Serveur d'exploration sur la recherche en informatique en Lorraine - Exploration (Accueil)

Index « Titre (en) » - entrée « techniques »
Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.
technique < techniques < technological  Facettes :

List of bibliographic references indexed by techniques

Number of relevant bibliographic references: 156.
[0-20] [0 - 20][0 - 50][20-40]
Ident.Authors (with country if any)Title
000006 (2016-07-13) Dietmar Jannach [Allemagne] ; Iman Kamehkhosh [Allemagne] ; Geoffray Bonnin [France]Biases in Automated Music Playlist Generation: A Comparison of Next-Track Recommending Techniques
000498 (2015-06-12) Samuel Hornus [France]Intersection detection via Gauss maps; a review and new techniques
000596 (2015-04) Vincent Cheval [France] ; Véronique Cortier [France]Timing attacks in security protocols: symbolic framework and proof techniques
000852 (2014-12-02) Pierre-Cyrille Héam [France] ; Jean-Luc Joly [France]On the Uniform Random Generation of Determinisitic Partially Ordered Automata using Monte Carlo Techniques
000951 (2014-09-13) Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
000A84 (2014-06-25) François Despaux [France] ; Ye-Qiong Song [France] ; Abdelkader Lahmadi [France]Towards performance analysis of wireless sensor networks using Process Mining Techniques
000B52 (2014-05-22) François Despaux [France] ; Ye-Qiong Song [France] ; Abdelkader Lahmadi [France]Modelling and Performance Analysis of Wireless Sensor Networks Using Process Mining Techniques: ContikiMAC Use Case
000C19 (2014-04-05) Guillaume Aucher [France] ; Bastien Maubert [France] ; Sophie Pinchinat [France]Automata Techniques for Epistemic Protocol Synthesis
000D15 (2014-01) Manamiary Bruno Andriamiarina [France] ; Dominique Méry [France] ; Neeraj Kumar Singh [France]Revisiting Snapshot Algorithms by Refinement-based Techniques (Extended Version)
001016 (2013-09-22) Joachim Thiemann [France] ; Emmanuel Vincent [France]An experimental comparison of source separation and beamforming techniques for microphone array signal enhancement
001801 (2012-12-14) Manamiary Bruno Andriamiarina [France] ; Dominique Méry [France] ; Neeraj Kumar Singh [France]Revisiting Snapshot Algorithms by Refinement-based Techniques
001993 (2012-08-23) Dominique Méry [France] ; Neeraj Kumar Singh [France]Critical systems development methodology using formal techniques
002449 (2011-02-20) Chiraz Latiri [France] ; Kamel Smaïli [France] ; Caroline Lavecchia [France] ; Cyrine Nasri [France] ; David Langlois [France]Phrase-based machine translation based on text mining and statistical language modeling techniques
002506 (2011) Latiri Chiraz [France] ; Kamel Smaili [France] ; Caroline Lavecchia [France] ; Cyrine Nasri [France] ; David Langlois [France]Phrase-based Machine Translation based on Text Mining and Statistical Language Modeling Techniques
002837 (2011) Tony Bourdier [France]Specification, analysis and transformation of security policies via rewriting techniques
002848 (2011) Véronique Cortier [France] ; Steve Kremer [France]Formal Models and Techniques for Analyzing Security Protocols
002935 (2010-12-01) Jérôme François [Luxembourg (pays)] ; Humberto Abdelnur [France] ; Radu State [Luxembourg (pays)] ; Olivier Festor [France]Machine Learning Techniques for Passive Network Inventory
003023 (2010) Mathias Hülsbusch [Allemagne] ; Barbara König [Allemagne] ; Arend Rensink [Pays-Bas] ; Maria Semenyak [Allemagne] ; Christian Soltenborn [Allemagne] ; Heike Wehrheim [Allemagne]Showing Full Semantics Preservation in Model Transformation - A Comparison of Techniques
003050 (2010) Christel Baier [Allemagne]On Model Checking Techniques for Randomized Distributed Systems
003990 (2009) Antonio Carrieri [Italie] ; Violeta Pérez-Nueno [Espagne] ; Alessandra Fano ; Carlo Pistone ; David Ritchie [France] ; Jordi Teixid [Espagne]Biological Profiling of Anti‐HIV Agents and Insight into CCR5 Antagonist Binding Using in silico Techniques
003C97 (2009) Daniel Gorin [France]Automated reasoning techniques for hybrid logics

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Title.i -k "techniques" 
HfdIndexSelect -h $EXPLOR_AREA/Data/Main/Exploration/Title.i  \
                -Sk "techniques" \
         | HfdSelect -Kh $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd 

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    indexItem
   |index=    Title.i
   |clé=    techniques
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022