Filtrer vos résultats
- 18
- 16
- 15
- 7
- 6
- 5
- 1
- 3
- 32
- 8
- 1
- 1
- 4
- 3
- 1
- 1
- 1
- 2
- 2
- 5
- 3
- 4
- 1
- 2
- 1
- 2
- 33
- 1
- 33
- 17
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 34
- 22
- 19
- 7
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
34 résultats
|
|
triés par
|
|
Privacy and Nomadic Computing: A Public-Key Cryptosystem Based on Passwords[Research Report] RR-LIG-030, LIG. 2012
Rapport
hal-01472092v1
|
||
Enforcing Dynamic Interference PolicyPASSAT 2011 - 3rd International Conference on Privacy, Security, Risk and Trust, Oct 2011, Boston, MA, United States. pp.1111 - 1118, ⟨10.1109/PASSAT/SocialCom.2011.17⟩
Communication dans un congrès
hal-00932533v1
|
|||
Categorical Abstract Rewriting Systems and Functoriality of Graph TransformationGT-VMT 2011 - International Workshop on Graph Transformation and Visual Modeling Techniques (satellite workshop of ETAPS 2011), Apr 2011, Saarbrücken, Germany. 17 p
Communication dans un congrès
hal-00828532v1
|
|||
|
Graph rewriting with polarized cloning2009
Pré-publication, Document de travail
hal-00433379v2
|
||
Twilight Chess - A Chess Variant Designed to Rehabilitate Human vs. Computer ChallengeJournal of the International Computer Games Association, 2009, 32 (2), pp.89-92
Article dans une revue
hal-00940915v1
|
|||
|
Data-Structure Rewriting2005
Pré-publication, Document de travail
hal-00004558v1
|
||
|
AGREE - Algebraic Graph Rewriting with Controlled EmbeddingICGT 2015 - 8th International Conference on Graph Transformation, Jul 2015, L'Aquila, Italy. pp.35-51, ⟨10.1007/978-3-319-21145-9_3⟩
Communication dans un congrès
hal-01403189v1
|
||
|
Modeling pointer redirection as cyclic term-graph rewritingTERMGRAPH'06 - Third International Workshop on Term Graph Rewriting, Apr 2006, Vienne, Austria. pp.65-84, ⟨10.1016/j.entcs.2006.10.027⟩
Communication dans un congrès
hal-00388351v1
|
||
|
On foundational aspects of RDF and SPARQL2020
Pré-publication, Document de travail
hal-02316115v2
|
||
|
All You Need Is CONSTRUCT[Research Report] LIG (Laboratoire informatique de Grenoble); LJK / Grenoble University - INRIA. 2020
Rapport
hal-02954492v1
|
||
|
The First Four Years (2007-2010) and Beyond - Volume 1: Research Program and Activity Report2011
Rapport
hal-00773168v1
|
||
|
Algebraic graph rewriting with controlled embeddingTheoretical Computer Science, 2020, 802, pp.19-37. ⟨10.1016/j.tcs.2019.06.004⟩
Article dans une revue
hal-02409411v1
|
||
|
Parallelism in AGREE TransformationsGraph Transformation - 9th International Conference, ICGT 2016, Jul 2016, Vienna, Austria. pp.37-53, ⟨10.1007/978-3-319-40530-8_3⟩
Communication dans un congrès
hal-01985467v1
|
||
|
The PBPO graph transformation approachJournal of Logical and Algebraic Methods in Programming, 2019, 103, pp.213-231. ⟨10.1016/j.jlamp.2018.12.003⟩
Article dans une revue
hal-01984720v1
|
||
Specializing Narrowing for Timetable Generation: A Case StudySeventh International Symposium on Practical Aspects of Declarative Languages (PADL05), 2005, Long Beach, United States. pp.22-36
Communication dans un congrès
hal-00372911v1
|
|||
|
A Heterogeneous Pushout Approach to Term-Graph TransformationRTA 2009 - 20th International Conference on Rewriting Techniques and Applications, Jun 2009, Brasília, Brazil. pp.194-208, ⟨10.1007/978-3-642-02348-4_14⟩
Communication dans un congrès
hal-00340202v1
|
||
A double-pushout approach for modeling pointer redirectionIFIP WG1.3 meeting, Jan 2008, Sierra Nevada, Spain
Communication dans un congrès
hal-00770342v1
|
|||
|
Adjunction for Garbage Collection with Application to Graph RewritingRTA'07 - Rewriting Techniques and Application 2007, Jun 2007, Paris, France. pp.122-136, ⟨10.1007/978-3-540-73449-9_11⟩
Communication dans un congrès
hal-00388331v1
|
||
|
The Pullback-Pushout Approach to Algebraic Graph TransformationICGT 2017, Jul 2017, Marburg, Germany. pp.3-19, ⟨10.1007/978-3-319-61470-0_1⟩
Communication dans un congrès
hal-01984745v1
|
||
|
SEmantic Networks of Data: Utility and PrivacyAtelier sur la Protection de la Vie Privée (APVP'19), Jul 2019, Cap Hornu, France
Poster de conférence
hal-02182524v1
|
||
|
Graph Transformation with Focus on Incident EdgesICGT 2012 - 6th International Conference on Graph Transformations, Sep 2012, Bremen, Germany. pp.156-171, ⟨10.1007/978-3-642-33654-6_11⟩
Communication dans un congrès
hal-00828535v1
|
||
|
Querying RDF Databases with Sub-CONSTRUCTs2021
Pré-publication, Document de travail
hal-03268281v1
|
||
|
On the Impact of Information Technologies on Society: an Historical Perspective through the Game of Chess2012
Rapport
hal-00933764v1
|
||
|
On the Impact of Information Technologies on Society: an Historical Perspective through the Game of ChessTuring-100 - The Turing Centenary Conference, Jun 2012, Manchester, United Kingdom. pp.268-277
Communication dans un congrès
hal-00933738v1
|
||
|
Privacy and Nomadic Computing: A Public-Key Cryptosystem Based on Passwords2013
Rapport
hal-00933842v1
|
||
|
Transformation of Attributed Structures with Cloning (Long Version)2014
Pré-publication, Document de travail
hal-00944383v1
|
||
|
An Algebraic Graph Transformation Approach for RDF and SPARQLElectronic Proceedings in Theoretical Computer Science, 2020, 330, pp.55-70. ⟨10.4204/EPTCS.330.4⟩
Article dans une revue
hal-03066753v1
|
||
|
SEmantic Networks of Data: Utility and PrivacyRESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France
Communication dans un congrès
hal-02182521v1
|
||
|
On the Heritage of Crypto Assets -Tales From the Crypt Protocol2022
Pré-publication, Document de travail
hal-03727994v1
|
||
|
Gardner's Minichess Variant is solved2013
Pré-publication, Document de travail
hal-00944409v1
|
- 1
- 2