In this report we point out the reasons that lead us to distribute modular applications, why we think that modularity is a critical step --~but not a final one~-in the design of distributed applications, and how we distribute. We illustrate our ideas with two experiments developed in the \sc Croap and \sc Secoia projects at \tt INRIA\footnoteInstitut National de Recherche en Informatique et Automatique.. They concern respectively \sc Centaur and \sc Smeci tools
We present a new model for automated verification of security protocols, permitting the use of an un...
We investigate the properties of the solutions of a class of piecewise-linear differential equations...
In the paper we consider the elasticity equations in nonsmooth domains in $R^n, n=2,3$. The domains ...
In this report we point out the reasons that lead us to distribute modular applications, why we thin...
In this paper, we consider a multiplexer with constant output rate and infinite buffer capacity fed ...
Field Programmable Gate Arrays (FPGAs) are usually programmed using languages and methods inherited ...
Ce document présente une analyse comparative de divers langages prototypes et modèles formels exista...
An algorithm for finding small-weight words in large linear codes is developed. It is in particular ...
This paper presents a theoretical and experimental study on two different methods to evaluate the si...
The present note proposes a survey of protocol overheads in mobile ad-hoc networks. An analysis is p...
We present a radix-10 variant of the BKM algorithm. It is a shift-and-add, CORDIC-like algorithm tha...
The so-called synthesis problem for nets, which consists in deciding whether a given graph is isomor...
The lowest static reduction (LSR) is the 0^th-order Control-Flow Analysis without continuation passi...
L'évolution de l'architecture des microprocesseurs est très rapide ; dans ce rapport nous présentons...
We present a stratification of geometric information available from stereo in three levels: Euclidea...
We present a new model for automated verification of security protocols, permitting the use of an un...
We investigate the properties of the solutions of a class of piecewise-linear differential equations...
In the paper we consider the elasticity equations in nonsmooth domains in $R^n, n=2,3$. The domains ...
In this report we point out the reasons that lead us to distribute modular applications, why we thin...
In this paper, we consider a multiplexer with constant output rate and infinite buffer capacity fed ...
Field Programmable Gate Arrays (FPGAs) are usually programmed using languages and methods inherited ...
Ce document présente une analyse comparative de divers langages prototypes et modèles formels exista...
An algorithm for finding small-weight words in large linear codes is developed. It is in particular ...
This paper presents a theoretical and experimental study on two different methods to evaluate the si...
The present note proposes a survey of protocol overheads in mobile ad-hoc networks. An analysis is p...
We present a radix-10 variant of the BKM algorithm. It is a shift-and-add, CORDIC-like algorithm tha...
The so-called synthesis problem for nets, which consists in deciding whether a given graph is isomor...
The lowest static reduction (LSR) is the 0^th-order Control-Flow Analysis without continuation passi...
L'évolution de l'architecture des microprocesseurs est très rapide ; dans ce rapport nous présentons...
We present a stratification of geometric information available from stereo in three levels: Euclidea...
We present a new model for automated verification of security protocols, permitting the use of an un...
We investigate the properties of the solutions of a class of piecewise-linear differential equations...
In the paper we consider the elasticity equations in nonsmooth domains in $R^n, n=2,3$. The domains ...