Skip to Main content Skip to Navigation

hal-00851282v1  Conference papers
Alexandre ChapoutotLaurent-Stéphane DidierFanny Villers. A Statistical Inference Model for the Dynamic Range of LTI Systems
15th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetics and Verified Numerics, SCAN, Sep 2012, Novosibirsk, Russia. pp.25-26
hal-01241361v1  Conference papers
Philippe AyraultThérèse HardinFrançois Pessaux. Development of a Generic Voter under FoCal
TAP 2009 - 3rd International Conference on Tests and Proofs, Jul 2009, Zurich, Switzerland. pp.10-26, ⟨10.1007/978-3-642-02949-3_3⟩
hal-01292266v1  Conference papers
Steven VaroumasBenoît VaugonEmmanuel Chailloux. Concurrent Programming of Microcontrollers, a Virtual Machine Approach
8th European Congress on Embedded Real Time Software and Systems (ERTS 2016), Jan 2016, TOULOUSE, France. pp.711-720
hal-00816115v1  Conference papers
Alexandre ChapoutotLaurent-Stéphane DidierFanny Villers. Range estimation of floating-point variables in Simulink models
Conference on Design and Architectures for Signal and Image Processing, Oct 2012, Karlsruhe, Germany. pp.1-8
hal-00655111v1  Conference papers
Adrien AngeliDavid FilliatStephane DoncieuxJean-Arcady Meyer. 2D Simultaneous Localization And Mapping for Micro Air Vehicles
European Micro Aerial Vehicles (EMAV 2006), Jul 2006, Braunschweig, Germany
hal-01298878v1  Book sections
Françoise Levy-Dit-VehelMaria-Grazia MarinariLudovic PerretCarlo Traverso. A Survey on Polly Cracker Systems
Gröbner Bases, Coding, and Cryptography, Springer, pp.285-305, 2009, 978-3-540-93805-7. ⟨10.1007/978-3-540-93806-4_16⟩
hal-00974889v1  Journal articles
Françoise Levy-Dit-VehelLudovic Perret. Security Analysis of Word Problem-Based Cryptosystems
Designs, Codes and Cryptography, Springer Verlag, 2010, 54 (1), pp.29-41. ⟨10.1007/s10623-009-9307-x⟩
hal-00976374v1  Conference papers
Jean-Charles FaugèreFrançoise Levy-Dit-VehelLudovic Perret. Cryptanalysis of MinRank
CRYPTO 2008 - 28th Annual International Cryptology Conference, Aug 2008, Santa Barbara, CA, United States. pp.280-296, ⟨10.1007/978-3-540-85174-5_16⟩
hal-01203505v1  Conference papers
François PessauxVincent BenayounCatherine DuboisPhilippe Ayrault. ML Dependency Analysis for Assessors
Software Engineering and Formal Methods (SEFM) 2012, Oct 2012, Thessaloniki, Greece. pp.278-292, ⟨10.1007/978-3-642-33826-7_19⟩
hal-01125667v2  Conference papers
Philippe AyraultMatthieu CarlierDavid DelahayeCatherine DuboisDamien Doligez et al.  Trusted Software within Focal
C&ESAR 2008 - Computer & Electronics Security Applications Rendez-vous, Dec 2008, Rennes, France. pp.162-179
hal-00275358v1  Journal articles
Grégoire HenryMichel MaunyEmmanuel Chailloux. Typer la désérialisation sans sérialiser les types
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2007, 26 (9), pp.1067-1090
hal-00706772v1  Conference papers
Alexandre ChapoutotThibault HilairePhilippe Chevrel. Interval-based Robustness of Linear Parametrized Filters
SCAN'12 - 15th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetic and Verified Numerical Computations, Sep 2012, Novosibirsk, Russia. CDROM