Français Anglais
Accueil Annuaire Plan du site
Accueil > Production scientifique > Les résultats majeurs
Production scientifique
Les résultats majeurs
#
Date
Titre et Description
Contact
76.
26/03/2009
77.
02/03/2009
Semantics, Calculi, and Analysis for Object-oriented Specifications.
We present a formal semantics for an object-orient ...
78.
29/11/2008
Automated motif extraction and classification in RNA tertiary structures
We used a novel graph-based approach to extract RN ...
79.
20/10/2008
80.
19/10/2008
OctoPocus: A Dynamic Guide for Learning Gesture-Based Command Sets
OctoPocus, is a dynamic guide that combines on-scr ...
81.
01/09/2008
Model-Based Adaptation of Behavioral Mismatching Components
Component-Based Software Engineering focuses on th ...
82.
01/09/2008
83.
01/07/2008
84.
09/04/2008
Sigma Lenses: Focus-Context Transitions Combining Space, Time and Translucence
Focus+context techniques such as fisheye lenses ar ...
85.
25/03/2008
86.
28/01/2008
The Average Complexity of Tree Alignment
Le fait étonnant est que la complexité moyenne de ...
87.
06/11/2007
Exploration Uniforme de très grands modèles
Etant donné un système qui est modélisé comme la c ...
88.
08/10/2007
Verifying a signature architecture: a comparative case study.
We report on a case study in applying different fo ...
89.
22/07/2007
L2R: A Logical Method for Reference Reconciliation
The reference reconciliation problem consists in d ...
90.
25/06/2007
Formal Verification of Floating-Point Programs
This paper introduces a methodology to perform for ...
91.
01/04/2007
Copy-and-Paste Between Overlapping Windows
Copy-and-paste, one of the fundamental operations ...
92.
01/01/2007
SomeRDFS in the Semantic Web
The Semantic Web envisions a world-wide distribute ...
93.
01/10/2006
User Interface Façades: Towards Fully Adaptable User Interfaces
User interfaces are becoming more and more complex ...
94.
01/08/2006
MoGo: un joueur de Go artificiel
MoGo has been developped tackling specifically and ...
95.
01/01/2006
96.
23/10/2005
Metisse is not a 3d desktop!
Twenty years after the general adoption of overlap ...
97.
08/07/2005
A Verification Approach for Applied System Security
We present a method for the security analysis of r ...
98.
24/01/2005
A Verification Approach for Applied System Security
We report on a case study in applying different fo ...
99.
25/11/2004
EKAW2014: Logical Detection of Invalid SameAs Statements in RDF Data
In the last years, thanks to the standardization o ...
100.
11/11/2004
EKAW2014: Logical Detection of Invalid SameAs Statements in RDF Data
In the last years, thanks to the standardization o ...
Première page - Précédant - 1 - 2 - 3 - 4 - 5 - Suivant [Page 4 sur 5]