Zobrazeno 1 - 10
of 1 083
pro vyhledávání: '"P. Desharnais"'
Autor:
Azogagh, Sofiane, Birba, Zelma Aubin, Desharnais, Josée, Gambs, Sébastien, Killijian, Marc-Olivier, Tawbi, Nadia
Cryptographic approaches, such as secure multiparty computation, can be used to compute in a secure manner the function of a distributed graph without centralizing the data of each participant. However, the output of the protocol itself can leak sens
Externí odkaz:
http://arxiv.org/abs/2412.02329
Autor:
Maël Rannou
Publikováno v:
Images du Travail, Travail des Images, Vol 14 (2022)
Externí odkaz:
https://doaj.org/article/195d867a94ca4791b9f5685efcdb5c11
Studying the quality requirements (aka Non-Functional Requirements (NFR)) of a system is crucial in Requirements Engineering. Many software projects fail because of neglecting or failing to incorporate the NFR during the software life development cyc
Externí odkaz:
http://arxiv.org/abs/1405.1131
Earlier papers \cite{VB2022,VB2023a,VB2023b} introduced the notions of a core and an index of a relation (an index being a special case of a core). A limited form of the axiom of choice was postulated -- specifically that all partial equivalence rela
Externí odkaz:
http://arxiv.org/abs/2401.16888
Autor:
Li-Goyette, Mathieu
Publikováno v:
International Journal of Comic Art; Spring/Summer2019, Vol. 21 Issue 1, p366-389, 24p
Insider threats are a growing concern for organizations due to the amount of damage that their members can inflict by combining their privileged access and domain knowledge. Nonetheless, the detection of such threats is challenging, precisely because
Externí odkaz:
http://arxiv.org/abs/2211.14437
Autor:
Pequignot, Yann, Alain, Mathieu, Dallaire, Patrick, Yeganehparast, Alireza, Germain, Pascal, Desharnais, Josée, Laviolette, François
It is crucial to detect when an instance lies downright too far from the training samples for the machine learning model to be trusted, a challenge known as out-of-distribution (OOD) detection. For neural networks, one approach to this task consists
Externí odkaz:
http://arxiv.org/abs/2010.12995
Cops and Robbers games have been studied for the last few decades in computer science and mathematics. As in general pursuit evasion games, pursuers (cops) seek to capture evaders (robbers); however, players move in turn and are constrained to move o
Externí odkaz:
http://arxiv.org/abs/2004.11503
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Philippe Joubert, Azadeh Arabzadeh, Valérie Breton, Mark Sorin, Elham Karimi, Morteza Rezanejad, Miranda W Yu, Lysanne Desharnais, Sheri A C McDowell, Samuel Doré, Benoit Fiset, Yuhong Wei, Roni Rayes, Michele Orain, Francois Coulombe, Venkata S K Manem, Andreanne Gagne, Daniela F Quail, Jonathan D Spicer, Logan A Walsh
Publikováno v:
Journal for ImmunoTherapy of Cancer, Vol 11, Iss 2 (2023)
Background Immunotherapy has revolutionized clinical outcomes for patients suffering from lung cancer, yet relatively few patients sustain long-term durable responses. Recent studies have demonstrated that the tumor immune microenvironment fosters tu
Externí odkaz:
https://doaj.org/article/b3889797f7b44bc4821c45531186df0a