Search

Your search keyword '"Institut National de Recherche en Informatique et en Automatique [Inria]"' showing total 125,825 results

Search Constraints

Start Over You searched for: Author "Institut National de Recherche en Informatique et en Automatique [Inria]" Remove constraint Author: "Institut National de Recherche en Informatique et en Automatique [Inria]"
125,825 results on '"Institut National de Recherche en Informatique et en Automatique [Inria]"'

Search Results

201. Do You Believe Your (Social Media) Data? A Personal Story on Location Data Biases, Errors, and Plausibility as Well as Their Visualization

202. An Iterative Centroid Approach for Diffeomorphic Online Atlasing

203. Guest Editors Introduction: Special Section on Recent Advances in Network Security Management

204. Exactly Solving Hard Permutation Flowshop Scheduling Problems on Peta-Scale GPU-Accelerated Supercomputers

205. Sequential sensor selection for the localization of acoustic sources by sparse Bayesian learning

206. Stability factor for robust balancing of simple assembly lines under uncertainty

207. SpecHLS: Speculative Accelerator Design Using High-Level Synthesis

208. Quantum Pin Codes

209. Efficient sampling in spectrahedra and volume approximation

210. MERRIN: MEtabolic regulation rule INference from time series data

211. Nonatomic aggregative games with infinitely many types

212. The Advantages of Maintaining a Multitask, Project-Specific Bot: An Experience Report

213. Cross-cultural evaluation of a web application to support communication and collaboration among stakeholders of the school inclusion of children with ASD

214. A Review of Core Operational Business-IT Alignment

215. Automated ICS template for STRIDE Microsoft Threat Modeling Tool

216. Compression quasi sans perte d'images satellites par filtrage de résidus

217. Histoire Récente de la Sécurité des Contenus Multimédia Un Focus sur la Dissimulation d'Information

218. Confidential Truth Finding with Multi-Party Computation

219. Generative AI for Reengineering Variants into Software Product Lines: An Experience Report

220. Démélange, déconvolution et débruitage conjoints d’un modèle convolutif parcimonieux avec dérive instrumentale, par pénalisation de rapports de normes ou quasi-normes lissées (PENDANTSS)

221. Implicit Differentiation for Hyperparameter Tuning the Weighted Graphical Lasso

222. On Programming Variability with Large Language Model-based Assistant

223. Estimation de mouvement rétrospective pour l'IRM cérébrale foetale

224. Formes d'ondes bio-inspirées : de la chauve-souris au radar

225. Segmentation à faible coût des délais réseau basée sur le regroupement hiérarchique

226. Intervalles de confiance pour l'estimation de superficies à partir d'images satellitaires

227. Learning a Riemannian manifold for the analysis-synthesis of nonstationary sounds

228. Incremental Constrained Clustering by Minimal Weighted Modification

229. Combined transcriptomics and metabolomics in the whole blood to depict feed efficiency in pigs

230. Automatically Inferring the Document Class of a Scientific Article

231. How to (Virtually) Train Your Speaker Localizer

232. Learning meshless parameterization with graph convolutional neural networks

233. Precise Segmentation for Children Handwriting Analysis by Combining Multiple Deep Models with Online Knowledge

234. MEG Encoding using Word Context Semantics in Listening Stories

235. Unsupervised speech enhancement with deep dynamical generative speech and noise models

236. Speech Taskonomy: Which Speech Tasks are the most Predictive of fMRI Brain Activity?

237. BPNet: Bézier Primitive Segmentation on 3D Point Clouds

238. Cryptanalysis of rank-metric schemes based on distorted Gabidulin codes

239. CFD STUDY OF THERMOCLINE FORMATION IN STRATIFIED WATER STORAGE: CONSIDERATION OF A SECOND-ORDER BOUSSINESQ APPROXIMATION TO MODEL BUOYANCY EFFECTS AND ITS APPLICATION TO ASSESS THE IMPACT OF OPERATING CONDITIONS

240. GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation

241. Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses

242. Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security

243. A comprehensive, formal and automated analysis of the EDHOC protocol

244. Hector: A Framework to Design and Evaluate Scheduling Strategies in Persistent Key-Value Stores

245. Investigating Dependency Graph Discovery Impact on Task-based MPI+OpenMP Applications Performances

246. Variational Shape Reconstruction via Quadric Error Metrics

247. The Stare-in-the-Crowd Effect When Navigating a Crowd in Virtual Reality

248. Insight into the ionic atmosphere effect: Comparison of theories for electrolytes at the primitive level

249. Degenerate Cahn-Hilliard equation: From nonlocal to local

250. A review of reference architectures for digital manufacturing: Classification, applicability and open issues

Catalog

Books, media, physical & digital resources