Selecione um Grupo de pesquisa.
- M. Abid, D. Macedo, J. Rubio‑Loyola, G. Pujolle : “An autonomic mobility management solution for the future wireless Internet”, Annals of Telecommunications - annales des télécommunications, vol. 67 (11-12), pp. 523-536, (Springer) [Abid 2012a]
- A. Achour, K. Haddadou, B. Kervella, G. Pujolle : “A SIP-SHIM6-Based Solution Providing Interdomain Service Continuity in IMS-based Networks”, IEEE Communications Magazine, vol. 50 (7), pp. 109-119, (Institute of Electrical and Electronics Engineers) [Achour 2012b]
- H. Adel, M.‑M. Louërat, M. Sabut : “Fast split background calibration for pipelined ADCs enabled by slope mismatch averaging technique”, Electronics Letters, vol. 48 (6), pp. 318-320, (IET) [Adel 2012b]
- J.‑M. Akre, J. Juillard, D. Galayko, E. Colinet : “Synchronization Analysis of Networks of Self-sampled All-Digital Phase-Locked Loops”, IEEE Transactions on Circuits and Systems Part 1 Fundamental Theory and Applications, vol. 59 (4), pp. 708-720, (Institute of Electrical and Electronics Engineers (IEEE)) [Akre 2012]
- Martin R. Albrecht, C. Cid, J.‑Ch. Faugère, L. Perret : “On the relation between the MXL family of algorithms and Gröbner basis algorithms”, Journal of Symbolic Computation, vol. 47 (8), pp. 926-941, (Elsevier) [Albrecht 2012b]
- R. Alt, S. Markov : “Theoretical and computational studies of some bioreactor models”, Computers & Mathematics with Applications, vol. 64 (3), pp. 350-360, (Elsevier) [Alt 2012]
- E. Angel, E. Bampis, N. Thibault : “Randomized truthful algorithms for scheduling selfish tasks on parallel machines”, Theoretical Computer Science, vol. 414 (1), pp. 1-8, (Elsevier) [Angel 2012d]
- S. Antão, J.‑C. Bajard, L. Sousa : “RNS-Based Elliptic Curve Point Multiplication for Massive Parallel Architectures”, The Computer Journal, vol. 55 (5), pp. 629-647, (Oxford University Press (UK)) [Antão 2012]
- P. Antoniadis, S. Fdida, Ch. Griffin, Y. Jin, G. Kesidis : “CSMA Local Area Networking under Dynamic Altruism”, CoRR, vol. abs/1204.4847, pp. 1, (Arxive) [Antoniadis 2012a]
- L. Arantes, J. Lejeune, M. Piffaretti, O. Marin, P. Sens, J. Sopena, Alysson N. Bessani, Vinicius V. Cogo, M. Correia, P. Costa, M. Pasin : “Vers une plate-forme MapReduce tolérant les fautes byzantines”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 31 (8-10), pp. 1079-1099, (Lavoisier) [Arantes 2012]
- Ph. Aubry, A. Valibouze : “Algebraic Computation of resolvents without extraneous powers”, European Journal of Combinatorics, vol. 33 (7), pp. 1369-1385, (Elsevier) [Aubry 2012a]
- Ph. Aubry, A. Valibouze : “Parallel computation of resolvents by multimodular techniques and decomposition formula”, International Journal of Algebra and Computation, vol. 22 (5), pp. 1-21, (World Scientific Publishing) [Aubry 2012b]
- G. Ausiello, N. Boria, A. Giannakos, G. Lucarelli, Vangelis Th. Paschos : “Online maximum k-coverage”, Discrete Applied Mathematics, vol. 160 (13-14), pp. 1901-1913, (Elsevier) [Ausiello 2012]
- O. Auzende, H. Giroire, F. Le Calvez : “A Practical Approach to Using the IMS-QTI Specification”, International Journal of Learning Technology, vol. 7 (4), pp. 353-377, (Inderscience) [Auzende 2012]
- E. Bampis, Ch. Dürr, F. Kacem, Ioannis Z. Milis : “Speed scaling with power down scheduling for agreeable deadlines”, Sustainable Computing : Informatics and Systems, vol. 2 (4), pp. 184-189, (Elsevier) [Bampis 2012a]
- Ph. Baptiste, M. Chrobak, Ch. Dürr : “Polynomial Time Algorithms for Minimum Energy Scheduling”, ACM Transactions on Algorithms, vol. 8 (3), pp. 26, (Association for Computing Machinery) [Baptiste 2012]
- B. Baynat : “Analytical Models for Dimensioning of OFDMA-based Cellular Networks Carrying VoIP and Best-Effort Traffic”, CSC International Journal of Computer Networks (IJCN), vol. 4 (4), pp. 104-134 [Baynat 2012]
- N. Belala, D. Saidouni, M. Bouneb, J.‑M. Ilié : “Maximality Semantics and Petri Nets”, International Journal of Computer Science and Technology, vol. 3 (3-4), pp. 687-694 [Belala 2012]
- N. Belblidia, M. Dias De Amorim, L. Maciel Kosmalski Costa, J. Leguay, V. Conan : “Part-Whole Dissemination of Large Multimedia Contents in Opportunistic Networks”, Computer Communications, vol. 35 (15), pp. 1786-1797, (Elsevier) [Belblidia 2012]
- M. Ben Saad, S. Gançarski : “Archiving theWeb using Changes Patterns : a Case Study”, International Journal on Digital Libraries, vol. 13 (1), pp. 33-49, (Springer Verlag) [Ben Saad 2012]
- A. Ben Salem, A. Duret‑Lutz, F. Kordon : “Model Checking using Generalized Testing Automata”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. 7400 (VI), pp. 94-122, (Springer) [Ben Salem 2012]
- A. Benabid, C. Hanen, O. Marchetti, A. Munier‑Kordon : “Periodic schedules for bounded timed weighted event graphs”, IEEE Transactions on Automatic Control, vol. 57 (5), pp. 1222-1232, (Institute of Electrical and Electronics Engineers) [Benabid 2012]
- G. Benattar, B. Bérard, D. Lime, J. Mullins, O. Roux, M. Sassolas : “Channel Synthesis for Finite Transducers”, International Journal of Foundations of Computer Science, vol. 23 (6), pp. 1241-1260, (World Scientific Publishing) [Benattar 2012]
- R. Bendraou, J.‑M. Jézéquel, F. Fleurey : “Achieving Process modeling and Execution through the Combination of Aspect and Model-Driven Engineering Approaches”, Journal of Software: Evolution and Process, vol. 24 (7), pp. 765-781, (John Wiley & Sons, Ltd.) [Bendraou 2012a]
- B. Bérard, S. Haddad, M. Sassolas : “Interrupt Timed Automata: verification and expressiveness”, Formal Methods in System Design, vol. 40 (1), pp. 41-87, (Springer Verlag) [Bérard 2012a]
- E. Bevacqua, E. De Sevin, S. Hyniewska, C. Pelachaud : “A listener model: introducing personality traits”, Journal on Multimodal User Interfaces, pp. 12, (Springer) [Bevacqua 2012]
- M. Bezahaf, L. Iannone, M. Dias De Amorim, S. Fdida : “An experimental evaluation of cross-layer routing in a wireless mesh backbone”, Computer Networks, vol. 56 (5), pp. 1568-1583, (Elsevier) [Bezahaf 2012]
- E. Blokhina, D. Galayko, P. Harte, Ph. Basset, O. Feely : “Limit on converted power in resonant electrostatic vibration energy harvesters”, Applied Physics Letters, vol. 101 (17), pp. 39-47, (American Institute of Physics) [Blokhina 2012a]
- O. Bodini, O. Roussel, M. Soria : “Boltzmann samplers for first-order differential specifications”, Discrete Applied Mathematics, vol. 160 (18), pp. 2563-2572, (Elsevier) [Bodini 2012c]
- N. Bourgeois, A. Giannakos, G. Lucarelli, I. Milis, Vangelis Th. Paschos, O. Pottié : “The max quasi-independent set problem”, Journal of Combinatorial Optimization, vol. 23, pp. 94-117, (Springer Verlag) [Bourgeois 2012b]
- M. Bourgoin, E. Chailloux, J.‑L. Lamotte : “SPOC: GPGPU PROGRAMMING THROUGH STREAM PROCESSING WITH OCAML”, Parallel Processing Letters, vol. 22 (2), pp. 1240007, (World Scientific Publishing) [Bourgoin 2012c]
- M. Bourguiba, K. Haddadou, G. Pujolle : “Packet Aggregation Based Network I/O Virtualization for Cloud Computing”, Computer Communications, vol. 35 (3), pp. 309-319, (Elsevier) [Bourguiba 2012]
- D. Buffoni, S. Tollari, P. Gallinari : “A Learning to Rank framework applied to text-image retrieval”, Multimedia Tools and Applications, vol. 60 (1), pp. 161-180, (Springer Verlag) [Buffoni 2012]
- B.‑M. Bui‑Xuan, M. Habib, M. Rao : “Tree-representation of set families and applications to combinatorial decompositions”, European Journal of Combinatorics, vol. 33 (5), pp. 688-711, (Elsevier) [Bui-Xuan 2012]
- C. Carlet, J.‑Ch. Faugère, Ch. Goyet, G. Renault : “Analysis of the algebraic side channel attack”, Journal of Cryptographic Engineering, vol. 2 (1), pp. 45-62, (Springer) [Carlet 2012]
- Th. Carron : “Les "Serious Games" pour apprendre autrement!”, Revue ESPRIUT "le magazine des IUT de France" n°8, pp. 6 [Carron 2012a]
- Th. Carron, J.‑Ch. Marty, Ph. Pernelle : “Un environnement d'apprentissage basé sur le jeu: Learning Adventure”, Argos. La revue des BCD et CDI, vol. 50, pp. 16-21, (CRDP Académie de Créteil) [Carron 2012c]
- X. Chen, D. Wang : “Management of Geometric Knowledge in Textbooks”, Data and Knowledge Engineering, vol. 73, pp. 43-57, (Elsevier) [Chen 2012a]
- X. Chen, D. Wang, T. Zhao : “GeoText: An Intelligent Dynamic Geometry Textbook (Extended Abstract)”, ACM Communications in Computer Algebra, vol. 46 (4), pp. 171-175, (Association for Computing Machinery (ACM)) [Chen 2012b]
- Y. Chevaleyre, J. Lang, N. Maudet, J. Monnot, L. Xia : “New candidates welcome! Possible winners with respect to the addition of new candidates”, Mathematical Social Sciences, vol. 64 (1), pp. 74-88, (Elsevier) [Chevaleyre 2012]
- M. Chrobak, Ch. Dürr, F. Guíñez, A. Lozano, N. Thang : “Tile Packing Tomography is {NP}-hard”, Algorithmica, vol. 64 (2), pp. 267-278, (Springer Verlag) [Chrobak 2012]
- Th. Claveirole, M. Dias De Amorim : “Manipulating Wi-Fi Packet Traces with WiPal: Design and Experience”, Software: Practice and Experience, vol. 42 (5), pp. 585-599, (Wiley) [Claveirole 2012]
- J.‑R. Coffi, Ch. Marsala, N. Museux : “Adaptive complex event processing for harmful situation detection”, Evolving Systems, vol. 3 (3), pp. 167-177, (Springer-Verlag) [Coffi 2012]
- J. Creus, B. Amann, V. Christophides, N. Travers, D. Vodislav : “RoSeS, un moteur de requêtes continues pour la syndication RSS à large échelle”, Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, vol. 17 (5), pp. 57-85, (Lavoisier) [Creus 2012]
- E. De Sevin, E. Bevacqua, S. Hyniewska, C. Pelachaud : “Un Modèle d'Interlocuteur Virtuel avec des Comportements d'Écoute Crédibles”, Journal Technique et Science Informatiques, vol. 31 (4), pp. 503-531 [De Sevin 2012a]
- J. Delange, L. Pautet, F. Kordon : “Design, implementation and verification of MILS systems”, Software: Practice and Experience, vol. 42 (7), pp. 799-816, (Wiley) [Delange 2012]
- R. Diaconu, C. Dima : “Model-Checking Alternating-Time Temporal Logic with Strategies Based on Common Knowledge is Undecidable”, Applied Artificial Intelligence, vol. 26 (4), pp. 331-348, (Taylor & Francis) [Diaconu 2012]
- Y. Dieudonné, F. Petit : “Self-stabilizing gathering with strong multiplicity detection”, Theoretical Computer Science, vol. 428, pp. 47-57, (Elsevier) [Dieudonné 2012]
- S. Dubois, M. Potop‑Butucaru, M. Nesterenko, S. Tixeuil : “Self-stabilizing byzantine asynchronous unison”, Journal of Parallel and Distributed Computing, vol. 72 (7), pp. 917-923, (Elsevier) [Dubois 2012a]
- S. Dubois, T. Masuzawa, S. Tixeuil : “Bounding the Impact of Unbounded Attacks in Stabilization”, IEEE Transactions on Parallel and Distributed Systems, vol. 23 (3), pp. 460-466, (Institute of Electrical and Electronics Engineers) [Dubois 2012e]
- G. Dulac‑Arnold, L. Denoyer, Ph. Preux, P. Gallinari : “Sequential approaches for learning datum-wise sparse representations”, Machine Learning, vol. 89 (1-2), pp. 87-122, (Springer Verlag) [Dulac-Arnold 2012e]
- P.‑Y. Dumas, A. El Fallah‑Seghrouchni, P. Taillibert : “Aerial: a framework to support human decision making in a constrained environment”, ICTAI, pp. unknown [Dumas 2012]
- Ch. Dürr, F. Guíñez, M. Matamala : “Reconstructing 3-Colored Grids from Horizontal and Vertical Projections is NP-Hard: A Solution to the 2-Atom Problem in Discrete Tomography”, SIAM Journal on Discrete Mathematics, vol. 26 (1), pp. 330-352, (Society for Industrial and Applied Mathematics) [Dürr 2012a]
- Ch. Dürr, M. Queyranne, Frits C. R. Spieksma, F. Nobibon, Gerhard J. Woeginger : “The interval ordering problem”, Discrete Applied Mathematics, vol. 160 (7-8), pp. 1094-1103, (Elsevier) [Dürr 2012c]
- Ch. Dürr, Ł. Jeż, N. Thang : “Online Scheduling of Bounded Length Jobs to Maximize Throughput”, Journal of Scheduling, vol. 15 (5), pp. 653-664, (Springer Verlag) [Dürr 2012e]
- F. Dzogang, M.‑J. Lesot, M. Rifqi, B. Bouchon‑Meunier : “Early Fusion of Low Level Features for emotion Mining”, Biomedical Informatics Insights, vol. 5, pp. 129-136 [Dzogang 2012c]
- A. El Abed, S. Dubuisson, D. Béréziat : “Spatio-temporal target-measure association using an adaptive geometrical approach”, Pattern Recognition Letters, vol. 33 (6), pp. 765-774, (Elsevier) [El Abed 2012]
- E. Erdem, S. Dubuisson, I. Bloch : “Fragments Based Tracking with Adaptive Cue Integration”, Computer Vision and Image Understanding, vol. 116 (7), pp. 827-841, (Elsevier) [Erdem 2012a]
- E. Erdem, S. Dubuisson, I. Bloch : “Visual Tracking by Fusing Multiple Cues with Context-Sensitive Reliabilities”, Pattern Recognition, vol. 45 (5), pp. 1948-1959, (Elsevier) [Erdem 2012b]
- J. Fabrizio, S. Dubuisson, D. Béréziat : “Motion compensation based on Tangent Distance prediction for video compression”, Signal Processing: Image Communication, vol. 27 (2), pp. 153-171, (Elsevier) [Fabrizio 2012]
- U. Farooq, H. Parvez, Z. Marrakchi, H. Mehrez : “A New Heterogeneous Tree-based Application Specific FPGA and Its Comparison with Mesh-based Application Specific FPGA”, Microprocessors and Microsystems: Embedded Hardware Design, vol. 36 (8), pp. 588-605, (Elsevier) [Farooq 2012a]
- P. Fouilhoux, A. Ridha Mahjoub : “Solving VLSI Design and DNA Sequencing Problems using Bipartization of Graphs”, Computational Optimization and Applications, vol. 51 (2), pp. 749-781, (Springer Verlag) [Fouilhoux 2012d]
- P. Fouilhoux, O. Karasan, A. Ridha Mahjoub, O. Ozkok, H. Yaman : “Survivability in Hierarchical Telecommunications Networks”, Networks, vol. 59 (1), pp. 37-58, (Wiley) [Fouilhoux 2012e]
- H. Fournier, D. Gardy, A. Genitrini, B. Gittenberger : “The fraction of large random trees representing a given Boolean function in implicational logic”, Random Structures and Algorithms, vol. 40 (3), pp. 317-349, (Wiley) [Fournier 2012]
- L. Galand, O. Spanjaard : “Exact algorithms for OWA-optimization in multiobjective spanning tree problems”, Computers and Operations Research, vol. 39 (7), pp. 1540-1554, (Elsevier) [Galand 2012]
- F. Gandino, F. Lamberti, G. Paravati, J.‑C. Bajard, P. Montuschi : “An Algorithmic and Architectural Study on Montgomery Exponentiation in RNS”, IEEE Transactions on Computers, vol. 61 (8), pp. 1071-1083, (Institute of Electrical and Electronics Engineers) [Gandino 2012]
- P. Gastin, N. Sznajder : “Decidability of well-connectedness for distributed synthesis”, Information Processing Letters, vol. 112 (24), pp. 963-968, (Elsevier) [Gastin 2012]
- A. Genitrini, B. Gittenberger, V. Kraus, C. Mailler : “Probabilities of Boolean Functions Given by Random Implicational Formulas”, The Electronic Journal of Combinatorics, vol. 19 (2), pp. p37, (Open Journal Systems) [Genitrini 2012a]
- A. Genitrini, J. Kozik : “In the full propositional logic, 5/8 of classical tautologies are intuitionistically valid”, Annals of Pure and Applied Logic, vol. 163 (7), pp. 875-887, (Elsevier Masson) [Genitrini 2012b]
- C. Gicquel, L. Hege, M. Minoux, W. Van Canneyt : “A Discrete Time Exact Solution Approach for a Complex Hybrid Flowshop Scheduling Problem with limited Wait Constraints”, Computers and Operations Research, vol. 39 (3), pp. 629-636, (Elsevier) [Gicquel 2012b]
- C. Gicquel, L. Wolsey, M. Minoux : “On Discrete Lot Sizing and Scheduling on Identical Parallel Machines”, Optimization Letters, vol. 6, pp. 545-557, (Springer Verlag) [Gicquel 2012c]
- D. Gorisse, M. Cord, F. Precioso : “Locality sensitive hashing for chi2 distance”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34 (2), pp. 402-410, (Institute of Electrical and Electronics Engineers) [Gorisse 2012]
- L. Gourvès, J. Monnot, F. Pascual : “Cooperation in Multiorganization Matching”, Algorithmic Operations Research, vol. 7 (2), pp. 111-124, (Preeminent Academic Facets) [Gourvès 2012]
- S. Graillat, V. Ménissier‑Morain : “Accurate summation, dot product and polynomial evaluation in complex floating point arithmetic”, Information and Computation n°216, pp. 57-71, (Elsevier) [Graillat 2012]
- A. Greuet, F. Guo, M. Safey El Din, L. Zhi : “Global optimization of polynomials restricted to a smooth variety using sums of squares”, Journal of Symbolic Computation, vol. 47 (5), pp. 503-518, (Elsevier) [Greuet 2012]
- F. Greve, P. Sens, L. Arantes, V. Simon : “Eventually Strong Failure Detector with Unknown Membership”, The Computer Journal, vol. 55 (12), pp. 1507-1524, (Oxford University Press (UK)) [Greve 2012b]
- B. Grugeon‑Allys, J. Pilet, F. Chenevotot, E. Delozanne : “Diagnostic et parcours différenciés d'enseignement en algèbre élémentaire”, Recherches en Didactique des Mathematiques, vol. Hors série, pp. 133-158, (La Pensee Sauvage) [Grugeon-Allys 2012]
- C. Gueguen, S. Baey : “Comparison Study of Resource Allocation Strategies for OFDM Multimedia Networks”, Journal of Electrical and Computer Engineering, vol. 2012, pp. 3, (Hindawi Publishing Corp.) [Gueguen 2012]
- R. Guillemet, Ph. Basset, D. Galayko, T. Bourouina : “Design optimization of an out-of-plane gap-closing electrostatic Vibration Energy Harvester (VEH) with a limitation on the output voltage”, Analog Integrated Circuits and Signal Processing, vol. 71 (1), pp. 39-47, (Springer Verlag) [Guillemet 2012]
- K. Haddadou, S. Ghamri‑Doudane, Y. Ghamri‑Doudane, N. Agoulmine : “Practical and analytical approaches for designing scalable on-demand policy-based resource allocation in stateless IP networks”, International Journal of Network Management, vol. 22 (2), pp. 131-149, (Wiley) [Haddadou 2012]
- L. Hillah, F. Kordon, Ch. Lakos, L. Petrucci : “Extending PNML Scope: a Framework to Combine Petri Nets Types”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. 7400 (VI), Lecture Notes in Computer Science, pp. 46-70, (Springer) [Hillah 2012]
- S. Hong, F. Kordon, E. Paviot‑Adet, S. Evangelista : “Computing a Hierarchical Static order for Decision Diagram-Based Representation from P/T Nets”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. 6900 (V), Lecture Notes in Computer Science, pp. 121-140, (Springer) [Hong 2012]
- H. Hong, M. Safey El Din : “Variant Quantifier Elimination”, Journal of Symbolic Computation, vol. 47 (7), International Symposium on Symbolic and Algebraic Computation (ISSAC 2009), pp. 883-901, (Elsevier) [Hong 2012]
- E. Hullermeier, M. Rifqi, S. Henzgen, R. Senge : “Comparing Fuzzy Partitions: A Generalization of the Rand Index and Related Measures”, IEEE Transactions on Fuzzy Systems, vol. 20 (3), pp. 546-556, (Institute of Electrical and Electronics Engineers) [Hullermeier 2012]
- E. Hyon, A. Jean‑Marie : “Scheduling Services in a Queuing System with Impatience and Setup Costs”, The Computer Journal, vol. 55 (5), Special Focus on Probability Models in Performance Analysis, pp. 553-563, (Oxford University Press (UK)) [Hyon 2012]
- Y. Jacob, L. Denoyer, P. Gallinari : “Apprentissage automatique de la propagation des étiquettes dans les réseaux sociaux multirelationnels”, Document numérique - Revue des sciences et technologies de l'information. Série Document numérique, vol. 15 (1), pp. 79-99, (Hermès) [Jacob 2012]
- M. Jan, Ch. Jouvray, F. Kordon, A. Kung, J. Lalande, F. Loiret, J. Navas, L. Pautet, J. Pulou, A. Radermacher, L. Seinturier : “Flex-eWare: a Flexible MDE-based Solution for Designing and Implementing Embedded Distributed Systems”, Software: Practice and Experience, vol. 42 (12), pp. 1467-1494, (Wiley) [Jan 2012]
- M. Jaume, V. Viet Triem Tong, G. Hiet : “Spécification et mécanisme de détection de flots d'information illégaux”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 31 (6), pp. 713-742, (Lavoisier) [Jaume 2012c]
- F. Javid, R. Iskander, F. Durbin, M.‑M. Louërat : “Analog Circuits Sizing Using the Fixed Point Iteration Algorithm with Transistor Compact Models”, International Journal of Microelectronics and Computer Science, vol. 3 (1), pp. 7-14, (Department of Microelectronics and Computer Science (DMCS) of Technical University of Łódź) [Javid 2012a]
- S. Jelassi, G. Rubino, H. Melvin, H. Youssef, G. Pujolle : “Quality of Experience of VoIP Service: A Survey of Assessment Approaches and Open Issues”, Communications Surveys and Tutorials, IEEE Communications Society, vol. 14 (2), pp. 491-513, (Institute of Electrical and Electronics Engineers) [Jelassi 2012a]
- S. Jelassi, H. Youssef, Ch. HOENE, G. Pujolle : “Single-ended parametric voicing-aware models for live assessment of packetized VoIP conversations”, Telecommunication Systems, vol. 49 (1), pp. 17-34, (Springer Verlag (Germany)) [Jelassi 2012b]
- F. Jézéquel, R. Couturier, Ch. Denis : “Solving large sparse linear systems in a grid environment: the GREMLINS code versus the PETSc library”, Journal of Supercomputing, vol. 59 (3), pp. 1517-1532, (Springer Verlag) [Jézéquel 2012]
- J.‑D. Kant : “Apports de l'informatique et des mathématiques pour la modélisation en sciences humaines et sociales”, Mathématiques et Sciences Humaines, vol. 197, pp. 47-64, (Centre de Mathématique Sociale et de statistique, EPHE) [Kant 2012]
- S. Khemiri, Kh. Boussetta, G. Pujolle : “A tabu search heuristic for bandwidth allocation in fixe WiMAX”, Telecommunication Systems, vol. 51 (1), pp. 81-91, (Springer Verlag (Germany)) [Khemiri 2012]
- F. Kordon, A. Linard, D. Buchs, M. Colange, S. Evangelista, K. Lampka, N. Lohmann, E. Paviot‑Adet, Y. Thierry‑Mieg, H. Wimmel : “Report on the Model Checking Contest at Petri Nets 2011”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. 7400 (VI), Lecture Notes in Computer Science, pp. 169-196, (Springer) [Kordon 2012a]
- J. Lawall, J. Jongwane : “Le logiciel libre dans la recherche”, Interstices, (INRIA) [Lawall 2012]
- S. Legtchenko, S. Monnet, P. Sens, G. Muller : “RelaxDHT : A Churn Resilient for Peer-to-Peer Distributed Hash-Tables”, ACM Transactions on Autonomous and Adaptive Systems, vol. 7 (2), pp. 28, (Association for Computing Machinery (ACM)) [Legtchenko 2012]
- M.‑J. Lesot, M. Rifqi : “Degrés d'équivalence de mesures de comparaison pour données binaires et pour données numériques”, Revue des Nouvelles Technologies de l'Information, vol. RNTI-E-22, Mesurer et évaluer la Qualité des Données et des Connaissances, pp. 145-164, (Editions RNTI) [Lesot 2012c]
- X. Li, D. Wang : “Simple Decomposition of Polynomial Sets over Finite Fields”, Journal of Systems Science and Mathematical Sciences, vol. 32 (1), pp. 15-26, (Kexue Chubanshe) [Li 2012]
- D. Lin, J.‑Ch. Faugère, L. Perret, T. Wang : “On enumeration of polynomial equivalence classes and their application to MPKC”, Finite Fields and Their Applications, vol. 18 (2), pp. 283-302, (Elsevier) [Lin 2012]
- G. Lozenguez, L. Adouane, A. Beynier, A.‑I. Mouaddib, Ph. Martinet : “Map Partitioning to Approximate an Exploration Strategy in Mobile Robotics”, Multiagent and Grid Systems - An International Journal of Cloud Computing, vol. 8 (3), pp. 275-288, (IOS Press) [Lozenguez 2012b]
- S. Martin, Kh. Al Agha, G. Pujolle : “Traffic-based topology control algorithm for energy savings in multi-hop wireless networks”, Annals of Telecommunications - annales des télécommunications, vol. 67 (3-4), pp. 181-189, (Springer) [Martin 2012]
- J.‑Ch. Marty, Th. Carron, Ph. Pernelle : “Observe and React: Interactive Indicators for Monitoring Pedagogical Sessions”, International Journal of Learning Technology, vol. 7 (3), pp. 277-296, (Inderscience) [Marty 2012]
- R. Miletitch, N. Sabouret, M. Ochs : “Susciter l'émotion dans la narration automatique”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 31 (4), pp. 477-501, (Lavoisier) [Miletitch 2012]
- B. Mitra, L. Tabourier, C. Roth : “Intrinsically Dynamic Network Communities”, Computer Networks, vol. 56 (3), pp. 1041-1053, (Elsevier) [Mitra 2012]
- L. Molinier, M. Ligocki, E. Ghedira Molinier, G. Pujolle, D. Gaïti : “Piloting the spanning tree protocol in home networks using a multi-agent system”, Telecommunication Systems, vol. 51 (1), pp. 15-27, (Springer Verlag (Germany)) [Molinier 2012]
- T. Monteiro, Marcelo E. Pellenz, M. De Oliveira Penna Neto, F. Enembreck, R. Sousa, G. Pujolle : “Channel allocation algorithms for WLANs using distributed optimization”, AEÜ - International Journal of Electronics and Communications / Archiv für Elektronik und Übertragungstechnik, vol. 66 (6), pp. 480-490, (Elsevier) [Monteiro 2012b]
- Ch. Mou : “Design of termination criterion of BMS algorithm for lexicographical ordering”, Journal of Computer Applications, vol. 32 (11), pp. 2977-2980, (Science Press) [Mou 2012]
- Z. Movahedi, M. Ayari, R. Langar, G. Pujolle : “A survey of autonomic network architectures and evaluation criteria”, Communications Surveys and Tutorials, IEEE Communications Society, vol. 14 (2), pp. 464-490, (Institute of Electrical and Electronics Engineers) [Movahedi 2012]
- M. Muratet : “Prog&Play : conception et utilisation”, Argos. La revue des BCD et CDI n°50, pp. 13-15, (CRDP Académie de Créteil) [Muratet 2012a]
- M. Muratet, E. Delozanne, P. Torguet, F. Viallet : “Addressing teachers' concerns about the Prog&Play serious game with context adaptation”, International Journal of Learning Technology, vol. 7 (4), pp. 419-433, (Inderscience) [Muratet 2012b]
- N. Ndiaye, P. Sens, O. Thiare : “Performance comparison of hierarchical checkpoint protocols grid computing”, International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1 (6), pp. 46-53, (UNIR) [Ndiaye 2012b]
- V. Nguyen, Th. Nguyen : “Approximating the asymmetric profitable tour”, International Journal of Mathematics in Operational Research, vol. 4 (3), pp. 294-301, (Inderscience) [Nguyen 2012]
- W. Niu, D. Wang : “Algebraic Analysis of Stability and Bifurcation of a Self-assembling Micelle System”, Applied Mathematics and Computation, vol. 219 (1), pp. 108-121, (Elsevier) [Niu 2012]
- M. Nogueira Lima, Helber W. Da Silva, A. Dos Santos, G. Pujolle : “A Security Management Architecture for Supporting Routing Services on WANETs”, IEEE Transactions on Network and Service Management, vol. 9 (2), pp. 156-168, (IEEE) [Nogueira Lima 2012]
- S. Orange, G. Renault, K. Yokoyama : “Efficient Arithmetic in Successive Algebraic Extension Fields Using Symmetries”, Mathematics in Computer Science, vol. 6 (3), pp. 217-233, (Springer) [Orange 2012]
- S. Peters, Y. Jacob, L. Denoyer, P. Gallinari : “Iterative Multi-Label Multi-Relational Classification Algorithm for Complex Social Networks”, Social Network Analysis and Mining, vol. 2 (1), pp. 17-29, (Springer) [Peters 2012]
- T. Pham, S. Fdida : “DTN support for news dissemination in an urban area”, Computer Networks, vol. 56 (9), pp. 2276-2291, (Elsevier) [Pham 2012]
- D. Picard, A. Revel, M. Cord : “An Application of Swarm Intelligence to Distributed Image Retrieval”, Information Sciences, vol. 192, pp. 71-81, (Elsevier) [Picard 2012a]
- C. Pivoteau, B. Salvy, M. Soria : “Algorithms for combinatorial structures: Well-founded systems and Newton iterations.”, Journal of Combinatorial Theory, Series A, vol. 119 (8), pp. 1711-1773, (Elsevier) [Pivoteau 2012]
- B. Piwowarski, M.‑R. Amini, M. Lalmas : “On using a quantum physics formalism for multidocument summarization”, Journal of the American Society for Information Science and Technology, vol. 63 (5), pp. 865-888, (Association for Information Science and Technology (ASIS&T)) [Piwowarski 2012c]
- F. Rocha Jimenez Vieira, J. Ferreira De Rezende, V. Carneiro Barbosa, S. Fdida : “Scheduling links for heavy traffic on interfering routes in wireless mesh networks”, Computer Networks, vol. 56 (5), pp. 1584, (Elsevier) [Rocha Jimenez Vieira 2012]
- A. Salah Brahim, B. Le Grand, M. Latapy : “Diffusion Cascades: Spreading Phenomena in Blog Network Communities”, Parallel Processing Letters, vol. 22 (1), pp. 1-16, (World Scientific Publishing) [Salah Brahim 2012]
- S.‑A. Sansone, Ph. Rocca‑Serra, D. Field, E. Maguire, Ch. Taylor, O. Hofmann, H. Fang, S. Neumann, W. Tong, L. Amaral‑Zettler, K. Begley, T. Booth, L. Bougueleret, G. Burns, B. Chapman, T. Clark, L.‑A. Coleman, J. Copeland, S. Das, A. De Daruvar, P. De Matos, I. Dix, S. Edmunds, Ch. Evelo, M. Forster, P. Gaudet, J. Gilbert, C. Goble, J. Griffin, D. Jacob, J. Kleinjans, L. Harland, K. Haug, H. Hermjakob, Sh. Ho Sui, A. Laederach, Sh. Liang, S. Marshall, A. Mcgrath, E. Merrill, D. Reilly, M. Roux, C. Shamu, C. Shang, Ch. Steinbeck, A. Trefethen, B. Williams‑Jones, K. Wolstencroft, I. Xenarios, W. Hide : “Toward interoperable bioscience data”, Nature Genetics, vol. 44 (2), pp. 121-126, (Nature Publishing Group) [Sansone 2012]
- M. Schröder, E. Bevacqua, R. Cowie, F. Eyben, H. Gunes, D. Heylen, M. Ter Maat, G. Mckeown, S. Pammi, M. Pantic, C. Pelachaud, B. Schuller, E. De Sevin, M. Valstar, M. Wöllmer : “Building Autonomous Sensitive Artificial Listeners”, IEEE Transactions on Affective Computing, vol. 3 (2), pp. 165-183, (Institute of Electrical and Electronics Engineers) [Schröder 2012]
- Everton F. R. Seára, M. Sunye, Luis C. E. Bona, T. Vignatti, Andre L. Vignatti, A. Doucet : “Extending OAI-PMH over structured P2P networks for digital preservation”, International Journal on Digital Libraries, vol. 12 (1), pp. 13-26, (Springer Verlag) [Seára 2012]
- M. Sicard, N. Perrot, R. Reuillon, S. Mesmoudi, I. Alvarez, S. Martin : “A viability approach to control food processes: Application to a Camembert cheese ripening process”, Food Control, vol. 23 (2), pp. 312-319, (Elsevier) [Sicard 2012]
- S. Sundaresan, W. De Donato, N. Feamster, R. Teixeira, S. Crawford, A. Pescapé : “Measuring Home Broadband Performance”, Communications of the ACM, vol. 55 (11), pp. 100-109, (Association for Computing Machinery) [Sundaresan 2012]
- J. Torres, M. Nogueira Lima, G. Pujolle : “A Survey on Identity Management for the Future Network”, Communications Surveys and Tutorials, IEEE Communications Society, vol. 15 (2), pp. 787-802, (Institute of Electrical and Electronics Engineers) [Torres 2012]
- I. Truck, J. Malenfant : “Towards a formalization of the Linguistic Conditional Preference networks”, International Journal of Applied Management Science, vol. 4 (4), pp. 349-370 [Truck 2012]
- E. Tsigaridas : “Improved bounds for the CF algorithm”, Theoretical Computer Science, pp. 1-12, (Elsevier) [Tsigaridas 2012]
- J. Van Der Hoeven, G. Lecerf, B. Mourrain, Ph. Trébuchet, J. Berthomieu, D. Diatta, A. Mantzaflaris : “Mathemagix”, ACM Communications in Computer Algebra, vol. 45 (3/4), pp. 186-188, (Association for Computing Machinery (ACM)) [Van Der Hoeven 2012]
- V. Vu, N. Labroche, B. Bouchon‑Meunier : “Improving Constrained Clustering with Active Query”, Pattern Recognition, vol. 45 (4), pp. 1749-1758, (Elsevier) [Vu 2012]
- D. Wang : “Algebraic Stability Criteria and Symbolic Derivation of Stability Conditions for Feedback Control Systems”, International Journal of Control, vol. 85 (10), pp. 1414-1421, (Taylor & Francis) [Wang 2012]
- X. Wang, M. Latapy, M. Soria : “Deciding on the type of the degree distribution of a graph from traceroute-like measurements”, International Journal of Computer Networks & Communications, vol. 4 (3), pp. 151-167, (AIRCC Publishing Corporation) [Wang 2012]
- J. Whitbeck, Y. Lopez, J. Leguay, V. Conan, M. Dias De Amorim : “Push-and-Track: Saving Infrastructure Bandwidth Through Opportunistic Forwarding”, Pervasive and Mobile Computing, vol. 8 (5), pp. 682-697, (Elsevier) [Whitbeck 2012c]
- J. Whiteaker, F. Schneider, R. Teixeira, Ch. Diot, A. Soule, F. Picconi, M. May : “Expanding Home Services with Advanced Gateways”, Computer Communication Review, pp. 38-43, (Association for Computing Machinery) [Whiteaker 2012]
- N. Widynski, S. Dubuisson, I. Bloch : “Fuzzy Spatial Constraints and Ranked Partitioned Sampling Approach for Multiple Object Tracking”, Computer Vision and Image Understanding, vol. 116 (10), pp. 1076-1094, (Elsevier) [Widynski 2012]
- P.‑H. Wuillemin, L. Torti : “Structured Probabilistic Inference”, International Journal of Approximate Reasoning, vol. 53 (7), pp. 946-968, (Elsevier) [Wuillemin 2012]