User menu

Accès à distance ? S'identifier sur le proxy UCLouvain | Saint-Louis

Search

Displaying 1 - 25 of 1450 results.

Pages

    • Speech
    Measuring the Adoption of DDoS Protection Services
    Jonker, Mattijs Sperotto, Anna van Rijswijk-Deij, Roland Sadre, Ramin[UCL] Pras, Aiko (2016) ACM Internet Measurement Conference (IMC) — Santa Monica, California
    • Journal article
    STAMINA: A Competition to Encourage the Development and Assessment of Software Model Inference Techniques
    Walkinshaw, Neil Lambeau, Bernard[UCL] Damas, Christophe[UCL] Bogdanov, Kirill Dupont, Pierre[UCL] (2012) Empirical Software Engineering : an international journal — Vol. 18, no.4, p. 791-824 (2013)
    • BookChapter
    Sécurité informatique - Cours et exercices corrigés
    Avoine, Gildas[UCL] Junod, Pascal Oechslin, Philippe (2010) Sécurité informatique - Cours et exercices corrigés — [ISBN : 978-2-7117-4860-0]
    • Journal article
    RFID for newbies, sauce security
    Avoine, Gildas[UCL] (2011) Hakin 9 : IT security magazine — Vol. 6, no. 8, p. 14-19 (2011)
    • Journal article
    Learning typed automata from automatically labeled data
    Kermorvant, Christian de la Higuera, Colin Dupont, Pierre[UCL] (2004) Journal electonique d'intelligence artificielle — Vol. 6, no. 45 (2004)
    • Speech
    Data Center Networking with multipath TCP
    Raiciu, Costin Pluntke, Christopher Barré, Sébastien[UCL] Greenhalgh, Adam Wischik, Damon Handley, Mark (2010) Ninth ACM workshop on hot topics in networks (HotNets-IX) — Monterey, California, US
    • Speech
    A Data Structure to Handle Large Sets of Equal Terms
    Le Charlier, Baudouin[UCL] Atindehou, Mêton Mêton[UCL] (2016) SCSS 2016. 7th International Symposium on Symbolic Computation in Software Science — Ochanomizu University, Tokyo
    • Speech
    Yet Another Ultralightweight Authentication Protocol that is Broken
    Avoine, Gildas[UCL] Carpent, Xavier[UCL] (2012) RFIDSec'12 — Nijmegen, Netherlands
    • Journal article
    Security analysis of YKHL distance bounding protocol with adjustable false acceptance rate
    Kim, Chong Hee[UCL] (2011) IEEE Communications Letters — , p. 1-3 (2011)
    • BookChapter
    RFID Security
    Avoine, Gildas[UCL] (2011) Encyclopedia of Cryptography and Security — [ISBN : 978-1-4419-5905-8]
    • Journal article
    A Probabilistic Study of the Delay caused by Jittering in Wireless Flooding
    Cordero Fuertes, Juan Antonio[UCL] (2013) Wireless Personal Communications : an international journal — Vol. 73, no. 3, p. 415-439 (2013)
    • Journal article
    Improved differential fault analysis on AES key schedule
    Kim, Chong Hee[UCL] (2011) IEEE Transactions on Information Forensics and Security — Vol. 99, p. 1-10 (2011)
    • BookChapter
    State-merging DFA Induction Algorithms with Mandatory Merge Constraints
    Lambeau, Bernard[UCL] Damas, Christophe[UCL] Dupont, Pierre[UCL] (2008) 9th International Colloquium on Grammatical Inference (ICGI) — [ISBN : 978-3-540-88008-0]
    • Speech
    Towards trust inference from bipartite social networks
    O'Doherty, Daire[UCL] Jouili , Salim Van Roy, Peter[UCL] (2012) Second ACM SIGMOD Workshop on Databases and Social Networks (DBSocial 2012) — Scottsdale, AZ, USA
    • Speech
    Practical Uses of Constraint Programming in Music using Relation Domains
    Van Cauwelaert, Sascha[UCL] Gutiérrez Sabogal, Gustavo Adolfo[UCL] Van Roy, Peter[UCL] (2012) Korean Electro-Acoustic Music Society's annual conference — Seoul, Korea
    • Speech
    The Coxlogit model: feature selection from survival and classification data
    Branders, Samuel[UCL] D'Ambrosio, Roberto[UCL] Dupont, Pierre[UCL] (2014) IEEE Symposium on Computational Intelligence in Multicriteria Decision-Making — Orlando (FL)
    • BookChapter
    Improving probabilistic automata learning with additional knowledge
    Kermorvant, Christopher de la Higuera, Colin Dupont, Pierre[UCL] (2004) Structural, Syntactic, and Statistical Pattern Recognition, Joint IAPR International Workshops, SSPR 2004 and SPR 2004 — [ISBN : 3-540-22570-6]

Pages