Current teams : | ALMASTY ALSOC APR BD CIAN ComplexNetworks DECISION DELYS LFI MOCAH MoVe NPA PEQUAN PolSys QI RO SMA SYEL |
- A. Abril Garcia, H. Mehrez, F. Pétrot, J. Gobert, C. Miro : “Estimation et optimisation de la consommation dans les SoC utilisant la simulation précise au cycle”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 27 (1-2), pp. 203-233, (Lavoisier) [Abril Garcia 2008]
- N. Absi, S. Kedad‑Sidhoum : “The multi-item capacitated lot-sizing problem with setup times and shortage costs”, European Journal of Operational Research, vol. 185 (3), pp. 1351-1374, (Elsevier) [Absi 2008c]
- N. Aitsaadi, N. Achir, Kh. Boussetta : “A Mesh-Based Sensors Deployment Method For Water Quality Monitoring”, Sea technology, vol. 49 (8), pp. 49-52, (Compass Publications Inc) [Aitsaadi 2008a]
- T. Ali Yahiya, K. Sethom, G. Pujolle, A.‑L. Beylot : “A cross-layering based autonomic approach for QoS support in heterogeneous wireless networks”, International journal of communication networks and distributed systems, vol. 1 (3), pp. 312-329, (Inderscience Publishers) [Ali Yahiya 2008c]
- E. Altman, T. Basar, N. Malouch : “The Role of Information Update in Flow Control”, IEEE Transactions on Communications, vol. 56 (8), pp. 1331-1342, (Institute of Electrical and Electronics Engineers) [Altman 2008]
- I. Alvarez, S. Huet : “Automatic diagnosis of engine of agricultural tractors: The BED experiment”, Biosystems Engineering, vol. 100 (3), pp. 362-369, (Elsevier) [Alvarez 2008]
- E. Angel, E. Bampis, F. Pascual : “An exponential (matching based) neighborhood for the vehicle routing problem”, Journal of Combinatorial Optimization, vol. 15 (2), pp. 179-190, (Springer Verlag) [Angel 2008a]
- E. Angel, E. Bampis, F. Pascual : “How good are SPT schedules for fair optimality criteria”, Annals of Operations Research, vol. 159 (1), pp. 53-64, (Springer Verlag) [Angel 2008b]
- E. Angel, E. Bampis, F. Pascual : “The impact of local policies on the quality of packet routing in paths, trees, and rings”, Journal of Scheduling, vol. 11 (5), pp. 311-322, (Springer Verlag) [Angel 2008c]
- P. Antoniadis, B. Le Grand, L. Tassiulas, A. Satsiou, R. Aguiar, J. Barraca, S. Sargento : “Community Building over Neighbourhood Wireless Mesh Networks”, IEEE Technology and Society Magazine, vol. 27 (1), pp. 48-56, (Institute of Electrical and Electronics Engineers) [Antoniadis 2008a]
- Ph. Baptiste, M. Flamini, F. Sourd : “Lagrangian bounds for just-in-time job-shop scheduling”, Computers and Operations Research, vol. 35 (3), pp. 906-915, (Elsevier) [Baptiste 2008]
- R. Ben‑El‑Kezadri, F. Kamoun : “YAVISTA: A Graphical Tool for Comparing 802.11 Simulators”, Journal of Computers (JCP), vol. 3 (2), pp. 10-20, (Academy Publisher) [Ben-El-Kezadri 2008a]
- F. Benbadis, K. Obraczka, J. Cortès, A. Brandwajn : “Exploring Landmark Placement Strategies for Topology-Based Localization in Wireless Sensor Networks”, EURASIP Journal on Advances in Signal Processing, vol. 2008 (1), pp. 275658, (SpringerOpen) [Benbadis 2008]
- R. Bendraou, Ph. Desfray, M.‑P. Gervais, A. Muller : “MDA Tool Components: A Proposal for Packaging Know-how in Model Driven Development”, Software and Systems Modeling, vol. 7 (3), pp. 329-343, (Springer Verlag) [Bendraou 2008b]
- D. Benmerzoug, F. Kordon, M. Boufaïda : “Formalisation and verification of interaction protocols for business process integration: a Petri net approach”, International Journal of Simulation and Process Modelling, vol. 4 (3/4), pp. 195-204, (Inderscience) [Benmerzoug 2008b]
- B. Bérard, F. Cassez, S. Haddad, D. Lime, O. Roux : “When are Timed Automata Weakly Timed Bisimilar to Time Petri Nets?”, Theoretical Computer Science, vol. 403 (2--3), pp. 202-220, (Elsevier) [Bérard 2008b]
- Vincent D. Blondel, J.‑L. GUILLAUME, Julien M. Hendrickx, C. De Kerchove, R. Lambiotte : “Local leaders in random networks”, Physical Review E : Statistical, Nonlinear, and Soft Matter Physics, vol. 77 (3), pp. 036114, (American Physical Society) [Blondel 2008a]
- Vincent D. Blondel, J.‑L. GUILLAUME, R. Lambiotte, E. Lefebvre : “Fast unfolding of communities in large networks”, Journal of Statistical Mechanics: Theory and Experiment, vol. P10008, pp. 1-12, (IOP Publishing) [Blondel 2008b]
- R. Botreau, J. Capdeville, P. Perny, I. Veissier : “Multicriteria evaluation of animal welfare at farm level: an application of MCDA methodologies”, Foundations of Computing and Decision Sciences, vol. 33 (4), pp. 287-316 [Botreau 2008b]
- N. Bouabdallah, G. Pujolle, H. Perros : “Multipoint-to-point lightpaths in all-optical networks: Dimensioning and cost analysis”, Performance Evaluation, vol. 65 (3-4), pp. 262-285, (Elsevier) [Bouabdallah 2008]
- P. Brézillon, M. Borges, J. Pino, J.‑Ch. Pomerol : “Lessons Learned from Three Case Studies”, Journal of Decision Systems, vol. 17 (1), pp. 27-40, (Routledge Taylor & Francis Group) [Brézillon 2008d]
- Th. Bullot, D. Gaïti, G. Pujolle, H. Zimmermann : “A piloting plane for controlling wireless devices”, Telecommunication Systems, vol. 39 (3-4), pp. 195-203, (Springer Verlag (Germany)) [Bullot 2008]
- E. Chailloux, V. Ravet, J. Verlaguet : “Hirondml: Fair Threads Migrations for Objective Caml”, Parallel Processing Letters, vol. 18 (1), pp. 55-69, (World Scientific Publishing) [Chailloux 2008]
- Ph. Chrétienne : “On single-machine scheduling without intermediate delays”, Discrete Applied Mathematics, vol. 156 (13), pp. 2543-2550, (Elsevier) [Chrétienne 2008]
- Th. Claveirole, M. Dias De Amorim, M. Abdalla, Y. Viniotis : “Securing Wireless Sensor Networks Against Aggregator Compromises”, IEEE Communications Magazine, vol. 46 (4), pp. 134-141, (Institute of Electrical and Electronics Engineers) [Claveirole 2008b]
- J. Cohen, A. Dasgupta, S. Ghosh, S. Tixeuil : “An Exercise in Selfish Stabilization”, ACM Transactions on Autonomous and Adaptive Systems, vol. 3 (4), pp. article 15, (Association for Computing Machinery (ACM)) [Cohen 2008]
- V. Conan, J. Leguay, T. Friedman : “Fixed Point Opportunistic Routing in Delay Tolerant Networks”, IEEE Journal on Selected Areas in Communications, vol. 26 (5), pp. 773-782, (Institute of Electrical and Electronics Engineers) [Conan 2008]
- R. Couturier, Ch. Denis, F. Jézéquel : “GREMLINS: a large sparse linear solver for grid environment”, Parallel Computing, vol. 34 (6-8), pp. 380-391, (Elsevier) [Couturier 2008]
- A. Coveliers, K. Heydemann, N. Drach : “Étude de la sensibilité aux jeux de données de la compilation itérative”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 27 (6), pp. 757-777, (Lavoisier) [Coveliers 2008]
- D. Dahmani, J.‑M. Ilié, M. Boukala : “Time Recursive Petri Nets - revisited”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. 5100 (I), Lecture Notes in Computer Science, pp. 104-118, (Springer) [Dahmani 2008]
- D. De Oliveira Cunha, O. Muniz Bandeira Duarte, G. Pujolle : “A Cooperation-Aware Routing Scheme for Fast Varying Fading Wireless Channels”, IEEE Communications Letters, vol. 12 (10), pp. 794-796, (Institute of Electrical and Electronics Engineers) [De Oliveira Cunha 2008a]
- A. Denoyer, L. Denoyer, D. Marotte, M. Georget, P.‑J. Pisella : “Intraindividual comparative study of corneal and ocular wavefront aberrations after biaxial microincision versus coaxial small-incision cataract surgery”, British Journal of Ophthalmology, vol. 92 (12), pp. 1679-1684, (BMJ Publishing Group) [Denoyer 2008a]
- A. Denoyer, L. Denoyer, J. Halfon, P.‑J. Pisella : “Influence of the Corneal Incision Size on Corneal and Ocular Higher-Order Aberrations After Cataract Surgery: Microincision versus Small-Incision”, Investigative Ophthalmology & Visual Science, vol. 49 (13), pp. 5662-5662, (Association for Research in Vision and Ophthalmology) [Denoyer 2008b]
- L. Denoyer, P. Gallinari : “Report on the XML mining track at INEX 2007 categorization and clustering of XML documents”, Sigir Forum, vol. 42 (1), pp. 22-28, (Association for Computing Machinery (ACM)) [Denoyer 2008b]
- M. Detyniecki, Ch. Marsala : “Automatic Video Annotation with Forests of Fuzzy Decision Trees”, Mathware & soft computing, vol. 15 (1), pp. 61-74, (RACO) [Detyniecki 2008b]
- M. Dias De Amorim, A. Ziviani, Y. Viniotis, L. Tassiulas : “Practical Aspects of Mobility in Wireless Self-Organizing Networks”, IEEE Wireless Communications, vol. 15 (6), pp. 6-7, (Institute of Electrical and Electronics Engineers) [Dias De Amorim 2008a]
- J. Diaz, S. Sandri, M. Rifqi, B. Bouchon‑Meunier : “Hypothesis Management for Disorder Diagnosis in a Hierarchical Framework”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 16, pp. 87-104, (World Scientific Publishing) [Diaz 2008c]
- L.‑S. Didier, P.‑Y. Rivaille : “Une nouvelle base RNS à 4 moduli et son convertisseur vers le binaire”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 27 (6), pp. 735-755, (Lavoisier) [Didier 2008b]
- L. Dupont, D. Lazard, S. Lazard, S. Petitjean : “Near-Optimal Parameterization of the Intersection of Quadrics: I. The Generic Algorithm”, Journal of Symbolic Computation, vol. 43 (3), pp. 168-191, (Elsevier) [Dupont 2008a]
- L. Dupont, D. Lazard, S. Lazard, S. Petitjean : “Near-Optimal Parameterization of the Intersection of Quadrics: II. A Classification of Pencils”, Journal of Symbolic Computation, vol. 43 (3), pp. 192-215, (Elsevier) [Dupont 2008b]
- L. Dupont, D. Lazard, S. Lazard, S. Petitjean : “Near-Optimal Parameterization of the Intersection of Quadrics: III. Parameterizing Singular Intersections”, Journal of Symbolic Computation, vol. 43 (3), pp. 216-232, (Elsevier) [Dupont 2008c]
- B. Escoffier, J. Monnot, O. Spanjaard : “Some tractable instances of interval data minmax regret problems”, Operations Research Letters, vol. 36 (4), pp. 424-429, (Elsevier) [Escoffier 2008a]
- M. Esseghir, N. Bouabdallah : “Node density control for maximizing wireless sensor network lifetime”, International Journal of Network Management, vol. 18 (2), pp. 159-170, (Wiley) [Esseghir 2008a]
- P. Fouilhoux : “L'optimisation Combinatoire”, Pour la science, vol. 369, pp. 50-56, (Pour la Science) [Fouilhoux 2008a]
- J.‑G. Ganascia : “Le monde de la connaissance est-il plat?”, Science et Devenir de l'Homme. Les Cahiers du Mouvement Universel de la Responsabilité Scientifique n°56, pp. 81-85 [Ganascia 2008b]
- J.‑G. Ganascia : “L’expérimentation in silico est-elle une forme d’expérimentation mentale”, Sciences et Avenir, vol. HS (153), (Sciences et avenir) [Ganascia 2008c]
- J.‑G. Ganascia : “Reconstructing True Wrong Inductions”, AI magazine, vol. 29 (2), pp. 57-65, (Association for the Advancement of Artificial Intelligence) [Ganascia 2008d]
- J.‑G. Ganascia : ““In silico" Experiments : Towards a Computerized Epistemology”, Newsletter on Philosophy and Computers, vol. 07 (2), pp. 11-15 [Ganascia 2008f]
- Ch. Gonzales, P. Perny, S. Queiroz : “{GAI}-Networks: Optimization, Ranking and Collective Choice in Combinatorial Domains”, Foundations of Computing and Decision Sciences, vol. 33 (1), pp. 3-24 [Gonzales 2008b]
- A. Gonzalez, P. Brézillon : “Comparing two context-driven approaches for representation of human tactical behavior”, Knowledge Engineering Review, vol. 23 (3), pp. 295-315, (Cambridge University Press (CUP)) [Gonzalez 2008]
- Ph. Gosselin, M. Cord : “Active learning methods for Interactive Image Retrieval.”, IEEE Transactions on Image Processing, vol. 17 (7), pp. 1200-1211, (Institute of Electrical and Electronics Engineers) [Gosselin 2008a]
- Ph. Gosselin, M. Cord, S. Philipp‑Foliguet : “Combining visual dictionary, kernel-based similarity and learning strategy for image category retrieval”, Computer Vision and Image Understanding, vol. 110 (3), pp. 403-417, (Elsevier) [Gosselin 2008b]
- S. Graillat : “Accurate simple zeros of polynomials in floating point arithmetic”, Computers & Mathematics with Applications, vol. 56 (4), pp. 1114-1120, (Elsevier) [Graillat 2008c]
- S. Graillat : “Some topological and geometric properties of pseudozero set”, Applied Mathematics E - Notes, vol. 8, pp. 98-108, (Tsing Hua University) [Graillat 2008d]
- M. Hemaissia, A. El Fallah‑Seghrouchni, Ch. Labreuche : “A new multilateral multi-issue negotiation protocol and its application to a crisis management problem”, Multiagent and Grid Systems - An International Journal of Cloud Computing, vol. 4 (1), pp. 103-123, (IOS Press) [Hemaissia 2008]
- Y. Hendel, F. Sourd : “Job-shop with two jobs and irregular criteria”, International Journal of Operations Research, vol. 5 (1), pp. 61-67, (Operations Research Society of Taiwan (ORSTW)) [Hendel 2008]
- L. Hillah, F. Kordon, L. Petrucci : “Application des méthodes formelles à la robotique modulaire”, Journal Européen des Systèmes Automatisés (JESA), vol. 42 (4), pp. 459-478, (Lavoisier) [Hillah 2008]
- Y. Huang, N. Feamster, R. Teixeira : “Practical Issues with Using Network Tomography for Fault Diagnosis”, Computer Communication Review, vol. 38 (5), pp. 53-58, (Association for Computing Machinery) [Huang 2008]
- J. Hugues, B. Zalila, L. Pautet, F. Kordon : “From the prototype to the final embedded system using the Ocarina AADL tool suite”, ACM Transactions on Embedded Computing Systems (TECS), vol. 7 (4), pp. 42, (ACM) [Hugues 2008]
- C. Iovan, D. Boldo, M. Cord : “Detection, Characterization and Modeling Vegetation in Urban Areas from High Resolution Aerial Imagery”, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 1 (3), pp. 206-213, (IEEE) [Iovan 2008a]
- R. Iskander, M.‑M. Louërat, A. Kaiser : “Automatic DC operating point computation and design plan generation for analog IPs”, Analog Integrated Circuits and Signal Processing, vol. 56 (1-2), pp. 93-105, (Springer Verlag) [Iskander 2008]
- J.‑Y. Jaffray, M. Jeleva : “Information Processing under Imprecise Risk with an Insurance Demand Illustration”, International Journal of Approximate Reasoning, vol. 49 (1), pp. 117-129, (Elsevier) [Jaffray 2008]
- M. Jaume, Ch. Morisset : “Un cadre sémantique pour le contrôle d'accès”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 27 (8), pp. 951-976, (Lavoisier) [Jaume 2008]
- F. Jézéquel, J.‑M. Chesneaux : “CADNA: a library for estimating round-off error propagation”, Computer Physics Communications, vol. 178 (12), pp. 933-955, (Elsevier) [Jézéquel 2008]
- M. Kassar, B. Kervella, G. Pujolle : “An Intelligent Handover Management System for Future Generation Wireless Networks”, EURASIP Journal on Wireless Communications and Networking, vol. 2008, pp. 2008:791691, (SpringerOpen) [Kassar 2008b]
- M. Kassar, B. Kervella, G. Pujolle : “An Overview of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks”, Computer Communications, vol. 31 (10), pp. 2607-2620, (Elsevier) [Kassar 2008c]
- S. Kedad‑Sidhoum, Y. Rios Solis, F. Sourd : “Lower bound for the earliness-tardiness scheduling problem on parallel machines with distinct due dates”, European Journal of Operational Research, vol. 189 (3), pp. 1305-1316, (Elsevier) [Kedad-Sidhoum 2008c]
- M. Kissi, M. Ramdani, B. Bouchon‑Meunier, D. Zakarya : “Pattern recognition system based on empirical knowledge: Sandalwood and camphoraceous odors application”, Mathematics and Computers in Simulation, vol. 77 (5-6), pp. 453-463, (Elsevier) [Kissi 2008]
- U. Körner, G. Pujolle : “Editorial: protocols and control schemes in the NGN”, International Journal of Network Management, vol. 18 (2), pp. 77-79, (Wiley) [Körner 2008]
- J. Lafaye, D. Gross‑Amblard, C. Constantin, M. Guerrouani : “Watermill: An Optimized Fingerprinting System for Databases under Constraints”, IEEE Transactions on Knowledge and Data Engineering, vol. 20 (4), pp. 532-546, (Institute of Electrical and Electronics Engineers) [Lafaye 2008]
- M. Latapy : “Main-memory Triangle Computations for Very Large (Sparse (Power-Law)) Graphs”, Theoretical Computer Science, vol. 407 (1-3), pp. 458-473, (Elsevier) [Latapy 2008a]
- M. Latapy, C. Magnien, N. Del Vecchio : “Basic Notions for the Analysis of Large Two-mode Networks”, Social Networks, vol. 30 (1), pp. 31-48, (Elsevier) [Latapy 2008d]
- F. Le Calvez, H. Giroire, G. Tisseau : “Design of a learning environment in combinatorics based on problem solving: modeling activities, problems and errors”, International Journal of Artificial Intelligence in Education, vol. 18 (1), pp. 59-94, (Springer) [Le Calvez 2008c]
- M.‑J. Lesot, M. Rifqi, H. Benhadda : “Similarity measures for binary and numerical data: a survey”, International Journal of Knowledge Engineering and Soft Data Paradigms, vol. 1 (1), pp. 63-84, (Inderscience) [Lesot 2008a]
- M.‑J. Lesot, N. Labroche, L. Yaffi : “Analyse et visualisation interactive de sessions Web”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 22 (3-4), pp. 369-382, (Lavoisier) [Lesot 2008c]
- Z. Lewkovicz, J.‑D. Kant : “A multi-agent simulation of a stylized French Labor Market : emergences at the micro-level”, Advances in Complex Systems (ACS), vol. 11 (2), pp. 217-230, (World Scientific) [Lewkovicz 2008]
- S. Lohier, Y. Ghamri‑Doudane, G. Pujolle : “Cross-Layer Design to Improve Elastic Traffic Performance in WLANs”, International Journal of Network Management, vol. 18 (3), pp. 251-277, (Wiley) [Lohier 2008]
- D. Macedo, A. Dos Santos, G. Pujolle : “From TCP/IP to Convergent Networks: Challenges and Taxonomy”, Communications Surveys and Tutorials, IEEE Communications Society, vol. 10 (4), pp. 40-55, (Institute of Electrical and Electronics Engineers) [Macedo 2008a]
- O. Marchetti, A. Munier‑Kordon : “Minimizing Place Capacities of Weighted Event Graphs for Enforcing Liveness”, Discrete Event Dynamic Systems, vol. 18 (1), pp. 91-109, (Springer Verlag) [Marchetti 2008]
- Z. Marrakchi, H. Mrabet, Ch. Masson, H. Mehrez : “Performances Comparison between Multilevel Hierarchical and Mesh FPGA Interconnects”, International Journal of Electronics, vol. 95 (3), pp. 275-289, (Taylor & Francis) [Marrakchi 2008a]
- M. Marzouki : “Biométrie : corps étrangers sous contrôle”, Plein Droit, vol. 1 (76), Hortefeux, acte 1, pp. 24-26, (GISTI) [Marzouki 2008b]
- S. Mazouzi, Z. Guessoum, F. Michel : “Segmentation collective d'images à base d'objets polyédriques et courbés”, Revue I3 - Information Interaction Intelligence, vol. 8 (2), pp. 20, (Cépaduès) [Mazouzi 2008a]
- L. Mazuel, N. Sabouret : “Generic command interpretation algorithms for conversational agents”, Web Intelligence and Agent Systems, vol. 6 (1), pp. 43-58, (IOS Press) [Mazuel 2008a]
- B. Mourrain, Ph. Trébuchet : “Stable normal forms for polynomial system solving”, Theoretical Computer Science, vol. 409 (2), pp. 229-240, (Elsevier) [Mourrain 2008]
- A. Munier‑Kordon, D. Rebaine : “A polynomial time algorithms for the UET permutation flowshop problem with time delays”, Computers and Operations Research, vol. 35 (2), pp. 525-537, (Elsevier) [Munier-Kordon 2008]
- M. Nemissi, H. Seridi, H. Akdag : “The Labeled Classification and Its Application”, International Journal of Computational Intelligence, vol. 2 (6), pp. 2088-2097, (World Academy of Science, Engineering and Technology) [Nemissi 2008a]
- M. Nemissi, H. Seridi, H. Akdag : “The Labeled Systems Of Multiple Neural Networks”, International Journal of Neural Systems, vol. 18 (4), pp. 321-330, (World Scientific Publishing) [Nemissi 2008b]
- E. Neron, F. Tercinet, F. Sourd : “Search tree based approaches for parallel machine scheduling”, Computers and Operations Research, vol. 35 (4), pp. 1127-1137, (Elsevier) [Neron 2008]
- W. Niu, D. Wang : “Algebraic approaches to stability analysis of biological systems”, Mathematics in Computer Science, vol. 1 (3), pp. 507-539, (Springer) [Niu 2008b]
- M. Nogueira Lima, E. Da Silva, A. Dos Santos, L. Albini : “Identity-Based Key Management in Mobile Ad Hoc Networks: Techniques and Applications”, IEEE Wireless Communications, vol. 15 (5), pp. 46-52, (Institute of Electrical and Electronics Engineers) [Nogueira Lima 2008a]
- D. Picard, M. Cord, A. Revel : “Image Retrieval over Networks : Active Learning using Ant Algorithm”, IEEE Transactions on Multimedia, vol. 10 (7), pp. 1356-1365, (Institute of Electrical and Electronics Engineers) [Picard 2008c]
- É. Platon, N. Sabouret, Sh. Honiden : “An Architecture for Exception Management in Multi-Agent Systems”, International Journal of Agent-Oriented Software Engineering, vol. 2 (3), pp. 267-289, (Inderscience) [Platon 2008]
- A. Rakotomamonjy, V. Guigue : “BCI Competition III : Dataset II - Ensemble of SVMs for BCI P300 speller”, IEEE Transactions on Biomedical Engineering, vol. 55 (3), pp. 1147-1154, (Institute of Electrical and Electronics Engineers) [Rakotomamonjy 2008]
- T. Razafindralambo, I. Guerin‑Lassous, L. Iannone, S. Fdida : “Dynamic and distributed packet aggregation to solve the performance anomaly in 802.11 wireless”, Computer Networks, vol. 52 (1), pp. 77-95, (Elsevier) [Razafindralambo 2008]
- I. Rebai, B. De La Passardière, J.‑M. Labat : “To Store and Retrieve Software Components for Interactive Learning Environments: the ECR Repository”, International Journal of Advanced Media and Communication, vol. 2 (1), pp. 73-95, (Inderscience) [Rebai 2008]
- Y. Rios Solis, F. Sourd : “Exponential neighborhood search for a parallel machine scheduling problem”, Computers and Operations Research, vol. 35 (5), pp. 1697-1712, (Elsevier) [Rios Solis 2008]
- O. Rogovchenko, J. Malenfant : “Composants et composition pour les architectures de contrôle de robots”, Journal Européen des Systèmes Automatisés (JESA), vol. 42 (4), pp. 423-438, (Lavoisier) [Rogovchenko 2008a]
- A. Scherrer, P. Borgnat, E. Fleury, J.‑L. GUILLAUME, C. Robardet : “Description and simulation of dynamic mobility networks”, Computer Networks, vol. 52 (15), pp. 2842-2858, (Elsevier) [Scherrer 2008b]
- N. Scott, V. Faro‑Maza, M. Penny Scott, T. Harmer, J.‑M. Chesneaux, Ch. Denis, F. Jézéquel : “E-collisions using e-science”, Physics of Particles and Nuclei Letters [PisВ'ma v Zhurnal Fizika Elementarnykh Chastits i Atomnogo Yadra / Pisʹma v žurnal "Fizika èlementarnyh častic i atomnogo âdra"], vol. 5 (3), pp. 150-156, (MAIK Nauka/Interperiodica ; Pleiades Publishing [2007-....]) [Scott 2008]
- M. Serrano, Ch. Queinnec : “Hop. un langage de programmation pour le Web (1ère partie)”, Programmez ! n°104, pp. 53-55, (Magazine Programmez) [Serrano 2008a]
- M. Serrano, Ch. Queinnec : “Une galerie de photos sur le Web avec Hop (2ème partie)”, Programmez ! n°105, pp. 64-66, (Magazine Programmez) [Serrano 2008b]
- K. Sethom, T. Ali Yahiya, N. Laga, G. Pujolle : “A QoS-Aware Mesh protocol for Future Home Networks Using Autonomic Architecture”, EURASIP Journal on Wireless Communications and Networking, vol. 2008, pp. 2008:386898, (SpringerOpen) [Sethom 2008]
- A. Sheibanyrad, A. Greiner : “Two Efficient Synchronous ⇔ Asynchronous Converters well-suited for Networks-on-Chip in GALS Architectures”, Integration, the VLSI Journal, vol. 41 (1), pp. 17-26, (Elsevier) [Sheibanyrad 2008a]
- A. Sheibanyrad, A. Greiner, I. Miro‑Panades : “Multisynchronous and Fully Asynchronous NoCs for GALS Architectures”, IEEE Design & Test, vol. 25 (6), pp. 572-580, (IEEE) [Sheibanyrad 2008b]
- F. Sourd, O. Spanjaard : “A Multiobjective Branch-and-Bound Framework: Application to the Biobjective Spanning Tree Problem”, INFORMS Journal on Computing, vol. 20 (3), pp. 472-484, (Institute for Operations Research and the Management Sciences (INFORMS)) [Sourd 2008a]
- F. Sourd, S. Kedad‑Sidhoum : “A faster branch-and-bound algorithm for the earliness-tardiness scheduling problem”, Journal of Scheduling, vol. 11 (1), pp. 49-58, (Springer Verlag) [Sourd 2008b]
- S. Taktak, J.‑L. Desbarbieux, E. Encrenaz : “A tool for automatic detection of deadlocks in wormhole networks on chip”, ACM Transactions on Design Automation of Electronic Systems, vol. 13 (1), pp. 1-8, (Association for Computing Machinery) [Taktak 2008]
- B. Tebbani, I. Aib, G. Pujolle : “SLA-based dynamic resource management in wireless environments: an enterprise nomadism use case”, International Journal of Internet Protocol Technology, vol. 3 (1), pp. 13-21, (Inderscience) [Tebbani 2008b]
- R. Teixeira, A. Shaikh, Timothy G. Griffin, J. Rexford : “Impact of Hot-Potato Routing Changes in IP Networks”, IEEE/ACM Transactions on Networking, vol. 16 (6), pp. 1295-1307, (IEEE/ACM) [Teixeira 2008]
- Y. Thierry‑Mieg, L. Hillah : “UML Behavioral Consistency Checking Using Instantiable Petri nets”, Innovations in Systems and Software Engineering, vol. 4 (3), pp. 293-300, (Springer Verlag) [Thierry-Mieg 2008]
- S. Thiriot, J.‑D. Kant : “Using associative networks to represent adopters' beliefs in a multi-agent model of innovation diffusion”, Advances in Complex Systems (ACS), vol. 11 (2), pp. 261-272, (World Scientific) [Thiriot 2008c]
- G. Thomas, N. Geoffray, Ch. Clément, B. Folliot : “Designing Highly Flexible Virtual Machines: The JnJVM Experience”, Software: Practice and Experience, vol. 38 (15), pp. 1643-1675, (Wiley) [Thomas 2008]
- N. Thome, D. Mérad, S. Miguet : “Learning Articulated Appearance Models for Tracking Humans: a Spectral Graph Matching Approach”, Signal Processing: Image Communication, vol. 23 (10), pp. 769-787, (Elsevier) [Thome 2008a]
- N. Thome, S. Miguet, S. Ambellouis : “A Real-Time, Multi-View Fall Detection System: a LHMM-Based Approach”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 18 (11), pp. 1522-1532, (Institute of Electrical and Electronics Engineers) [Thome 2008b]
- P. URIEN, G. Pujolle : “Security and privacy for the next wireless generation”, International Journal of Network Management, vol. 18 (2), pp. 129-145, (Wiley) [URIEN 2008]
- A. Valibouze : “Sur les relations entre les racines d'un polynôme”, Acta Arithmetica, vol. 131 (1), pp. 1-27, (Instytut Matematyczny PAN) [Valibouze 2008c]
- B. Vatinlen, F. Chauvet, Ph. Chrétienne, Ph. Mahey : “Simple Bounds and Greedy Algorithms for Decomposing a Flow into a Minimal Set of Paths”, European Journal of Operational Research, vol. 185 (3), pp. 1390-1401, (Elsevier) [Vatinlen 2008]
- V. Vieira Dos Santos, P. Brézillon, A. Salgado, P. Tedesco : “A context-oriented model for domain-independent context management.”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 22 (5), pp. 609-627, (Lavoisier) [Vieira Dos Santos 2008]
- F. Viger, B. Augustin, X. Cuvellier, C. Magnien, M. Latapy, T. Friedman, R. Teixeira : “Detection, understanding, and prevention of traceroute measurement artifacts”, Computer Networks, vol. 52 (5), pp. 998-1018, (Elsevier) [Viger 2008]
- J.‑B. Voron, F. Kordon : “Evinrude: A Tool to Automatically Transform Program's Sources into Petri Nets”, Petri Net Newsletter, vol. 75, pp. 19-38 [Voron 2008a]
- A. Yang, B. Braunschweig, E. Fraga, Z. Guessoum, W. Marquardt, O. Nadjemi, D. Pinõl, P. Roux, S. Sama, M. Serra, I. Stalker : “A Multi-Agent System to Facilitate Component-based Process Modeling and Design”, Computers & Chemical Engineering, vol. 32 (1-2), pp. 2290-2305, (Elsevier) [Yang 2008]
- F. Yin, G. Pujolle : “Performance Optimization for Delay-tolerant and Contention-based Application in IEEE 802.16 Networks”, EURASIP Journal on Wireless Communications and Networking, vol. 2008, pp. 2008:573785, (SpringerOpen) [Yin 2008c]