Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Remi Garcia"'
Publikováno v:
2022 IEEE International Symposium on Circuits and Systems (ISCAS).
Autor:
Ahmad Abboud, Remi Garcia, Abdelkader Lahmadi, Michael Rusinowitch, Adel Bouhoula, Mondher Ayadi
Publikováno v:
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-9, ⟨10.1109/NOMS54207.2022.9789807⟩
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, Apr 2022, Budapest, Hungary. pp.1-9, ⟨10.1109/NOMS54207.2022.9789807⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::490366e03eb758b5d058320f21a4c563
https://inria.hal.science/hal-03850745
https://inria.hal.science/hal-03850745
Publikováno v:
IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing, 2022, 70, pp.1673-1686. ⟨10.1109/tsp.2022.3161158⟩
IEEE Transactions on Signal Processing, 2022, 70, pp.1673-1686. ⟨10.1109/tsp.2022.3161158⟩
International audience; In this work we optimally solve the problem of multiplierless design of second-order Infinite Impulse Response filters with minimum number of adders. Given a frequency specification, we design a stable direct form filter with
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::26098c327191ea0f6adc96e89bd8137e
https://hal.archives-ouvertes.fr/hal-03208221v2/document
https://hal.archives-ouvertes.fr/hal-03208221v2/document
Publikováno v:
CNSM 2020-16th International Conference on Network and Service Management
CNSM 2020-16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
CNSM
CNSM 2020-16th International Conference on Network and Service Management, Nov 2020, Izmir/Virtual, Turkey
CNSM
Software Defined Networks administrators can specify and smoothly deploy abstract network-wide policies. The rule sets of these policies are deployed in the forwarding tables of the available switches. In this paper, we propose a technique, named R2-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f5eac914770f13088aa0e71e8cfbd8d0
https://hal.inria.fr/hal-03036292
https://hal.inria.fr/hal-03036292
Autor:
Rémi Garcia, Paolo Modesti
Publikováno v:
Cyber Security and Applications, Vol 2, Iss , Pp 100038- (2024)
Confidence in a communication protocol’s security is a key requirement for its deployment and long-term maintenance. Checking if a vulnerability exists and is exploitable requires extensive expertise. The research community has advocated for a syst
Externí odkaz:
https://doaj.org/article/082fb899a27b42cdbc5ef1f205840f8e
Publikováno v:
Cyber Security and Applications, Vol 1, Iss , Pp 100015- (2023)
Access Control is a crucial defense mechanism organizations can deploy to meet modern cybersecurity needs and legal compliance with data privacy. The aim is to prevent unauthorized users and systems from accessing protected resources in a way that ex
Externí odkaz:
https://doaj.org/article/10a03815e30f4544944ec36b4141f262
Autor:
Paolo Modesti, Remi Garcia
Publikováno v:
The 28th International Symposium on Software Reliability Engineering Workshops (ISSREW)
ISSRE Workshops
ISSRE Workshops
Security protocols are critical components for the construction of secure and dependable distributed applications, but their implementation is challenging and error prone. Therefore, tools for formal modelling and analysis of security protocols can b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8d3d3d1e7955519d2a7b395f727abab9
http://sure.sunderland.ac.uk/id/eprint/8485/1/main.pdf
http://sure.sunderland.ac.uk/id/eprint/8485/1/main.pdf