Current teams : | ALMASTY ALSOC APR BD CIAN ComplexNetworks DECISION DELYS LFI MOCAH MoVe NPA PEQUAN PolSys QI RO SMA SYEL |
- M. ABDALLAH, Kh. Boussetta, W. Ooi : “Guest Editorial: Special Issue on Network and Systems Support for Games”, Multimedia Systems, vol. 20 (5), pp. 447-449, (Springer Verlag) [ABDALLAH 2014]
- J. Abello, F. Queyroi : “Network decomposition into fixed points of degree peeling”, Social Network Analysis and Mining, vol. 4 (1), pp. 191, (Springer) [Abello 2014]
- H. Aissaoui‑Mehrez, G. Pujolle, P. URIEN : “Framework Implementation Based On Grid of Smartcards To Authenticate Users and Virtual Machines”, SCITEPRESS Digital Library, pp. 285-290 [Aissaoui-Mehrez 2014a]
- A. Albano, J.‑L. GUILLAUME, S. Heymann, B. Le Grand : “Studying Graph Dynamics Through Intrinsic Time Based Diffusion Analysis”, Applications of Social Media and Social Network Analysis [Albano 2014b]
- Ah. Amokrane, R. Langar, R. Boutaba, G. Pujolle : “Energy Efficient Management Framework for Multihop TDMA-based Wireless Networks”, Computer Networks, vol. 62, pp. 29-42, (Elsevier) [Amokrane 2014]
- E. Angel, E. Bampis, Gerasimos G. Pollatos, V. Zissimopoulos : “Optimal data placement on networks with a constant number of clients”, Theoretical Computer Science, vol. 540-541, pp. 82-88, (Elsevier) [Angel 2014a]
- E. Angel, E. Bampis, V. Chau : “Low complexity scheduling algorithms minimizing the energy for tasks with agreeable deadlines”, Discrete Applied Mathematics, vol. 175, pp. 1-10, (Elsevier) [Angel 2014c]
- S. Angelopoulos, A. LĂłpez‑Ortiz, K. Panagiotou : “Multi-target ray searching problems”, Theoretical Computer Science, vol. 540-541, pp. 2-12, (Elsevier) [Angelopoulos 2014]
- J. AugĂ©, Th. Parmentelat, N. Turro, S. Avakian, L. Baron, M. Larabi, M. Rahman, T. Friedman, S. Fdida : “Tools to foster a global federation of testbeds”, Computer Networks, vol. 63, Special issue on Future Internet Testbeds â Part II, pp. 205-220, (Elsevier) [AugĂ© 2014]
- Ch. Avenel, E. MĂ©min, P. PĂ©rez : “Stochastic level set dynamics to track closed curves through image data”, Journal of Mathematical Imaging and Vision, vol. 49 (2), pp. 296-316, (Springer Verlag) [Avenel 2014]
- N. Bame, H. Naacke, I. Sarr, S. Ndiaye : “Algorithmes de traitement de requĂȘtes de biodiversitĂ© dans un environnement distribuĂ©”, Revue Africaine de Recherche en Informatique et MathĂ©matiques AppliquĂ©es, vol. Volume 18, 2014, pp. 1-18, (African Society in Digital Science) [Bame 2014]
- E. Bampis, A. Kononov, G. Lucarelli, I. Milis : “Bounded max-colorings of graphs”, Journal of Discrete Algorithms, vol. 26, pp. 56-68, (Elsevier) [Bampis 2014b]
- B. Bank, M. Giusti, J. Heintz, M. Safey El Din : “Intrinsic complexity estimates in polynomial optimization”, Journal of Complexity, vol. 30 (4), pp. 430-443, (Elsevier) [Bank 2014]
- Ph. Basset, D. Galayko, F. Cottone, R. Guillemet, E. Blokhina, F. Marty, T. Bourouina : “Electrostatic vibration energy harvester with combined effect of electrical nonlinearities and mechanical impact”, Journal of Micromechanics and Microengineering, vol. 24, pp. 035001, (IOP Publishing) [Basset 2014]
- S. Basu, M.‑F. Roy, M. Safey El Din, E. Schost : “A Baby StepâGiant Step Roadmap Algorithm for General Algebraic Sets”, Foundations of Computational Mathematics, vol. 14 (6), pp. 1117-1172, (Springer Verlag) [Basu 2014]
- A. Becker, N. Gama, A. Joux : “A sieve algorithm based on overlattices”, LMS Journal of Computation and Mathematics, vol. 17 (Special Issue A), pp. 49-70, (London Mathematical Society) [Becker 2014]
- N. Belhadj, Z. Marrakchi, M. Ben ayed, N. Masmoudi, H. Mehrez : “MPSoC Architecture for Macro Blocks Line Partitioning of H.264/AVC Encoder”, International Journal of Embedded and Real-Time Communication Systems, vol. 5 (2), pp. 43-60, (IGI Global) [Belhadj 2014]
- E. Blokhina, D. Galayko, D. Fournier‑Prunaret, O. Feely : “Sliding in a piecewise-smooth dynamical system with a hold-on effect”, Physics Letters A, vol. 378 (42), pp. 3085-3092, (Elsevier) [Blokhina 2014a]
- G. Bourgne, N. Maudet : “Designing Protocols for Abductive Hypothesis Refinement in Dynamic Multiagent Environments”, Computational Intelligence, vol. 30 (2), pp. 362-401, (Wiley) [Bourgne 2014]
- M. Bourgoin, E. Chailloux, J.‑L. Lamotte : “Efficient Abstractions for GPGPU Programming”, International Journal of Parallel Programming, vol. 42 (4), pp. 583-600, (Springer Verlag) [Bourgoin 2014c]
- J.‑P. Briot : “Composants et agents : Ă©volution de la programmation et analyse comparative”, Revue des Sciences et Technologies de l'Information - SĂ©rie TSI : Technique et Science Informatiques, vol. 33 (1-2), pp. 85-115, (Lavoisier) [Briot 2014a]
- B.‑M. Bui‑Xuan, Nick S. Jones : “How modular structure can simplify tasks on networks: parameterizing graph optimization by fast local community detection”, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 470 (2170), pp. 20140224, (Royal Society, The) [Bui-Xuan 2014]
- R. Busa‑Fekete, B. SzörĂ©nyi, P. Weng, W. Cheng, E. Hullermeier : “Preference-based reinforcement learning: evolutionary direct policy search using a preference-based racing algorithm”, Machine Learning, vol. 97 (3), pp. 327-351, (Springer Verlag) [Busa-Fekete 2014]
- Th. Carron, S. Talbot : “Industrial Knowledge assessment for capitalization purposes via learning techniques”, World Applied Sciences Journal, vol. 31 (14), pp. 28-35 [Carron 2014]
- S. Casare, A. Brandao, Z. Guessoum, J. Sichman : “Medee Method Framework: a situational approach for organization-centered MAS”, Autonomous Agents and Multi-Agent Systems, vol. 28 (3), pp. 430-473, (Springer Verlag) [Casare 2014]
- Ah. Chaouche, A. El Fallah‑Seghrouchni, J.‑M. IliĂ©, D. Saidouni : “A Higher-order Agent Model with Contextual Management for Ambient Systems”, Transactions on Computational Collective Intelligence XVI, vol. 8780, pp. 146-169 [Chaouche 2014c]
- X. Chen, B. Doerr, C. Doerr, X. Hu, M. Weidong, R. Van Stee : “The Price of Anarchy for Selfish Ring Routing is Two”, ACM Transactions on Economics and Computation, vol. 2, pp. 8, (Association for Computing Machinery (ACM)) [Chen 2014]
- Ph. ChrĂ©tienne : “A polynomial algorithm for the two-connections variant of the tree pp-median problem”, Discrete Optimization, vol. 14, pp. 1-16, (Elsevier) [ChrĂ©tienne 2014a]
- Ph. ChrĂ©tienne : “On scheduling with the non-idling constraint”, Annals of Operations Research, pp. 1-19, (Springer Verlag) [ChrĂ©tienne 2014b]
- Ph. ChrĂ©tienne, P. Fouilhoux, E. GOURDIN, J. Segura : “The Location-Dispatching Problem: polyhedral results and Content Delivery Network Design”, Discrete Applied Mathematics, vol. 164 (1), pp. 68-85, (Elsevier) [ChrĂ©tienne 2014c]
- M. Danisch, J.‑L. GUILLAUME, B. Le Grand : “Multi-ego-centered communities in practice”, Social Network Analysis and Mining, vol. 4 (1), pp. 180, (Springer) [Danisch 2014d]
- Ch. Dhanjal, R. Gaudel, S. ClĂ©mençon : “Efficient Eigen-updating for Spectral Graph Clustering”, Neurocomputing, vol. 131, pp. 440-452, (Elsevier) [Dhanjal 2014]
- C. Doerr, Jens M. Schmidt, G. Ramakrishna : “Computing Minimum Cycle Bases in Weighted Partial 2-Trees in Linear Time”, Journal of Graph Algorithms and Applications, vol. 18, pp. 325-346, (Brown University) [Doerr 2014a]
- B. Doerr, C. Doerr : “Playing Mastermind with Constant-Size Memory”, Theory of Computing Systems, vol. 55, pp. 658-684, (Springer Verlag) [Doerr 2014b]
- B. Doerr, C. Doerr : “Ranking-Based Black-Box Complexity”, Algorithmica, vol. 68, pp. 571-609, (Springer Verlag) [Doerr 2014c]
- B. Doerr, C. Doerr : “Reducing the arity in unbiased black-box complexity”, Theoretical Computer Science, vol. 545, pp. 108-121, (Elsevier) [Doerr 2014d]
- B. Doerr, C. Doerr, T. Kötzing : “The unbiased black-box complexity of partition is polynomial”, Artificial Intelligence, vol. 216, pp. 12, (Elsevier) [Doerr 2014g]
- V. Dorzhiev, A. Karami, Ph. Basset, V. Dragunov, D. Galayko : “MEMS electrostatic vibration energy harvester without switches and inductive elements”, Journal of Physics: Conference Series, vol. 557, pp. 012126, (IOP Science) [Dorzhiev 2014]
- A. Drebes, K. Heydemann, N. Drach, A. Pop, A. Cohen : “Topology-Aware and Dependence-Aware Scheduling and Memory Allocation for Task-Parallel Languages”, ACM Transactions on Architecture and Code Optimization, vol. 11 (3), pp. 30, (Association for Computing Machinery) [Drebes 2014b]
- B. Dupont De Dinechin, A. Munier‑Kordon : “Converging to periodic schedules for cyclic scheduling problems with resources and deadlines”, Computers and Operations Research, vol. 51, pp. 227-236, (Elsevier) [Dupont De Dinechin 2014]
- F. Dzogang, M.‑J. Lesot, M. Rifqi : “Apprentissage de concepts Ă©motionnels Ă partir de descripteurs bas niveau”, Revue des Sciences et Technologies de l'Information - SĂ©rie RIA : Revue d'Intelligence Artificielle, vol. 28 (1), Affects, compagnons artificiels et interactions, pp. 131-157, (Editions Hermes) [Dzogang 2014]
- B. Escoffier, V. Paschos, E. Tourniaire : “Approximating MAX SAT by Moderately Exponential and Parameterized Algorithms”, Theoretical Computer Science, vol. 560 (2), pp. 147-157, (Elsevier) [Escoffier 2014]
- I. Fajjari, N. Aitsaadi, M. PiĂłro, G. Pujolle : “A new virtual network static embedding strategy within the Cloudâs private backbone network”, Computer Networks, vol. 62, pp. 69-88, (Elsevier) [Fajjari 2014]
- J.‑R. Falleri, X. Blanc, R. Bendraou, M. Almeida Da Silva, C. Teyton : “Incremental inconsistency detection with low memory overhead”, Software: Practice and Experience, vol. 44 (5), pp. 621-641, (Wiley) [Falleri 2014]
- S. Feruglio, Th. Courcier, A. Karami, A. Alexandre‑Gauthier, O. Romain, V. Aimez, P. Charette, P. Pittet, G.‑N. Lu : “Opto-electrical Modeling of CMOS Buried Quad Junction Photodetector”, Key Engineering Materials, vol. 605, pp. 470-473, (Trans Tech Publications) [Feruglio 2014]
- S. Foroutan, A. Sheibanyrad, F. PĂ©trot : “Assignment of Vertical Links to Routers in Vertically-Partially-Connected 3D-NoCs”, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 33 (8), pp. 1208-1218, (IEEE) [Foroutan 2014]
- P. Fouilhoux, A. Questel : “A Branch-and-Cut for the non-disjoint m-Ring-Star problem”, RAIRO - Operations Research, vol. 48 (2), pp. 167-188, (EDP Sciences) [Fouilhoux 2014a]
- R. Fournier, Th. Cholez, M. Latapy, I. Chrisment, C. Magnien, O. Festor, I. Daniloff : “Comparing Pedophile Activity in Different P2P Systems”, Social Sciences, vol. 3 (3), Special Issue on Contemporary Developments in Child Protection, pp. 314-325, (MDPI) [Fournier 2014b]
- J.‑G. Ganascia, P. Glaudes, A. Del Lungo : “Automatic Detection of Reuses and Citations in Literary Texts”, Literary and Linguistic Computing, vol. 29 (3), pp. 412-421, (Oxford University Press (OUP)) [Ganascia 2014b]
- G. Geeraerts, J.‑F. Raskin, N. Sznajder : “On regions and zones for event-clock automata”, Formal Methods in System Design, vol. 45 (3), pp. 330-380, (Springer Verlag) [Geeraerts 2014]
- M. Gerla, Ch. Wu, G. Pau, X. Zhu : “Content distribution in VANETs”, IEEE Transactions on Vehicular Communications, vol. 1 (1), pp. 3-12, (Institute of Electrical and Electronics Engineers, Inc. (IEEE)) [Gerla 2014a]
- C. Gicquel, A. Lisser, M. Minoux : “An evaluation of semidefinite programming based approaches for discrete lot-sizing problems”, European Journal of Operational Research, vol. 237 (2), pp. 498-507, (Elsevier) [Gicquel 2014a]
- H. Goh, N. Thome, M. Cord, J.‑H. Lim : “Learning Deep Hierarchical Visual Feature Coding”, IEEE Transactions on Neural Networks and Learning Systems, vol. 25 (12), pp. 2212-2225, (IEEE) [Goh 2014]
- A. Gradvohl, H. Senger, L. Arantes, P. Sens : “Comparing Distributed Online Stream Processing Systems Considering Fault Tolerance Issues.”, Journal of Emerging Technologies in Web Intelligence, vol. 6 (2), pp. 174-179, (Academy Publisher) [Gradvohl 2014]
- A. Greuet, M. Safey El Din : “Probabilistic Algorithm for Polynomial Optimization over a Real Algebraic Set”, SIAM Journal on Optimization, vol. 24 (3), pp. 1313-1343, (Society for Industrial and Applied Mathematics) [Greuet 2014]
- D. Guenther, R. Alvarez‑Boto, J. Contreras‑Garcia, J.‑Ph. Piquemal, J. Tierny : “Characterizing Molecular Interactions in Chemical Systems”, IEEE Transactions on Visualization and Computer Graphics, vol. 20 (12), pp. 2476-2485, (Institute of Electrical and Electronics Engineers) [Guenther 2014]
- J. Gutierrez, I. Alvar, A. Joux : “Recovering a sum of two squares decomposition”, Journal of Symbolic Computation, vol. 64, pp. 16-21, (Elsevier) [Gutierrez 2014]
- A. Gyulassy, D. Guenther, J. Levine, J. Tierny, V. Pascucci : “Conforming Morse-Smale Complexes”, IEEE Transactions on Visualization and Computer Graphics, vol. 20 (12), pp. 2595-2603, (Institute of Electrical and Electronics Engineers) [Gyulassy 2014]
- P. Harte, E. Blokhina, O. Feely, D. Fournier‑Prunaret, D. Galayko : “Electrostatic Vibration Energy Harvesters with Linear and Nonlinear Resonators”, International journal of bifurcation and chaos in applied sciences and engineering, vol. 24 (11), pp. 1430030, (World Scientific Publishing) [Harte 2014b]
- A. Hatoum, R. Langar, N. Aitsaadi, R. Boutaba, G. Pujolle : “Cluster-based Resource Management in OFDMA Femtocell Networks with QoS Guarantees”, IEEE Transactions on Vehicular Technology, vol. 63 (5), pp. 2378-2391, (Institute of Electrical and Electronics Engineers) [Hatoum 2014]
- O. Hazir, S. Kedad‑Sidhoum : “Batch Sizing and Just-In-Time Scheduling with Common Due Date”, Annals of Operations Research, vol. 213 (1), pp. 187-202, (Springer Verlag) [Hazir 2014]
- H. Hoang‑Van, Y. Shinozaki, T. Miyoshi, O. Fourmaux : “A Router-Aided Hierarchical P2P Traffic Localization Based on Variable Additional Delay Insertion”, IEICE Transactions on Communications, vol. E97-B (1), pp. 29-39, (Institute of Electronics, Information and Communication Engineers) [Hoang-Van 2014b]
- R. Hollanders, D. Bernardes, B. Mitra, R. Jungers, J.‑Ch. Delvenne, F. Tarissan : “Data-driven traffic and diffusion modeling in peer-to-peer networks: A real case study”, Network Science, vol. 2 (3), pp. 341-366, (Cambridge University Press) [Hollanders 2014]
- A. Honorat, M. Potop‑Butucaru, S. Tixeuil : “Gathering fat mobile robots with slim omnidirectional cameras”, Theoretical Computer Science, vol. 557, pp. 1-27, (Elsevier) [Honorat 2014]
- S. Hoteit, S. Secci, S. Sobolevsky, C. Ratti, G. Pujolle : “Estimating human trajectories and hotspots through mobile phone data”, Computer Networks, vol. 64, pp. 296-307, (Elsevier) [Hoteit 2014c]
- Th. Hujsa, J.‑M. Delosme, A. Munier‑Kordon : “Polynomial Sufficient Conditions of Well-Behavedness and Home Markings in Subclasses of Weighted Petri Nets”, ACM Transactions on Embedded Computing Systems (TECS), vol. 13 (4), pp. 141:1-141:25, (ACM) [Hujsa 2014b]
- M. Ibrahim, N. Maculan, M. Minoux : “A note on the NP-hardness of the separation problem on some valid inequalities for the elementary shortest path problem”, Pesquisa Operacional, vol. 34 (1), pp. 117-124, (Sociedade Brasileira de Pesquisa Operacional) [Ibrahim 2014]
- C. Iovan, P.‑H. CournĂšde, Th. Guyard, B. Bayol, D. Boldo, M. Cord : “Model-Based Analysis-Synthesis for Realistic Tree Reconstruction and Growth Simulation”, IEEE Transactions on Geoscience and Remote Sensing, vol. 52 (2), pp. 1438-1450, (Institute of Electrical and Electronics Engineers) [Iovan 2014]
- M. Jacomy, T. Venturini, S. Heymann, M. Bastian : “ForceAtlas2, a Continuous Graph Layout Algorithm for Handy Network Visualization Designed for the Gephi Software”, PLoS ONE, vol. 9 (6), pp. e98679, (Public Library of Science) [Jacomy 2014]
- F. JĂ©zĂ©quel, Ph. Langlois, N. Revol : “First steps towards more numerical reproducibility”, ESAIM: Proceedings and Surveys, vol. 45, ESAIM: Proceedings and Surveys, pp. 229-238, (EDP Sciences) [JĂ©zĂ©quel 2014]
- M. Kchaou Boujelben, C. Gicquel, M. Minoux : “A distribution network design problem in the automotive industry: MIP formulation and heuristics”, Computers and Operations Research, vol. 52, pp. 16-28, (Elsevier) [Kchaou Boujelben 2014]
- B. Kemme, A. Schiper, R. Ganesan, M. Shapiro : “Dagstuhl Seminar Review: Consistency in Distributed Systems”, ACM SIGACT News, vol. 45 (1), pp. 22, (Association for Computing Machinery (ACM)) [Kemme 2014]
- R. Khefifi, P. Poizat, F. SaĂŻs : “Vers une utilisation automatique des Informations Personnelles pour la rĂ©alisation de e-procedures”, Revue des Nouvelles Technologies de l'Information, vol. RNTI-W-2, pp. 75-89, (Editions RNTI) [Khefifi 2014]
- A. Kilic, Z. Marrakchi, H. Mehrez : “A Top-Down Optimization Methodology for Mutually Exclusive Applications”, International Journal of Reconfigurable Computing, vol. 2014, pp. 827613:1-827613:18, (Hindawi Publishing Corporation) [Kilic 2014b]
- F. KSONTINI, S. Espie, Z. Guessoum, R. Mandiau : “Representation of the Agent Environment for Traffic Behavioral Simulation.”, Transactions on Computational Collective Intelligence, vol. 15, pp. 49-68, (Springer) [KSONTINI 2014]
- M. Latapy, A. Hamzaoui, C. Magnien : “Detecting Events in the Dynamics of Ego-centered Measurements of the Internet Topology”, Journal of Complex Networks, vol. 2 (1), pp. 38-59, (Oxford University Press) [Latapy 2014a]
- X. Li, D. Wang : “Computing equilibria of semi-algebraic economies using triangular decomposition and real solution classification”, Journal of Mathematical Economics, vol. 54, pp. 48-58, (Elsevier) [Li 2014]
- A. LĂłpez‑Ortiz, S. Angelopoulos, A. Hamel : “Optimal Scheduling of Contract Algorithms for Anytime Problem-Solving”, Journal of Artificial Intelligence Research, vol. 51, pp. 533-554, (Association for the Advancement of Artificial Intelligence) [LĂłpez-Ortiz 2014]
- Th. Lust, D. Tuyttens : “Variable and large neighborhood search to solve the multiobjective set covering problem”, Journal of Heuristics, vol. 20 (2), pp. 165-188, (Springer Verlag) [Lust 2014b]
- J. Mairesse, I. Marcovici : “Around probabilistic cellular automata”, Theoretical Computer Science, vol. 559, pp. 42-72, (Elsevier) [Mairesse 2014]
- B. Marne, J.‑M. Labat : “Model and Authoring Tool to Help Teachers Adapt Serious Games to their Educational Contexts”, International Journal of Learning Technology, vol. 9 (2), pp. 161-180, (Inderscience) [Marne 2014b]
- A. Maurer, S. Tixeuil : “Byzantine broadcast with fixed disjoint paths”, Journal of Parallel and Distributed Computing, vol. 74 (11), pp. 3153-3160, (Elsevier) [Maurer 2014a]
- J.‑F. Maurras, Th. Nguyen, V. Nguyen : “On the linear description of the Huffman trees polytope”, Discrete Applied Mathematics, vol. 164 (1), pp. 225-236, (Elsevier) [Maurras 2014]
- O. Melekhova : “Coordination dans la dĂ©cision pour les architectures autonomiques Ă grande Ă©chelle”, Revue des Sciences et Technologies de l'Information - SĂ©rie TSI : Technique et Science Informatiques, vol. 33 (1-2), pp. 31-62, (Lavoisier) [Melekhova 2014]
- S. Mesmoudi, I. Alvarez, S. Martin, R. Reuillon, M. Sicard, N. Perrot : “Coupling geometric analysis and viability theory for system exploration: Application to a living food system”, Journal of Process Control, vol. 24 (12), pp. 18-28, (Elsevier) [Mesmoudi 2014]
- L. Meziou, A. Histace, F. Precioso, O. Romain, X. Dray, B. Granado, B. Matuszewski : “Computer-Assisted Segmentation of Videocapsule Images Using Alpha-Divergence-Based Active Contour In The Framework of Intestinal Pathologies Detection”, International Journal of Biomedical Imaging, vol. 2014, pp. 428583 (10 pages), (Hindawi Publishing Corporation) [Meziou 2014]
- R. Minetto, N. Thome, M. Cord, Neucimar J. Leite, J. Stolfi : “SnooperText: A Text Detection System for Automatic Indexing of Urban Scenes”, Computer Vision and Image Understanding, vol. 122, pp. 92-104, (Elsevier) [Minetto 2014]
- M. Minoux : “Two-stage robust optimization, state-space representable uncertainty and applications”, RAIRO - Operations Research, vol. 48 (4), pp. 455-475, (EDP Sciences) [Minoux 2014]
- I. Moraes, D. Mattos, Lyno Henrique G. Ferraz, Miguel Elias M. Campista, M. Rubinstein, L. Maciel Kosmalski Costa, M. Dias De Amorim, P. Velloso, Otto Carlos M. B. Duarte, G. Pujolle : “FITS: A flexible virtual network testbed architecture”, Computer Networks, pp. 221-237, (Elsevier) [Moraes 2014]
- N. Moro, K. Heydemann, E. Encrenaz, B. Robisson : “Formal verification of a software countermeasure against instruction skip attacks”, Journal of Cryptographic Engineering, vol. 4 (3), pp. 145-156, (Springer) [Moro 2014c]
- K. Moussa Ali Abdellatif, R. Chotin‑Avot, H. Mehrez : “Authenticated Encryption on FPGAs from the Static Part to the Reconfigurable Part”, Microprocessors and Microsystems: Embedded Hardware Design, vol. 38 (6), pp. 526-538, (Elsevier) [Moussa Ali Abdellatif 2014a]
- K. Moussa Ali Abdellatif, R. Chotin‑Avot, H. Mehrez : “Low cost Solutions for Secure Remote Reconfiguration of FPGAs”, International Journal of Embedded Systems, vol. 6 (2-3), pp. 257-265, (Inderscience) [Moussa Ali Abdellatif 2014c]
- A. Munier‑Kordon, D. Rebaine : “The coupled unit-time operations problem on identical parallel machines with respect to the makespan”, Operations Research Letters, vol. 42 (1), pp. 21-26, (Elsevier) [Munier-Kordon 2014]
- M. Muratet, E. Delozanne, F. Viallet, P. Torguet : “Ătude de l'intĂ©gration d'un jeu sĂ©rieux pour l'enseignement de la programmation dans diffĂ©rents contextes universitaires”, STICEF (Sciences et Technologies de l'Information et de la Communication pour l'Ăducation et la Formation), vol. 21 (special Evaluation dans les jeux sĂ©rieux), pp. 1-38, (ATIEF) [Muratet 2014]
- B. Ouattara, L. Doyen, D. Ney, H. Mehrez, P. Bazargan‑Sabet : “Power grid redundant path contribution in system on chip (SoC) robustness against electromigration”, Microelectronics Reliability, vol. 54 (9-10), pp. 1702-1706, (Elsevier) [Ouattara 2014]
- N. Palix, G. Thomas, S. Saha, Ch. CalvĂšs, G. Muller, J. Lawall : “Faults in Linux 2.6”, ACM Transactions on Computer Systems, vol. 32 (2), pp. 1-40, (Association for Computing Machinery) [Palix 2014]
- V. Pangracious, E. Amouri, Z. Marrakchi, H. Mehrez : “Architecture level optimization of 3-dimensional tree-based FPGA”, Microelectronics Journal, vol. 45 (4), pp. 355-366, (Elsevier) [Pangracious 2014a]
- C. Pereira, D. Viega, J. Mahdjoub, Z. Guessoum, L. Gonçalves, M. Ferreira, J. Monteiro : “Using a multi-agent system approach for microaneurysm detection in fundus images”, Artificial Intelligence in Medicine, vol. 60 (3), pp. 179-188, (Elsevier) [Pereira 2014]
- T. Phe‑Neau, M. Dias De Amorim, V. Conan : “Uncovering vicinity properties in disruption-tolerant networks”, Computer Networks, pp. 210-223, (Elsevier) [Phe-Neau 2014b]
- Ch. Phung, S. Secci, D. Saucez, L. Iannone : “The OpenLISP control-plane architecture”, IEEE Network, vol. 28 (2), pp. 34-40, (Institute of Electrical and Electronics Engineers) [Phung 2014]
- A. Pla, B. LĂłpez, J. Murillo, N. Maudet : “Multi-attribute auctions with different types of attributes: Enacting properties in multi-attribute auctions”, Expert Systems with Applications, vol. 41, pp. 4829-4843, (Elsevier) [Pla 2014]
- P. Raad, S. Secci, Ch. Phung, A. Cianfrani, P. Gallard, G. Pujolle : “Achieving Sub-Second Downtimes in Large-Scale Virtual Machine Migrations with LISP”, IEEE Transactions on Network and Service Management, vol. 11 (2), pp. 133-143, (IEEE) [Raad 2014]
- M. Radenen, Th. ArtiĂšres : “Handling signal variability with contextual markovian models”, Pattern Recognition Letters, vol. 35, pp. 236-245, (Elsevier) [Radenen 2014b]
- D. Saucez, S. Secci, Ch. Barakat : “On the Incentives and Incremental Deployments of ICN technologies for OTT Services”, IEEE Network, vol. 28 (3), pp. 20-25, (Institute of Electrical and Electronics Engineers) [Saucez 2014]
- S. Secci, G. Pujolle, Th.‑M.‑T. Nguyen, S. Nguyen : “Performance-Cost Trade-off Strategic Evaluation of Multipath TCP Communications”, IEEE Transactions on Network and Service Management, vol. 11 (2), pp. 250-263, (IEEE) [Secci 2014a]
- S. Secci, S. Murugesan : “Cloud Networks: Enhancing Performance and Resiliency”, Computer, vol. 47 (10), pp. 82-85, (IEEE Computer Society) [Secci 2014b]
- Juan S. Silva, A. Histace, O. Romain, X. Dray, B. Granado : “Towards embedded detection of polyps in WCE images for early diagnosis of colorectal cancer”, International Journal of Computer Assisted Radiology and Surgery, vol. 9 (2), pp. 283-293, (Springer Verlag) [Silva 2014]
- R. Souza Couto, S. Secci, M. Elias Mitre Campista, L. Maciel Kosmalski Costa : “Network Design Requirements for Disaster Resilience in IaaS Clouds”, IEEE Communications Magazine, vol. 52 (10), pp. 52-58, (Institute of Electrical and Electronics Engineers) [Souza Couto 2014c]
- O. Stiti, O. Braham, G. Pujolle : “Creation of Virtual Wi-Fi Access Point and Secured Wi-Fi Pairing, through NFC”, International journal of communications, network and system sciences, vol. 7 (6), pp. 175-180, (Scientific Research) [Stiti 2014]
- A. Tatar, M. Dias De Amorim, S. Fdida, P. Antoniadis : “A survey on predicting the popularity of web content.”, Journal of Internet Services and Applications, vol. 5 (1), pp. 8, (Springer) [Tatar 2014a]
- A. Tatar, P. Antoniadis, M. Dias De Amorim, S. Fdida : “From Popularity Prediction to Ranking Online News”, Social Network Analysis and Mining, pp. 4:174, (Springer) [Tatar 2014b]
- M. Taub, R. Azevedo, F. Bouchet, B. Khosravifar : “Can the use of cognitive and metacognitive self-regulated learning strategies be predicted by learnersâ levels of prior knowledge in hypermedia-learning environments?”, Computers in Human Behavior, vol. 39, pp. 356-367, (Elsevier) [Taub 2014a]
- M. Thabet, M. BoufaĂŻda, F. Kordon : “An Approach for Developing an Interoperability Mechanism Between Cloud Providers”, International Journal of Space-Based and Situated Computing, vol. 4 (2), pp. 88-99, (Inderscience) [Thabet 2014]
- Ch. Theriault, N. Thome, M. Cord, P. PĂ©rez : “Perceptual principles for video classification with Slow Feature Analysis”, IEEE Journal of Selected Topics in Signal Processing, vol. 8 (3), pp. 428-437, (IEEE) [Theriault 2014]
- N. Travers, Z. Hmedeh, N. Vouzoukidou, C. Du Mouza, V. Christophides, M. Scholl : “RSS feeds behavior analysis, structure and vocabulary”, International Journal of web information systems, vol. 10 (3), pp. 291-320, (Emerald) [Travers 2014]
- M. Valerio Barbera, A. Carneiro Viana, M. Dias De Amorim, J. Stefa : “Data Offloading in social mobile networks through VIP Delegation”, Ad Hoc Networks, vol. 19, pp. 92-110, (Elsevier) [Valerio Barbera 2014]
- M. VĂ©ron, O. Marin, S. Monnet, Z. Guessoum : “Towards a scalable refereeing system for online gaming”, Multimedia Systems, vol. 20 (5), pp. 579-593, (Springer Verlag) [VĂ©ron 2014c]
- J.‑L. Wybo, C. Gouttas, E. Freyssinet : “Lâimpact des rĂ©seaux sociaux dans la gestion des crises et le cybercrime”, SĂ©curitĂ© et stratĂ©gie, vol. 18 (3), pp. 37-43, (Club des Directeurs de SĂ©curitĂ© des Entreprises) [Wybo 2014]
- A. Yessad, I. Mounier, Th. Carron, F. Kordon, J.‑M. Labat : “Formal Framework to improve the reliability of concurrent and collaborative learning games”, EAI Endorsed Transactions on Serious Games, vol. 14 (2), pp. e4, (ICST) [Yessad 2014b]
- Y. Zhang, B. BĂ©rard, L. Hillah, F. Kordon, Y. Thierry‑Mieg : “Controllability for Discrete Event Systems Modeled in VeriJ”, International Journal of Critical Computer-Based Systems, vol. 5 (3/4), pp. 218-240, (Inderscience) [Zhang 2014]
- Zh. Zhang, D. Refauvelet, A. Greiner, M. Benabdenbi, F. PĂȘcheux : “On-the-Field Test and Configuration Infrastructure for 2-D-Mesh NoCs in Shared-Memory Many-Core Architectures”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 22 (6), pp. 1364-1376, (IEEE) [Zhang 2014]