Higher dimensional rewriting theory was born following work by Squier on the word problem in the 80s. The goal of this work is to extend and modernize those results from Squier. In the first part of this work we show how to use rewriting to prove coherence theorems for bicategories, pseudofunctors and pseudonatural transformations, extending techniques already applied to monoidal categories. The goal of the second half of this work is to express rewriting theory in a more fitting framework. Our first step towards this goal is to define the notion of cubical (omega,p)-category, and to prove its equivalence with its globular counterpart. These structures are put to use in the final part of this thesis, in order to extend existing results of c...
This thesis is divided into three independent chapters on the iterates of rational maps on projectiv...
Many tools exist to solve constrained path-planning problems. They can be classified as follows. In ...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Colorings of the discrete plane (i.e., tilings) are a geometrical model which is intimately linked w...
The work reported in this thesis revisits in two waysthe abstract domain of polyhedraused for static...
Lie algebras were introduced toward the end of XIXth century in order to study some geometrical prob...
We study the generalization of constraint programming on variables finite domains with variable flow...
We first recall the formalism of entropy structures introduced by T.Downarowicz. Using this backgrou...
In this thesis, we tackle several questions about Néron models of abelian varieties on a discrete va...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
The most general black hole solution of Einstein–Maxwell theory has been discovered by Plebański and...
Les problèmes logiciels sont frustrants et diminuent l’expérience utilisateur. Par exemple, la fuite...
Bijective combinatorics is a field which consists in studying the enumerative properties of some fam...
We give a new algorithm for the blocs diagonalization of Hankel matrices. When the matrix correspond...
Systematic polysemy, which has played a central role in lexical semantic debates since the 90's, see...
This thesis is divided into three independent chapters on the iterates of rational maps on projectiv...
Many tools exist to solve constrained path-planning problems. They can be classified as follows. In ...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Colorings of the discrete plane (i.e., tilings) are a geometrical model which is intimately linked w...
The work reported in this thesis revisits in two waysthe abstract domain of polyhedraused for static...
Lie algebras were introduced toward the end of XIXth century in order to study some geometrical prob...
We study the generalization of constraint programming on variables finite domains with variable flow...
We first recall the formalism of entropy structures introduced by T.Downarowicz. Using this backgrou...
In this thesis, we tackle several questions about Néron models of abelian varieties on a discrete va...
Rigorous numerics aims at providing certified representations for solutions of various problems, not...
The most general black hole solution of Einstein–Maxwell theory has been discovered by Plebański and...
Les problèmes logiciels sont frustrants et diminuent l’expérience utilisateur. Par exemple, la fuite...
Bijective combinatorics is a field which consists in studying the enumerative properties of some fam...
We give a new algorithm for the blocs diagonalization of Hankel matrices. When the matrix correspond...
Systematic polysemy, which has played a central role in lexical semantic debates since the 90's, see...
This thesis is divided into three independent chapters on the iterates of rational maps on projectiv...
Many tools exist to solve constrained path-planning problems. They can be classified as follows. In ...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...