Filter your results
- 7
- 6
- 9
- 3
- 1
- 13
- 1
- 1
- 1
- 4
- 1
- 3
- 2
- 1
- 1
- 12
- 1
- 13
- 6
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
A Statistical Inference Model for the Dynamic Range of LTI Systems15th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetics and Verified Numerics, SCAN, Sep 2012, Novosibirsk, Russia. pp.25-26
Conference papers
hal-00851282v1
|
|||
Typer la désérialisation sans sérialiser les typesRevue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, 2007, 26 (9), pp.1067-1090
Journal articles
hal-00275358v1
|
|||
|
Concurrent Programming of Microcontrollers, a Virtual Machine Approach8th European Congress on Embedded Real Time Software and Systems (ERTS 2016), Jan 2016, TOULOUSE, France. pp.711-720
Conference papers
hal-01292266v1
|
||
Range estimation of floating-point variables in Simulink modelsConference on Design and Architectures for Signal and Image Processing, Oct 2012, Karlsruhe, Germany. pp.1-8
Conference papers
hal-00816115v1
|
|||
Interval-based Robustness of Linear Parametrized FiltersSCAN'12 - 15th GAMM-IMACS International Symposium on Scientific Computing, Computer Arithmetic and Verified Numerical Computations, Sep 2012, Novosibirsk, Russia. pp.cf. CDROM
Conference papers
hal-00706772v1
|
|||
|
High performance motion detection: some trends toward new embedded architectures for vision systemsJournal of Real-Time Image Processing, 2009, 4 (2), pp.127-146. ⟨10.1007/s11554-008-0096-7⟩
Journal articles
hal-01131002v1
|
||
|
Cryptanalysis of MinRankCRYPTO 2008 - 28th Annual International Cryptology Conference, Aug 2008, Santa Barbara, CA, United States. pp.280-296, ⟨10.1007/978-3-540-85174-5_16⟩
Conference papers
hal-00976374v1
|
||
|
A Survey on Polly Cracker SystemsGröbner Bases, Coding, and Cryptography, Springer, pp.285-305, 2009, 978-3-540-93805-7. ⟨10.1007/978-3-540-93806-4_16⟩
Book sections
istex
hal-01298878v1
|
||
|
Security Analysis of Word Problem-Based CryptosystemsDesigns, Codes and Cryptography, 2010, 54 (1), pp.29-41. ⟨10.1007/s10623-009-9307-x⟩
Journal articles
istex
hal-00974889v1
|
||
|
2D Simultaneous Localization And Mapping for Micro Air VehiclesEuropean Micro Aerial Vehicles (EMAV 2006), Jul 2006, Braunschweig, Germany
Conference papers
hal-00655111v1
|
||
|
ML Dependency Analysis for AssessorsSoftware Engineering and Formal Methods (SEFM) 2012, Oct 2012, Thessaloniki, Greece. pp.278-292, ⟨10.1007/978-3-642-33826-7_19⟩
Conference papers
hal-01203505v1
|
||
|
Development of a Generic Voter under FoCalTAP 2009 - 3rd International Conference on Tests and Proofs, Jul 2009, Zurich, Switzerland. pp.10-26, ⟨10.1007/978-3-642-02949-3_3⟩
Conference papers
hal-01241361v1
|
||
|
Trusted Software within FocalC&ESAR 2008 - Computer & Electronics Security Applications Rendez-vous, Dec 2008, Rennes, France. pp.162-179
Conference papers
hal-01125667v2
|