Search

Your search keyword '"Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA)"' showing total 5,071 results

Search Constraints

Start Over You searched for: Author "Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA)" Remove constraint Author: "Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA)"
5,071 results on '"Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA)"'

Search Results

1. Random Partitioning Forest for Point-Wise and Collective Anomaly Detection—Application to Network Intrusion Detection

2. Multispectral object detection

3. Efficient Statistical Assessment of Neural Network Corruption Robustness

4. Factored couplings in multi-marginal optimal transport via difference of convex programming

5. Delta-State-Based Synchronization of CRDTs in Opportunistic Networks

6. Reducing the Cost of Aggregation in Crowdsourcing

7. Cube Sampled K-Prototype Clustering for Featured Data

8. Parametric Graph for Unimodal Ranking Bandit

9. Sub-Tree-Based Approach for Reconfiguration of Light-Tree Pair without Flow Interruption in Sparse Wavelength Converter Network

10. Special Session: Operating Systems under test: an overview of the significance of the operating system in the resiliency of the computing continuum

11. Visual feedback improves movement illusions induced by tendon vibration after chronic stroke

12. Beyond 2014

13. Evidential positive opinion influence measures for viral marketing

14. Blacklisting-Based Channel Hopping Approaches in Low-Power and Lossy Networks

15. Whispering devices: A survey on how side-channels lead to compromised information

16. AbstractSDRs: Bring down the two-language barrier with Julia Language for efficient SDR prototyping

17. Catching the Fastest Boomerangs

18. Multi-View Instance Matching with Learned Geometric Soft-Constraints

19. Small Object Detection in Remote Sensing Images Based on Super-Resolution with Auxiliary Generative Adversarial Networks

20. Sélection opportuniste des cluster heads dans des réseaux hétérogènes basse consommation

21. Designing Reverse Firewalls for the Real World

22. Extension of a bi-dimensional grammar for online interpretation of structured documents: application on architecture plans and geometry domains

23. Graph Edit Distance for the analysis of children’s on-line handwritten arithmetical operations

24. YOLO-Fine: One-Stage Detector of Small Objects Under Various Backgrounds in Remote Sensing Images

25. Data annotation with active learning: application to environmental surveys

26. Corpus design for expressive speech: impact of the utterance length

27. Overlapping Hierarchical Clustering (OHC)

28. Think Cities: the accelerator for sustainable planning

29. Ontology-Based RDF Integration of Heterogeneous Data

30. Multi-Strategy Dynamic Service Composition in Opportunistic Networks

31. Canonical Forms for General Graphs Using Rooted Trees - Correctness and Complexity Study of the SCOTT Algorithm

32. Carrier and Symbol Synchronisation for LoRa Receivers

33. Opportunistic cluster heads for heterogeneous networks combining LoRa and wake-up radio

34. Time Series Alignment with Global Invariances

35. Can tablet apps support the learning of handwriting? An investigation of learning outcomes in kindergarten classroom

36. Actes de l’atelier HIA 2020: Humains et IA, travailler en intelligence

37. Séparation de la forme et du temps dans les séries temporelles - application à l'authentification de signatures

38. Modelisation de l'incertitude et de l'imprecision de donnees de crowdsourcing : MONITOR

39. A decidable class of security protocols for both reachability and equivalence properties

40. Solving ECDLP over F p with Pre-computation via Representation Technique

41. Semantic segmentation of LiDAR points clouds: Rasterisation beyond Digital Elevation Models

42. A Framework for Security and Privacy for the Internet of Things (SPIRIT)

43. Towards an SDR implementation of LoRa: Reverse-engineering, demodulation strategies and assessment over Rayleigh channel

44. Cryptanalysis of SKINNY in the Framework of the SKINNY 2018–2019 Cryptanalysis Competition

45. Scott : A method for representing graphs asrooted trees for graph canonization

46. Accurate LoRa Performance evaluation using Marcum function

47. Sliced Gromov-Wasserstein

48. On the separation of shape and temporal patterns in time series -Application to signature authentication

49. Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN

50. Combining sources of side-channel information

Catalog

Books, media, physical & digital resources