Current teams : | ALMASTY ALSOC APR BD CIAN ComplexNetworks DECISION DELYS LFI MOCAH MoVe NPA PEQUAN PolSys QI RO SMA SYEL |
- A. Abdel‑Razzac, S. Elayoubi, T. Chahed, B. El Hassan : “Dimensioning and Profit Sharing in Hybrid LTE/DVB Systems to Offer Mobile TV Services”, IEEE Transactions on Wireless Communications, vol. 12 (12), pp. 6314-6327, (Institute of Electrical and Electronics Engineers) [Abdel-Razzac 2013b]
- N. Absi, S. Dauzère‑Pérès, S. Kedad‑Sidhoum, B. Penz, Ch. Rapine : “Lot sizing with carbon emission constraints”, European Journal of Operational Research, vol. 227 (1), pp. 55-61, (Elsevier) [Absi 2013b]
- M. Alassir, J. Denoulet, O. Romain, P. Garda : “Signal Integrity-Aware Virtual Prototyping of Field Bus-Based Embedded Systems”, IEEE Transactions on Components, Packaging and Manufacturing Technology, vol. 3 (12), pp. 2081-2091, (Institute of Electrical and Electronics Engineers) [Alassir 2013]
- A. Albano, B. Le Grand, M. Latapy : “Visualisation de grands réseaux dynamiques: Application à la détection d'anomalies de routage dans l'Internet.”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 26 (4), pp. 409-427, (Lavoisier) [Albano 2013a]
- O. Allali, C. Magnien, M. Latapy : “Internal links prediction: a new approach for predicting links in bipartite graphs”, Intelligent Data Analysis, vol. 7 (1), pp. 5-25, (IOS Press) [Allali 2013a]
- O. Allali, L. Tabourier, C. Magnien, M. Latapy : “Internal links and pairs as a new tool for the analysis of bipartite complex networks”, Social Network Analysis and Mining, vol. 3 (1), pp. 85-91, (Springer) [Allali 2013b]
- R. Alt, J.‑L. Lamotte : “Stochastic Arithmetic as a Tool to Study the Stability of Biological Models”, BIOMATH, vol. 2 (2), pp. 1-7, (Biomath Forum) [Alt 2013a]
- Ah. Amokrane, M. ZHANI, R. Langar, R. Boutaba, G. Pujolle : “Greenhead: Virtual Data Center Embedding across Distributed Infrastructures”, IEEE Transactions on Cloud Computing, vol. 1 (1), pp. 36-49, (IEEE) [Amokrane 2013a]
- E. Amouri, H. Mehrez, Z. Marrakchi : “Impact of Dual Placement and Routing on WDDL Netlist Security in FPGA”, International Journal of Reconfigurable Computing, vol. 2013 (802436), pp. 24, (Hindawi Publishing Corporation) [Amouri 2013b]
- S. Angelopoulos, P. Schweitzer : “Paging and list update under bijective analysis”, Journal of the ACM (JACM), vol. 60 (2), pp. 7, (Association for Computing Machinery) [Angelopoulos 2013]
- P. Antoniadis, S. Fdida, Ch. Griffin, Y. Jin, G. Kesidis : “Distributed medium access control with conditionally altruistic users”, EURASIP Journal on Wireless Communications and Networking, vol. 2013, pp. 202, (SpringerOpen) [Antoniadis 2013]
- S. Avila, N. Thome, M. Cord, E. Valle, A. De Albuquerque Araújo : “Pooling in Image Representation: the Visual Codeword Point of View”, Computer Vision and Image Understanding, vol. 117 (5), pp. 453-465, (Elsevier) [Avila 2013b]
- M. Ayala, A. Benabid, Ch. Artigues, C. Hanen : “The resource-constrained modulo scheduling problem: an experimental study”, Computational Optimization and Applications, vol. 54 (3), pp. 645-673, (Springer Verlag) [Ayala 2013]
- J.‑C. Bajard, S. Duquesne, M. Ercegovac : “Combining leak–resistant arithmetic for elliptic curves defined over Fp and RNS representation”, Publications Mathématiques de Besançon. Algèbre et Théorie des Nombres, pp. 67-87, (Publications mathématiques de Besançon) [Bajard 2013b]
- E. Bampis, D. Letsios, G. Lucarelli, E. Markakis, I. Milis : “On multiprocessor temperature-aware scheduling problems”, Journal of Scheduling, vol. 16 (5), pp. 529-538, (Springer Verlag) [Bampis 2013c]
- N. Barcelo, Daniel G. Cole, D. Letsios, M. Nugent, Kirk R. Pruhs : “Optimal energy trade-off schedules”, Sustainable Computing : Informatics and Systems, vol. 3 (3), pp. 207-217, (Elsevier) [Barcelo 2013]
- M. Bardet, J.‑Ch. Faugère, B. Salvy, P.‑J. Spaenlehauer : “On the Complexity of Solving Quadratic Boolean Systems”, Journal of Complexity, vol. 29 (1), pp. 53-75, (Elsevier) [Bardet 2013]
- C. Baudrit, P.‑H. Wuillemin, N. Perrot : “Parameter elicitation in probabilistic graphical models for modelling multi-scale food complex systems”, Journal of Food Engineering, vol. 115 (1), pp. 1-10, (Elsevier) [Baudrit 2013]
- C. Bazgan, L. Gourvès, J. Monnot, F. Pascual : “Single approximation for Biobjective Max TSP”, Theoretical Computer Science, vol. 478, pp. 41-50, (Elsevier) [Bazgan 2013]
- N. Belala, D. Saidouni, R. Boukharrou, Ah. Chaouche, A. Seraoui, A. Chachoua : “Time Petri Nets with Action Duration: A True Concurrency Real-Time Model”, International Journal of Embedded and Real-Time Communication Systems, vol. 4 (2), pp. 62-83, (IGI Global) [Belala 2013]
- S. Belloeil, R. Chotin‑Avot, H. Mehrez : “Exploring redundant arithmetics in computer-aided design of arithmetic datapaths”, Integration, the VLSI Journal, vol. 46 (2), pp. 104-118, (Elsevier) [Belloeil 2013]
- A. Ben Dhia, S. N. Pagliarini, L. Naviner, H. Mehrez, Ph. Matherat : “A defect-tolerant area-efficient multiplexer for basic blocks in SRAM-based FPGAs”, Microelectronics Reliability, vol. 53 (9-11), pp. 1189-1193, (Elsevier) [Ben Dhia 2013a]
- Y. Ben Maïssa, F. Kordon, S. Mouline, Y. Thierry‑Mieg : “Modeling and Analyzing Wireless Sensor Networks with VeriSensor: an Integrated Workflow”, LNCS Transactions on Petri Nets and Other Models of Concurrency, vol. VIII, pp. 24-47, (Springer) [Ben Maïssa 2013]
- B. Bérard, F. Cassez, S. Haddad, D. Lime, O. Roux : “The Expressive Power of Time Petri Nets”, Theoretical Computer Science, vol. 474, pp. 1-20, (Elsevier) [Bérard 2013b]
- D. Bernardes, M. Latapy, F. Tarissan : “Inadequacy of SIR Model to Reproduce Key Properties of Real-world Spreading Phenomena: Experiments on a Large-scale P2P System”, Social Network Analysis and Mining, vol. 3 (4), pp. 1195-1208, (Springer) [Bernardes 2013]
- J. Berthomieu, G. Lecerf, G. Quintin : “Polynomial root finding over local rings and application to error correcting codes”, Applicable Algebra in Engineering, Communication and Computing, vol. 24 (6), pp. 413-443, (Springer Verlag) [Berthomieu 2013b]
- L. Bettale, J.‑Ch. Faugère, L. Perret : “Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic”, Designs, Codes and Cryptography, vol. 69 (1), pp. 1-52, (Springer Verlag) [Bettale 2013]
- M. Bienkowski, M. Chrobak, Ch. Dürr, M. Hurand, A. Jeż, Ł. Jeż, G. Stachowiak : “A $\Phi$-Competitive Algorithm for Collecting Items with Increasing Weights from a Dynamic Queue”, Theoretical Computer Science, vol. 475, pp. 92-102, (Elsevier) [Bienkowski 2013a]
- M. Bienkowski, M. Chrobak, Ch. Dürr, M. Hurand, A. Jeż, Ł. Jeż, G. Stachowiak : “Collecting Weighted Items from a Dynamic Queue”, Algorithmica, vol. 65 (1), pp. 60-94, (Springer Verlag) [Bienkowski 2013b]
- Tegawendé F. Bissyandé, L. Réveillère, J. Lawall, Y.‑D. Bromberg, G. Muller : “Implementing an Embedded Compiler using Program Transformation Rules”, Software: Practice and Experience, pp. 1..20, (Wiley) [Bissyandé 2013]
- L. Blin, M. Potop‑Butucaru, S. Rovedakis : “A super-stabilizing log(n)-approximation algorithm for dynamic Steiner trees”, Theoretical Computer Science, vol. 500, pp. 90-112, (Elsevier) [Blin 2013b]
- E. Blokhina, D. Galayko, Ph. Basset, O. Feely : “Steady-State Oscillations in Resonant Electrostatic Vibration Energy Harvesters”, IEEE Transactions on Circuits and Systems Part 1 Fundamental Theory and Applications, vol. 60 (4), pp. 875-884, (Institute of Electrical and Electronics Engineers (IEEE)) [Blokhina 2013b]
- J. Bonan, Ch. Hagleitner, H. Aboushady, M.‑M. Louërat : “Compact and Low power ADCs for a MEMs-based Probe Storage Device”, Analog Integrated Circuits and Signal Processing, vol. 76 (1), pp. 23-34, (Springer Verlag) [Bonan 2013]
- F. Bouchet, J.‑P. Sansonnet : “Agents Conversationnels Psychologiques : Modélisation des réactions rationnelles et comportementales des agents assistants conversationnels”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 27 (6), pp. 679-708, (Lavoisier) [Bouchet 2013a]
- B. Bouchon‑Meunier : “Fuzzy logic in France”, Mathware & soft computing, vol. 20 (2), pp. 10-13, (RACO) [Bouchon-Meunier 2013a]
- B. Bouchon‑Meunier, M.‑J. Lesot, Ch. Marsala : “Modeling and management of subjective information in a fuzzy setting”, International Journal of General Systems, vol. 42 (1), pp. 3-19, (Taylor & Francis) [Bouchon-Meunier 2013c]
- J.‑P. Briot : “Le soutien à l'interdisciplinarité au Brésil - Les spécificités et l'impact du système d'évaluation des programmes de post-graduation”, Hermès, La Revue - Cognition, communication, politique n°67, pp. 136-137, (CNRS-Editions) [Briot 2013]
- B.‑M. Bui‑Xuan, J. Telle, M. Vatshelle : “Fast dynamic programming for locally checkable vertex subset and vertex partitioning problems”, Theoretical Computer Science, vol. 511, pp. 66-76, (Elsevier) [Bui-Xuan 2013a]
- B.‑M. Bui‑Xuan, O. Suchy, J. Telle, M. Vatshelle : “Feedback vertex set on graphs of low cliquewidth”, European Journal of Combinatorics, vol. 34 (3), pp. 666-679, (Elsevier) [Bui-Xuan 2013b]
- C. Calauzènes, N. Usunier, P. Gallinari : “Calibration and regret bounds for order-preserving surrogate losses in learning to rank”, Machine Learning, vol. 93 (2-3), pp. 227-260, (Springer Verlag) [Calauzènes 2013]
- S. Campano, E. De Sevin, V. Corruble, N. Sabouret : “Une approche pour la simulation de comportements émotionnels fondée sur la théorie de la conservation des ressources.”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 32 (1), pp. 113-138, (Lavoisier) [Campano 2013a]
- A. Carneiro Viana, M. Dias De Amorim : “Coverage Strategy for Periodic Readings in Robotic-Assisted Monitoring Systems”, Ad Hoc Networks, vol. 11 (7), pp. 1907-1918, (Elsevier) [Carneiro Viana 2013]
- X. Chen, D. Wang : “Formalization and Specification of Geometric Knowledge Objects”, Mathematics in Computer Science, vol. 7 (4), Special Focus on Mathematics, Data and Knowledge, pp. 439-454, (Springer) [Chen 2013a]
- X. Chen, D. Wang, X. Zhang : “Foreword to the Special Focus on Mathematics, Data and Knowledge”, Mathematics in Computer Science, vol. 7 (4), Special Focus on Mathematics, Data and Knowledge, pp. 379-386, (Springer) [Chen 2013b]
- Ch. Collet, B. Amann, N. Bidoit, M. Boughanem, M. Bouzeghoub, A. Doucet, D. Gross‑Amblard, J.‑M. Petit, M.‑S. Hacid, G. Vargas‑Solar : “De la gestion de bases de données à la gestion de grands espaces de données”, Revue des Sciences et Technologies de l'Information - Série ISI : Ingénierie des Systèmes d'Information, vol. 18 (4), pp. 11-31, (Lavoisier) [Collet 2013]
- D. Cornaz, V. Nguyen : “Kőnig’s edge-colouring theorem for all graphs”, Operations Research Letters, vol. 41 (6), pp. 592-596, (Elsevier) [Cornaz 2013b]
- A. Cournier, S. Dubois, A. Lamani, F. Petit, V. Villain : “The Snap-stabilizing message forwarding algorithm on tree topologies”, Theoretical Computer Science, vol. 496, pp. 89-112, (Elsevier) [Cournier 2013b]
- J.‑M. Couvreur, D. Poitrenaud, P. Weil : “Branching processes of general Petri nets”, Fundamenta Informaticae, vol. 122 (1-2), pp. 31-58, (IOS Press) [Couvreur 2013]
- M. Danisch, J.‑L. GUILLAUME, B. Le Grand : “Towards multi-ego-centered communities: a node similarity approach”, International Journal of Web Based Communities, vol. 9 (3), pp. 299-322, (Inderscience) [Danisch 2013b]
- F. De Dinechin, Ch. Lauter, J.‑M. Muller, S. Torres : “On Ziv's rounding test”, ACM Transactions on Mathematical Software, vol. 39 (4), pp. 26, (Association for Computing Machinery) [De Dinechin 2013]
- S. Deleplanque, S. Kedad‑Sidhoum, A. Quilliot : “Lagrangean Heuristic for a Multi-Plant Lot-Sizing Problem with Transfer and Storage Capacities”, RAIRO - Operations Research, vol. 47 (04), pp. 429-443, (EDP Sciences) [Deleplanque 2013]
- Ch. Delort, O. Spanjaard : “A hybrid dynamic programming approach to the biobjective binary knapsack problem”, ACM Journal of Experimental Algorithmics, vol. 18, pp. 1.2, (Association for Computing Machinery) [Delort 2013]
- S. Devismes, F. Petit, S. Tixeuil : “Optimal probabilistic ring exploration by semi-synchronous oblivious robots”, Theoretical Computer Science, vol. 498, pp. 10-27, (Elsevier) [Devismes 2013]
- I. Di Loreto, B. Lange, A. Seilles, W. Dyce, S. Andary : “Game Design for All: The Example of Hammer and Planks”, Serious Games Development and Applications, vol. 8101, pp. 70-75, (Springer Berlin Heidelberg) [Di Loreto 2013]
- M. Diallo, V. Sourlas, P. Flegkas, S. Fdida, L. Tassiulas : “A content-based publish/subscribe framework for large-scale content delivery”, Computer Networks, vol. 57 (4), pp. 924-943, (Elsevier) [Diallo 2013]
- Y. Dieudonné, F. Levé, F. Petit, V. Villain : “Deterministic Geoleader Election in Disoriented Anonymous Systems”, Theoretical Computer Science, vol. 506, pp. 43-54, (Elsevier) [Dieudonné 2013]
- S. Dubuisson, Ch. Gonzales : “Estimation de densités non paramétriques et multimodales par permutation de sous-particules. Application au suivi d'un ou de plusieurs objets synthétiques articulés”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 27 (1), pp. 95-120, (Lavoisier) [Dubuisson 2013a]
- S. Dubuisson, Ch. Gonzales, X. Nguyen : “Sub-sample swapping for sequential Monte Carlo approximation of high-dimensional densities in the context of complex object tracking”, International Journal of Approximate Reasoning, vol. 54 (7), Special issue: Uncertainty in Artificial Intelligence and Databases, pp. 934-953, (Elsevier) [Dubuisson 2013b]
- G. Dupret, B. Piwowarski : “Model Based Comparison of Discounted Cumulative Gain and Average Precision”, Journal of Discrete Algorithms, vol. 18, pp. 49-62, (Elsevier) [Dupret 2013]
- Ch. Eder : “An analysis of inhomogeneous signature-based Gröbner basis computations”, Journal of Symbolic Computation, vol. 59, pp. 21-35, (Elsevier) [Eder 2013a]
- Ch. Eder : “Improving incremental signature-based Gröbner basis algorithms”, ACM Communications in Computer Algebra, vol. 47 (1), pp. 1-13, (Association for Computing Machinery (ACM)) [Eder 2013b]
- I. Emiris, E. Tsigaridas, G. Tzoumas : “Exact Voronoi diagram of smooth convex pseudo-circles: General predicates, and implementation for ellipses”, Computer Aided Geometric Design, (Elsevier) [Emiris 2013]
- J. Fabrizio, B. Marcotegui, M. Cord : “Text detection in street level images”, Pattern Analysis and Applications, vol. 16 (4), pp. 519-533, (Springer Verlag) [Fabrizio 2013]
- U. Farooq, H. Parvez, H. Mehrez, Z. Marrakchi : “Exploration and optimization of a homogeneous tree-based application specific inflexible FPGA”, Microelectronics Journal, vol. 44 (12), pp. 1052-1062, (Elsevier) [Farooq 2013]
- J.‑Ch. Faugère, M. Safey El Din, P.‑J. Spaenlehauer : “On the Complexity of the Generalized MinRank Problem”, Journal of Symbolic Computation, vol. 55, pp. 30-58, (Elsevier) [Faugère 2013b]
- J.‑Ch. Faugère, P. Gaudry, L. Huot, G. Renault : “Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm”, Journal of Cryptology, pp. 1-40, (Springer Verlag) [Faugère 2013e]
- J.‑Ch. Faugère, V. Gauthier‑Umana, A. Otmani, L. Perret, J.‑P. Tillich : “A Distinguisher for High Rate McEliece Cryptosystems”, IEEE Transactions on Information Theory, vol. 59 (10), pp. 6830-6844, (Institute of Electrical and Electronics Engineers) [Faugère 2013f]
- P. Fortin, J.‑L. Lamotte : “An (almost) direct deployment of the Fast Multipole Method on the Cell processor”, Journal of Supercomputing, vol. 65 (3), pp. 1205-1222, (Springer Verlag) [Fortin 2013a]
- P. Gastin, N. Sznajder : “Fair Synthesis for Asynchronous Distributed Systems”, ACM Transactions on Computational Logic, vol. 14 (2), pp. 9, (Association for Computing Machinery) [Gastin 2013]
- D. Genius, A. Munier‑Kordon, Kh. Zine el Abidine : “Space Optimal Solution for Data Reordering in Streaming Applications on NoC based MPSoC”, Journal of Systems Architecture, vol. 59 (7), pp. 455-467, (Elsevier) [Genius 2013b]
- A. Ghosh, E. Tsigaridas, B. Mourrain, R. Deriche : “A polynomial approach for extracting the extrema of a spherical function and its application in diffusion MRI”, Medical Image Analysis, vol. 17 (5), pp. 503-514, (Elsevier) [Ghosh 2013]
- Ch. Griffin, G. Kesidis, P. Antoniadis, S. Fdida : “Modeling and Control of Rare Segments in BitTorrent with Epidemic Dynamics”, CoRR, vol. abs/1306.3160, pp. 1, (Arxive) [Griffin 2013]
- K. Hansen, R. Ibsen‑Jensen, Vladimir V. Podolskii, E. Tsigaridas : “Patience of Matrix Games”, Discrete Applied Mathematics, (Elsevier) [Hansen 2013]
- F. Hermenier, J. Lawall, G. Muller : “BtrPlace: A Flexible Consolidation Manager for Highly Available Applications”, IEEE Transactions on Dependable and Secure Computing, vol. 10 (5), pp. 273-286, (Institute of Electrical and Electronics Engineers) [Hermenier 2013]
- H. Hong, D. Wang, J. Yang : “A Framework for Improving Uniformity of Parameterizations of Curves”, Science China Information Sciences, vol. 56 (10), pp. 108101:1-108101:22, (Springer) [Hong 2013]
- S. Hoteit, S. Secci, R. Langar, G. Pujolle : “A Nucleolus-based Approach for Resource Allocation in OFDMA Wireless Mesh Networks”, IEEE Transactions on Mobile Computing, vol. 12 (11), pp. 2145-2154, (Institute of Electrical and Electronics Engineers) [Hoteit 2013a]
- R. Iskander, M.‑M. Louërat, A. Kaiser : “Hierarchical sizing and biasing of analog firm intellectual properties”, Integration, the VLSI Journal, vol. 46 (2), pp. 172-188, (Elsevier) [Iskander 2013]
- Y. Jarma Alviz, K. Boloor, M. Dias De Amorim, Y. Viniotis, Robert D. Callaway : “Dynamic Service Contract Enforcement in Service-Oriented Networks”, IEEE Transactions on Services Computing, vol. 6 (1), pp. 130-142, (IEEE) [Jarma Alviz 2013]
- G. Jeronimo, D. Perrucci, E. Tsigaridas : “On the minimum of a polynomial function on a basic closed semialgebraic set and applications”, SIAM Journal on Optimization, vol. 23 (1), pp. 241-255, (Society for Industrial and Applied Mathematics) [Jeronimo 2013]
- H. Jiang, S. Graillat, C. Hu, Sh. Lia, X. Liao, L. Cheng, F. Su : “Accurate evaluation of the $k$-th derivative of a polynomial”, Journal of Computational and Applied Mathematics, vol. 243, pp. 28-47, (Elsevier) [Jiang 2013a]
- M. Jin, X. Li, D. Wang : “A new algorithmic scheme for computing characteristic sets”, Journal of Symbolic Computation, vol. 50, pp. 431-449, (Elsevier) [Jin 2013]
- S. Kamei, H. Kakugawa, S. Devismes, S. Tixeuil : “A self-stabilizing 3-approximation for the maximum leaf spanning tree problem in arbitrary networks”, Journal of Combinatorial Optimization, vol. 25 (3), pp. 430-459, (Springer Verlag) [Kamei 2013]
- B. Kemme, G. Ramalingam, A. Schiper, M. Shapiro, K. Vaswani : “Consistency in Distributed Systems”, Dagstuhl Reports, vol. 3 (2), pp. 92-126, (Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik) [Kemme 2013]
- F. Kocak, G. Kesidis, T. Pham, S. Fdida : “The effect of caching on a model of content and access provider revenues in Information-Centric Networks”, ASE SCIENCE, vol. 2 (3), pp. 160-169 [Kocak 2013a]
- W. Kolberg, P. De Botelho Marcos, Julio C. S. Anjos, Alexandre K. S. Miyazaki, Claudio R. Geyer, L. Arantes : “MRSG - A MapReduce Simulator over SimGrid”, Parallel Computing, vol. 39 (4-5), pp. 233-244, (Elsevier) [Kolberg 2013]
- L. Kong, P.‑H. Wuillemin, J.‑Ph. Bastard, N. Sokolovska, S. Gougis, S. Fellahi, F. Darakhshan, D. Bonnefont‑Rousselot, R. Bittar, J. Dore, J.‑D. Zucker, K. Clément, S. Rizkalla : “Insulin resistance and inflammation predict kinetic body weight changes in response to dietary weight loss and maintenance in overweight and obese subjects by using a Bayesian network approach”, The American Journal of Clinical Nutrition, vol. 98 (6), pp. 1385-1394, (Oxford University Press) [Kong 2013]
- F. Langrognet, F. Jézéquel, N. Revol : “JDEV 2013 : Développer pour Calculer : Des outils pour calculer avec précision & Comment calculer avec des intervalles”, High-Performance Computing Magazine, pp. 1-5, (HPC Médias) [Langrognet 2013]
- J.‑B. Lasserre, M. Laurent, B. Mourrain, Ph. Rostalski, Ph. Trébuchet : “Moment Matrices, Border Bases and Real Radical Computation”, Journal of Symbolic Computation, vol. 51, pp. 63-85, (Elsevier) [Lasserre 2013]
- M. Latapy, C. Magnien, R. Fournier : “Quantifying paedophile activity in a large P2P system”, Information Processing and Management, vol. 49 (1), pp. 248-263, (Elsevier) [Latapy 2013]
- J. Lawall, J. Brunel, N. Palix, R. Hansen, H. Stuart, G. Muller : “WYSIWIB: exploiting fine-grained program structure in a scriptable API-usage protocol-finding process”, Software: Practice and Experience, vol. 43 (1), pp. 67-92, (Wiley) [Lawall 2013]
- Ch. Lécuyer, T. Ueyama : “The Logics of Materials Innovation The Case of Gallium Nitride and Blue Light Emitting Diodes”, Historical Studies in the Natural Sciences, vol. 43 (3), pp. 243-280 [Lécuyer 2013b]
- J. Lesca, M. Minoux, P. Perny : “Compact versus Noncompact LP Formulations for minimizing Convex Choquet Integrals”, Discrete Applied Mathematics, vol. 161 (1-2), pp. 184-199, (Elsevier) [Lesca 2013]
- Th. Lust, A. Rolland : “Choquet optimal set in biobjective combinatorial optimization”, Computers and Operations Research, vol. 40 (10), pp. 2260-2269, (Elsevier) [Lust 2013a]
- C. Magnien, A. Medem Kuatse, S. Kirgizov, F. Tarissan : “Towards realistic modeling of IP-level routing topology dynamics”, Networking science, vol. 3 (1-4), pp. 24-33 [Magnien 2013]
- R. Minetto, N. Thome, M. Cord, Neucimar J. Leite, J. Stolfi : “T-HOG: an Effective Gradient-Based Descriptor for Single Line Text Regions”, Pattern Recognition, vol. 46 (3), pp. 1078-1090, (Elsevier) [Minetto 2013]
- Ch. Mou, D. Wang, X. Li : “Decomposing polynomial sets into simple sets over finite fields: The positive-dimensional case”, Theoretical Computer Science, vol. 468, pp. 102-113, (Elsevier) [Mou 2013]
- G. Muller, J. Jongwane : “Quand les écrans deviennent bleus”, Interstices, (INRIA) [Muller 2013]
- A. Munier‑Kordon, F. Kacem, B. Dupont De Dinechin, L. Finta : “Scheduling an interval ordered precedence graph with communication delays and a limited number of processors”, RAIRO - Operations Research, vol. 47 (1), pp. 73-87, (EDP Sciences) [Munier-Kordon 2013]
- M. Nesterenko, S. Tixeuil : “Ideal Stabilization”, International Journal of Grid and Utility Computing, vol. 4 (4), pp. 219-230, (Inderscience) [Nesterenko 2013]
- V. Nguyen : “A primal-dual approximation algorithm for the Asymmetric Prize-Collecting TSP”, Journal of Combinatorial Optimization, vol. 25 (2), pp. 265-278, (Springer Verlag) [Nguyen 2013a]
- W. Ogryczak, P. Perny, P. Weng : “A Compromise Programming Approach to Multiobjective Markov Decision Processes”, International Journal of Information Technology and Decision Making, vol. 12 (5), pp. 1021-1053, (World Scientific Publishing) [Ogryczak 2013]
- A. Olaru, A. Florea, A. El Fallah‑Seghrouchni : “A Context-Aware Multi-Agent System as a Middleware for Ambient Intelligence”, Mobile Networks and Applications, vol. 18 (3), pp. 429-443, (Springer Verlag) [Olaru 2013]
- Ph. Pernelle, J.‑Ch. Marty, Th. Carron : “From Traces to indicators for Serious Games: Case study concerning a new way to introduce Product Lifecycle Management”, International Journal of Learning Technology, vol. 8 (2), pp. 127-146, (Inderscience) [Pernelle 2013a]
- F. Peschanski, H. Klaudel, R. Devillers : “A petri net interpretation of open reconfigurable systems”, Fundamenta Informaticae, vol. 122 (1-2), pp. 85-117, (Polskie Towarzystwo Matematyczne) [Peschanski 2013]
- D. Picard, N. Thome, M. Cord : “JKernelMachines: A Simple Framework for Kernel Machines”, Journal of Machine Learning Research, vol. 14, pp. 1417-1421, (Journal of Machine Learning Research) [Picard 2013]
- J. Pilet, E. Delozanne, F. Chenevotot, B. Grugeon, D. Prévit, N. El‑Kechaï : “Les outils Pépite sur LaboMeP : Identifier des besoins d’apprentissage des élèves pour réguler l’enseignement”, MathémaTICE, vol. 37, (sesamath) [Pilet 2013a]
- A. Quilliot, Ph. Chrétienne : “Homogeneously non-idling schedules of unit-time jobs on identical parallel machines”, Discrete Applied Mathematics, vol. 161, pp. 1586–1597, (Elsevier) [Quilliot 2013a]
- M. Rehmani, A. Carneiro Viana, H. Khalife, S. Fdida : “SURF: A Distributed Channel Selection Strategy for Data Dissemination in Multi-Hop Cognitive Radio Networks”, Computer Communications, vol. 36 (10-11), pp. 1172–1185, (Elsevier) [Rehmani 2013]
- T. Ribeiro, K. Inoue, G. Bourgne : “Combining Answer Set Programs for Adaptive and Reactive Reasoning”, Theory and Practice of Logic Programming, vol. 13 (4-5-Online-Supplement), (Cambridge University Press (CUP)) [Ribeiro 2013]
- F. Rocha Jimenez Vieira, J. Ferreira De Rezende, Valmir C. Barbosa, S. Fdida : “Local heuristic for the refinement of multi-path routing in wireless mesh networks”, Computer Networks, vol. 57 (1), pp. http://www.sciencedirect.com/science/article/pii/s1389128612003325, (Elsevier) [Rocha Jimenez Vieira 2013]
- D. Rossi, P. Veglia, M. Sammarco, F. Larroca : “ModelNet-TE: An emulation tool for the study of P2P and traffic engineering interaction dynamics”, Peer-to-Peer Networking and Applications, vol. 6 (2), pp. 194-212, (Springer) [Rossi 2013]
- S. Rubrichi, S. Quaglini, A. Spengler, P. Russo, P. Gallinari : “A system for the extraction and representation of summary of product characteristics content”, Artificial Intelligence in Medicine, vol. 57 (2), pp. 145-154, (Elsevier) [Rubrichi 2013]
- J. Saunier, H. Jones : “Emotion dynamics of a society of embodied agents”, Revue des Sciences et Technologies de l'Information - Série RIA : Revue d'Intelligence Artificielle, vol. 27 (6), pp. 709-738, (Lavoisier) [Saunier 2013]
- S. Secci, K. Liu, B. Jabbari : “Efficient Inter-Domain Traffic Engineering with Transit-Edge Hierarchical Routing”, Computer Networks, vol. 57 (4), pp. 976-989, (Elsevier) [Secci 2013]
- Y. Seddik, Ch. Gonzales, S. Kedad‑Sidhoum : “Single machine scheduling with delivery dates and cumulative payoffs”, Journal of Scheduling, vol. 16 (3), pp. 313-329, (Springer Verlag) [Seddik 2013c]
- M. Tang, X. Mao, Z. Guessoum : “Research on an Infectious Disease Transmission by Flocking Birds”, The Scientific World Journal, vol. 2013, pp. 196823, (Hindawi Publishing Corporation) [Tang 2013a]
- M. Tang, X. Mao, Z. Guessoum, H. Zhou : “Rumor Diffusion in an Interests-Based Dynamic Social Network”, The Scientific World Journal, vol. 2013, pp. 824505, (Hindawi Publishing Corporation) [Tang 2013b]
- F. Tarissan, B. Quoitin, P. Mérindol, B. Donnet, J.‑J. Pansiot, M. Latapy : “Towards a Bipartite Graph Modeling of the Internet Topology”, Computer Networks, vol. 57 (11), pp. 2331-2347, (Elsevier) [Tarissan 2013]
- Ch. Theriault, N. Thome, M. Cord : “Extended Coding and Pooling in the HMAX Model”, IEEE Transactions on Image Processing, vol. 22 (2), pp. 764-777, (Institute of Electrical and Electronics Engineers) [Theriault 2013b]
- V. Thomas‑Vaslin, A. Six, J.‑G. Ganascia, H. Bersini : “Dynamical and Mechanistic Reconstructive Approaches of T Lymphocyte Dynamics: Using Visual Modeling Languages to Bridge the Gap between Immunologists, Theoreticians, and Programmers”, Frontiers in Immunology, vol. 4, pp. 300, (Frontiers) [Thomas-Vaslin 2013]
- L. Torti, Ch. Gonzales, P.‑H. Wuillemin : “Speeding-up Structured Probabilistic Inference using Pattern Mining”, International Journal of Approximate Reasoning, vol. 54 (7), pp. 900-918, (Elsevier) [Torti 2013]
- M. Turki, Z. Marrakchi, H. Mehrez, M. Abid : “Frequency Optimization Objective during System Prototyping on Multi-FPGA Platform”, International Journal of Reconfigurable Computing, vol. 2013, pp. 853510, (Hindawi Publishing Corporation) [Turki 2013b]
- O. Vasquez Perez, J. M. Sepúlveda, Miguel D. Alfaro, L. Osorio‑Valenzuela : “Disaster Response Project Scheduling Problem: A Resolution Method based on a Game-Theoretical Model”, International Journal of Computers, Communications and Control, vol. 8 (2), pp. 334-345, (Agora University of Oradea) [Vasquez Perez 2013]
- V. Vu, N. Labroche, B. Bouchon‑Meunier, V.‑Th. Vu, N. Hien : “Graph-based Semi-supervised Clustering”, Journal of Science and Technology, Ha Noi University of Education, Viet Nam, Special Number [Vu 2013]
- W. Wei, I. Alvarez, S. Martin : “Sustainability analysis: Viability concepts to consider transient and asymptotical dynamics in socio-ecological tourism-based systems”, Ecological Modelling, vol. 251, pp. 103-113, (Elsevier) [Wei 2013]
- C. Winzen : “Direction-reversing quasi-random rumor spreading with restarts”, Information Processing Letters, vol. 113, pp. 921-926, (Elsevier) [Winzen 2013]
- J. Yang, D. Wang, H. Hong : “Improving Angular Speed Uniformity by Reparameterization”, Computer Aided Geometric Design, vol. 30 (7), pp. 636-652, (Elsevier) [Yang 2013b]
- S. Yassa, J. Sublime, R. Chelouah, H. Kadima, G.S. Jo, B. Granado : “A Genetic Algorithm for Multi-Objective Optimization in Workflow Scheduling with Hard Constraints”, International Journal of Metaheuristics, pp. 1, (Inderscience Enterprises Ltd.) [Yassa 2013a]