Nous nous intéressons à l'aspect théorique des virus informatiques. Pour cela nous proposons une définition fondée sur les théorèmes d'itération et de récursion. Nous montrons qu'elle capture naturellement les définitions antérieures et en particulier celle de L.~Adleman. Nous établissons une méthode générique de construction de virus et nous l'illustrons par quelques exemples. Nous mettons en avant les liens qu'entretiennent la spécialisation de programme et la propagation de virus. Finalement, nous étudions des stratégies de détection et de protection en nous appuyant sur les théories de la calculabilité et de l'information
We study a coupled system of equations describing the movement of a rigid body which is immersed in ...
AbstractLet E be an order continuous Köthe function space (or an order continuous Banach lattice) an...
U ovom diplomskom radu prezentirani su osnovni koncepti teorije rizika koja modelira dva izvora neiz...
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/108611/1/biom12178.pdfhttp://deepblue.l...
Le résumé en français n'a pas été communiqué par l'auteur.Throughout this thesis, I wish to study th...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
Let $(X, {\cal A}, \mu, \tau)$ be an ergodic dynamical system and $\varphi$ be a measurable map from...
International audienceWe provide a simple proof of the completeness of arbitrary public announcement...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
AbstractHere we establish left Caputo fractional ‖⋅‖∞-Landau type inequalities. We give applications...
International audienceWe study the controllability of the Bloch equation, for an ensemble of non int...
AbstractIn this article we continue with the study of approximation properties of smooth Poisson–Cau...
Trajectories of individual molecules moving within complex environments such as cell cytoplasm and m...
AbstractIn this paper, we give a new reverse Hilbert-type inequality with a best constant factor and...
In this paper sufficient conditions for a matrix M = (mnk ) (mnk are Cesàro numbers As n‐k, s ∈ C if...
We study a coupled system of equations describing the movement of a rigid body which is immersed in ...
AbstractLet E be an order continuous Köthe function space (or an order continuous Banach lattice) an...
U ovom diplomskom radu prezentirani su osnovni koncepti teorije rizika koja modelira dva izvora neiz...
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/108611/1/biom12178.pdfhttp://deepblue.l...
Le résumé en français n'a pas été communiqué par l'auteur.Throughout this thesis, I wish to study th...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
Let $(X, {\cal A}, \mu, \tau)$ be an ergodic dynamical system and $\varphi$ be a measurable map from...
International audienceWe provide a simple proof of the completeness of arbitrary public announcement...
The role of simulation has kept increasing for the sensitivity analysis and the uncertainty quantifi...
AbstractHere we establish left Caputo fractional ‖⋅‖∞-Landau type inequalities. We give applications...
International audienceWe study the controllability of the Bloch equation, for an ensemble of non int...
AbstractIn this article we continue with the study of approximation properties of smooth Poisson–Cau...
Trajectories of individual molecules moving within complex environments such as cell cytoplasm and m...
AbstractIn this paper, we give a new reverse Hilbert-type inequality with a best constant factor and...
In this paper sufficient conditions for a matrix M = (mnk ) (mnk are Cesàro numbers As n‐k, s ∈ C if...
We study a coupled system of equations describing the movement of a rigid body which is immersed in ...
AbstractLet E be an order continuous Köthe function space (or an order continuous Banach lattice) an...
U ovom diplomskom radu prezentirani su osnovni koncepti teorije rizika koja modelira dva izvora neiz...