Current teams : | ALMASTY ALSOC APR BD CIAN ComplexNetworks DECISION DELYS LFI MOCAH MoVe NPA PEQUAN PolSys QI RO SMA SYEL |
- N. Absi, S. Kedad‑Sidhoum : “The multi-item capacitated lot-sizing problem with safety stocks and demand shortage costs”, Computers and Operations Research, vol. 36 (11), pp. 2926-2936, (Elsevier) [Absi 2009]
- S. Achouri, T. Bossart, A. Munier‑Kordon : “A Polynomial algorithm for minDSC on series-parallel graphs”, RAIRO - Operations Research, vol. 43 (2), pp. 145-156, (EDP Sciences) [Achouri 2009]
- N. Aitsaadi, N. Achir, Kh. Boussetta, G. Pujolle : “A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events”, Sensors, vol. 9 (3), pp. 1625-1643, (MDPI) [Aitsaadi 2009a]
- T. Ali‑Yahiya, A.‑L. Beylot, G. Pujolle : “An Adaptive Cross-Layer Design for Multiservice Scheduling in OFDMA Based Mobile WiMAX Systems”, Computer Communications, vol. 32 : Adaptive Multicarrier Communications and Networks (3), pp. 531-539, (Elsevier) [Ali-Yahiya 2009]
- Dh. Anane, S. Aknine, S. Pinson : “Coordination d'ActivitĂ©s dans les ChaĂ®nes Logistiques : une Approche Multi-Agents par Formation de Coalitions”, Revue des Sciences et Technologies de l'Information - SĂ©rie ISI : IngĂ©nierie des Systèmes d'Information, vol. 14 (2), pp. 113-136, (Lavoisier) [Anane 2009]
- É. AndrĂ©, E. Encrenaz, L. Fribourg, Th. Chatain : “An Inverse Method for Parametric Timed Automata”, International Journal of Foundations of Computer Science, vol. 20 (5), pp. 819-836, (World Scientific Publishing) [AndrĂ© 2009]
- E. Angel, E. Bampis, F. Pascual, A.‑A. Tchetgnia : “On truthfulness and approximation for scheduling selfish tasks”, Journal of Scheduling, vol. 12 (5), pp. 437-445, (Springer Verlag) [Angel 2009]
- S. Angelopoulos, B. Doerr, A. Huber, K. Panagiotou : “Tight Bounds for Quasirandom Rumor Spreading”, The Electronic Journal of Combinatorics, vol. 16 (1), pp. r102, (Open Journal Systems) [Angelopoulos 2009b]
- P. Antoniadis, B. Le Grand : “Self-organised virtual communities: bridging the gap between web-based communities and P2P systems”, International Journal of Web Based Communities, vol. 5 (2), pp. 179-194, (Inderscience) [Antoniadis 2009]
- Ah. Ashry, H. Aboushady : “Fast and accurate jitter simulation technique for continuous-time ΣΔ modulators”, Electronics Letters, vol. 45 (24), pp. 1218-1219, (IET) [Ashry 2009a]
- Ah. Ashry, H. Aboushady : “Using excess loop delay to simplify LC-based ΣΔ modulators”, Electronics Letters, vol. 45 (25), pp. 1298-1299, (IET) [Ashry 2009b]
- D. Augot, M. Bardet, J.‑Ch. Faugère : “On the decoding of binary cyclic codes with the Newton's identities”, Journal of Symbolic Computation, vol. 44 (12), Gröbner Bases in Cryptography, Coding Theory, and Algebraic Combinatorics, pp. 1608-1625, (Elsevier) [Augot 2009b]
- Ph. Ayrault, Th. Hardin, F. Pessaux : “Development life cycle of critical software under FoCal”, Electronic Notes in Theoretical Computer Science, vol. 243, pp. 15-31, (Elsevier) [Ayrault 2009a]
- S. Baarir, M. Beccuti, D. Cerotti, M. De Pierro, S. Donatelli, G. Franceschinis : “The GreatSPN Tool: Recent Enhancements”, ACM SIGMETRICS Performance Evaluation Review, vol. 36 (4), pp. 4-9, (Association for Computing Machinery) [Baarir 2009c]
- Ph. Baptiste, Ph. ChrĂ©tienne, J. Meng‑GĂ©rard, F. Sourd : “On maximizing the profit of a satellite launcher: selecting and scheduling tasks with time windows and setups”, Discrete Applied Mathematics, vol. 157 (17), pp. 3656-3664, (Elsevier) [Baptiste 2009]
- R. Bashirov, F. Kordon, H. Lort : “{Exploiting colored Petri nets to decide on permutation admissibility}”, Acta Informatica, vol. 46 (1), pp. 43-55, (Springer Verlag) [Bashirov 2009]
- Ph. Basset, D. Galayko, A. Mahmood Paracha, F. Marty, A. Dudka, T. Bourouina : “A batch-fabricated and electret-free silicon electrostatic vibration energy harvester”, Journal of Micromechanics and Microengineering, vol. 19 (11), pp. 115025, (IOP Publishing) [Basset 2009]
- I. Bedhiaf Limam, O. Cherkaoui, G. Pujolle : “Third-generation virtualized architecture for the MVNO context”, Annals of Telecommunications - annales des tĂ©lĂ©communications, vol. 64 (5-6), pp. 339-347, (Springer) [Bedhiaf Limam 2009]
- J.‑Ch. Billaut, F. Sourd : “Single machine scheduling with forbidden start times”, 4OR: A Quarterly Journal of Operations Research, vol. 7 (1), pp. 37-50, (Springer Verlag) [Billaut 2009]
- F. Bonnefoi, Ch. Choppy, F. Kordon : “A Discretization Method from Coloured to Symmetric Nets: Application to an Industrial Example”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. 5800 (III), Lecture Notes in Computer Science, pp. 159-188, (Springer) [Bonnefoi 2009]
- A. Bordes, L. Bottou, P. Gallinari : “SGD-QN: Careful Quasi-Newton Stochastic Gradient Descent”, Journal of Machine Learning Research, vol. 10, pp. 1737-1754, (Microtome Publishing) [Bordes 2009]
- V. Borrel, F. Legendre, M. Dias De Amorim, S. Fdida : “SIMPS: Using sociology for personnal mobility”, IEEE/ACM Transactions on Networking, vol. 17 (3), pp. 831-842, (IEEE/ACM) [Borrel 2009]
- B. Bouchon‑Meunier, S. Galichet, A. Revault D'Allonnes : “France Chapter Report”, IEEE Computational Intelligence Magazine, vol. 4 (2), pp. 18-21, (Institute of Electrical and Electronics Engineers) [Bouchon-Meunier 2009e]
- H. Boudouda, H. Seridi, M. Nemissi, H. Akdag : “Fuzzy-Possibilistic Classification: Resolution of Initialization Problem”, Journal of Advanced Computational Intelligence and Intelligent Informatics, vol. 13 (1), pp. 45-51, (Fuji Technology Press Ltd.) [Boudouda 2009]
- M. Bouet, G. Pujolle : “L-VIRT: range-free 3-D localization of RFID tags based on topological constraints”, Computer Communications, vol. 32 (13-14), pp. 1485-1494, (Elsevier) [Bouet 2009b]
- F. Boulier, D. Lazard, F. Ollivier, M. Petitot : “Computing representations for radicals of finitely generated differential ideals”, Applicable Algebra in Engineering, Communication and Computing, vol. 20 (1), pp. 73-121, (Springer Verlag) [Boulier 2009]
- G. Bourgne, A. El Fallah‑Seghrouchni, N. Maudet : “Towards refinement of abductive or inductive hypotheses through propagation”, Journal of Applied Logic, vol. 7 (3), pp. 289-306, (Elsevier) [Bourgne 2009b]
- A. Brandwajn, Th. Begin : “Higher-order distributional properties in closed queueing networks”, Performance Evaluation, vol. 66 (11), pp. 607-620, (Elsevier) [Brandwajn 2009b]
- P. BrĂ©zillon, J. BrĂ©zillon, J.‑Ch. Pomerol : “Context-Based Methodology for Decision Making: Application to Car Driving”, International Journal of Decision Support System Technology, vol. 1 (3), pp. 1-20, (IGI Global) [BrĂ©zillon 2009a]
- P. BrĂ©zillon, L. Leger‑Chorki, Ch. Tijus : “Modeling users' search through contextual graphs.”, Revue des Sciences et Technologies de l'Information - SĂ©rie RIA : Revue d'Intelligence Artificielle, vol. 23 (4), pp. 467-484, (Lavoisier) [BrĂ©zillon 2009b]
- E. BUYUKKAYA, M. ABDALLAH : “Efficient Triangulation for P2P Networked Virtual Environments”, Multimedia Tools and Applications, vol. 45 (1-3), Special Issue on Massively Multiplayer Online Games (MTAP-MMO), pp. 291-312, (Springer Verlag) [BUYUKKAYA 2009a]
- R. Cavagna, J. Royan, P. Gioia, Ch. Bouville, M. ABDALLAH, E. BUYUKKAYA : “Peer-to-peer visualization of very large 3D landscape and city models using MPEG-4”, Signal Processing: Image Communication, vol. 24 (1-2), Signal Processing: Image Communication, pp. 115-121, (Elsevier) [Cavagna 2009]
- Y. Charif, N. Sabouret : “Un protocole de coordination d'agents introspectifs pour la chorĂ©graphie dynamique de services”, Revue des Sciences et Technologies de l'Information - SĂ©rie RIA : Revue d'Intelligence Artificielle, vol. 23 (1), pp. 47-79, (Lavoisier) [Charif 2009]
- O. Cherkaoui, Masum Z. Hasan, G. Pujolle : “Editorial: Network virtualization: the path to future Internet”, Annals of Telecommunications - annales des tĂ©lĂ©communications, vol. 64 (5-6), pp. 269-270, (Springer) [Cherkaoui 2009]
- R. Chevallier, E. Encrenaz, L. Fribourg, W. Xu : “Timed Verification of the Generic Architecture of a Memory Circuit Using Parametric Timed Automata”, Formal Methods in System Design, vol. 34 (1), pp. 59-81, (Springer Verlag) [Chevallier 2009]
- Th. Claveirole, M. Dias De Amorim : “WiPal: Efficient Offline Merging of IEEE 802.11 Traces”, ACM SIGMOBILE Mobile Computing and Communications Review, vol. 13 (4), pp. 39-46, (Association for Computing Machinery (ACM)) [Claveirole 2009b]
- P. Danturi, S. Tixeuil : “Self-stabilizing Philosophers with Generic Conflicts”, ACM Transactions on Autonomous and Adaptive Systems, vol. 4 (1), pp. 7, (Association for Computing Machinery (ACM)) [Danturi 2009]
- Th. Degris, O. Sigaud, P.‑H. Wuillemin : “Apprentissage par renforcement factorisĂ© pour le comportement de personnages non joueurs”, Revue des Sciences et Technologies de l'Information - SĂ©rie RIA : Revue d'Intelligence Artificielle, vol. 23 (2-3), pp. 221-251, (Lavoisier) [Degris 2009]
- J. Delange, L. Pautet, A. Plantec, M. Kerboeuf, F. Singhoff, F. Kordon : “Validate, Simulate and Implement ARINC653 Systems using the AADL”, ACM SIGAda Ada Letters, vol. 29 (3), pp. 31-44 [Delange 2009]
- G. Demartin, L. Denoyer, A. Douce, Kh. Fachry, P. Gallinari, Sh. Gev, W.‑Ch. Huang, T. Iofciu, J. Kamps, G. Kazai, M. Koolen, M. Landoni, R. Nordlie, N. Pharo, R. Schenkel, M. Theobald, A. Trotman, Arjen P. De Vries, A. Woodley, J. Zhu : “Report on INEX 2008”, Sigir Forum, vol. 43 (1), pp. 17-36, (Association for Computing Machinery (ACM)) [Demartin 2009]
- A. Denoyer, L. Denoyer, J. Halfon, S. Majzoub, P.‑J. Pisella : “A Comparative Study of Aspheric IOLs with Either Negative or No Spherical Aberrations”, Journal of Cataract and Refractive Surgery, vol. 35 (3), pp. 496-503, (Elsevier) [Denoyer 2009]
- F. Didi, H. Labiod, G. Pujolle, M. Feham : “Mobility and QoS of 802.11 and 802.11e wireless LAN standards”, The international Arab journal of information technology, vol. 6 (4), pp. 403-411, (Colleges of Computing and Information Society (CCIS)) [Didi 2009]
- L.‑S. Didier, P.‑Y. Rivaille : “A generalization of a Fast RNS conversion for a new 4-modulus base”, IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 56 (1), pp. 46-50, (Institute of Electrical and Electronics Engineers) [Didier 2009]
- T. Do, Th. Artières : “Learning mixture models with support vector machines for sequence classification and segmentation”, Pattern Recognition, vol. 42 (12), pp. 3224-3230, (Elsevier) [Do 2009b]
- S. Dubuisson, J. Fabrizio : “Optimal recursive clustering of likelihood functions for multiple object tracking”, Pattern Recognition Letters, vol. 30 (6), pp. 606-614, (Elsevier) [Dubuisson 2009]
- E. Encrenaz, A. Finkel : “Automatic Verification of Counter Systems With Ranking Function”, Electronic Notes in Theoretical Computer Science, vol. 239, pp. 85-103, (Elsevier) [Encrenaz 2009]
- H. Everett, D. Lazard, S. Lazard, M. Safey El Din : “The Voronoi diagram of three lines”, Discrete and Computational Geometry, vol. 42 (1), pp. 94-130, (Springer Verlag) [Everett 2009b]
- J.‑Ch. Faugère, L. Perret : “An efficient algorithm for decomposing multivariate polynomials and its applications to cryptography”, Journal of Symbolic Computation, vol. 44 (12), pp. 1676-1689, (Elsevier) [Faugère 2009f]
- S. Feruglio, F. Andrieu, F. Olivier, G. Ghibaudo : “Low-Temperature Electrical Characterization of Fully Depleted eXtra-strained SOI n-MOSFETs with TiN/HfO2 Gate Stack for the 32-nm Technology Node”, Cryogenics, vol. 49 (11), pp. 605-610, (Elsevier) [Feruglio 2009]
- P. Fouilhoux, M. LabbĂ©, A. Ridha Mahjoub, H. Yaman : “Generating Facets for the Independence System Polytope”, SIAM Journal on Discrete Mathematics, vol. 23 (3), pp. 1484-1506, (Society for Industrial and Applied Mathematics) [Fouilhoux 2009]
- V. Freiderikos, D. GaĂŻti, R. Insler, P. JaffrĂ©, A. Kortebi, S. Meyer, L. Molinier, G. Pujolle, H. Zimmermann : “Piloting Home Network with Intelligent Agents”, IEEE Vehicular Technology Magazine, vol. 4 (1), pp. 49-56, (Institute of Electrical and Electronics Engineers, Inc.) [Freiderikos 2009]
- J.‑G. Ganascia : “ExpĂ©rimentations in silico”, Les Nouvelles d'Archimède : la revue culturelle de l'UniversitĂ© de Lille 1 n°51, pp. 18-19, (UniversitĂ© de Lille - Sciences et Technologies) [Ganascia 2009b]
- N. Gharbi, C. Dutheillet, M. Ioualalen : “Colored stochastic Petri nets for modelling and analysis of mulitclass retrial systems”, Mathematical and Computer Modelling, vol. 49 (7-8), pp. 1436-1448, (Elsevier) [Gharbi 2009]
- C. Gicquel, M. Minoux, Y. Dallery : “On the Discrete Lot-Sizing and Scheduling Problem with Sequence-Dependent Changeover Time”, Operations Research Letters, vol. 37 (1), pp. 32-36, (Elsevier) [Gicquel 2009a]
- C. Gicquel, N. Miègeville, M. Minoux, Y. Dallery : “Discrete Lot Sizing and Scheduling using Product Decomposition into Attributes”, Computers and Operations Research, vol. 36 (9), pp. 2690-2698, (Elsevier) [Gicquel 2009c]
- M. Gonçalves Rubinstein, F. Ben Abdesslem, M. Dias De Amorim, S. Rodrigues Cavalcanti, R. Alves Dos Santos, L. Maciel Kosmalski Costa, O. Muniz Bandeira Duarte, Miguel Elias M. Campista : “Measuring the capacity of in-car to in-car vehicular networks”, IEEE Communications Magazine, vol. 47 (11), pp. 128-136, (Institute of Electrical and Electronics Engineers) [Gonçalves Rubinstein 2009]
- S. Graillat : “Accurate Floating Point Product and Exponentiation”, IEEE Transactions on Computers, vol. 58 (7), pp. 994-1000, (Institute of Electrical and Electronics Engineers) [Graillat 2009a]
- S. Graillat, Ph. Langlois, N. Louvet : “Algorithms for Accurate, Validated and Fast Polynomial Evaluation”, Japan Journal of Industrial and Applied Mathematics, vol. 26 (2-3), pp. 191-214, (Kinokuniya Company) [Graillat 2009b]
- C. Gueguen, S. Baey : “A Fair Opportunistic Access Scheme for Multiuser OFDM Wireless Networks”, EURASIP Journal on Wireless Communications and Networking, vol. 2009 (726495), pp. 14 pages, (SpringerOpen) [Gueguen 2009b]
- A. Guerra‑Hernández, J. Castro‑Manzano, A. El Fallah‑Seghrouchni : “CTL AgentSpeak(L): a Specification Language for Agent Programs”, Journal of Algorithms in Cognition, Informatics and Logic, vol. 64 (1), pp. 31-40, (Elsevier) [Guerra-Hernández 2009]
- L. Habib, M. Jaume, Ch. Morisset : “Formal definition and comparison of access control models”, Journal of information assurance and security (JIAS), vol. 4 (4), pp. 372-381 [Habib 2009]
- Kh. HACHICHA, D. Faura, O. Romain, P. Garda : “Accelerating the multiple reference frames compensation in the H.264 video coder”, Journal of Real-Time Image Processing, vol. 4 (1), pp. 55-65, (Springer Verlag) [HACHICHA 2009]
- A. Hamez, Y. Thierry‑Mieg, F. Kordon : “Building Efficient Model Checkers using Hierarchical Set Decision Diagrams and Automatic Saturation”, Fundamenta Informaticae, vol. 94 (3-4), pp. 413-437, (Polskie Towarzystwo Matematyczne) [Hamez 2009]
- C. Hanen, A. Munier‑Kordon : “Periodic Schedules for Linear Precedence Constraints”, Discrete Applied Mathematics, vol. 157 (2), pp. 280-291, (Elsevier) [Hanen 2009b]
- C. Hanen, Y. Zinder : “The worst-case analysis of the Garey-Johnson Algorithm”, Journal of Scheduling, vol. 12 (4), pp. 389-400, (Springer Verlag) [Hanen 2009c]
- A. Hashemi : “Nullstellensätze for Zero–Dimensional Gröbner Bases”, Computational Complexity, vol. 18 (1), pp. 155-168, (Springer Verlag) [Hashemi 2009]
- Y. Hendel, N. Runge, F. Sourd : “The one-machine just-in-time scheduling problem with preemption”, Discrete Optimization, vol. 6 (1), pp. 10-22, (Elsevier) [Hendel 2009]
- Th. Hilaire : “On the Transfer Function Error of State-Space Filters in Fixed-Point Context”, IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 56 (12), pp. 936-940, (Institute of Electrical and Electronics Engineers) [Hilaire 2009]
- L. Hillah, E. Kindler, F. Kordon, L. Petrucci, N. Trèves : “A primer on the Petri Net Markup Language and ISO/IEC 15909-2”, Petri Net Newsletter, vol. 76, pp. 9-28 [Hillah 2009]
- E. Jamhour, M. De Oliveira Penna Neto, R. Nabhen, G. Pujolle : “Modeling a multi-queue network node with a fuzzy predictor”, Fuzzy Sets and Systems, vol. 160 (13), pp. 1902-1928, (Elsevier) [Jamhour 2009]
- H. Khalife, N. Malouch, S. Fdida : “Multihop Cognitive Radio Networks: to Route or not to Route”, IEEE Network, vol. 23 (4), pp. 20-25, (Institute of Electrical and Electronics Engineers) [Khalife 2009]
- M. Kida, G. Renault, K. Yokoyama : “QUINTIC POLYNOMIALS OF HASHIMOTO–TSUNOGAI, BRUMER AND KUMMER”, International Journal of Number Theory, vol. 05 (4), pp. 555-571, (World Scientific Publishing) [Kida 2009]
- A. Kolar, A. Pinna, O. Romain, S. Viateur, Th. Ea, E. Belhaire, T. Graba, B. Granado : “A Multishutter Time Sensor for Multispectral Imaging in a 3D reconstruction integrated sensor”, IEEE Sensors Journal, vol. 9, pp. 478-484, (ISBN: 1530-437X) [Kolar 2009a]
- A. Kolar, O. Romain, J. Ayoub, D. Faura, S. Viateur, T. Graba, B. Granado : “A system for an accurate 3D reconstruction in video endoscopy capsule”, EURASIP Journal on Embedded Systems, vol. 2009, Hindawi (Ed.), pp. 716317, (ISBN: 1687-3955) [Kolar 2009c]
- L. Lacassagne, A. Manzanera, J. Denoulet, A. MĂ©rigot : “High performance motion detection: some trends toward new embedded architectures for vision systems”, Journal of Real-Time Image Processing, vol. 4 (2), pp. 127-146, (Springer Verlag) [Lacassagne 2009]
- R. Langar, N. Bouabdallah, R. Boutaba : “Mobility-Aware Clustering Algorithms with Interference Constraints in Wireless Mesh Networks”, Computer Networks, vol. 53 (1), pp. 25-44, (Elsevier) [Langar 2009a]
- R. Langar, N. Bouabdallah, R. Boutaba, B. Sericola : “Proposal and Analysis of Adaptive Mobility Management in IP-Based Mobile Networks”, IEEE Transactions on Wireless Communications, vol. 8 (7), pp. 3608-3619, (Institute of Electrical and Electronics Engineers) [Langar 2009b]
- M. Latapy, Th. Phan : “The lattice of integer partitions and its infinite extension”, Discrete Mathematics, vol. 309 (6), pp. 1357-1367, (Elsevier) [Latapy 2009]
- D. Lazard : “Thirty years of Polynomial System Solving, and now?”, Journal of Symbolic Computation, vol. 44 (3), pp. 222-231, (Elsevier) [Lazard 2009c]
- D. Lazard, S. McCallum : “Iterated Discriminants”, Journal of Symbolic Computation, vol. 44 (9), pp. 1176-1193, (Elsevier) [Lazard 2009d]
- A. Lifchitz, S. Jhean‑Larose, G. Denhière : “Effect of Tuned Parameters on a LSA Multiple Choice Questions Answering Model”, Behavior Research Methods, vol. 41 (4), pp. 1201-1209, (Psychonomic Society, Inc) [Lifchitz 2009]
- Ch. Madeira, V. Corruble : “STRADA : une approche adaptative pour les jeux de stratĂ©gie modernes”, Revue des Sciences et Technologies de l'Information - SĂ©rie RIA : Revue d'Intelligence Artificielle, vol. 23 (2), pp. 293-326, (Lavoisier) [Madeira 2009]
- F. Maes, L. Denoyer, P. Gallinari : “Structured Prediction with Reinforcement Learning”, Machine Learning, vol. 77 (2-3), pp. 271-301, (Springer Verlag) [Maes 2009a]
- C. Magnien, M. Latapy, M. Habib : “Fast Computation of Empirically Tight Bounds for the Diameter of Massive Graphs”, ACM Journal of Experimental Algorithmics, vol. 13, pp. 10, (Association for Computing Machinery) [Magnien 2009b]
- F. Manne, M. Mjelde, L. Pilard, S. Tixeuil : “A New Self-Stabilizing Maximal Matching Algorithm”, Theoretical Computer Science, vol. 410 (14), pp. 1336-1345, (Elsevier) [Manne 2009]
- O. Marchetti, A. Munier‑Kordon : “A sufficient condition for the liveness of weighted event graphs”, European Journal of Operational Research, vol. 197 (2), pp. 532-540, (Elsevier) [Marchetti 2009a]
- Z. Marrakchi, H. Mrabet, H. Mehrez : “FPGA Interconnect Topologies Exploration”, International Journal of Reconfigurable Computing, vol. 2009, pp. 259837, (Hindawi Publishing Corporation) [Marrakchi 2009a]
- M. Marzouki : “« Non Ă Edvige » : sursaut ou prise de conscience ?”, Plein Droit, vol. 1 (80), Sans papiers, mais pas sans voix, pp. 21-25, (GISTI) [Marzouki 2009e]
- T. Masuzawa, S. Tixeuil : “On Bootstrapping Topology Knowledge in Anonymous Networks”, ACM Transactions on Autonomous and Adaptive Systems, vol. 4 (1), pp. 8, (Association for Computing Machinery (ACM)) [Masuzawa 2009a]
- S. Mazouzi, Z. Guessoum, F. Michel : “Une approche multi-agent pour la segmentation d'images de profondeur Ă base d'objets polyĂ©driques. Une nouvelle approche de segmentation d'images”, Revue des Sciences et Technologies de l'Information - SĂ©rie TSI : Technique et Science Informatiques, vol. 28 (3), pp. 365-393, (Lavoisier) [Mazouzi 2009b]
- M. Minoux : “On Robust Maximum Flow with Polyhedral Uncertainty Sets”, Optimization Letters, vol. 3 (3), pp. 367-376, (Springer Verlag) [Minoux 2009a]
- M. Minoux : “Solving some Multistage Robust Decision Problems with Huge Implicitly defined Scenario Trees”, Algorithmic Operations Research, vol. 4 (1), pp. 1-18, (Preeminent Academic Facets) [Minoux 2009c]
- M. Nesterenko, S. Tixeuil : “Discovering Network Topology in the Presence of Byzantine Nodes”, IEEE Transactions on Parallel and Distributed Systems, vol. 20 (12), pp. 1777-1789, (Institute of Electrical and Electronics Engineers) [Nesterenko 2009a]
- H. Nguyen, S. Graillat, J.‑L. Lamotte : “Extended precision with a rounding mode toward zero environment. Application on the CELL processor”, International Journal of Reliability and Safety, vol. 3 (1-3), pp. 153-173, (Inderscience) [Nguyen 2009b]
- M. Nogueira Lima, A. Dos Santos, G. Pujolle : “A Survey of Survivability in Mobile Ad Hoc Networks”, Communications Surveys and Tutorials, IEEE Communications Society, vol. 11 (1), pp. 66-77, (Institute of Electrical and Electronics Engineers) [Nogueira Lima 2009]
- M. Ochs, N. Sabouret, V. Corruble : “Simulation de la dynamique des Ă©motions et des relations sociales de personnages virtuels”, Revue des Sciences et Technologies de l'Information - SĂ©rie RIA : Revue d'Intelligence Artificielle, vol. 23 (2-3), pp. 327-357, (Lavoisier) [Ochs 2009c]
- M. Ochs, N. Sabouret, V. Corruble : “Simulation of the Dynamics of Non-Player Characters' Emotions and Social Relations in Games”, IEEE Transactions on Computational Intelligence and AI in games, vol. 1 (4), pp. 281-297, (IEEE Computational Intelligence Society) [Ochs 2009d]
- F. Pascual, K. Rzadca, D. Trystram : “Cooperation in Multi-Organization Scheduling”, Concurrency and Computation: Practice and Experience, vol. 21 (7), pp. 905-921, (Wiley) [Pascual 2009]
- P. PastrĂ©, P. Parage, J.‑F. Richard, E. Sander, J.‑M. Labat, M. Futtersack : “La rĂ©solution de problèmes professionnels sur simulateur”, ActivitĂ©s, vol. 6 (1), pp. 3-28, (Association Recherches et Pratiques sur les ACTivitĂ©s) [PastrĂ© 2009]
- A. Revault D'Allonnes, H. Akdag, B. Bouchon‑Meunier : “For a Data-Driven Interpretation of Rules wrt GMP Conclusions in Abductive Problems”, Journal of Uncertain Systems, vol. 3 (4), pp. 280-297, (World Academic Press) [Revault D'Allonnes 2009a]
- J.‑F. Richard, P. PastrĂ©, P. Parage, E. Sander, M. Futtersack, J.‑M. Labat : “Analyse des stratĂ©gies de correction de dĂ©fauts en plasturgie Ă l’aide d’un modèle de rĂ©solution de problème Ă base de contraintes”, Le travail humain, vol. 72 (3), pp. 267-292, (Presses Universitaires de France) [Richard 2009]
- E. Rosas, X. Bonnaire : “WTR: a reputation metric for distributed hash tables based on a risk and credibility factor”, Journal of Computer Science and Technology, vol. 24 (5), (Springer Verlag) [Rosas 2009b]
- N. Runge, F. Sourd : “A new model for the preemptive earliness - tardiness scheduling problem”, Computers and Operations Research, vol. 36 (7), pp. 2242-2249, (Elsevier) [Runge 2009]
- G. Saharidis, M. Minoux, Y. Dallery : “Scheduling of Loading and Unloading of Crude Oil in a Refinery Using Event-Based Discrete-Time Formulation”, Computers & Chemical Engineering, vol. 33 (8), pp. 1413-1426, (Elsevier) [Saharidis 2009]
- C. Sakuraba, D. Ronconi, F. Sourd : “Scheduling in a two-machine flowshop for the minimization of the mean absolute deviation from a common due date”, Computers and Operations Research, vol. 36 (1), pp. 60-72, (Elsevier) [Sakuraba 2009]
- R. Sicard, Th. Artières : “Modelling sequences using pairwise relational features”, Pattern Recognition, vol. 42 (9), pp. 1922-1931, (Elsevier) [Sicard 2009]
- Th. Silverston, O. Fourmaux, A. Botta, A. Dainotti, A. PescapĂ©, G. Ventre, K. Salamatian : “Traffic Analysis of Peer-to-Peer IPTV Communities”, Computer Networks, vol. 53 (4), pp. 470-484, (Elsevier) [Silverston 2009a]
- J. Sopena, L. Arantes, F. Legond‑Aubry, P. Sens : “Building Effective Mutual Exclusion Services for Grids”, Journal of Supercomputing, vol. 49 (1), pp. 84-107, (Springer Verlag) [Sopena 2009a]
- J. Sopena, S. Baarir, F. Legond‑Aubry : “VĂ©rification formelle d'un algorithme gĂ©nĂ©rique et hiĂ©rarchique d'exclusion mutuelle”, Revue des Sciences et Technologies de l'Information - SĂ©rie TSI : Technique et Science Informatiques, vol. 28 (9), pp. 1085-1105, (Lavoisier) [Sopena 2009c]
- F. Sourd : “New Exact Algorithms for One-Machine Earliness-Tardiness Scheduling”, INFORMS Journal on Computing, vol. 21 (1), pp. 167-175, (Institute for Operations Research and the Management Sciences (INFORMS)) [Sourd 2009]
- I. Truck, H. Akdag : “A Tool for Aggregation with Words”, Information Sciences, vol. 179 (14), pp. 2317-2324, (Elsevier) [Truck 2009]
- G. Valadon, C. Magnien, R. Wakikawa : “Mobile IPv6 Deployments: Graph-based Analysis and practical Guidelines”, Computer Communications, vol. 32 (17), pp. 1871-1880, (Elsevier) [Valadon 2009]
- F. Yin, G. Pujolle, J. Park, H.‑Ch. Chao : “Performance Optimization with Efficient Polling Mechanism in IEEE 802.16 Networks”, Wireless Personal Communications, vol. 51 (3), pp. 635-665, (Springer Verlag) [Yin 2009b]