Etudes supérieures

Alternate Text
A neutral approach to proof and refutation in MALL
Category

Documents

A neutral approach to proof and refutation in MALL

Olivier Delande

A neutral approach to proof and refutation in MALL Alternate Text
Category

Documents

Etudes supérieures

A neutral approach to proof and refutation in MALL

Olivier Delande

Book

11 pages

Flag

English

icon play Lire
icon play Infos
A Proof Theoretic Approach to the Static Analysis of Logic Programs Dale Miller
Category

Documents

A Proof Theoretic Approach to the Static Analysis of Logic Programs Dale Miller

Peter Andrews

A Proof Theoretic Approach to the Static Analysis of Logic Programs Dale Miller Alternate Text
Category

Documents

Etudes supérieures

A Proof Theoretic Approach to the Static Analysis of Logic Programs Dale Miller

Peter Andrews

Book

20 pages

Flag

English

icon play Lire
icon play Infos
UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING
Category

Documents

UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING

Duke University

UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING Alternate Text
Category

Documents

Etudes supérieures

UNIFORM PROOFS AS A FOUNDATION FOR LOGIC PROGRAMMING

Duke University

Book

35 pages

Flag

English

icon play Lire
icon play Infos
Unification of Simply Typed Lambda Terms as Logic Programming
Category

Documents

Unification of Simply Typed Lambda Terms as Logic Programming

Unification of Simply Typed Lambda Terms as Logic Programming Alternate Text
Category

Documents

Etudes supérieures

Unification of Simply Typed Lambda Terms as Logic Programming

Book

12 pages

Flag

English

icon play Lire
icon play Infos
CSL07 September
Category

Documents

CSL07 September

CSL07 September Alternate Text
Category

Documents

Etudes supérieures

CSL07 September

Book

19 pages

Flag

English

icon play Lire
icon play Infos
Encryption as an abstract data type
Category

Documents

Encryption as an abstract data type

Encryption as an abstract data type Alternate Text
Category

Documents

Etudes supérieures

Encryption as an abstract data type

Book

18 pages

Flag

English

icon play Lire
icon play Infos
Light Logics for Polynomial Time Computations April 3th
Category

Documents

Light Logics for Polynomial Time Computations April 3th

Time Computations

Light Logics for Polynomial Time Computations April 3th Alternate Text
Category

Documents

Etudes supérieures

Light Logics for Polynomial Time Computations April 3th

Time Computations

Book

58 pages

Flag

English

icon play Lire
icon play Infos
A Brief Survey of Imprinting Options for Constrained Devices
Category

Documents

A Brief Survey of Imprinting Options for Constrained Devices

Eric Rescorla

A Brief Survey of Imprinting Options for Constrained Devices Alternate Text
Category

Documents

Etudes supérieures

A Brief Survey of Imprinting Options for Constrained Devices

Eric Rescorla

Book

4 pages

Flag

English

icon play Lire
icon play Infos
On Access Control in the Internet of Things
Category

Documents

On Access Control in the Internet of Things

Jan Janak

On Access Control in the Internet of Things Alternate Text
Category

Documents

Etudes supérieures

On Access Control in the Internet of Things

Jan Janak

Book

3 pages

Flag

English

icon play Lire
icon play Infos
Access Tokens for the IoT Jens Matthias Bohli NEC Laboratories Europe eu Introduction The vision of the Internet of Things has been discussed for several years now and has already attracted attention beyond the research community Besides the widespread use of RFID chips the Internet of Things is also characterized by smart real world objects that report status of themselves or the environment detected by sensors Some objects also offer to change their status or the environment through actuators Communication and management platforms for smart objects are currently developed Privacy security and trust are an essential component in such a platform due to the sensitivity of personal data and the impact that decisions and actuations have on the real world This paper discusses access protection for smart objects The focus is on access tokens that support payment and access tokens for wireless sensor networks with unprotected sensor nodes The goal is to present specific requirements and point to initial solutions Access restrictions on the smart object are needed to prevent unauthorized access to the object to protect the data or actuation offered by the smart object or to prevent malicious access patterns that aim at exhausting limited resources in a DoS attack The SENSEI project considered two kinds of access restricted objects Objects that can only be accessed by a small restricted group and Objects that are in principle publicly available but require payment for access The assumed use case is a network of sensor equipped parking lots that allow the user to find a parking space remotely or reserve the parking space actuation Being able to offer payment for access to objects or wireless sensor network can also be an incentive to accelerate wide deployments of this technology Setting The involved parties are the owner of the object a framework provider where the object is registered and the users wishing to access the object Initially the object has a shared key with the framework provider Users have to receive ...
Category

Documents

Access Tokens for the IoT Jens Matthias Bohli NEC Laboratories Europe eu Introduction The vision of the Internet of Things has been discussed for several years now and has already attracted attention beyond the research community Besides the widespread use of RFID chips the Internet of Things is also characterized by smart real world objects that report status of themselves or the environment detected by sensors Some objects also offer to change their status or the environment through actuators Communication and management platforms for smart objects are currently developed Privacy security and trust are an essential component in such a platform due to the sensitivity of personal data and the impact that decisions and actuations have on the real world This paper discusses access protection for smart objects The focus is on access tokens that support payment and access tokens for wireless sensor networks with unprotected sensor nodes The goal is to present specific requirements and point to initial solutions Access restrictions on the smart object are needed to prevent unauthorized access to the object to protect the data or actuation offered by the smart object or to prevent malicious access patterns that aim at exhausting limited resources in a DoS attack The SENSEI project considered two kinds of access restricted objects Objects that can only be accessed by a small restricted group and Objects that are in principle publicly available but require payment for access The assumed use case is a network of sensor equipped parking lots that allow the user to find a parking space remotely or reserve the parking space actuation Being able to offer payment for access to objects or wireless sensor network can also be an incentive to accelerate wide deployments of this technology Setting The involved parties are the owner of the object a framework provider where the object is registered and the users wishing to access the object Initially the object has a shared key with the framework provider Users have to receive ...

Matthias Bohli

Access Tokens for the IoT Jens Matthias Bohli NEC Laboratories Europe eu Introduction The vision of the Internet of Things has been discussed for several years now and has already attracted attention beyond the research community Besides the widespread use of RFID chips the Internet of Things is also characterized by smart real world objects that report status of themselves or the environment detected by sensors Some objects also offer to change their status or the environment through actuators Communication and management platforms for smart objects are currently developed Privacy security and trust are an essential component in such a platform due to the sensitivity of personal data and the impact that decisions and actuations have on the real world This paper discusses access protection for smart objects The focus is on access tokens that support payment and access tokens for wireless sensor networks with unprotected sensor nodes The goal is to present specific requirements and point to initial solutions Access restrictions on the smart object are needed to prevent unauthorized access to the object to protect the data or actuation offered by the smart object or to prevent malicious access patterns that aim at exhausting limited resources in a DoS attack The SENSEI project considered two kinds of access restricted objects Objects that can only be accessed by a small restricted group and Objects that are in principle publicly available but require payment for access The assumed use case is a network of sensor equipped parking lots that allow the user to find a parking space remotely or reserve the parking space actuation Being able to offer payment for access to objects or wireless sensor network can also be an incentive to accelerate wide deployments of this technology Setting The involved parties are the owner of the object a framework provider where the object is registered and the users wishing to access the object Initially the object has a shared key with the framework provider Users have to receive ... Alternate Text
Category

Documents

Etudes supérieures

Access Tokens for the IoT Jens Matthias Bohli NEC Laboratories Europe eu Introduction The vision of the Internet of Things has been discussed for several years now and has already attracted attention beyond the research community Besides the widespread use of RFID chips the Internet of Things is also characterized by smart real world objects that report status of themselves or the environment detected by sensors Some objects also offer to change their status or the environment through actuators Communication and management platforms for smart objects are currently developed Privacy security and trust are an essential component in such a platform due to the sensitivity of personal data and the impact that decisions and actuations have on the real world This paper discusses access protection for smart objects The focus is on access tokens that support payment and access tokens for wireless sensor networks with unprotected sensor nodes The goal is to present specific requirements and point to initial solutions Access restrictions on the smart object are needed to prevent unauthorized access to the object to protect the data or actuation offered by the smart object or to prevent malicious access patterns that aim at exhausting limited resources in a DoS attack The SENSEI project considered two kinds of access restricted objects Objects that can only be accessed by a small restricted group and Objects that are in principle publicly available but require payment for access The assumed use case is a network of sensor equipped parking lots that allow the user to find a parking space remotely or reserve the parking space actuation Being able to offer payment for access to objects or wireless sensor network can also be an incentive to accelerate wide deployments of this technology Setting The involved parties are the owner of the object a framework provider where the object is registered and the users wishing to access the object Initially the object has a shared key with the framework provider Users have to receive ...

Matthias Bohli

Book

3 pages

Flag

English

icon play Lire
icon play Infos
Un trusted Intermediaries in CoAP
Category

Documents

Un trusted Intermediaries in CoAP

Thomas Fossati?

Un trusted Intermediaries in CoAP Alternate Text
Category

Documents

Etudes supérieures

Un trusted Intermediaries in CoAP

Thomas Fossati?

Book

3 pages

Flag

English

icon play Lire
icon play Infos
A System of Interaction and Structure IV: The Exponentials and Decomposition
Category

Documents

A System of Interaction and Structure IV: The Exponentials and Decomposition

Lutz Strassburger

A System of Interaction and Structure IV: The Exponentials and Decomposition Alternate Text
Category

Documents

Etudes supérieures

A System of Interaction and Structure IV: The Exponentials and Decomposition

Lutz Strassburger

Book

43 pages

Flag

English

icon play Lire
icon play Infos
April final version for proceedings of CiE 10
Category

Documents

April final version for proceedings of CiE'10

Lutz Strassburger

April final version for proceedings of CiE 10 Alternate Text
Category

Documents

Etudes supérieures

April final version for proceedings of CiE'10

Lutz Strassburger

Book

10 pages

Flag

English

icon play Lire
icon play Infos
ANon commutative Extension of MELL Alessio Guglielmi and Lutz Straßburger
Category

Documents

ANon commutative Extension of MELL Alessio Guglielmi and Lutz Straßburger

ANon commutative Extension of MELL Alessio Guglielmi and Lutz Straßburger Alternate Text
Category

Documents

Etudes supérieures

ANon commutative Extension of MELL Alessio Guglielmi and Lutz Straßburger

Book

16 pages

Flag

English

icon play Lire
icon play Infos
Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic
Category

Documents

Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic

Second Order

Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic Alternate Text
Category

Documents

Etudes supérieures

Some Observations on the Proof Theory of Second Order Propositional Multiplicative Linear Logic

Second Order

Book

15 pages

Flag

English

icon play Lire
icon play Infos
January Submitted pages paper pages appendix
Category

Documents

January Submitted pages paper pages appendix

Second Order

January Submitted pages paper pages appendix Alternate Text
Category

Documents

Etudes supérieures

January Submitted pages paper pages appendix

Second Order

Book

39 pages

Flag

English

icon play Lire
icon play Infos
May To be presented at HyLo 07 Part of ESSLLI
Category

Documents

May To be presented at HyLo'07 Part of ESSLLI

Lutz Strassburger

May To be presented at HyLo 07 Part of ESSLLI Alternate Text
Category

Documents

Etudes supérieures

May To be presented at HyLo'07 Part of ESSLLI

Lutz Strassburger

Book

10 pages

Flag

English

icon play Lire
icon play Infos
Under consideration for publication in Math Struct in Comp Science
Category

Documents

Under consideration for publication in Math Struct in Comp Science

Under consideration for publication in Math Struct in Comp Science Alternate Text
Category

Documents

Etudes supérieures

Under consideration for publication in Math Struct in Comp Science

Book

21 pages

Flag

English

icon play Lire
icon play Infos
March This is an expanded version of the LICS 05 submission Mistakes have been corrected and the relative emphasis of axioms has changed but the claims are strictly identical
Category

Documents

March This is an expanded version of the LICS'05 submission Mistakes have been corrected and the relative emphasis of axioms has changed but the claims are strictly identical

Francois Lamarche

March This is an expanded version of the LICS 05 submission Mistakes have been corrected and the relative emphasis of axioms has changed but the claims are strictly identical Alternate Text
Category

Documents

Etudes supérieures

March This is an expanded version of the LICS'05 submission Mistakes have been corrected and the relative emphasis of axioms has changed but the claims are strictly identical

Francois Lamarche

Book

17 pages

Flag

English

icon play Lire
icon play Infos
June Lecture notes for ESSLLI 06 Malaga Spain
Category

Documents

June Lecture notes for ESSLLI'06 Malaga Spain

Lutz Strassburger

June Lecture notes for ESSLLI 06 Malaga Spain Alternate Text
Category

Documents

Etudes supérieures

June Lecture notes for ESSLLI'06 Malaga Spain

Lutz Strassburger

Book

96 pages

Flag

English

icon play Lire
icon play Infos
Supervisory Control for Modal Specifications of Services
Category

Documents

Supervisory Control for Modal Specifications of Services

Philippe Darondeau

Supervisory Control for Modal Specifications of Services Alternate Text
Category

Documents

Etudes supérieures

Supervisory Control for Modal Specifications of Services

Philippe Darondeau

Book

8 pages

Flag

English

icon play Lire
icon play Infos
P U B L I C A T I O N I N T E R N E No
Category

Documents

P U B L I C A T I O N I N T E R N E No

P U B L I C A T I O N I N T E R N E No Alternate Text
Category

Documents

Etudes supérieures

P U B L I C A T I O N I N T E R N E No

Book

17 pages

Flag

English

icon play Lire
icon play Infos
Statistical Region Merging Richard Nock and Frank Nielsen
Category

Documents

Statistical Region Merging Richard Nock and Frank Nielsen

Statistical Region Merging Richard Nock and Frank Nielsen Alternate Text
Category

Documents

Etudes supérieures

Statistical Region Merging Richard Nock and Frank Nielsen

Book

7 pages

Flag

English

icon play Lire
icon play Infos
Marie Albenque Eric Fusy and Dominique Poulalhon
Category

Documents

Marie Albenque Eric Fusy and Dominique Poulalhon

Marie Albenque

Marie Albenque Eric Fusy and Dominique Poulalhon Alternate Text
Category

Documents

Etudes supérieures

Marie Albenque Eric Fusy and Dominique Poulalhon

Marie Albenque

Book

8 pages

Flag

English

icon play Lire
icon play Infos
Optimal Coding and Sampling of Triangulations
Category

Documents

Optimal Coding and Sampling of Triangulations

Optimal Coding and Sampling of Triangulations Alternate Text
Category

Documents

Etudes supérieures

Optimal Coding and Sampling of Triangulations

Book

12 pages

Flag

English

icon play Lire
icon play Infos
Planar Graphs via Well Orderly Maps and Trees
Category

Documents

Planar Graphs via Well Orderly Maps and Trees

Cyril Gavoille

Planar Graphs via Well Orderly Maps and Trees Alternate Text
Category

Documents

Etudes supérieures

Planar Graphs via Well Orderly Maps and Trees

Cyril Gavoille

Book

19 pages

Flag

English

icon play Lire
icon play Infos
Marie Albenque Eric Fusy and Dominique Poulalhon
Category

Documents

Marie Albenque Eric Fusy and Dominique Poulalhon

Marie Albenque

Marie Albenque Eric Fusy and Dominique Poulalhon Alternate Text
Category

Documents

Etudes supérieures

Marie Albenque Eric Fusy and Dominique Poulalhon

Marie Albenque

Book

8 pages

Flag

English

icon play Lire
icon play Infos
Dynamic programming for graphs on surfaces
Category

Documents

Dynamic programming for graphs on surfaces

Ignasi Saucnrs, Lirmm, Montpellier

Dynamic programming for graphs on surfaces Alternate Text
Category

Documents

Etudes supérieures

Dynamic programming for graphs on surfaces

Ignasi Saucnrs, Lirmm, Montpellier

Book

61 pages

Flag

English

icon play Lire
icon play Infos
Metastability for Ginzburg Landau type
Category

Documents

Metastability for Ginzburg Landau type

Nils Berglund

Metastability for Ginzburg Landau type Alternate Text
Category

Documents

Etudes supérieures

Metastability for Ginzburg Landau type

Nils Berglund

Book

48 pages

Flag

English

icon play Lire
icon play Infos
Jam8 soumis a Topics on the Interface between Harmonic Analysis and Number Theory T Erdelyi B Saffari G Tenenbaum Eds
Category

Documents

Jam8 soumis a Topics on the Interface between Harmonic Analysis and Number Theory T Erdelyi B Saffari G Tenenbaum Eds

Philippe Jaming

Jam8 soumis a Topics on the Interface between Harmonic Analysis and Number Theory T Erdelyi B Saffari G Tenenbaum Eds Alternate Text
Category

Documents

Etudes supérieures

Jam8 soumis a Topics on the Interface between Harmonic Analysis and Number Theory T Erdelyi B Saffari G Tenenbaum Eds

Philippe Jaming

Book

17 pages

Flag

English

icon play Lire
icon play Infos
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents
Alternate Text