Elegir un grupo actual de investigación.
- M. ABDALLAH, Kh. Boussetta, W. Ooi : “Guest Editorial: Special Issue on Network and Systems Support for Games”, Multimedia Systems, vol. 20 (5), pp. 447-449, (Springer Verlag) [ABDALLAH 2014]
- J. Abello, F. Queyroi : “Network decomposition into fixed points of degree peeling”, Social Network Analysis and Mining, vol. 4 (1), pp. 191, (Springer) [Abello 2014]
- H. Aissaoui‑Mehrez, G. Pujolle, P. URIEN : “Framework Implementation Based On Grid of Smartcards To Authenticate Users and Virtual Machines”, SCITEPRESS Digital Library, pp. 285-290 [Aissaoui-Mehrez 2014a]
- A. Albano, J.‑L. GUILLAUME, S. Heymann, B. Le Grand : “Studying Graph Dynamics Through Intrinsic Time Based Diffusion Analysis”, Applications of Social Media and Social Network Analysis [Albano 2014b]
- Ah. Amokrane, R. Langar, R. Boutaba, G. Pujolle : “Energy Efficient Management Framework for Multihop TDMA-based Wireless Networks”, Computer Networks, vol. 62, pp. 29-42, (Elsevier) [Amokrane 2014]
- E. Angel, E. Bampis, Gerasimos G. Pollatos, V. Zissimopoulos : “Optimal data placement on networks with a constant number of clients”, Theoretical Computer Science, vol. 540-541, pp. 82-88, (Elsevier) [Angel 2014a]
- E. Angel, E. Bampis, V. Chau : “Low complexity scheduling algorithms minimizing the energy for tasks with agreeable deadlines”, Discrete Applied Mathematics, vol. 175, pp. 1-10, (Elsevier) [Angel 2014c]
- S. Angelopoulos, A. López‑Ortiz, K. Panagiotou : “Multi-target ray searching problems”, Theoretical Computer Science, vol. 540-541, pp. 2-12, (Elsevier) [Angelopoulos 2014]
- J. Augé, Th. Parmentelat, N. Turro, S. Avakian, L. Baron, M. Larabi, M. Rahman, T. Friedman, S. Fdida : “Tools to foster a global federation of testbeds”, Computer Networks, vol. 63, Special issue on Future Internet Testbeds − Part II, pp. 205-220, (Elsevier) [Augé 2014]
- Ch. Avenel, E. Mémin, P. Pérez : “Stochastic level set dynamics to track closed curves through image data”, Journal of Mathematical Imaging and Vision, vol. 49 (2), pp. 296-316, (Springer Verlag) [Avenel 2014]
- N. Bame, H. Naacke, I. Sarr, S. Ndiaye : “Algorithmes de traitement de requêtes de biodiversité dans un environnement distribué”, Revue Africaine de Recherche en Informatique et Mathématiques Appliquées, vol. Volume 18, 2014, pp. 1-18, (African Society in Digital Science) [Bame 2014]
- E. Bampis, A. Kononov, G. Lucarelli, I. Milis : “Bounded max-colorings of graphs”, Journal of Discrete Algorithms, vol. 26, pp. 56-68, (Elsevier) [Bampis 2014b]
- B. Bank, M. Giusti, J. Heintz, M. Safey El Din : “Intrinsic complexity estimates in polynomial optimization”, Journal of Complexity, vol. 30 (4), pp. 430-443, (Elsevier) [Bank 2014]
- Ph. Basset, D. Galayko, F. Cottone, R. Guillemet, E. Blokhina, F. Marty, T. Bourouina : “Electrostatic vibration energy harvester with combined effect of electrical nonlinearities and mechanical impact”, Journal of Micromechanics and Microengineering, vol. 24, pp. 035001, (IOP Publishing) [Basset 2014]
- S. Basu, M.‑F. Roy, M. Safey El Din, E. Schost : “A Baby Step–Giant Step Roadmap Algorithm for General Algebraic Sets”, Foundations of Computational Mathematics, vol. 14 (6), pp. 1117-1172, (Springer Verlag) [Basu 2014]
- A. Becker, N. Gama, A. Joux : “A sieve algorithm based on overlattices”, LMS Journal of Computation and Mathematics, vol. 17 (Special Issue A), pp. 49-70, (London Mathematical Society) [Becker 2014]
- N. Belhadj, Z. Marrakchi, M. Ben ayed, N. Masmoudi, H. Mehrez : “MPSoC Architecture for Macro Blocks Line Partitioning of H.264/AVC Encoder”, International Journal of Embedded and Real-Time Communication Systems, vol. 5 (2), pp. 43-60, (IGI Global) [Belhadj 2014]
- E. Blokhina, D. Galayko, D. Fournier‑Prunaret, O. Feely : “Sliding in a piecewise-smooth dynamical system with a hold-on effect”, Physics Letters A, vol. 378 (42), pp. 3085-3092, (Elsevier) [Blokhina 2014a]
- G. Bourgne, N. Maudet : “Designing Protocols for Abductive Hypothesis Refinement in Dynamic Multiagent Environments”, Computational Intelligence, vol. 30 (2), pp. 362-401, (Wiley) [Bourgne 2014]
- M. Bourgoin, E. Chailloux, J.‑L. Lamotte : “Efficient Abstractions for GPGPU Programming”, International Journal of Parallel Programming, vol. 42 (4), pp. 583-600, (Springer Verlag) [Bourgoin 2014c]
- J.‑P. Briot : “Composants et agents : évolution de la programmation et analyse comparative”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 33 (1-2), pp. 85-115, (Lavoisier) [Briot 2014a]
- B.‑M. Bui‑Xuan, Nick S. Jones : “How modular structure can simplify tasks on networks: parameterizing graph optimization by fast local community detection”, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 470 (2170), pp. 20140224, (Royal Society, The) [Bui-Xuan 2014]
- R. Busa‑Fekete, B. Szörényi, P. Weng, W. Cheng, E. Hullermeier : “Preference-based reinforcement learning: evolutionary direct policy search using a preference-based racing algorithm”, Machine Learning, vol. 97 (3), pp. 327-351, (Springer Verlag) [Busa-Fekete 2014]
- Th. Carron, S. Talbot : “Industrial Knowledge assessment for capitalization purposes via learning techniques”, World Applied Sciences Journal, vol. 31 (14), pp. 28-35 [Carron 2014]
- S. Casare, A. Brandao, Z. Guessoum, J. Sichman : “Medee Method Framework: a situational approach for organization-centered MAS”, Autonomous Agents and Multi-Agent Systems, vol. 28 (3), pp. 430-473, (Springer Verlag) [Casare 2014]
- Ah. Chaouche, A. El Fallah‑Seghrouchni, J.‑M. Ilié, D. Saidouni : “A Higher-order Agent Model with Contextual Management for Ambient Systems”, Transactions on Computational Collective Intelligence XVI, vol. 8780, pp. 146-169 [Chaouche 2014c]
- X. Chen, B. Doerr, C. Doerr, X. Hu, M. Weidong, R. Van Stee : “The Price of Anarchy for Selfish Ring Routing is Two”, ACM Transactions on Economics and Computation, vol. 2, pp. 8, (Association for Computing Machinery (ACM)) [Chen 2014]
- Ph. Chrétienne : “A polynomial algorithm for the two-connections variant of the tree pp-median problem”, Discrete Optimization, vol. 14, pp. 1-16, (Elsevier) [Chrétienne 2014a]
- Ph. Chrétienne : “On scheduling with the non-idling constraint”, Annals of Operations Research, pp. 1-19, (Springer Verlag) [Chrétienne 2014b]
- Ph. Chrétienne, P. Fouilhoux, E. GOURDIN, J. Segura : “The Location-Dispatching Problem: polyhedral results and Content Delivery Network Design”, Discrete Applied Mathematics, vol. 164 (1), pp. 68-85, (Elsevier) [Chrétienne 2014c]
- M. Danisch, J.‑L. GUILLAUME, B. Le Grand : “Multi-ego-centered communities in practice”, Social Network Analysis and Mining, vol. 4 (1), pp. 180, (Springer) [Danisch 2014d]
- Ch. Dhanjal, R. Gaudel, S. Clémençon : “Efficient Eigen-updating for Spectral Graph Clustering”, Neurocomputing, vol. 131, pp. 440-452, (Elsevier) [Dhanjal 2014]
- C. Doerr, Jens M. Schmidt, G. Ramakrishna : “Computing Minimum Cycle Bases in Weighted Partial 2-Trees in Linear Time”, Journal of Graph Algorithms and Applications, vol. 18, pp. 325-346, (Brown University) [Doerr 2014a]
- B. Doerr, C. Doerr : “Playing Mastermind with Constant-Size Memory”, Theory of Computing Systems, vol. 55, pp. 658-684, (Springer Verlag) [Doerr 2014b]
- B. Doerr, C. Doerr : “Ranking-Based Black-Box Complexity”, Algorithmica, vol. 68, pp. 571-609, (Springer Verlag) [Doerr 2014c]
- B. Doerr, C. Doerr : “Reducing the arity in unbiased black-box complexity”, Theoretical Computer Science, vol. 545, pp. 108-121, (Elsevier) [Doerr 2014d]
- B. Doerr, C. Doerr, T. Kötzing : “The unbiased black-box complexity of partition is polynomial”, Artificial Intelligence, vol. 216, pp. 12, (Elsevier) [Doerr 2014g]
- V. Dorzhiev, A. Karami, Ph. Basset, V. Dragunov, D. Galayko : “MEMS electrostatic vibration energy harvester without switches and inductive elements”, Journal of Physics: Conference Series, vol. 557, pp. 012126, (IOP Science) [Dorzhiev 2014]
- A. Drebes, K. Heydemann, N. Drach, A. Pop, A. Cohen : “Topology-Aware and Dependence-Aware Scheduling and Memory Allocation for Task-Parallel Languages”, ACM Transactions on Architecture and Code Optimization, vol. 11 (3), pp. 30, (Association for Computing Machinery) [Drebes 2014b]
- B. Dupont De Dinechin, A. Munier‑Kordon : “Converging to periodic schedules for cyclic scheduling problems with resources and deadlines”, Computers and Operations Research, vol. 51, pp. 227-236, (Elsevier) [Dupont De Dinechin 2014]
- F. Dzogang, M.‑J. Lesot, M. Rifqi : “Apprentissage de concepts émotionnels à partir de descripteurs bas niveau”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 28 (1), Affects, compagnons artificiels et interactions, pp. 131-157, (Editions Hermes) [Dzogang 2014]
- B. Escoffier, V. Paschos, E. Tourniaire : “Approximating MAX SAT by Moderately Exponential and Parameterized Algorithms”, Theoretical Computer Science, vol. 560 (2), pp. 147-157, (Elsevier) [Escoffier 2014]
- I. Fajjari, N. Aitsaadi, M. Pióro, G. Pujolle : “A new virtual network static embedding strategy within the Cloud’s private backbone network”, Computer Networks, vol. 62, pp. 69-88, (Elsevier) [Fajjari 2014]
- J.‑R. Falleri, X. Blanc, R. Bendraou, M. Almeida Da Silva, C. Teyton : “Incremental inconsistency detection with low memory overhead”, Software: Practice and Experience, vol. 44 (5), pp. 621-641, (Wiley) [Falleri 2014]
- S. Feruglio, Th. Courcier, A. Karami, A. Alexandre‑Gauthier, O. Romain, V. Aimez, P. Charette, P. Pittet, G.‑N. Lu : “Opto-electrical Modeling of CMOS Buried Quad Junction Photodetector”, Key Engineering Materials, vol. 605, pp. 470-473, (Trans Tech Publications) [Feruglio 2014]
- S. Foroutan, A. Sheibanyrad, F. Pétrot : “Assignment of Vertical Links to Routers in Vertically-Partially-Connected 3D-NoCs”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33 (8), pp. 1208-1218, (IEEE) [Foroutan 2014]
- P. Fouilhoux, A. Questel : “A Branch-and-Cut for the non-disjoint m-Ring-Star problem”, RAIRO - Operations Research, vol. 48 (2), pp. 167-188, (EDP Sciences) [Fouilhoux 2014a]
- R. Fournier, Th. Cholez, M. Latapy, I. Chrisment, C. Magnien, O. Festor, I. Daniloff : “Comparing Pedophile Activity in Different P2P Systems”, Social Sciences, vol. 3 (3), Special Issue on Contemporary Developments in Child Protection, pp. 314-325, (MDPI) [Fournier 2014b]
- J.‑G. Ganascia, P. Glaudes, A. Del Lungo : “Automatic Detection of Reuses and Citations in Literary Texts”, Literary and Linguistic Computing, vol. 29 (3), pp. 412-421, (Oxford University Press (OUP)) [Ganascia 2014b]
- G. Geeraerts, J.‑F. Raskin, N. Sznajder : “On regions and zones for event-clock automata”, Formal Methods in System Design, vol. 45 (3), pp. 330-380, (Springer Verlag) [Geeraerts 2014]
- M. Gerla, Ch. Wu, G. Pau, X. Zhu : “Content distribution in VANETs”, IEEE Transactions on Vehicular Communications, vol. 1 (1), pp. 3-12, (Institute of Electrical and Electronics Engineers, Inc. (IEEE)) [Gerla 2014a]
- C. Gicquel, A. Lisser, M. Minoux : “An evaluation of semidefinite programming based approaches for discrete lot-sizing problems”, European Journal of Operational Research, vol. 237 (2), pp. 498-507, (Elsevier) [Gicquel 2014a]
- H. Goh, N. Thome, M. Cord, J.‑H. Lim : “Learning Deep Hierarchical Visual Feature Coding”, IEEE Transactions on Neural Networks and Learning Systems, vol. 25 (12), pp. 2212-2225, (IEEE) [Goh 2014]
- A. Gradvohl, H. Senger, L. Arantes, P. Sens : “Comparing Distributed Online Stream Processing Systems Considering Fault Tolerance Issues.”, Journal of Emerging Technologies in Web Intelligence, vol. 6 (2), pp. 174-179, (Academy Publisher) [Gradvohl 2014]
- A. Greuet, M. Safey El Din : “Probabilistic Algorithm for Polynomial Optimization over a Real Algebraic Set”, SIAM Journal on Optimization, vol. 24 (3), pp. 1313-1343, (Society for Industrial and Applied Mathematics) [Greuet 2014]
- D. Guenther, R. Alvarez‑Boto, J. Contreras‑Garcia, J.‑Ph. Piquemal, J. Tierny : “Characterizing Molecular Interactions in Chemical Systems”, IEEE Transactions on Visualization and Computer Graphics, vol. 20 (12), pp. 2476-2485, (Institute of Electrical and Electronics Engineers) [Guenther 2014]
- J. Gutierrez, I. Alvar, A. Joux : “Recovering a sum of two squares decomposition”, Journal of Symbolic Computation, vol. 64, pp. 16-21, (Elsevier) [Gutierrez 2014]
- A. Gyulassy, D. Guenther, J. Levine, J. Tierny, V. Pascucci : “Conforming Morse-Smale Complexes”, IEEE Transactions on Visualization and Computer Graphics, vol. 20 (12), pp. 2595-2603, (Institute of Electrical and Electronics Engineers) [Gyulassy 2014]
- P. Harte, E. Blokhina, O. Feely, D. Fournier‑Prunaret, D. Galayko : “Electrostatic Vibration Energy Harvesters with Linear and Nonlinear Resonators”, International journal of bifurcation and chaos in applied sciences and engineering, vol. 24 (11), pp. 1430030, (World Scientific Publishing) [Harte 2014b]
- A. Hatoum, R. Langar, N. Aitsaadi, R. Boutaba, G. Pujolle : “Cluster-based Resource Management in OFDMA Femtocell Networks with QoS Guarantees”, IEEE Transactions on Vehicular Technology, vol. 63 (5), pp. 2378-2391, (Institute of Electrical and Electronics Engineers) [Hatoum 2014]
- O. Hazir, S. Kedad‑Sidhoum : “Batch Sizing and Just-In-Time Scheduling with Common Due Date”, Annals of Operations Research, vol. 213 (1), pp. 187-202, (Springer Verlag) [Hazir 2014]
- H. Hoang‑Van, Y. Shinozaki, T. Miyoshi, O. Fourmaux : “A Router-Aided Hierarchical P2P Traffic Localization Based on Variable Additional Delay Insertion”, IEICE Transactions on Communications, vol. E97-B (1), pp. 29-39, (Institute of Electronics, Information and Communication Engineers) [Hoang-Van 2014b]
- R. Hollanders, D. Bernardes, B. Mitra, R. Jungers, J.‑Ch. Delvenne, F. Tarissan : “Data-driven traffic and diffusion modeling in peer-to-peer networks: A real case study”, Network Science, vol. 2 (3), pp. 341-366, (Cambridge University Press) [Hollanders 2014]
- A. Honorat, M. Potop‑Butucaru, S. Tixeuil : “Gathering fat mobile robots with slim omnidirectional cameras”, Theoretical Computer Science, vol. 557, pp. 1-27, (Elsevier) [Honorat 2014]
- S. Hoteit, S. Secci, S. Sobolevsky, C. Ratti, G. Pujolle : “Estimating human trajectories and hotspots through mobile phone data”, Computer Networks, vol. 64, pp. 296-307, (Elsevier) [Hoteit 2014c]
- Th. Hujsa, J.‑M. Delosme, A. Munier‑Kordon : “Polynomial Sufficient Conditions of Well-Behavedness and Home Markings in Subclasses of Weighted Petri Nets”, ACM Transactions on Embedded Computing Systems (TECS), vol. 13 (4), pp. 141:1-141:25, (ACM) [Hujsa 2014b]
- M. Ibrahim, N. Maculan, M. Minoux : “A note on the NP-hardness of the separation problem on some valid inequalities for the elementary shortest path problem”, Pesquisa Operacional, vol. 34 (1), pp. 117-124, (Sociedade Brasileira de Pesquisa Operacional) [Ibrahim 2014]
- C. Iovan, P.‑H. Cournède, Th. Guyard, B. Bayol, D. Boldo, M. Cord : “Model-Based Analysis-Synthesis for Realistic Tree Reconstruction and Growth Simulation”, IEEE Transactions on Geoscience and Remote Sensing, vol. 52 (2), pp. 1438-1450, (Institute of Electrical and Electronics Engineers) [Iovan 2014]
- M. Jacomy, T. Venturini, S. Heymann, M. Bastian : “ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software”, PLoS ONE, vol. 9 (6), pp. e98679, (Public Library of Science) [Jacomy 2014]
- F. Jézéquel, Ph. Langlois, N. Revol : “First steps towards more numerical reproducibility”, ESAIM: Proceedings and Surveys, vol. 45, ESAIM: Proceedings and Surveys, pp. 229-238, (EDP Sciences) [Jézéquel 2014]
- M. Kchaou Boujelben, C. Gicquel, M. Minoux : “A distribution network design problem in the automotive industry: MIP formulation and heuristics”, Computers and Operations Research, vol. 52, pp. 16-28, (Elsevier) [Kchaou Boujelben 2014]
- B. Kemme, A. Schiper, R. Ganesan, M. Shapiro : “Dagstuhl Seminar Review: Consistency in Distributed Systems”, ACM SIGACT News, vol. 45 (1), pp. 22, (Association for Computing Machinery (ACM)) [Kemme 2014]
- R. Khefifi, P. Poizat, F. Saïs : “Vers une utilisation automatique des Informations Personnelles pour la réalisation de e-procedures”, Revue des Nouvelles Technologies de l'Information, vol. RNTI-W-2, pp. 75-89, (Editions RNTI) [Khefifi 2014]
- A. Kilic, Z. Marrakchi, H. Mehrez : “A Top-Down Optimization Methodology for Mutually Exclusive Applications”, International Journal of Reconfigurable Computing, vol. 2014, pp. 827613:1-827613:18, (Hindawi Publishing Corporation) [Kilic 2014b]
- F. KSONTINI, S. Espie, Z. Guessoum, R. Mandiau : “Representation of the Agent Environment for Traffic Behavioral Simulation.”, Transactions on Computational Collective Intelligence, vol. 15, pp. 49-68, (Springer) [KSONTINI 2014]
- M. Latapy, A. Hamzaoui, C. Magnien : “Detecting Events in the Dynamics of Ego-centered Measurements of the Internet Topology”, Journal of Complex Networks, vol. 2 (1), pp. 38-59, (Oxford University Press) [Latapy 2014a]
- X. Li, D. Wang : “Computing equilibria of semi-algebraic economies using triangular decomposition and real solution classification”, Journal of Mathematical Economics, vol. 54, pp. 48-58, (Elsevier) [Li 2014]
- A. López‑Ortiz, S. Angelopoulos, A. Hamel : “Optimal Scheduling of Contract Algorithms for Anytime Problem-Solving”, Journal of Artificial Intelligence Research, vol. 51, pp. 533-554, (Association for the Advancement of Artificial Intelligence) [López-Ortiz 2014]
- Th. Lust, D. Tuyttens : “Variable and large neighborhood search to solve the multiobjective set covering problem”, Journal of Heuristics, vol. 20 (2), pp. 165-188, (Springer Verlag) [Lust 2014b]
- J. Mairesse, I. Marcovici : “Around probabilistic cellular automata”, Theoretical Computer Science, vol. 559, pp. 42-72, (Elsevier) [Mairesse 2014]
- B. Marne, J.‑M. Labat : “Model and Authoring Tool to Help Teachers Adapt Serious Games to their Educational Contexts”, International Journal of Learning Technology, vol. 9 (2), pp. 161-180, (Inderscience) [Marne 2014b]
- A. Maurer, S. Tixeuil : “Byzantine broadcast with fixed disjoint paths”, Journal of Parallel and Distributed Computing, vol. 74 (11), pp. 3153-3160, (Elsevier) [Maurer 2014a]
- J.‑F. Maurras, Th. Nguyen, V. Nguyen : “On the linear description of the Huffman trees polytope”, Discrete Applied Mathematics, vol. 164 (1), pp. 225-236, (Elsevier) [Maurras 2014]
- O. Melekhova : “Coordination dans la décision pour les architectures autonomiques à grande échelle”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 33 (1-2), pp. 31-62, (Lavoisier) [Melekhova 2014]
- S. Mesmoudi, I. Alvarez, S. Martin, R. Reuillon, M. Sicard, N. Perrot : “Coupling geometric analysis and viability theory for system exploration: Application to a living food system”, Journal of Process Control, vol. 24 (12), pp. 18-28, (Elsevier) [Mesmoudi 2014]
- L. Meziou, A. Histace, F. Precioso, O. Romain, X. Dray, B. Granado, B. Matuszewski : “Computer-Assisted Segmentation of Videocapsule Images Using Alpha-Divergence-Based Active Contour In The Framework of Intestinal Pathologies Detection”, International Journal of Biomedical Imaging, vol. 2014, pp. 428583 (10 pages), (Hindawi Publishing Corporation) [Meziou 2014]
- R. Minetto, N. Thome, M. Cord, Neucimar J. Leite, J. Stolfi : “SnooperText: A Text Detection System for Automatic Indexing of Urban Scenes”, Computer Vision and Image Understanding, vol. 122, pp. 92-104, (Elsevier) [Minetto 2014]
- M. Minoux : “Two-stage robust optimization, state-space representable uncertainty and applications”, RAIRO - Operations Research, vol. 48 (4), pp. 455-475, (EDP Sciences) [Minoux 2014]
- I. Moraes, D. Mattos, Lyno Henrique G. Ferraz, Miguel Elias M. Campista, M. Rubinstein, L. Maciel Kosmalski Costa, M. Dias De Amorim, P. Velloso, Otto Carlos M. B. Duarte, G. Pujolle : “FITS: A flexible virtual network testbed architecture”, Computer Networks, pp. 221-237, (Elsevier) [Moraes 2014]
- N. Moro, K. Heydemann, E. Encrenaz, B. Robisson : “Formal verification of a software countermeasure against instruction skip attacks”, Journal of Cryptographic Engineering, vol. 4 (3), pp. 145-156, (Springer) [Moro 2014c]
- K. Moussa Ali Abdellatif, R. Chotin‑Avot, H. Mehrez : “Authenticated Encryption on FPGAs from the Static Part to the Reconfigurable Part”, Microprocessors and Microsystems: Embedded Hardware Design, vol. 38 (6), pp. 526-538, (Elsevier) [Moussa Ali Abdellatif 2014a]
- K. Moussa Ali Abdellatif, R. Chotin‑Avot, H. Mehrez : “Low cost Solutions for Secure Remote Reconfiguration of FPGAs”, International Journal of Embedded Systems, vol. 6 (2-3), pp. 257-265, (Inderscience) [Moussa Ali Abdellatif 2014c]
- A. Munier‑Kordon, D. Rebaine : “The coupled unit-time operations problem on identical parallel machines with respect to the makespan”, Operations Research Letters, vol. 42 (1), pp. 21-26, (Elsevier) [Munier-Kordon 2014]
- M. Muratet, E. Delozanne, F. Viallet, P. Torguet : “Étude de l'intégration d'un jeu sérieux pour l'enseignement de la programmation dans différents contextes universitaires”, STICEF (Sciences et Technologies de l'Information et de la Communication pour l'Éducation et la Formation), vol. 21 (special Evaluation dans les jeux sérieux), pp. 1-38, (ATIEF) [Muratet 2014]
- B. Ouattara, L. Doyen, D. Ney, H. Mehrez, P. Bazargan‑Sabet : “Power grid redundant path contribution in system on chip (SoC) robustness against electromigration”, Microelectronics Reliability, vol. 54 (9-10), pp. 1702-1706, (Elsevier) [Ouattara 2014]
- N. Palix, G. Thomas, S. Saha, Ch. Calvès, G. Muller, J. Lawall : “Faults in Linux 2.6”, ACM Transactions on Computer Systems, vol. 32 (2), pp. 1-40, (Association for Computing Machinery) [Palix 2014]
- V. Pangracious, E. Amouri, Z. Marrakchi, H. Mehrez : “Architecture level optimization of 3-dimensional tree-based FPGA”, Microelectronics Journal, vol. 45 (4), pp. 355-366, (Elsevier) [Pangracious 2014a]
- C. Pereira, D. Viega, J. Mahdjoub, Z. Guessoum, L. Gonçalves, M. Ferreira, J. Monteiro : “Using a multi-agent system approach for microaneurysm detection in fundus images”, Artificial Intelligence in Medicine, vol. 60 (3), pp. 179-188, (Elsevier) [Pereira 2014]
- T. Phe‑Neau, M. Dias De Amorim, V. Conan : “Uncovering vicinity properties in disruption-tolerant networks”, Computer Networks, pp. 210-223, (Elsevier) [Phe-Neau 2014b]
- Ch. Phung, S. Secci, D. Saucez, L. Iannone : “The OpenLISP control-plane architecture”, IEEE Network, vol. 28 (2), pp. 34-40, (Institute of Electrical and Electronics Engineers) [Phung 2014]
- A. Pla, B. López, J. Murillo, N. Maudet : “Multi-attribute auctions with different types of attributes: Enacting properties in multi-attribute auctions”, Expert Systems with Applications, vol. 41, pp. 4829-4843, (Elsevier) [Pla 2014]
- P. Raad, S. Secci, Ch. Phung, A. Cianfrani, P. Gallard, G. Pujolle : “Achieving Sub-Second Downtimes in Large-Scale Virtual Machine Migrations with LISP”, IEEE Transactions on Network and Service Management, vol. 11 (2), pp. 133-143, (IEEE) [Raad 2014]
- M. Radenen, Th. Artières : “Handling signal variability with contextual markovian models”, Pattern Recognition Letters, vol. 35, pp. 236-245, (Elsevier) [Radenen 2014b]
- D. Saucez, S. Secci, Ch. Barakat : “On the Incentives and Incremental Deployments of ICN technologies for OTT Services”, IEEE Network, vol. 28 (3), pp. 20-25, (Institute of Electrical and Electronics Engineers) [Saucez 2014]
- S. Secci, G. Pujolle, Th.‑M.‑T. Nguyen, S. Nguyen : “Performance-Cost Trade-off Strategic Evaluation of Multipath TCP Communications”, IEEE Transactions on Network and Service Management, vol. 11 (2), pp. 250-263, (IEEE) [Secci 2014a]
- S. Secci, S. Murugesan : “Cloud Networks: Enhancing Performance and Resiliency”, Computer, vol. 47 (10), pp. 82-85, (IEEE Computer Society) [Secci 2014b]
- Juan S. Silva, A. Histace, O. Romain, X. Dray, B. Granado : “Towards embedded detection of polyps in WCE images for early diagnosis of colorectal cancer”, International Journal of Computer Assisted Radiology and Surgery, vol. 9 (2), pp. 283-293, (Springer Verlag) [Silva 2014]
- R. Souza Couto, S. Secci, M. Elias Mitre Campista, L. Maciel Kosmalski Costa : “Network Design Requirements for Disaster Resilience in IaaS Clouds”, IEEE Communications Magazine, vol. 52 (10), pp. 52-58, (Institute of Electrical and Electronics Engineers) [Souza Couto 2014c]
- O. Stiti, O. Braham, G. Pujolle : “Creation of Virtual Wi-Fi Access Point and Secured Wi-Fi Pairing, through NFC”, International journal of communications, network and system sciences, vol. 7 (6), pp. 175-180, (Scientific Research) [Stiti 2014]
- A. Tatar, M. Dias De Amorim, S. Fdida, P. Antoniadis : “A survey on predicting the popularity of web content.”, Journal of Internet Services and Applications, vol. 5 (1), pp. 8, (Springer) [Tatar 2014a]
- A. Tatar, P. Antoniadis, M. Dias De Amorim, S. Fdida : “From Popularity Prediction to Ranking Online News”, Social Network Analysis and Mining, pp. 4:174, (Springer) [Tatar 2014b]
- M. Taub, R. Azevedo, F. Bouchet, B. Khosravifar : “Can the use of cognitive and metacognitive self-regulated learning strategies be predicted by learners’ levels of prior knowledge in hypermedia-learning environments?”, Computers in Human Behavior, vol. 39, pp. 356-367, (Elsevier) [Taub 2014a]
- M. Thabet, M. Boufaïda, F. Kordon : “An Approach for Developing an Interoperability Mechanism Between Cloud Providers”, International Journal of Space-Based and Situated Computing, vol. 4 (2), pp. 88-99, (Inderscience) [Thabet 2014]
- Ch. Theriault, N. Thome, M. Cord, P. Pérez : “Perceptual principles for video classification with Slow Feature Analysis”, IEEE Journal of Selected Topics in Signal Processing, vol. 8 (3), pp. 428-437, (IEEE) [Theriault 2014]
- N. Travers, Z. Hmedeh, N. Vouzoukidou, C. Du Mouza, V. Christophides, M. Scholl : “RSS feeds behavior analysis, structure and vocabulary”, International Journal of web information systems, vol. 10 (3), pp. 291-320, (Emerald) [Travers 2014]
- M. Valerio Barbera, A. Carneiro Viana, M. Dias De Amorim, J. Stefa : “Data Offloading in social mobile networks through VIP Delegation”, Ad Hoc Networks, vol. 19, pp. 92-110, (Elsevier) [Valerio Barbera 2014]
- M. Véron, O. Marin, S. Monnet, Z. Guessoum : “Towards a scalable refereeing system for online gaming”, Multimedia Systems, vol. 20 (5), pp. 579-593, (Springer Verlag) [Véron 2014c]
- J.‑L. Wybo, C. Gouttas, E. Freyssinet : “L’impact des réseaux sociaux dans la gestion des crises et le cybercrime”, Sécurité et stratégie, vol. 18 (3), pp. 37-43, (Club des Directeurs de Sécurité des Entreprises) [Wybo 2014]
- A. Yessad, I. Mounier, Th. Carron, F. Kordon, J.‑M. Labat : “Formal Framework to improve the reliability of concurrent and collaborative learning games”, EAI Endorsed Transactions on Serious Games, vol. 14 (2), pp. e4, (ICST) [Yessad 2014b]
- Y. Zhang, B. Bérard, L. Hillah, F. Kordon, Y. Thierry‑Mieg : “Controllability for Discrete Event Systems Modeled in VeriJ”, International Journal of Critical Computer-Based Systems, vol. 5 (3/4), pp. 218-240, (Inderscience) [Zhang 2014]
- Zh. Zhang, D. Refauvelet, A. Greiner, M. Benabdenbi, F. Pêcheux : “On-the-Field Test and Configuration Infrastructure for 2-D-Mesh NoCs in Shared-Memory Many-Core Architectures”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22 (6), pp. 1364-1376, (IEEE) [Zhang 2014]