys 2015), pp. 301-304, Vienna, Austria, DOI: 10.1145/2792838.2799679, Septembre 2015.
Network-as-a-Service: the WebRTC case How SDN and NFV set a solid Telco-OTT groundwork .  
a. Boubendir, E. Bertin et N. Simoni.
The 6th IEEE International Conference On Network of the Future (NOF'2015), pp. 1-3, Montreal, Canada, Septembre 2015.
Instantaneous quantum computing in continuous variables.
T. Douce, D. Markham, E. Kashefi, E. Diamanti, P. Milman, Th. Coudreau et G. Ferrini.
Quantum Information Processing and Communication (QIPC 2015), Leeds, Grande Bretagne, Septembre 2015.
Towards on-chip continuous-variable quantum key distribution.
M. Persechino, M. Ziebell, N. Harris, Ch. Galland, D. Marris-Morini, L. Vivien, E. Diamanti et Ph. Grangier.
Quantum Information Processing and Communication (QIPC 2015), Leeds, Grande Bretagne, Septembre 2015.
Experimental verication of multipartite entanglement in the presence of dishonest parties.
W. McCutcheon, A. Pappa, B. Bell, A. McMillan, A. Chailloux, Th. Lawson, M. Mafu, D. Markham, E. Diamanti, I. Kerenidis, J. Rarity et M. Tame.
Conference on Quantum Cryptography (QCrypt 2015), Tokyo, Japon, Septembre 2015.
The Paris Centre for Quantum Computing Quantum Information Network.
E. Diamanti.
Septembre 2015.
Design and Analysis of an Improved BitMessage Anti-spam Mechanism.  
A. Schaub et D. Rossi.
IEEE P2P'XIV, Cambridge, USA, Septembre 2015.
Hierarchical Content Stores in High-speed ICN Routers: Emulation and Prototype Implementation.  
R. Mansilha, L. Saino, M. Barcellos, M. Gallo, E. Leonardi, D. Perino et D. Rossi.
ACM SIGCOMM Conference on Information-Centric Networking (ICN'15), San Francisco, USA, Septembre 2015.
Internet of Things: A Definition & Taxonomy.
p. urien et al..
IEEE NGMAST'15, Cambridge, UK, DOI: 10.1109/NGMAST.2015.71 , Septembre 2015.
Using Secure Element in the Cloud From HCE-SE Open Platform.
p. urien.
onnect Security World, Technologies for Trusted Mobility & Transactions 2015, Marseille, France, Septembre 2015.
New Direction For Open NFC Trusted Mobile Applications: The MOBISIM Project.
p. urien.
IEEE Conference on Communications and Network Security 2025, Florence, Italie, DOI: 10.1109/CNS.2015.7346898, Septembre 2015.
Foraging-inspired Self-organisation for Terrain Exploration with Failure-prone Agents.
A. Rodrigues, J. Gomez et A. Diaconescu.
The 9th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO'15), pp. 10, Cambridge, MA, USA, Septembre 2015.
Rule Conflicts in Holonic Institutions.
J. Jiang, J. Pitt et A. Diaconescu.
3rd Workshop on Fundamentals of Collective Adaptive Systems (FoCAS@SASO2015), pp. 6, Septembre 2015.
Safe box cloud authentication using TLS extesion.
M. Msahli, M. T. Hammi et A. Serhrouchni.
Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, pp. 1--6, Septembre 2015.
Digital safe: Secure synchronization of shared files.
M. JEMEL, M. Msahli et A. Serhrouchni.
Information Assurance and Security (IAS), 2015 11th International Conference on, pp. 67--72, Septembre 2015.
Sharing and verifying quantum information with differing degrees of trust.
D. Markham.
Septembre 2015.
Verification of quantum information processing in quantum networks.
D. Markham.
Septembre 2015.
An integrated QoT-aware traffic grooming heuristic for multi-granularity D-connection establishment in survivable SRLG-constrained translucent networks.
M. Bakri, M. Koubaa, A. Bouallegue et M. Gagnaire.
IEEE Conference on Wireless and Optical Communications Networks (WOCN), (Bengalore, India), Septembre 2015.
Efficient training data extraction framework for intrusion detection systems.
A. Makiou et A. Serhrouchni.
IEEE, IFIP,6th International Conference on the Network of the Future (NOF), Montreal, Canada , Septembre 2015.
Minimum driving distance warranty for EV charging over Public Lighting Systems.
M. Alvarado-Ruiz, F. Abi Abdallah et M. Gagnaire.
IEEE International Conference on Computer as a Tool (EUROCON), pp. 1-6, Salamanca, Spain, DOI: 10.1109/EUROCON.2015.7313712, Septembre 2015.
Simplicial homology for future cellular networks.  
A. Vergne, L. Decreusefond et Ph. Martins.
IEEE Transactions on Mobile Computing, vol. 14, n° 8, pp. 1712-1725, Août 2015.
Fast Rule Mining in Ontological Knowledge Bases with AMIE+.  
L. Galárraga, Ch. Teflioudi, K. Hose et F. M. Suchanek.
VLDB journal, Août 2015.
Online Influence Maximization.  
S. Lei, S. Maniu, L. Mo, R. Cheng et P. Senellart.
KDD, pp. 645-654, Sydney, Australia, Août 2015.
Discovery and registration of components in multimodal systems distributed on the IoT.  
B. H. Rodriguez et J.-C. Moissinac.
DMS2015, Vancouver, Canada, DOI: DOI: 10.18293/DMS2015-39, Août 2015.
LISP EID Block Management Guidelines.
L. Iannone, R. Jorgensen, D. Conrad et G. Huston.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-06.txt, Août 2015.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-13.txt, Août 2015.
Impact of Carrier-Grade NAT on Web Browsing .  
E. Bocchi, A. Safari, S. Traverso, A. Finamore, V. Di Gennaro, M. Mellia, M. Munafo et D. Rossi.
6th International Workshop on TRaffic Analysis and Characterization (TRAC), pp. 532--537, Dubrovnik, Croatia , Août 2015.
Improving Reusability of Model Transformations by Automating their Composition.
C. Castellanos, E. Borde, L. Pautet, S. Gardoll et Th. Vergnaud.
EUROMICRO-SEAA, pp. 267--274, Madeira, Portugal, Août 2015.
A Reputation System for Detection of Black Hole Attack in Vehicular Networking.
R. Khatoun, P. Gu, L. Khoukhi, R. Doulami et A. Serhrouchni.
International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015), , Shanghai, China, Août 2015.
Flooding Attacks Detection in MANETs.
M. Rmayti, Y. Begriche, R. Khatoun et A. Serhrouchni.
International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC 2015), Shanghai, China, Août 2015.
Distributing secret keys with quantum continuous variables : principle, security and implementations.
E. Diamanti et A. Leverrier.
Entropy, vol. 17, pp. 6072, Août 2015.
Data Protection: Combining Fragmentation, Encryption, and Dispersion.
K. Kapusta, H. Qiu et G. Memmi.
Août 2015.
Value Sensitive Design for Self-Organising Digital Communities.
J. Pitt, A. Nowak et A. Diaconescu.
Charting the Next Decade for Value Sensitive Design Workshop (held with the Critical Alternatives Conference), Aarhus, Denmark, Août 2015.
Secure Public Key Regime (SPKR) in Vehicular Networks.  
T. Heng Chuan, J. Zhang, M. Ma, P.H.J. Chong et H. Labiod.
2015 International Conference on Cyber Security of Smart cities, Industrial Control System and Communications (SSIC), Shanghai, China, DOI: 10.1109/SSIC.2015.7245678, Août 2015.
Proceedings on Cyber Security of Smart Cities, Industrial Control System and Communications.  
R. Khatoun, X. Chen et A. Serhrouchni.
SSIC'2015, IEEE, Août 2015.
Analysis of cyber security for industrial control systems.
Z. DRIAS, A. Serhrouchni et O. VOGEL.
IEEE, International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC). , Shanghai China, Août 2015.
DDOS Mitigation Cloud-Based Service.
F. Guenane, N. Michele et A. Serhrouchni.
IEEE, TrustCom-ISPA-BigDataSE , HELSINKI, FINLAND, Août 2015.
Secure access & authentication for collaborative intercloud exchange service.
F. A. Guenane et A. Serhrouchni.
IEEE, International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC). , Shanghai, China, Août 2015.
Some probability judgments may rely on complexity assessments.  
A. Saillenfest et J.-L. Dessalles.
37th Annual Conference of the Cognitive Science Society, Pasadena, CA, USA, Juillet 2015.
A Mathematical Description of the Speed/Accuracy Trade-Off of Aimed Movement.  
Y. Guiard et O. Rioul.
British HCI, Lincoln, Royaume Uni, DOI: DOI: http://dx.doi.org/10.1145/2783446.2783574 , Juillet 2015.
Combining Existential Rules and Description Logics.  
A. Amarilli et M. Benedikt.
IJCAI 2015, pp. 2691-2697, Buenos Aires, Argentine, Juillet 2015.
Finite Open-World Query Answering with Number Restrictions.  
A. Amarilli et M. Benedikt.
LICS 2015, pp. 305-316, Kyoto, Japon, Juillet 2015.
Intensional Data on the Web.  
A. Amarilli, S. Maniu et P. Senellart.
ACM Sigweb Newsletter, pp. 12, Juillet 2015.
Training-Based Antenna Selection for PER Minimization: A POMDP Approach.
P. Sinchu, R. G. Stephen, Ch. R. Murthy et M. Coupechoux.
IEEE Transactions on Communications, Juillet 2015.
The elephant in the room: getting value from Big Data.  
S. Abiteboul, L. Dong, O. Etzioni, D. Srivastava, G. Weikum, J. Stoyanovich et F. M. Suchanek.
WebDB workshop at SIGMOD, Juillet 2015.
Tutorial: Knowledge Bases for Web Content Analytics.  
J. Hoffart, N. Preda, F. M. Suchanek et G. Weikum.
WWW, Juillet 2015.
Distribution multi-utilisateurs d'intrication bipartite aux longueurs d'onde des télécommunications.  
J. Trapateau, J. Ghalbouni, A. Orieux, E. Diamanti et I. Zaquine.
COLOQ, pp. 114-115, Rennes, France, Juillet 2015.
Fibres à coeur liquide pour la génération de paires de photons corrélés émancipées du bruit Raman.
M. Barbier, I. Zaquine et Ph. Delaye.
COLOQ, pp. 96-97, Rennes, France, Juillet 2015.
LISP EID Block Management Guidelines.
L. Iannone, R. Jorgensen, D. Conrad et G. Huston.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-05.txt, Juillet 2015.
On the Space Complexity of Set Agreement.
C. Delporte, H. Fauconnier, P. Kuznetsov et E. Ruppert.
PODC, Paris, France, Juillet 2015.
The Weakest Failure Detector for Eventual Consistency.
S. Dubois, R. Guerraoui, P. Kuznetsov, F. Petit et P. Sens.
PODC, Paris, France, Juillet 2015.
Cryptographie, la confiance retrouvée.
R. Alléaume et D. Markham.
La Recherche - Numéro spécial Information Quantique, Juillet 2015.
Translating ATL Model Transformations to Algebraic Graph Transformations.
E. Richa, E. Borde et L. Pautet.
ICMT, pp. 183--198, L'Aquila, Italy, Juillet 2015.
Marquage des paquets IP pour la traçabilité sur Internet.
M. Vasseur, R. Khatoun et A. Serhrouchni.
Marquage des paquets IP pour la traçabilité sur Internet. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distribued Systems (NTDS), Paris, France, Juillet 2015.
Management of service composition based on self-controlled components.
T. Aubonnet, L. Henrio, S. Kessal, o. Kulnkhina, f. Lemoine, E. Madelaine, C. Ruz et N. Simoni.
JISA : Journal of Internet Services and Application, vol. 6, n° 1, pp. 1-17, DOI: 10.1186/s13174-015-00317, , Juillet 2015.
Sending quantum messages through space.
E. Diamanti.
Physics, vol. 8, pp. 68, Juillet 2015.
Vers des reseaux ultrasecurises.
E. Diamanti et S. Tanzilli.
La Recherche, dossier "Les revolutions quantiques" , Juillet 2015.
Fast selective encryption methods for bitmap images.
H. Qiu et G. Memmi.
International Journal of Multimedia Data Engineering and Management, vol. 6, n° 3, pp. 52-70, Juillet 2015.
Data protection by means of fragmentation in distributed storage systems.
K. Kapusta et G. Memmi.
CFIP-Notere, Paris, France, Juillet 2015.
optimal Chudnovsky Chudnovsky multiplication algorithms .
m. rambaud.
WAIFI 2014, gebze, turquie, Juillet 2015.
Towards Failure-Resistant Mobile Distributed Systems Inspired by Swarm Intelligence and Trophallaxis.
A. Rodrigues, J. Gomez et A. Diaconescu.
The 13th European Conference on Artificial Life (ECAL 2015), pp. 8, York, UK,, Juillet 2015.
Structure and Governance of Communities for the Digital Society.
J. Pitt et A. Diaconescu.
Workshop on Self-Improving System Integration (SISSY @ ICAC 2015), Grenoble, France, Juillet 2015.
Taxonomy of attacks on industrial control protocols.
Z. DRIAS, A. Serhrouchni et O. VOGEL.
International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS) , Paris France, Juillet 2015.
Toward user's devices collaboration to distribute securely the client side storage.
M. JEMEL et A. Serhrouchni.
IEEE, International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France, Juillet 2015.
Optimising the information flow of one-way quantum computations.
E. Pius, R. D. Da Silva et E. Kashefi.
Quantum Information \& Computation, vol. 15, n° 9-10, pp. 853--884, Juillet 2015.
Optimal Geographic Caching in Cellular Networks.  
B. Blaszczyszyn et A. Giovanidis.
International Conference on Communications (ICC), Londres, UK, DOI: 10.1109/ICC.2015.7248843, Juin 2015.
A Generic Holonic Control Architecture for Heterogeneous Multi-Scale and Multi-Objective Smart Micro-Grids.
S. Frey, A. Diaconescu, D. Menga et I. Demeure.
ACM Transactions on Autonomous and Adaptive Systems (TAAS), vol. 10, n° 2, pp. 9:1-9:21, Juin 2015.
Impact of Mobility on QoS in Heterogeneous Wireless Networks.  
M. Touati, J.-M. Kélif et M. Coupechoux.
IEEE International Conference on Communications, International Workshop on Small Cell and 5G Networks (ICC Workshops), pp. 1-6, London, United Kingdom, Juin 2015.
Structurally Tractable Uncertain Data.  
A. Amarilli.
SIGMOD/PODS Ph.D. Symposium, pp. 39-44, Melbourne, Australie, Juin 2015.
Core stable algorithms for coalition games with complementarities and peer effects.  
M. Touati, R. Elazouzi, M. Coupechoux, E. Altman et J.-M. Kélif.
ACM SIGMETRICS NetEcon, Portland, USA, Juin 2015.
Provenance Circuits for Trees and Treelike Instances.  
A. Amarilli, P. Bourhis et P. Senellart.
ICALP 2015, pp. 56-68, Kyoto, Japan, Juin 2015.
Experimental demonstration of multi-user entanglement distribution.
J. Trapateau, J. Ghalbouni, E. Diamanti et I. Zaquine.
CLEO, Munich, Allemagne, Juin 2015.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-impact-03.txt, Juin 2015.
Malicious virtual machines detection through a clustering approach.
M. Bazm, R. Khatoun, Y. Begriche, L. Khoukhi, X. Chen et A. Serhrouchni.
International Conference of Cloud Computing Technologies and Applications (CloudTech?2015), Marrakesh, Morocco, Juin 2015.
Part 3: Template for Service Level Agreements (SLA.
T. Aubonnet, N. Simoni et P.-Y. Hebert.
ETSI, n° ETSI EG 202 009-3 , Juin 2015.
Towards on-chip continuous-variable quantum key distribution.
M. Persechino, M. Ziebell, N. Harris, Ch. Galland, D. Marris-Morini, L. Vivien, E. Diamanti et Ph. Grangier.
CLEO/Europe - EQEC 2015, Munich, Allemagne, Juin 2015.
Possibility for Probabilistic XML.  
A. Amarilli.
Ingénierie des Systèmes d'Information, vol. 20, n° 5, pp. 53-75, Juin 2015.
RACS: Remote APDU call secure creating trust for the internet.
p. urien.
IEEE CTS 2015, Atlanta, USA, DOI: 10.1109/CTS.2015.7210448 , Juin 2015.
Linear independence of rank 1 matrices and the dimension of *-products of codes.
H. Randriambololona.
2015 IEEE International Symposium on Information Theory (ISIT 2015), Juin 2015.
OUVRIR LA BOITE NOIRE DE LA PRODUCTION DE VIDEOS POUR LES MOOC. VERS UNE ANALYSE SOCIOTECHNIQUE.
R. Sharrock et L. Brice.
QPES - Questions de pédagogie dans l'enseignement supérieur, Brest, France, Juin 2015.
Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks.  
F. Yan, A. Vergne, Ph. Martins et L. Decreusefond.
IEEE/ACM Transactions on Networking, vol. 23, n° 6, pp. 1705 -- 1718, DOI: 10.1109/TNET.2014.2338355, Juin 2015.
draft-urien-uta-tls-dtls-security-module-00.  
p. urien.
IETF, Juin 2015.
A greedy approach for minimizing SDN control overhead.  
M. Obadia, M. Bouet, J.-L. Rougier et L. Iannone.
Network Softwarization (NetSoft), 2015 1st IEEE Conference on, London, UK, DOI: 10.1109/NETSOFT.2015.7116135, Juin 2015.
Derandomizing quantum circuits: measurement based unitary design.
D. Markham.
Juin 2015.
Discovering Meta-Paths in Large Heterogeneous Information Networks.  
Ch. Meng, R. Cheng, S. Maniu, P. Senellart et W. Zhang.
WWW, Florence, Italy, Mai 2015.
On the Ensemble of Optimal Dominating and Locating-Dominating Codes in a Graph.  
I. Honkala, O. Hudry et A. Lobstein.
Information Processing Letters, vol. 115, pp. 699-702, Mai 2015.
Analyzing Interference from Static Cellular Cooperation using the Nearest Neighbour Model.  
A. Giovanidis, L. D. Alvarez-Corrales et L. Decreusefond.
SPASWIN - WIOPT, Mumbai, Inde, DOI: 10.1109/WIOPT.2015.7151121, Mai 2015.
A Collaborative Approach for a Source based Detection of Botclouds.
B. Hammi, G. Doyen et R. Khatoun.
IFIP/IEEE Integrated Network Management Symposium (IM 2015), Ottawa, Canada,, Mai 2015.
DIVINA: Discovering Vulnerabilities of Internet Accounts.
Z. Ismail, D. Symeonidou et F. M. Suchanek.
WWW demo, Mai 2015.
Load Balancing in Heterogeneous Networks Based on Distributed Learning in Potential Games.  
M. S. Ali, P. Coucheney et M. Coupechoux.
International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), pp. 1-8, Mumbai, India, Mai 2015.
Rule Mining for Semantifying Wikilink.  
L. Galárraga, D. Symeonidou et J.-C. Moissinac.
LODW 2015, Florence, Mai 2015.
IBEX: Harvesting Entities from the Web Using Unique Identifiers.  
A. Talaika, J. Biega, A. Amarilli et F. M. Suchanek.
WebDB, Melbourne, Australie, Mai 2015.
FOREST: Focused Object Retrieval by Exploiting Significant Tag Paths.  
M. Oita et P. Senellart.
WebDB, pp. 55-61, Melbourne, Australia, Mai 2015.
Truth Finding with Attribute Partitioning.  
M. L. Ba, R. Horincar, P. Senellart et H. Wu.
WebDB, pp. 27-33, Melbourne, Australia, Mai 2015.
Spontaneous four-wave mixing in liquid-core fibers: towards fibered Raman-free correlated photon sources.  
M. Barbier, I. Zaquine et Ph. Delaye.
New Journal of Physics, vol. 17, pp. 053031, Mai 2015.
LISP EID Block.
L. Iannone, D. Lewis, D. Meyer et V. Fuller.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-12.txt, Mai 2015.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-impact-02.txt, Mai 2015.
Demonstrating genuine multipartite entanglement and nonseparability without shared reference frames.
C. F. Senel, Th. Lawson, M. Kaplan, D. Markham et E. Diamanti.
Physical Review A, vol. 91, pp. 052118, Mai 2015.
Practical secure quantum communications.
E. Diamanti.
SPIE Quantum Optics and Quantum Information Transfer and Processing, vol. 9505, n° 95050L, Prague, République tchèque, Mai 2015.
Des Secure Elements dans le Cloud, ou le Web des objets cryptographiques selon RACS. Chimère ou paradigme de rupture .
p. urien.
Mai 2015.
Network Connectivity Graph for Malicious Traffic Dissection.  
E. Bocchi, L. Grimaudo, M. Mellia, E. Baralis, S. Saha, S. Miskovic, G. Modelo-Howard et S.-J. Lee.
24th International Conference on Computer Communications and Networks (ICCCN 2015), pp. 1 - 9, Las Vegas, États-Unis, DOI: 10.1109/ICCCN.2015.7288435, Mai 2015.
Stochastic dynamics of determinantal processes by integration by parts.  
L. Decreusefond, I. Flint, N. Privault et G. L. Torrisi.
Communications on stochastic analysis and applications, vol. 9, n° 3, pp. 375-399, Avril 2015.
iSkin: Flexible, Stretchable and Visually Customizable On-Body Touch Sensors for Mobile Computing.  
M. Weigel, T. Lu, G. Bailly, A. Oulasvirta, C. Majidi et J. Steimle.
CHI'15: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2991-3000, Seoul, Korea, Avril 2015.
The Emergence of Interactive Behavior: A Model of Rational Menu Search.  
X. Chen, G. Bailly, D. P. Brumby, A. Oulasvirta et A. Howes.
CHI'15: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 4217-4226, Seoul, Korea, Avril 2015.
Physical Loci: Leveraging Spatial, Object and Semantic Memory for Command Selection.  
S. T. Perrault, E. Lecolinet, Y. Guiard, Y. Bourse et S. Zhao.
CHI'15: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 299-308, Seoul, Korea, DOI: 10.1145/2702123.2702126, Avril 2015.
Mobile instruments for multi-surface interaction.
J. Eagan et M.-E. Perrin.
International workshop on Mobile Collocated Interactions: From smartphones to Wearables, ACM CHI '15, pp. 4, Seoul, South Korea, Avril 2015.
SuperVision: Spatial Control of Connected Objects in a Smart Home.  
S. Gosh, G. Bailly, R. Despouys, E. Lecolinet et R. Sharrock.
CHI Extended Abstracts: ACM Conference on Human Factors in Computing Systems, pp. 2079-2084, Soul, Korea, DOI: 10.1145/2702613.2732779, Avril 2015.
Experimental demonstration of a graph state quantum error-correction code.  
B. A. Bell, D. A. Herrera-Martí, M. S. Tame, D. Markham, W. J. Wadsworth et J. G. Rarity.
Nature Communications, vol. 5, n° 3658, Avril 2015.
A Bird?s Eye View on Wawacity: Characteristics on Contents and Files.
N. Zhao, S. Khoudmi, L. Baud et P. Bellot.
BigMM 2015 The First IEEE International Conference on Multimedia Big Data , pp. 1-4, Beijing, China, Avril 2015.
Coexistence of continuous variable QKD with intense DWDM classical channels.  
H. Qin, R. Kumar et R. Alléaume.
New Journal of Physics, vol. 17, n° 4, pp. 043027, Avril 2015.
A Distributed and Robust SDN Control Plane for Transactional Network Updates.
M. Canini, P. Kuznetsov, D. Levin et S. Schmid.
INFOCOM, Avril 2015.
SketchSliders: Sketching Widgets for Visual Exploration on Wall Displays.  
Th. Tsandilas, A. Bezerianos et Th. Jacob.
CHI '15: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Séoul, Corée du Sud, DOI: http://dx.doi.org/10.1145/2702123.2702129., Avril 2015.
Distributed Load Balancing in Heterogeneous Networks.  
M. Coupechoux, M. S. Ali et P. Coucheney.
Journée Optim & Télécoms, Université Paris 13, Villetaneuse, France, Avril 2015.
On products and powers of linear codes under componentwise multiplication.
H. Randriambololona.
Contemporary Mathematics, Avril 2015.
A Case Study on Regularity in Cellular Network Deployment.
J.-S. Gomez, A. Vasseur, A. Vergne, Ph. Martins, L. Decreusefond et Ch. Wei.
IEEE Wireless Communications Letters, Avril 2015.
A Greedy Approach for Minimizing SDN Control Overhead.
M. Obadia, M. Bouet, J.-L. Rougier et L. Iannone.
NetSoft'15, IEEE, Avril 2015.
LISP EID Block.
L. Iannone, D. Lewis, D. Meyer et V. Fuller.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-11.txt, Avril 2015.
Quantum Cryptography in Practice.
R. Alléaume.
Avril 2015.
Computation of the winner of an election .
O. Hudry.
Avril 2015.
Practical secure quantum communications.
E. Diamanti.
Avril 2015.
Zen and the art of network troubleshooting: a hands on experimental study.  
D. Joumblatt, F. Espinet et D. Rossi.
Traffic Monitoring and Analysis (TMA'15), Barcellona, Spain, Avril 2015.
A Lightweight Anycast Enumeration and Geolocation.  
D. Cicalese, D. Joumblatt, D. Rossi, J. Augé, M.-O. Buob et T. Friedman.
IEEE INFOCOM, Demo Session, Hong Kong, China, Avril 2015.
A Fistful of Pings: Accurate and Lightweight Anycast Enumeration and Geolocation.  
D. Cicalese, D. Joumblatt, D. Rossi, J. Augé, M.-O. Buob et T. Friedman.
IEEE INFOCOM, Hong Kong, China, Avril 2015.
Personal Cloud Storage Benchmarks and Comparison.  
E. Bocchi, I. Drago et M. Mellia.
IEEE Transactions on Cloud Computing (IEEE TCC), n° 99, pp. pp, DOI: 10.1109/TCC.2015.2427191, Avril 2015.
Calculabilité de la cohomologie étale modulo $\ell$.
D. Madore et F. Orgogozo.
Algebra Number Theory, vol. 9, n° 7, pp. 1647--1739, DOI: 10.2140/ant.2015.9.1647, Avril 2015.
Competitive Location in Cognitive Radio Networks.  
S. Iellamo, E. Alekseeva, L. Chen, M. Coupechoux et Y. A. Kochetov.
4OR A Quarterly Journal of Operations Research, vol. 13, n° 1, pp. 81-110, DOI: 10.1007/s10288-014-0268-1, Mars 2015.
Architecture orientée services : une clef pour faciliter l'intégration de nouveaux points de mesure pour la performance des activités de maintenance.
T. Dang, P. Bellot, P. Minet, E. Livolant et Ch. Mozzati.
Génie Logiciel, n° 112, pp. 25-31, Mars 2015.
Guest Editorial: Special Issue on Databases and Crowdsourcing.  
R. Cheng, S. Maniu et P. Senellart.
Distributed and Parallel Databases, vol. 33, n° 1, pp. 1-2, Mars 2015.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-impact-01.txt, Mars 2015.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-12.txt, Mars 2015.
Unbreakable code ? the keys to your secrets in quantum states of light.
R. Alléaume.
Horizon Magazine, Mars 2015.
Quantum cryptography using practical photonic systems.
E. Diamanti.
Mars 2015.
Anycast census and geolocation.  
D. Cicalese, J. Augé, D. Joumblatt, D. Rossi et T. Friedman.
7th Workshop on Active Internet Measurements (AIMS 2015, San Diego, USA, Mars 2015.
Errors Announcing 32-bit ASNs in BGP Routes.  
R. Mazloum, J. Augé, T. Friedman et D. Rossi.
International Conference on Design of Reliable Communication Networks (DRCN'15), Extended Abstract, Kansas City, USA,, Mars 2015.
Green Opportunistic and Efficient Resource Block Allocation Algorithm for LTE Uplink Networks.
F. Z. Kaddour, E. Vivier, L. Mroueh, M. Pischella et Ph. Martins.
IEEE Trans. Vehicular Technology, vol. 64, n° 10, pp. 4537--4550, DOI: 10.1109/TVT.2014.2365960, Mars 2015.
Ground state blind quantum computation on AKLT state.
T. Morimae, V. Dunjko et E. Kashefi.
Quantum Information and Computation, vol. 15, pp. 200-234, Mars 2015.
Servers, display devices, scrolling methods and methods of generating heatmaps.  
J. Robinson, M. Ribière, M. Baglioni, E. Lecolinet et J. Daigremont.
Mars 2015.
Lower bounds on the minimum distance of long codes in the Lee metric.
H. Randriam, L. Sok et P. Solé.
Designs, Codes and Cryptography, vol. 74, n° 2, pp. 441-452, Février 2015.
Decoherence effects on the nonlocality of symmetric states.  
A. Sohbi, I. Zaquine, E. Diamanti et D. Markham.
PHYSICAL REVIEW A, vol. 91, n° 2, pp. 022101 , DOI: http://dx.doi.org/10.1103/PhysRevA.91.022101, Février 2015.
A Stochastic Geometry Framework for Analyzing Pairwise-Cooperative Cellular Networks.  
F. Baccelli et A. Giovanidis.
IEEE Trans. on Wireless Communications, vol. 14, n° 2, pp. 794 - 808 , DOI: 10.1109/TWC.2014.2360196, Février 2015.
Survey on Decentralized Online Social Networks.
Th. Strufe, Th. Paul et A. Famulari.
Computer Networks: The International Journal of Computer and Telecommunications Networking, Février 2015.
Demo Abstract: Automating WSN experiments and simulations.
R. Leone, J. Leguay, P. Medagliani et C. Chaudet.
European Wireless Sensor Networks (EWSN), Porto, Portugal, Février 2015.
Complexité et théorie du vote.
O. Hudry.
Bulletin de la Société française de recherche opérationnelle et d?aide à la décision (ROADEF), vol. 33, pp. 7-14, Février 2015.
An Authentication Architecture for Cloud-Based Firewalling Service.  
F. A. Guenane, A. Serhrouchni et G. Pujolle.
IEEE, MobiSecServ, onference On Mobile And Secure Services, Florida, USA, Février 2015.
Snooping Wikipedia Vandals with MapReduce.  
M. Spina, D. Rossi, M. Sozio, S. Maniu et B. Cautis.
IEEE ICC, London, United kingdom, Février 2015.
Cost-aware caching: Caching more (costly items) for less (ISPs operational expenditures).  
A. Araldo, D. Rossi et F. Martignon.
IEEE Transactions on Parallel and Distributed Systems, pp. to appear, Février 2015.
Towards token-requestor for epayment based on cloud of secure elements and HCE mobiles.
p. urien.
IEEE MobiSecServ 2015, Gainesville,FL, USA, DOI: 10.1109/MOBISECSERV.2015.7072876, Février 2015.
Toward an optimized servers placement for mobile applications offloading.
M. Gagnaire et A. Ellouze.
IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), Montreal, Février 2015.
Green Wired Networks.
R. Sharrock et al..
Février 2015.
StreamDM: Advanced Data Mining in Spark Streaming.
A. Bifet, S. Maniu, J. Qian, G. Tian, Ch. He et W. Fan.
IEEE International Conference on Data Mining Workshop, ICDMW 2015, Atlantic City, NJ, USA, November 14-17, 2015, pp. 1608--1611, DOI: 10.1109/ICDMW.2015.140, Février 2015.
Real-Time Big Data Stream Analytics.
A. Bifet.
Février 2015.
Robustness and device independence of verifiable blind quantum computing.
A. Gheorghiu, E. Kashefi et P. Wallden.
New Journal of Physics, vol. 17, n° 8, pp. 083040, Février 2015.
Practical sharing of quantum secrets over untrusted channels.
D. Markham et A. Marin.
International Conference on Information Theoretic Security, pp. 1--14, Février 2015.
Mining Big Data Streams with Apache SAMOA.
A. Bifet.
Février 2015.
Online electric vehicle recharge scheduling under different e-mobility operator's pricing models.
I. Amigo et M. Gagnaire.
IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, DOI: 10.IAMG/2015, Février 2015.
Proceedings of the 2015 First Conference on Mobile and Secure Services (MOBISECSERV), .
S. Piramuthu et P. Urien.
MobiSecServ, Piscataway, NJ : IEEE, DOI: ISBN 9781479974283, Février 2015.
On the number of optimal identifying codes in a twin-free graph.  
I. Honkala, O. Hudry et A. Lobstein.
Discrete Applied Mathematics, vol. 180, pp. 111-119, Janvier 2015.
Construction of the generalized \\vCech complex.  
N.-K. Le, Ph. Martins, L. Decreusefond et A. Vergne.
VTC 25, Glasgow, Scotland, Janvier 2015.
YAGO3: A Knowledge Base from Multilingual Wikipedias.  
F. Mahdisoltani, J. Biega et F. M. Suchanek.
CIDR, Janvier 2015.
Nonlocality and conflicting interest games.
A. Pappa, N. Kumar, Th. Lawson, M. Santha, S. Zhang, E. Diamanti et I. Kerenidis.
Physical Review Letters, vol. 114, pp. 020401, Janvier 2015.
Continuous-variable quantum key distribution and hacking.
E. Diamanti.
IDQuantique Winter School, Les Diablerets, Suisse, Janvier 2015.
Integrated quantum communications.
E. Diamanti.
PICQUE Integrated Quantum Photonics Workshop, Oxford, Grande Bretagne, Janvier 2015.
LISP EID Block.
L. Iannone, D. Lewis, V. Fuller et D. Meyer.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-10.txt, Janvier 2015.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-impact-00.txt, Janvier 2015.
A Secure and Effective Device Pairing Protocol.
T. Nguyen et J. Leneutre.
12th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, Janvier 2015.
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures.  
Z. Ismail, J. Leneutre, D. Bateman et L. Chen.
16th IEEE International Symposium on High Assurance Systems Engineering (HASE), Daytona Beach, Florida, USA , Janvier 2015.
Hybrid Classical-Quantum Cryptography.
R. Alléaume.
Janvier 2015.
A Fuzzy Multi-metric QoS-balancing Gateway Selection Algorithm in a Clustered VANET to LTE Advanced Hybrid Cellular Network.
G.E.M. Zhioua, N. Tabbane, H. Labiod et S. Tabbane.
IEEE Transactions on Vehicular Technology, Janvier 2015.
Wait-freedom with advice.
E. Gafni, H. Fauconnier, C. Delporte et P. Kuznetsov.
Distributed Computing, vol. 28, n° 1, pp. 3-19, Janvier 2015.
On Partial Wait-Freedom in Transactional Memory.
P. Kuznetsov et S. Ravi.
ICDCN, Janvier 2015.
Scheduling algorithms to reduce the static energy consumption of real-time systems.
V. Legout, M. Jan et L. Pautet.
Real-Time Systems, vol. 51, n° 2, pp. 153--191, Janvier 2015.
Scalable Facility Location for Massive Graphs on Pregel-like Systems.
G. De Francisci Morales, K. Garimella, A. Gionis et M. Sozio.
CIKM, Janvier 2015.
Efficient Densest Subgraph Computation in Evolving Graphs.  
A. Epasto, S. Lattanzi et M. Sozio.
WWW, Janvier 2015.
Finding Subgraphs with Maximum Total Density and Limited Overlap.  
O. D. Balalau, T.-H. H. Chan, F. Bonchi, F. Gullo et M. Sozio.
WSDM, Janvier 2015.
Variations on minimal linear codes.  
G. Cohen et S. Mesnager.
4ICMCTA, Coding theory and Applications, vol. CIM Series in Math. Sciences 3, pp. 125-131, Janvier 2015.
Yet another variation on minimal linear codes.  
G. Cohen, S. Mesnager et H. Randriam.
ITA , pp. 329-330, Janvier 2015.
Cyclic codes and algebraic immunity of Boolean functions.  
S. Mesnager et G. Cohen.
IEEE-ITW, Janvier 2015.
Remote APDU Call Secure (RACS) Creating Secure and Trusted Applications for NFC Mobile Devices.
p. urien.
IEEE CCNC 2015, Las Vegas, USA, DOI: 10.1109/CCNC.2015.7157961 , Janvier 2015.
Macroscopic View of Malware in Home Networks.  
A. Finamore, S. Saha, G. Modelo-Howard, S.-J. Lee, E. Bocchi, L. Grimaudo, M. Mellia et E. Baralis.
12th Annual IEEE Consumer Communications & Networking Conference (IEEE CCNC'15), pp. 262 - 266, Las Vegas, États-Unis, DOI: 10.1109/CCNC.2015.7157987, Janvier 2015.
An Attack Execution Model for Industrial Control Systems Security Assessment..
Z. Ismail, J. Leneutre et A. Fourati.
CyberICS/WOS-CPS@ESORICS 2015, pp. 157-167, Vienna, Austria, Janvier 2015.
A SDN-based network architecture for cloud resiliency.
A. Fressancourt et M. Gagnaire.
12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas-Nevada USA, DOI: 15:MG/AF, Janvier 2015.
Complexity results for extensions of median orders to different types of remoteness.  
O. Hudry.
Annals of Operations Research , vol. 225, pp. 111-123, 2015.
New uniform and asymptotic upper bounds on the tensor rank of multiplication in extensions of finite fields.
J. Pieltant et H. Randriam.
Math. of Computation, vol. 84, n° 294, pp. 2023-2045, 2015.
Cellular Network Offloading using VANETs: An Analytical Study.
G.E.M. Zhioua, H. Labiod et al..
IEEE VTC2015-Spring , Glasgow, Scotland, 2015.
Applications of conceptual spaces.
J.-L. Dessalles.
DOI: 10.1007/978-3-319-15021-5_22015.
Keynote: A Hitchhiker's Guide to Ontology.  
F. M. Suchanek.
2015.
Pour innover, modéliser l'imaginaire - Regards croisés d'industriels et de chercheurs.  
J.-L. Dessalles.
2015.
Asymptotics of superposition of point processes.  
L. Decreusefond et A. Vasseur.
2015.
Simplicial homology based energy saving algorithms for wireless networks.  
N.-K. Le, Ph. Martins, L. Decreusefond et A. Vergne.
IEEE ICC, London, United kingdom, 2015.
A Flow-Level Performance Model for Mobile Networks Carrying Adaptive Streaming Traffic.  
Th. Bonald, S.-E. ELAYOUBI et Y.-T. Lin.
Globecom, San Diego, United states, 2015.
Multi-Resource Fairness: Objectives, Algorithms and Performance.  
Th. Bonald et J. Roberts.
ACM Sigmetrics, Portland, United states, 2015.
How Mobility Impacts the Performance of Inter-cell Coordination in Cellular Data Networks.  
N. Abbas, Th. Bonald et B. Sayrac.
Globecom, San Diego, United states, 2015.
Mobility support in optical slot switching-based next-generation mobile backhaul networks.  
N. Benzaoui, Y. Pointurier, Th. Bonald, B. Uscumlic, Q. Wei et S. Bigo.
ECOC, Valencia, Spain, 2015.
Traffic models for user-level performance evaluation in data networks.  
Th. Bonald.
ITC, Ghent, Belgium, DOI: 10.1109/ITC.2015.20, 2015.
Analytical Modeling of Downlink CoMP in LTE-Advanced.  
A. Khlass, Th. Bonald et S.-E. ELAYOUBI.
VTC, Glasgow, United kingdom, DOI: 10.1109/VTCSpring.2015.7145704, 2015.
Opportunistic gains of mobility in cellular data networks.  
N. Abbas, Th. Bonald et B. Sayrac.
WiOpt, Bombay, India, DOI: 10.1109/WIOPT.2015.7151088, 2015.
On involutions of finite fields.
P. Charpin, S. Mesnager et S. Sarkar.
ISIT 2015, Hong-Kong, 2015.
Results on characterizations of plateaued functions in arbitrary characteristic.
S. Mesnager, F. Ozbudak et A. Sinak.
BalkanCryptSec 2015, 2015.
Bent and semi-bent functions via linear translators.
N. Kocak, S. Mesnager et F. Ozbudak.
IMACC 2015, 2015.
On the diffusion property of iterated functions.
J. Liu, S. Mesnager et L. Chen.
IMACC 2015, 2015.
Secret sharing schemes with general access structures.
J. Liu, S. Mesnager et L. Chen.
Inscrypt 2015, 2015.
Distributed Instrumentation \& Control (I\&C) architecture Design and V alidation.
M. Viel, P. Salaun, Th. Lemattre, F. a. Chatou, N. B. Chaux et Th. Robert.
Fast Abstract DSN 2015, pp. 1-2, 2015.
Safety and Deferred Update in Transactional Memory.
H. Attiya, S. Hans, P. Kuznetsov et S. Ravi.
DOI: 10.1007/978-3-319-14720-8_32015.
Dynamic Recommender System: Using Cluster-Based Biases to Improve the Accuracy of the Predictions.
M. Gueye, T. Abdessalem et H. Naacke.
DOI: 10.1007/978-3-319-23751-0\_52015.
On Polynomial Pairs of Integers.
F. Ezerman, B. Meyer et P. Solé.
Journal of Integer Sequences, vol. 18, 2015.
A POMDP Solution to Antenna Selection for PER Minimization.  
P. Sinchu, R. G. Stephen, Ch. R. Murthy et M. Coupechoux.
IEEE Global Communications Conference (GLOBECOM), pp. 1-6, Austin, USA, Décembre 2014.
Analytical Performance Model for Poisson Wireless Networks with Pathloss and Shadowing Propagation.  
J.-M. Kélif, S. Senecal, M. Coupechoux et C. Bridon.
IEEE Global Communications Conference (GLOBECOM) Workshops, pp. 1-5, Austin, USA, Décembre 2014.
Quality of Service and Performance Evaluation: A Fluid Approach for Poisson Wireless Networks.  
J.-M. Kélif, S. Senecal, C. Bridon et M. Coupechoux.
IEEE International Conference on Network of the Future (NoF), pp. 1-5, Paris, France, Décembre 2014.
NP-hardness of the computation of a median equivalence relation in classification.
O. Hudry.
VIII ALIO/EURO Workshop on Applied Combinatorial Optimization (ALIO/EURO 2014), Montevideo, Uruguay, Décembre 2014.
Comment nous optimisons nos signaux sociaux.
J.-L. Dessalles.
La Recherche, vol. 494, pp. 56-59, Décembre 2014.
A Social and Popularity-based Tag Recommender.
M. Gueye, T. Abdessalem et H. Naacke.
The 7th IEEE International Conference on Social Computing and Networking, pp. 8, Décembre 2014.
Towards a Numerical Rule Mining Language.  
L. Galárraga et F. M. Suchanek.
Workshop on Automated Knowledge Base Construction (AKBC), Décembre 2014.
La régressivité de l?impôt chez les très hauts revenus : des chiffres incisifs sous le scalpel émoussé de Landais, Piketty et Saez.
Y. Guiard.
Statistique et société, vol. 2, n° 4, pp. 71-77, Décembre 2014.
Fast Selective Encryption Method for Bitmaps based on GPU Acceleration..
H. Qiu et G. Memmi.
IEEE ISM?14 , pp. 155-158, Taipei, Taiwan, DOI: 10.1109/ISM.2014.47 , Décembre 2014.
Radio-Based Navigation and Posture Detection Experiments in Cooperative Wireless Body Area Networks.
B. Denis, J. Hamie, C. Chaudet et al..
IEEE International Conference on Electronics Circuits and Systems (IEEE ICECS?14), Workshop on Emerging Techniques and Architectures in BAN Systems and Applications,, Marseille, France, Décembre 2014.
Détection des Attaques Wormhole dans les Réseaux MANETs en utilisant la Théorie des Graphes.
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, X. Chen et D. Gaïti.
10ième édition du colloque francophone sur la Gestion de Réseaux Et de Services (GRES?2014). , Paris, France, Décembre 2014.
Génération automatique de règles Snort pour la détection des réseaux Fast-Flux..
J.-Ph. Monteuuis, J. Huor, M. Hofmann, V. Beauvisage et R. Khatoun.
Multi-System & Internet Security Cookbook (MISC), n° 76, Décembre 2014.
Cost-aware caching: optimizing cache provisioning and object placement in ICN.  
A. Araldo, M. Mangili, F. Martignon et D. Rossi.
IEEE GLOBECOM, pp. 1108 - 1113 , Austin, USA, Décembre 2014.
Fine-grained EPR-steering inequalities.
T. Pramanik, M. Kaplan et A. Majumdar.
Physical Review A Rapid communications, vol. 90, n° 050305(R), Décembre 2014.
Dimension of physical systems, information processing, and thermodynamics.
N. Brunner, M. Kaplan, A. Leverrier et P. Skrzypczyk.
New Journal of Physics, vol. 16, n° 123050, Décembre 2014.
LISP EID Block Management Guidelines.
L. Iannone, D. Conrad et R. Jorgensen.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-04.txt, Décembre 2014.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-11.txt, Décembre 2014.
FAILOVER MECHANISMS FOR DISTRIBUTED SDN CONTROLLERS.
M. Obadia, M. Bouet, J. Leguay, L. Iannone et K. Phemius.
!st Workshop on Smart Cloud Networks and Systems, Paris (France), Décembre 2014.
Security enhancement of HTML5 Local Data Storage.
M. JEMEL et A. Serhrouchni.
IEEE, IFIP, 2014 International Conference and Workshop on the Network of the Future (NOF), Paris, France, Décembre 2014.
On-line scheduling policies for Electric Vehicle charging over public lighting systems.
M. Alvarado-Ruiz, F. Abi Abdallah et M. Gagnaire.
IEEE International Electric Vehicle Conference (IEVC), pp. 1-8, Florence, Italy, DOI: 10.1109/IEVC.2014.7056128, Décembre 2014.
Carrier Aggregation/Channel Bonding in Next Generation Cellular Networks: Methods and Challenges.  
Z. Khan, H. Ahmadi, E. Hossain, M. Coupechoux, L. Dasilva et J. Lehtomäki.
IEEE Network, vol. 28, n° 6, pp. 34-40, DOI: 10.1109/MNET.2014.6963802, Novembre 2014.
On the Number of Optimal Identifying Codes in Twin-Free Graphs.
I. Honkala, O. Hudry et A. Lobstein.
Bordeaux Graph Workshop (BGW 2014), Bordeaux, Novembre 2014.
Knowledge Bases in the Age of Big Data Analytics.
F. M. Suchanek et G. Weikum.
International Conference on Very Large Databases (VLDB) tutorial, Novembre 2014.
Canonicalizing Open Knowledge Bases.
L. Galárraga, K. Murphy, G. Heitz et F. M. Suchanek.
Conference on Information and Knowledge Management (CIKM) , Novembre 2014.
Algorithmic Self-Governance and the Design of Socio-Technical Systems.
J. Pitt, D. Busquets, A. Diaconescu, A. Nowak, A. Rychwalska et M. Roszczynska-Kurasinska.
European Conference on Social Intelligence, Barcelona, Spain, Novembre 2014.
Quantum cryptography using practical photonic systems.
E. Diamanti.
Novembre 2014.
Demonstration and risk analysis of practical Trojan horse attacks on continuous-variable quantum key distribution systems.
I. Khan, N. Jain, B. Stiller, P. Jouguet, S. Kunz-Jacques, E. Diamanti, V. Makarov, Ch. Marquardt et G. Leuchs.
Quantum Communication, Measurement and Computing Conference (QCMC) , Hefei, Chine, Novembre 2014.
Analyzing various broadcast strategies in WBAN.
C. Chaudet, F. Petruzzi et M. Potop-Butucaru.
International Workshop on Green Solutions for Body Area Networks (GreenBAN'14), Paris, France, Novembre 2014.
Denial of Service (DoS) Attacks Detection in MANETs Using Bayesian Classifiers.
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi et D. Gaïti.
The 21st IEEE Symposium on Communications and Vehicular Technology in the Benelux , Delft, Netherlands, Novembre 2014.
Data Integrity and Availability Verification Game in Untrusted Cloud Storage.  
B. Djebaili, Ch. Kiennert, J. Leneutre et L. Chen.
5th International Conference on Decision and Game Theory for Security (Gamesec 2014), Lecture Notes in Computer Science, vol. 8840, pp. 287-306, Los Angeles, CA, USA, Novembre 2014.
Experimental demonstration of graph-state quantum secret sharing.
B. A. Bell, D. Markham, D. A. Herrera-Martí, A. Marin, W. J. Wadsworth, J. G. Rarity et M. S. Tame.
Nature Communications, vol. 5, n° 5480, Novembre 2014.
DODEX+: A new network coding scheme for mesh networks in mobile cloud computing.  
N. Boukhatem, Th. M. T. Nguyen, Th. V. Vu et G. Pujolle.
Wireless Days, Rio de Janeiro, Brazil, Novembre 2014.
Improving Web Application Firewalls to Detect Advanced SQL Injection Attacks.
A. Makiou et A. Serhrouchni.
IEEE, 10th International Conference on Information Assurance and Security (IAS?14), OKINAWA JAPON, Novembre 2014.
Security assurance of local data stored by HTML5 web application.
M. JEMEL et A. Serhrouchni.
10th International Conference on Information Assurance and Security (IAS?14), Okinawa, Japon, Novembre 2014.
Improving energy distribution for EV charging over public lighting systems.
M. Alvarado-Ruiz, F. Abi Abdallah et M. Gagnaire.
IEEE International Conference on Connected Vehicles and Expo (ICCVE), pp. 408 - 415, Vienna, Austria, DOI: 10.1109/ICCVE.2014.7297580, Novembre 2014.
Optimal Sequential Wireless Relay Placement on a Random Lattice Path.  
A. Sinha, A. Chattopadhyay, K.P. Naveen, P. Mondal, M. Coupechoux et A. Kumar.
Elsevier Ad Hoc Networks, vol. 21, pp. 1-17, Octobre 2014.
Belly Gestures: Body Centric Gestures on the Abdomen.  
D.-B. Vo, E. Lecolinet et Y. Guiard.
NordiCHI, pp. 687-696, Helsinki, Finland, DOI: 10.1145/2639189.2639210, Octobre 2014.
Impromptu Deployment of Wireless Relay Networks: Experiences Along a Forest Trail.  
A. Chattopadhyay, A. Ghosh, A. S. Rao, B. Dwivedi, S.V.R. Anand, M. Coupechoux et A. Kumar.
IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS), pp. 1-5, Philadelphia, USA, Octobre 2014.
Collecte, intégration et visualisation de données Web incertaines sur des objets mobiles.  
M. L. Ba, S. Montenez, T. Abdessalem et P. Senellart.
BDA (Bases de Données Avancées), Autrans, France, Octobre 2014.
Monitoring moving objects using uncertain Web data.  
M. L. Ba, S. Montenez, T. Abdessalem et P. Senellart.
SIGSPATIAL (Special Interest Group on Spatial Information), pp. 4, Dallas, USA, Octobre 2014.
Routing in OPC-UA with Rosa Overlay Network.
T. Dang, D. Brezak et P. Bellot.
OTM'14/CoopIS, Industry Case Studies Program, Amantea (Italy), Octobre 2014.
Can Believable Characters Act Unexpectedly?.
A. Saillenfest et J.-L. Dessalles.
Literary & Linguistic Computing, vol. 29, n° 4, pp. 606-620, DOI: 10.1093/llc/fqu042, Octobre 2014.
Advancing the Utility of Large Knowledge Bases.  
F. M. Suchanek.
Habilitation à diriger des recherches (HDR), Octobre 2014.
Semantic Culturomics.
F. M. Suchanek et N. Preda.
International Conference on Very Large Databases (VLDB) vision paper, Octobre 2014.
Un espace de caractérisation pour l'édition de courbes à trois dimensions.  
Th. Jacob, G. Bailly, E. Lecolinet, R. Foulon et E. Corteel.
IHM'14: Conférence francophone sur l'Interaction Homme Machine, pp. 105-112, Villeneuve d'Ascq, France, DOI: 10.1145/2670444.2670454, Octobre 2014.
Reliable experimental quantification of bipartite entanglement without reference frames.
Th. Lawson, A. Pappa, B. Bourdoncle, I. Kerenidis, D. Markham et E. Diamanti.
Physical Review A, vol. 90, pp. 042336, Octobre 2014.
Distribution quantique de clés avec des systèmes photoniques pratiques.
E. Diamanti.
Octobre 2014.
CtrlMouse et TouchCtrl : Dupliquer les Delimiteurs de Mode sur la Souris.  
Th. Pietrzak, S. Malacria et G. Bailly.
IHM'14: Conference Internationale Francophone sur l'Interaction Homme-Machine, Bordeaux, France, Octobre 2014.
Precondition Analysis in Algebraic Graph Transformation to Support the Testing of Model Transformation Chains.
E. Richa, E. Borde, L. Pautet, M. Bordin et J. Riuz.
MODELS workshop on Analysis of Model Transformations, pp. 34--43, Valencia (Spain), Octobre 2014.
Architecture Models Refinement for Fine Grain Timing Analysis of Embedded Systems.
E. Borde, L. Pautet, F. Cadoret, S. Rahmoun et F. Singhoff.
International Symposium on Rapid System Prototyping, pp. 44--50, New Delhi (India), Octobre 2014.
Game Theoretic Approaches for Revenue Sharing in Federated Cloud.
B. El Zant, I. Amigo et M. Gagnaire.
Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, pp. 300-306, Luxembourg, Octobre 2014.
SuperVision : controler spatialement les objets connectés dans une maison intelligente.  
S. Gosh, G. Bailly, R. Despouys, E. Lecolinet et R. Sharrock.
IHM'14: Conférence francophone sur l'Interaction Homme Machine, Lille, France, DOI: 10.1145/2670444.2670471, Octobre 2014.
A design space of guidance techniques for large and dense physical environments.  
H. Gacem, G. Bailly, J. Eagan et E. Lecolinet.
IHM'14:Proceedings of the 26th Conference on l'Interaction Homme-Machine, pp. 9-17, Villeneuve d'Ascq, France, DOI: 10.1145/2670444.2670455, Octobre 2014.
Implementation Software To Secure Virtual Machines With Remote Grid of Secure Elements.  
H. Aissaoui-Mehrez, G. Pujolle et p. urien.
IEEExplore, pp. 282 - 287 , DOI: 10.1109/MILCOM.2014.51, Octobre 2014.
LISP EID Block Management Guidelines.
L. Iannone, D. Conrad et R. Jorgensen.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-03.txt, Octobre 2014.
Perceptual strategies under constrained movements on a zoomable haptic mobile device.  
M. Ziat, E. Lecolinet, O. Gapenne, G. Mouret et Ch. Lenay.
Eurohaptics, pp. 224-231, Paris, France, DOI: 10.1007/978-3-662-44193-0_29, Octobre 2014.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-saucez-lisp-impact-07.txt, Octobre 2014.
PCM in cloud.  
M. Msahli et A. Serhrouchni.
IEEE International Conference on Granular Computing (GrC), Noboribetsu , Japan, Octobre 2014.
Hybrid approach to detect SQLi attacks and evasion techniques .  
A. Makiou, Y. Begriche et A. Serhrouchni.
IEEE, International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, USA, Octobre 2014.
Cloud of Secure Elements: An Infrastructure For the Trust of Mobiles NFC Services.
P. Urien.
WIMOB 2014, Lanarca, Chypre, DOI: 10.1109/WiMOB.2014.6962173, Octobre 2014.
NFC Peer To Peer Secure Services For Smart Cities. LLCPS Concepts and Experiments with Smartphones.
P. Urien.
SaSeIoT 2014, Rome, Italie, DOI: 10.1007/978-3-319-19743-2_40, Octobre 2014.
Interactions sûres dans les architectures orientées service.
J. Michaux.
Thèse de doctorat, Octobre 2014.
Software Switch Performance Factors in Network Virtualization Environment.
Y. Zhao, L. Iannone et R. Michel.
IEEE 22nd Internation Conference on Network Protocols (PhD Forum), pp. 468-470, Raleigh, NC (USA), Octobre 2014.
Cloud Storage Service Benchmarking: Methodologies and Experimentations.  
E. Bocchi, S. Sarni et M. Mellia.
3rd IEEE International Conference on Cloud Networking (IEEE CloudNet 2014), pp. 395-400, Luxemburg, LUX, DOI: 10.1109/CloudNet.2014.6969027, Octobre 2014.
Adaptation of run to mixed-criticality systems.
R. Gratia, L. Pautet et Th. Robert.
Workshop on Real-Time Computing (RTNS), pp. 25--28, Versailles, Octobre 2014.
Improving Electrical Vehicles Recharging by Routine-Aware Scheduling.
M. S. Kuran, A. Carneiro Viana, L. Iannone, D. Kofman, G. Mermoud et J.-Ph. Vasseur.
Smart Cities Recharged: IEEE International Workshop on Smart City and Ubiquitous Computing Applications (SCUCA'14) in conjunction with IEEE WiMob'14, Lanarca (Cyprus), Octobre 2014.
A parameter-free algorithm for an optimized tag recommendation list size.
M. Gueye, T. Abdessalem et H. Naacke.
RecSys '14, pp. 233-240, Foster City, United States, DOI: 10.1145/2645710.2645727, Octobre 2014.
Cuenesics: Using Mid-Air Gestures to Select Items on Interactive Public Displays.  
R. Walter, G. Bailly, N. valkona et J. Müller.
ACM MobileHCI'14, Toronto, Canada, Septembre 2014.
MirrorTouch: Combining Touch and Mid-air Gestures for Public Displays.  
J. Müller, G. Bailly, Th. Bossuyt et N. Hillgren.
MobileHCI'14, Toronto, Canada, Septembre 2014.
Recent Topics of Research around the YAGO Knowledge Base.  
A. Amarilli, L. Galárraga, N. Preda et F. M. Suchanek.
Asia-Pacific Web Conference (APWEB), pp. 1-12, Changsha, China, Septembre 2014.
Get a Sample for a Discount: Sampling-Based XML Data Pricing.  
R. Tang, A. Amarilli, P. Senellart et S. Bressan.
DEXA (Database and Expert Systems Applications), pp. 20-34, Munich, Germany, Septembre 2014.
Scalable, Generic, and Adaptive Systems for Focused Crawling.  
G. Gouriten, S. Maniu et P. Senellart.
HyperText, pp. 35-45, Santiago, Chili, Septembre 2014.
Technology for Collective Action [Special Section Introduction].  
J. Pitt, A. Diaconescu et D. Bollier.
IEEE Technology and Society Magazine, vol. 3, pp. 32-34, Septembre 2014.
Implementation of quantum cryptographic protocols using practical photonic systems.
E. Diamanti.
Septembre 2014.
Experimental plug and play quantum coin flipping.
A. Pappa, P. Jouguet, Th. Lawson, A. Chailloux, M. Legré, P. Trinkler, I. Kerenidis et E. Diamanti.
Fourth Annual Conference on Quantum Cryptography (QCRYPT), Paris, France, Septembre 2014.
Trojan horse attacks on practical continuous-variables quantum key distribution systems.
I. Khan, N. Jain, B. Stiller, P. Jouguet, S. Kunz-Jacques, E. Diamanti, Ch. Marquardt et G. Leuchs.
Conference on Quantum Cryptography (QCRYPT), Paris, France, Septembre 2014.
Improved Navigation Capabilities in Groups of Cooperative Wireless Body Area Networks.
J. Hamie, C. Chaudet et B. Denis.
9th International Conference on Body Area Networks (BodyNets?14), London, UK, Septembre 2014.
Denial of Service (DoS) Attacks Detection in MANETs Using Statistical Models.
M. Rmayti, R. Khatoun, Y. Begriche, L. Khoukhi et D. Gaïti.
IEEE Global Information Infrastructure and Networking Symposium (GIIS 2014), Montreal, Canada, Septembre 2014.
A Gaussian Mixture Model for Dynamic Detection of Abnormal Behavior in Smartphone Applications.
A. El Attar, R. Khatoun et M. Lemercier.
The IEEE Global Information Infrastructure and Networking Symposium (GIIS 2014), , Montreal, Canada, Septembre 2014.
Design and Evaluation of Cost-aware Information Centric Routers.  
A. Araldo, D. Rossi et F. Martignon.
ACM SIGCOMM Conference on Information-Centric Networking (ICN-2014), pp. 147-156, Paris, France, Septembre 2014.
Coupling caching and forwarding: Benefits, analysis, and implementation.  
G. Rossini et D. Rossi.
ACM SIGCOMM Conference on Information-Centric Networking (ICN-2014), pp. 127-136, Paris, France, Septembre 2014.
nalyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking.
C. Imbrenda, L. Muscariello et D. Rossi.
ACM SIGCOMM Conference on Information-Centric Networking (ICN-2014), pp. 57-66, Paris, France, Septembre 2014.
Analyzing cacheability in the access network with HACkSAw.  
C. Imbrenda, L. Muscariello et D. Rossi.
ACM SIGCOMM Conference on Information-Centric Networking (ICN-2014), pp. 201-202, Paris, France, Septembre 2014.
CCN Simulators: Analysis and Cross-Comparison.  
M. Tortelli, D. Rossi, G. Boggia et A. Grieco.
ACM SIGCOMM Conference on Information-Centric Networking (ICN-2014), pp. 197-198, Paris, France, Septembre 2014.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-saucez-lisp-impact-06.txt, Septembre 2014.
An Android Platform for NFC Services Virtualization Based on Host Card Emulation and Cloud of Secure Elements.
P. Urien.
Chip to Cloud Security Forum, Marseille, France, Septembre 2014.
Granular: An access control model, and Confia: Its software tool.
L. Rosero, M. Riguidel et J. Aranda.
CLEI 14, pp. 1-9, Montevideo, Uruguay, DOI: 10.1109/CLEI.2014.6965160 , Septembre 2014.
Multi-Flow Transmission and Carrier Aggregation Inter-Operation in HSPA+ Advanced.
A. Khlass, S. El Ayoubi et Th. Bonald.
Vehicular Technology Conference, pp. 1 - 5 , Vancouver, Canada, DOI: 10.1109/VTCFall.2014.6966063, Septembre 2014.
Enhanced cluster computing performance through proportional fairness.
Th. Bonald et J. Roberts.
Performance Evaluation, vol. 79, pp. 134?145, DOI: 10.1016/j.peva.2014.07.009, Septembre 2014.
Sensemaking in the autonomic smart-home.
R. Despouys, R. Sharrock et I. Demeure.
UBICOMP Ubiquitous computing, Seattle, USA, Septembre 2014.
Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation.
E. Richa, E. Borde, L. Pautet, M. Bordin et J. Riuz.
AMT@MoDELS, pp. 34--43, Valencia, Spain, Septembre 2014.
A per-Application Account of Bufferbloat: Causes and Impact on Users.  
A. Araldo et D. Rossi.
5th International Workshop on TRaffic Analysis and Characterization (TRAC), pp. 1-6, Nicosia, Cyprus, Août 2014.
ARCOMEM Crawling Architecture.  
V. Plachouras, F. Carpentier, M. Faheem, J. Masanès, Th. Risse, P. Senellart, P. Siehndel et Y. Stavrakas.
Future Internet, vol. 6, n° 3, pp. 518-541, Août 2014.
Quantum cryptography using practical photonic systems.
E. Diamanti.
Août 2014.
Automatic Production of Transformation Chains Using Structural Constraints on Output Models.
C. Castellanos, E. Borde, L. Pautet, Th. Vergnaud et Th. Dérive.
Euromicro Conference on Software Engineering and Advanced Applications, pp. 158 - 165, Verona (Italy), Août 2014.
Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis.
A. El Attar, R. Khatoun et M. Lemercier.
The 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC 2014), , Milan, Italy, Août 2014.
Pedestrian Crossing: The Long and Winding Road toward Fair Cross-comparison of ICN Quality .  
M. Tortelli, D. Rossi, A. Grieco et G. Boggia.
In International Workshop on Quality, Reliability, and Security in Information-Centric Networking (Q-ICN), pp. 1-6, Rhodes, Greece, Août 2014.
Framework Implementation Based On Grid of Smartcards To Authenticate Users and Virtual Machines.  
H. Aissaoui-Mehrez, G. Pujolle et p. urien.
SCITEPRESS Digital Library, pp. 285 - 290 , DOI: 10.5220-0005046102850290, Août 2014.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-saucez-lisp-impact-05.txt, Août 2014.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-saucez-lisp-impact-04.txt, Août 2014.
Formal Analysis of Secure Device Pairing Protocols.  
T. Nguyen et J. Leneutre.
IEEE 13th International Symposium on Network Computing and Applications (NCA), Cambridge, Massachusetts, USA, Août 2014.
Self-control Cloud Services.
N. Simoni et T. Aubonnet.
The 13th IEEE International Symposium on Network Computing and Applications (IEEE NCA14), pp. 282 - 287, Cambridge, USA, Août 2014.
Part 1: Methodology for identification of indicators relevant to the Users.
N. Simoni, T. Aubonnet et P.-Y. Hebert.
ETSI, n° ETSI EG 202 009-1, Août 2014.
Part 2: User related parameters on a service specific basis? .
P.-Y. Hebert, N. Simoni et T. Aubonnet.
ETSI, n° ETSI EG 202 009-2, Août 2014.
The Green-Game: Accounting for Device Criticality in Resource Consolidation for Backbone IP Networks.
A. P. Bianzino, J.-L. Rougier, C. Chaudet et D. Rossi.
Strategic Behavior and the Environment, vol. 4, n° 2, Juillet 2014.
An analytic model for evaluating outage and handover probability of cellular wireless networks.  
L. Decreusefond, Ph. Martins et Th.-T. Vu.
Wireless Personal Communications Journal, pp. ~, Juillet 2014.
Accuracy of Homology based Coverage Hole Detection for Wireless Sensor Networks on Sphere.  
L. Decreusefond, Ph. Martins et F. Yan.
IEEE Transactions on Wireless Communications, vol. 13, n° 7, pp. 3583-3595, Juillet 2014.
Toward a source detection of botclouds: a PCA-based approach.
B. Hammi, G. Doyen et R. Khatoun.
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014), Brno, Czech Republic, Juillet 2014.
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks.
J. Dromard, R. Khatoun et L. Khoukhi.
8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014), Brno, Czech Republic, Juillet 2014.
Towards Optimal Menu Designs.  
G. Bailly et A. Oulasvirta.
Interactions, Juillet 2014.
Variations of identifying codes in graphs obained by adding or removing one vertex.
I. Charon, I. Honkala, O. Hudry et A. Lobstein.
9th International colloquium on graph theory and combinatorics (ICGT 2014), vol. Book of extended abstracts, n° 39, pp. 1-4, Grenoble, France, Juillet 2014.
Assessing Parsimony in Models of Aspect.  
D. Munch et J.-L. Dessalles.
36th Annual Conference of the Cognitive Science Society, pp. 2221-2226, Québec, Juillet 2014.
A cognitive approach to narrative planning with believable characters.  
A. Saillenfest et J.-L. Dessalles.
Computational Models of Narrative, vol. 41, pp. 177-181, Québec, Juillet 2014.
On minimal and almost-minimal linear codes.  
S. Mesnager et G. Cohen.
21st International Symposium MTNS, pp. 928-931, Groningen, Pays-Bas, Juillet 2014.
A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI.  
Z. Ismail, J. Leneutre, D. Bateman et L. Chen.
IEEE Journal on Selected Areas in Communications, vol. 32, n° 7, pp. 1486-1499, DOI: 10.1109/JSAC.2014.2332095, Juillet 2014.
Modeling the temperature bias of power consumption for nanometer-scale CPUs in application processors.
K. De Vogeleer, G. Memmi, P. Jouvelot et F. Coelho.
Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV), 2014 International Conference on , pp. 172 - 180 , Samos, Greece, DOI: 10.1109/SAMOS.2014.6893209, Juillet 2014.
Global identity management of virtual machines based on remote secure elements.  
H. Aissaoui-Mehrez, G. Pujolle et p. urien.
IEEExplore, pp. 1-4, DOI: 10.1109/CITS.2014.6878954, Juillet 2014.
LISP EID Block Management Guidelines.
L. Iannone, D. Conrad et R. Jorgensen.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-02.txt, Juillet 2014.
LISP EID Block.
L. Iannone, D. Lewis, V. Fuller et D. Meyer.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-09.txt, Juillet 2014.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-10.txt, Juillet 2014.
A Unified LISP Mapping Database for L2 and L3 Network Virtualization Overlays.
Y. Hertoghs, F. Maino, V. Moreno, M. Smith, D. Farinacci et L. Iannone.
Internet Engineering Task Force (IETF), n° draft-hertoghs-nvo3-lisp-controlplane-unified-02, Juillet 2014.
Experimental demonstration of the coexistence of continuous-variable quantum key distribution with an intense DWDM classical channel.
R. Kumar, H. Qin et R. Alléaume.
CLEO 2014, n° ISBN: 978-1-55752-999-2, San Jose, Juillet 2014.
TEDS: A trusted entropy and dempster shafer mechanism for routing in wireless mesh networks.
T. Heng Chuan, M. Ma, H. Labiod et P.H.J. Chong.
Fourth International Conference on Mobile Services, Resources, and Users (Mobility 2014), Paris France, Juillet 2014.
A generalized asynchronous computability theorem .
E. Gafni, P. Kuznetsov et C. Manolescu.
PODC, pp. 222-231, Juillet 2014.
AIDD: A novel generic attack modeling approach.
S. Souissi et A. Serhrouchni.
IEEE, International Conference on High Performance Computing & Simulation (HPCS), Bologna, Italy, Juillet 2014.
Simplicial Homology of Random Configurations.  
L. Decreusefond, E. Ferraz, H. Randriambololona et A. Vergne.
Advances in Applied Probability., vol. 46, n° 2, pp. 325-347, Juin 2014.
Retrospective Spectrum Access Protocol: A Payoff-based Learning Algorithm for Cognitive Radio Networks.  
S. Iellamo, L. Chen et M. Coupechoux.
IEEE International Conference on Communications (ICC), pp. 1-6, Sydney, Australia, Juin 2014.
The Possibility Problem for Probabilistic XML.  
A. Amarilli.
Alberto Mendelzon International Workshop on Foundations of Data Management, Carthagène des Indes, Colombie, Juin 2014.
Placement de relais dans les réseaux cellulaires.  
M. Coupechoux, M. Minelli, M. Ma, J.-M. Kélif, M. Sigelle et Ph. Godlewski.
Journée en l'honneur de Philippe Godlewski, Paris, France, Juin 2014.
Device and method for organizing forwarding information in nodes of a content centric networking.
D. Perino, G. Carofiglio, D. Rossi et G. Rossini.
Juin 2014.
Generation of Correlated Photon Pairs by Spontaneous Four-Wave Mixing in Liquid-Core Microstructured Fibres.
M. Barbier, I. Zaquine et Ph. Delaye.
CEWQO, pp. 67, Bruxelles, Belgique, Juin 2014.
Decoherence Effects on the Non-locality of Symmetric States.
A. Sohbi, I. Zaquine, E. Diamanti et D. Markham.
CEWQO, pp. C48, 108, Bruxelles, Belgique, Juin 2014.
Optimal investment in social signals.  
J.-L. Dessalles.
Evolution, vol. 68, n° 6, pp. 1640-1650, DOI: 10.1111/evo.12378, Juin 2014.
ProbTree: A Query-Efficient Representation of Probabilistic Graphs.  
S. Maniu, R. Cheng et P. Senellart.
BUDA (Big Uncertain Data), Snowbird, USA, Juin 2014.
Exploring Video Sharing Websites Content With Machine Learning.
N. Zhao, L. Baud et P. Bellot.
International Journal of Distributed Systems and Technologies (IJDST), pp. 1-10, Juin 2014.
PDP 4PS : Periodic-Delayed Protocol for Partitioned Systems.
L. Pautet, E. Borde, Th. Robert et A. Jaouen.
International Conference on Reliable Software Technologies, vol. 8454, pp. 149-165, Paris, France, Juin 2014.
Complete Yet Practical Search for Minimal Query Reformulations Under Constraints.
I. Ileana, B. Cautis, Y. Katsis et A. Deutsch.
ACM SIGMOD, Snowbird, Utah, United States, Juin 2014.
CONNEXION : Éléments de méthodologie de vérification et validation. Épisode 1 : relever les principaux défis.
Y. Sun, G. Memmi, S. Vignes et F. Daumas.
Génie Logiciel, n° 109, pp. 50-60, Juin 2014.
A Dynamic Offer/Answer Mechanism Encompassing TCP Variants in Heterogeneous Environments.  
A. Fressancourt et M. Gagnaire.
International Conference on Advanced Networking Distributed Systems and Applications (INDS), vol. 1, n° 1, pp. 7-12, Béjaia, DOI: 10.1109/INDS.2014.9, Juin 2014.
On the Performance of the LISP Beta Network.
F. Coras, D. Saucez, L. Iannone et B. Donnet.
IFIP Networking 2014 Conference, Trondheim (Norway), Juin 2014.
Dynamic coding for TCP transmission reliability in multi-hop wireless networks.
N. Boukhatem, Th. M. T. Nguyen et Th. V. Vu.
WoWMoM 2014, Sydney, Australie, Juin 2014.
Information Dissemination in Vehicular Networks using Evolutionary Game Theory.
J. Zhang, V. Gauthier, H. Labiod et H. Afifi.
IEEE ICC'14, Sydney Australia, Juin 2014.
CIVAS: Towards a Cooperative ITS Vehicle Application oriented Security framework.
R. Moalla, B. Lonc, H. Labiod et N. Simoni.
IEEE Intelligent Vehicles Symposium (IEEE IV?2014), Dearborn, Michigan, Juin 2014.
Challenge Countermeasure Tree (CCT) For the Design of Cost-Effective Resilience Strategies.
S. Natouri, Ch. Lac et A. Serhrouchni.
IFIP Networking Conference., Trondheim, Norway, Trondheim, Norway, , Juin 2014.
Cloud of Secure Elements (CoSE), une technologie emergente de virtualisation de la securite.
P. Urien.
Juin 2014.
GSHADE: faster privacy-preserving distance computation and biometric identification.
J. Bringer, H. Chabanne, M. Favre, A. Patey, Th. Schneider, Th. Zahariadis et M. Zohner.
2nd ACM workshop on Information hiding and multimedia security , pp. 187-198 , Salzburg, Austria, DOI: 10.1145/2600918.2600922, Juin 2014.
Fairness evaluation of pipeline coded and non coded TCP flows .
P.-L. Ageneau, N. Boukhatem et M. Gerla.
Communications (ICC), 2014 IEEE International Conference on , pp. 2754 - 2760 , Sydney, Australia, DOI: 10.1109/ICC.2014.6883741, Juin 2014.
Procédé et dispositif de détermination de tensions et/ou de puissances disponibles dans un réseau électrique de recharge.
F. Abi Abdallah et M. Gagnaire.
Juin 2014.
User-centric Identity Management based on secure elements.  
G. Pujolle, P. Urien, H. Aissaoui-Mehrez et al..
IEEE, DOI: 0.1109/ISCC.2014.6912541, Juin 2014.
Disaster recovery in wireless networks: A homology based algorithm.  
A. Vergne, I. Flint, L. Decreusefond et Ph. Martins.
ICT 2014, best paper award, Lisbon, Portugal, Mai 2014.
Understanding Botclouds from a System Perspective: a Principal Component Analysis.
B. Hammi, G. Doyen et R. Khatoun.
14th IEEE/IFIP Network Operations and Management Symposium (NOMS 2014), Krakow, POLAND., Mai 2014.
Clustering-based Anomaly Detection for Smartphone Applications.
A. El Attar, R. Khatoun et M. Lemercier.
6th IEEE/IFIP International Workshop on Management of the Future Internet (MANFI 2014), Krakow, POLAND., Mai 2014.
Higher order expansions via Stein's method.  
L. Coutin et L. Decreusefond.
Communications on Stochastic Analysis, vol. 8, n° 2, pp. 155-168, Mai 2014.
mPlane: an Intelligent Measurement Plane for the Internet.  
B. Trammel, P. Casas, D. Rossi, A. Bar, Z. Ben-Houidi, I. Leontiadis, T. Szemethy et M. Mellia.
IEEE Communications Magazine, vol. 42, n° 5, pp. 148-156, Mai 2014.
On construction of semi-bent funvtions from bent functions.  
G. Cohen et S. Mesnager.
AMS Contemporary Mathematics, vol. 625, pp. 141-154, Mai 2014.
Entanglement, Flow and Classical Simulatability in Measurement Based Quantum Computation.  
D. Markham et E. Kashefi.
Prakash Fest 2014, Mai 2014.
A QoS Aware Approach for Cellular Infrastructure Offloading.
H. Labiod, G.E.M. Zhioua et al..
22nd IEEE/ACM IWQoS 2014, Honk Kong, china, Mai 2014.
EMV-TLS, a secure payment protocol for NFC enabled mobiles.
P. Urien.
CTS 2014, Mineapolis, MN, USA, DOI: 10.1109/CTS.2014.6867565, Mai 2014.
Flow-level modeling of multi-user beamforming in mobile networks .
A. Khlass, Th. Bonald et S. El Ayoubi.
Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2014 12th International Symposium on , pp. 70 - 77 , Hammamet , Tunisia, DOI: 10.1109/WIOPT.2014.6850281, Mai 2014.
Effects of Display Size and Navigation Type on a Classification Task.  
C. Liu, O. Chapuis, M. Beaudouin-Lafon, E. Lecolinet et W. Mackay.
CHI'14: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 4147-4156, DOI: 10.1145/2556288.2557020, Avril 2014.
Multi-finger Chords for Hand-held Tablets: Recognizable and Memorable.  
J. Wagner, E. Lecolinet et T. Selker.
CHI'14: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 2883-2892, Toronto, Canada, DOI: 10.1145/2556288.2556958, Avril 2014.
WADE: Simplified GUI Add-on Development for Third-party Software.  
X. Meng, S. Zhao, Y. Huang, Z. Zhang, J. Eagan et R. Subramanian.
CHI '14: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, pp. 10, Toronto, Canada, DOI: 10.1145/2466110.2466192, Avril 2014.
Model of Visual Search and Selection Time in Linear Menus.  
G. Bailly, A. Oulasvirta, D. P. Brumby et A. Howes.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, Toronto, Canada, Avril 2014.
Peripheral Microinteraction For Wearable Computing .  
D. J.C. Matthies, S. T. Perrault, E. Lecolinet et S. Zhao.
CHI'14 Workshop on Peripheral Interaction: Shaping the Research and Design Space, Toronto, Avril 2014.
Uncertainty in Crowd Data Sourcing under Structural Constraints.  
A. Amarilli, Y. Amsterdamer et T. Milo.
UnCrowd, vol. 8505, pp. 351-359, Bali, Indonesia, Avril 2014.
Robust Clustering Methods for Detecting Smartphone?s Abnormal Behavior.
A. El Attar, R. Khatoun, B. Birregah et M. Lemercier.
in IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, Avril 2014.
A factorial space for a system-based detection of botcloud activity.
B. Hammi, R. Khatoun et G. Doyen.
Sixth IFIP International Conference on New Technologies, Mobility and Security(NTMS'2014), Dubai, UAE, Avril 2014.
The Ring Ring: Drawing Attention through Light.  
L. Sun, S. T. Perrault et E. Lecolinet.
Chinese CHI 2014 Poster Session, pp. 15-16, Avril 2014.
Moment formulae for general point processes.  
L. Decreusefond et I. Flint.
Journal of Functional Analysis, vol. 267, n° 2, pp. 452-476, Avril 2014.
Integration of web sources under uncertainty and dependencies using probabilistic XML.  
M. L. Ba, S. Montenez, R. Tang et T. Abdessalem.
UnCrowd, Bali, Indonesia, Avril 2014.
Multi-Terabyte and Multi-Gbps Information Centric Routers.  
G. Rossini, D. Rossi, M. Garetto et E. Leonardi.
IEEE INFOCOM, pp. 1--9, Toronto, Canada, Avril 2014.
Aggregation of statistical data from passive probes: Techniques and best practices.  
S. Colabrese, D. Rossi et M. Mellia.
Traffic Measurement and Analysis (TMA), pp. 38-50, London, UK, Avril 2014.
Flow management at multi-Gbps: tradeoffs and lessons learned.  
G. Nassopulos, D. Rossi, F. Gringoli, L. Nava, M. Dusi et P. M. Santiago del Rio.
Traffic Measurement and Analysis (TMA), pp. 1-14, London, UK, Avril 2014.
Peeking Through the BitTorrent Seedbox Hosting Ecosystem.  
D. Rossi, G. Pujol, X. Wang et F. Mathieu.
Traffic Measurement and Analysis (TMA), pp. 115-126, London, UK, Avril 2014.
The role of the human political singularity in the emergence of language.
J.-L. Dessalles.
Int. Conf. on the Evolution of Language, pp. 423-424, Vienne, Autriche, Avril 2014.
Experimental plug and play quantum coin flipping.
A. Pappa, P. Jouguet, Th. Lawson, A. Chailloux, M. Legré, P. Trinkler, I. Kerenidis et E. Diamanti.
Nature Communications, vol. 5, pp. 3717, Avril 2014.
LISP Threats Analysis.
D. Saucez, L. Iannone et O. Bonaventure.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-threats-09.txt, Avril 2014.
The OpenLISP control plane architecture. .
Ch. D. Phung, S. Secci, D. Saucez et L. Iannone.
IEEE Network Magazine, vol. 28, n° 2, pp. 34-40, Avril 2014.
VOPP: A VANET Offloading Potential Prediction Model.
G.E.M. Zhioua, J. Zhang, H. Labiod et al..
15th IEEE WCNC 2014, Istanbul Turkey, Avril 2014.
VANET Inherent Capacity for Offloading Wireless Cellular Infrastructure: An Analytical Study.
G.E.M. Zhioua, H. Labiod et al..
6th IFIP NTMS 2014, Dubai, Avril 2014.
H. Labiod, Experimentation with the PRESERVE VSS and the Score@F System.
R. Moalla, B. Lonc, G. Segara, M. Lagana, P. Papadimitratos, J. Petit et H. Labiod.
Transport Research Arena (TRA), Paris France, Avril 2014.
A novel name-based security mechanism for information-centric networking.  
B. Hamdane, A. Serhrouchni et G. Sihem.
IEEE , Wireless Communications and Networking Conference (WCNC), Istanbul, Turquie, Avril 2014.
Cloud of Secure Elements (CoSE), concepts and applications for NFC services and Cloud Security.
P. Urien.
Avril 2014.
LLCPS: A New Secure Model for Internet of Things Services Based on the NFC P2P Model.
P. Urien.
ISSNIP 2014, Singapour, Singapour, DOI: 10.1109/ISSNIP.2014.6827682, Avril 2014.
New efficient cross-layer and multihoming mechanisms at layer 2 for inter-radio access technology handover between UMTS and WiMAX.
L. Bin, N. Boukhatem, Ph. Martins et P. Bertin.
Wireless Communications and Mobile Computing, vol. 14, n° 5, pp. 565?582, DOI: 10.1002/wcm.2208, Avril 2014.
Adaptive Provisioning of Connectivity-as-a-Service for Mobile Cloud Computing .
I. Ayadi et N. Simoni.
2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 169 - 175 , Oxford, UK, DOI: 10.1109/MobileCloud.2014.33, Avril 2014.
Logically timed specifications in the AADL: a synchronous model of computation and communication (recommendations to the SAE committee on AADL).
L. Besnard, E. Borde, P. Dissaux, Th. Gautier, P. Le Guernic et J.-P. Talpin.
INRIA, n° RT-0446, Avril 2014.
Sphere coverings and identifying codes.  
D. Auger, G. Cohen et S. Mesnager.
Designs, codes and cryptography, vol. 70, pp. 3-7, Mars 2014.
On the Complexity of Mining Itemsets from the Crowd Using Taxonomies.  
A. Amarilli, Y. Amsterdamer et T. Milo.
ICDT (International Conference on Database Theory), pp. 15-25, Athens, Greece, Mars 2014.
Scalable accurate consolidation of passively measured statistical data.
S. Colabrese, D. Rossi et M. Mellia.
Passive and Active Measurement (PAM), Extended Abstract, pp. 262-264, Los Angeles, USA, Mars 2014.
Violation of Interdomain Routing Assumptions.  
R. Mazloum, M.-O. Buob, J. Augé, B. Baynat, T. Friedman et D. Rossi.
Passive and Active Measurement (PAM),, Los Angeles, USA, Mars 2014.
Multi-user entanglement distribution at telecom wavelength.
J. Ghalbouni, E. Diamanti et I. Zaquine.
JFLI, Tokyo, Mars 2014.
Multi-user entanglement distribution at telecom wavelength.
J. Ghalbouni, E. Diamanti et I. Zaquine.
Quantum Information in Paris (QuPa), Paris, Mars 2014.
CompatibleOne: Bringing Cloud as a Commodity.
F. Diaz, S. Al Zahr, M. Gagnaire, J.-P. Laisné et I. J. Marshall.
IEEE International Conference on Cloud Engineering, pp. 397-402, Boston (USA), DOI: 10.1109/IC2E.2014.62, Mars 2014.
Quantum cryptography using practical photonic systems.
E. Diamanti.
Mars 2014.
Federation and Revenue Sharing in Cloud Computing Environment.
I. Amigo, B. El Zant et M. Gagnaire.
Cloud Engineering (IC2E), 2014 IEEE International Conference on , pp. 446-451, Mars 2014.
LISP Impact.
D. Saucez, L. Iannone, A. Cabellos et F. Coras.
Internet Engineering Task Force (IETF), n° draft-saucez-lisp-impact-03.txt, Mars 2014.
Profile Centric Model. .
M. Msahli et A. Serhrouchni.
International Journal of Internet Technology and Secured Transactions, vol. 5, n° ISSN online: 1748-5703, Mars 2014.
A Model-Based Resilience Analysis for IMS. .
S. Natouri, Ch. Lac et A. Serhrouchni.
Journal of Networks, vol. 9, n° 3, pp. 588-603, Mars 2014.
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks..
P. Urien et S. Piramuthu.
Decision Support Systems, vol. 59, pp. 28--36, DOI: 10.1016/j.dss.2013.10.003, Mars 2014.
Strong Equivalence Relations for Iterated Models.
Z. Bouzid, E. Gafni et P. Kuznetsov.
OPODIS, pp. 139-154, Mars 2014.
Advanced demand response solutions based on fine-grained load control.
R. Kaddah, D. Kofman et M. Pioro.
IEEE IWIES , Mars 2014.
Multi-user entanglement at telecom wavelength.
J. Ghalbouni, E. Diamanti et I. Zaquine.
Mars 2014.
Multi-user entanglement at telecom wavelength.
J. Ghalbouni, E. Diamanti et I. Zaquine.
Mars 2014.
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.
A. Patey, H. Chabanne, J. Bringer et R. Lescuyer.
18th International Conference, FC 2014, , pp. 255-272, Christ Church, Barbados, DOI: 10.1007/978-3-662-45472-5_16, Mars 2014.
Low complexity user scheduling for multi-antenna Gaussian broadcast systems with quality of service requirements.
J. Li, W. Xia, Ph. Martins et L. Shen.
IET Communications, vol. 8, n° 10, pp. 1820--1830, DOI: 10.1049/iet-com.2013.0913, Mars 2014.
Stochastic analysis of a cellular network with mobile relays.
Y. Chen, Ph. Martins, L. Decreusefond, F. Yan et X. Lagrange.
IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014, pp. 4758--4763, Austin,USA, DOI: 10.1109/GLOCOM.2014.7037559, Mars 2014.
Optimal Relay Placement in Cellular Networks.  
M. Minelli, M. Ma, M. Coupechoux, J.-M. Kélif, M. Sigelle et Ph. Godlewski.
IEEE Transactions on Wireless Communications, vol. 13, n° 2, pp. 998-1009, DOI: 10.1109/TWC.2013.010214.130814, Février 2014.
A Geometrical Approach for Power Optimization in Relay-Based Cellular Networks.  
M. Minelli, M. Ma, M. Coupechoux et Ph. Godlewski.
IEEE National Conference on Communications (NCC), pp. 1-6, Kanpur, India, Février 2014.
Delay-based congestion control: Flow vs. BitTorrent swarm perspectives.  
C. Testa et D. Rossi.
Computer Network, vol. 60, n° 0, pp. 115 -- 128, Février 2014.
Fighting the bufferbloat: on the coexistence of AQM and low priority congestion control (extended version).  
Y. Gong, D. Rossi, C. Testa, S. Valenti et D. Taht.
Computer Networks, vol. 60, pp. 115 -- 128, Février 2014.
Exploring Cyberlockers Content.
N. Zhao, L. Baud et P. Bellot.
International Journal of Multimedia and Image Processing (IJMIP), pp. 1-12, Février 2014.
Quantum cryptography: from theory to practice.
E. Diamanti.
Février 2014.
A Simple Architecture for Secure and Private Data Sharing Solutions.
M. Scarpa, F. Longo, G. Campobello, Th. Bonald et A. Famulari.
Février 2014.
Easy, secure, and privacy-preserving mechanisms for inter-Cloud data sharing.
M. Scarpa, F. Longo, A. Famulari et Th. Bonald.
Février 2014.
LISP EID Block Management Guidelines.
L. Iannone, R. Jorgensen et D. Conrad.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-mgmnt-01.txt, Février 2014.
A Unified LISP Mapping Database for L2 and L3 Network Virtualization Overlays.
Y. Hertoghs, F. Maino, V. Moreno, M. Smith, D. Farinacci et L. Iannone.
Internet Engineering Task Force (IETF), n° draft-hertoghs-nvo3-lisp-controlplane-unified-01, Février 2014.
Adiabatic graph-state quantum computation.  
B. Antonio, D. Markham et J. Anders.
New Journal of Physics, vol. 16, n° 113070, Février 2014.
FQGwS Gateway Selection Algorithm: Complexity and Performances.
G.E.M. Zhioua, H. Labiod et al..
4th IEEE ICNC, Honolulu, USA, , Février 2014.
Resilience design using the Challenge Countermeasure Tree (CCT) model.  
S. Natouri, A. Serhrouchni et Ch. Lac.
Applications and Innovations in Mobile Computing (AIMoC), Kolkata, India, Février 2014.
Cloud of Secure Elements(CoSE).
P. Urien.
IETF, n° draft-urien-cfrg-cose-00, Février 2014.
System and method of matching content items and consumers .
A. Gionis, G. De Francisci Morales et M. Sozio.
Février 2014.
Practical Cryptography for Future Quantum Information Networks.
E. Diamanti.
Habilitation à diriger des recherches (HDR), Février 2014.
Energy-QoS tradeoffs in J2EE hosting centres.
A. Gadafi, D. Hagimont, L. Broto, R. Sharrock, A. Tchana et al..
International Journal of Autonomic Computing, vol. 2, n° 1, pp. 54--72, Février 2014.
Implementing stabiliser codes by linear optics.
D. Markham.
Février 2014.
A Post-Optimization Method for the Routing and Wavelength Assignment Problem Applied to Scheduled Lightpath Demands.  
L. Belgacem, I. Charon et O. Hudry.
European Journal of Operational Research, vol. 232, pp. 298-306, Janvier 2014.
Maximum Size of a Minimum Watching System and the Graphs Achieving the Bound.  
D. Auger, I. Charon, O. Hudry et A. Lobstein.
Discrete Applied Mathematics, vol. 164, pp. 20-33, Janvier 2014.
Retrospective Spectrum Access Protocol: A Completely Uncoupled Learning Algorithm for Cognitive Networks.  
M. Coupechoux, S. Iellamo et L. Chen.
CEFIPRA Workshop on New Avenues for Network Models, Bangalore, India, Janvier 2014.
Quantum key distribution with continuous variables: long distance, side channels and network integration.
E. Diamanti.
Janvier 2014.
LISP EID Block.
L. Iannone, D. Lewis, V. Fuller et D. Meyer.
Internet Engineering Task Force (IETF), n° draft-ietf-lisp-eid-block-08.txt, Janvier 2014.
A Secure Cloud of Electronic Keys for NFC Locks Securely Controlled by NFC Smartphones.
P. Urien.
CCNC 2014, Las Vegas, NV, USA, DOI: 10.1109/CCNC.2014.6994415 , Janvier 2014.
Security for Future Networks: A Prospective Study of AAIs.
H. Aissaoui-Mehrez, G. Pujolle, P. Urien et al..
Int. J. on Recent Trends in Engineering and Technology, vol. 10, n° 1, pp. 203-212, DOI: DOI: 01.IJRTET.10.1.1448, Janvier 2014.
Non-Interference and Local Correctness in Transactional Memory.
P. Kuznetsov et S. Peri.
ICDCN, pp. 197-211, Janvier 2014.
A la recherche des connaissances du Web....  
S. Abiteboul, F. Gandon et F. M. Suchanek.
1024 : Bulletin de la Société Informatique de France, n° 2, pp. 20, Janvier 2014.
Content protection and secure synchronization of HTML5 local storage data.
M. JEMEL et A. Serhrouchni.
IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, Janvier 2014.
Quantum key distribution and cryptography..
R. Alléaume, N. Lutkenhaus, R. Renner, Ph. Grangier, Th. Debuisschert, G. Ribordy, N. Gisin, Ph. Painchault, T. Pornin, L. Salvail, M. Riguidel, A. Shields, Th. Länger, M. Peev, M. Dianati, A. Poppe, J. Bouda, C. Branciard, M. Godfrey, J. Rarity, H. Weinfurter, A. Zeilinger et Ch. Monyk.
Special issue of TCS for the 25th anniversary of BB84, vol. 560, pp. 62-81, 2014.
Minimum Sizes of Identifying Codes in Graphs Differing by One Edge.  
I. Charon, I. Honkala, O. Hudry et A. Lobstein.
Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences, vol. 6, n° 2, pp. 157-170, 2014.
The social origins of language.
J.-L. Dessalles.
2014.
Handbook of Evolution Theory in the Sciences.
J.-L. Dessalles.
2014.
Enseignement, préservation et diffusion des identités numériques.
Th. Cholez, G. Doyen, I. Chrisment, R. Khatoun et O. Festor.
2014.
Method for managing packets in a network of Information Centric Networking (ICN) nodes . .
D. Rossi et G. Rossini.
2014.
Information Centric Networking (ICN) router .
G. Rossini, D. Rossi, M. Garetto et E. Leonardi.
2014.
Distributed active measurement of Internet queuing delays.  
P. Casoria, D. Rossi, J. Augé, M.-O. Buob, T. Friedman et A. Pescape.
Passive and Active Measurement (PAM), Extended Abstract, pp. 278-280 , Los Angeles, USA, 2014.
Gestion de versions incertaines de documents XML.  
M. L. Ba, T. Abdessalem et P. Senellart.
Ingénierie des Systèmes d'Information, vol. 19, n° 4, pp. 9-34, 2014.
Crawl intelligent et adaptatif d?applications Web pour l?archivage du Web.  
M. Faheem et P. Senellart.
Ingénierie des Systèmes d'Information, vol. 19, n° 4, pp. 61-86, 2014.
The ARCOMEM Architecture for Social- and Semantic-Driven Web Archiving.  
Th. Risse, E. Demidova, S. Dietze, W. Peters, N. Papailiou, K. Doka, Y. Stavrakas, V. Plachouras, P. Senellart, F. Carpentier, A. Mantrach, B. Cautis, P. Siehndel et D. Spiliotopoulos.
Future Internet, vol. 6, n° 4, pp. 688-716, 2014.
Perspectives on Ontology Learning.
F. M. Suchanek.
2014.
From Bitcoin to Burning Man and Beyond: The Quest for Identity and Autonomy in a Digital Society.  
J. Pitt et A. Diaconescu.
2014.
No-calibration localisation for indoor wireless sensor networks.
N. Dieng, C. Chaudet, L. Toutain, M. Charbit et T. Ben Meriem.
International Journal of Ad Hoc and Ubiquitous Computing, vol. 14, n° 1/2/3, 2014.
Breadth-First Serialisation of Trees and Rational Languages.
V. Marsault et J. Sakarovitch.
Developments in Language Theory 2014, vol. LNCS, n° 8633, pp. 252-259, 2014.
A Type System for Weighted Automata and Rational Expressions.
A. Demaille, A. Duret-Lutz, S. Lombardy et J. Sakarovitch.
CIAA 2014, vol. LNCS, n° 8587, pp. 162-175, 2014.
Variational calculation of Laplace transforms via entropy on Wiener space and applications.
A. S. Ustunel.
J. Funct. Anal. , n° 8, pp. 3058?3083, 2014.
Entanglement, Flow and Classical Simulatability in Measurement Based Quantum Computation.
D. Markham et E. Kashefi.
2014.
Au-delà de la loi de Fitts et de la loi de Schmidt : fonction d'échange vitesse/précision dans le pointage manuel et dans la saccade oculaire.
Y. Guiard.
2014.