As it is introduced by Bermond, Pérennes, and Kodate and by Fragopoulou and Akl, some Cayley graphs, including most popular models for interconnection networks, admit a special automorphism, called complete rotation. Such an automorphism is often used to derive algorithms or properties of the underlying graph. For example, some optimal gossiping algorithms can be easily designed by using a complete rotation, and the constructions of the best known edge disjoint spanning trees in the toroidal meshes and the hypercubes are based on such an automorphism. Our purpose is to investigat- e such Cayley graphs. We relate some symmetries of a graph with potential algebraic symmetries appearing in its definition as a Cayley graph on a group. In the ca...
Colloque avec actes et comité de lecture. nationale.National audienceOn explore dans cet article que...
Ternary fission events from the decay of $^{56}$Ni compound nuclei, formed in the $^{32}$S + $^{24}$...
A lot of research has been done in routing protocols for ad-hoc network especially at the IETF in th...
As it is introduced by Bermond, Pérennes, and Kodate and by Fragopoulou and Akl, some Cayley graphs,...
We deal with a numerical method for HJB equations coming from optimal control problems with state co...
This paper studies the problem of All-to-All Communication for optical networks. In such networks th...
International audienceWe present a new tool that generates bounds on the values and the round-off er...
The form of topological derivatives for shape functionals for contact problems is established. Metho...
International audienceWe study a process calculus which combines both nondeterministic and probabili...
International audienceWe present a new tool that generates bounds on the values and the round-off er...
Projet PROMATHAsymptotic stability, conservative systems, control without regret, incomplete informa...
International audienceWe study the averaging problem for a divergence form random parabolic operator...
Ce rapport technique décrit les principales fonctionnalités du logiciel Medit. Ce programme a été dé...
Colloque avec actes et comité de lecture.A partir de techniques d'automates d'arbres, nous présenton...
Rapport interne.The theoretical and practical framework of Field Programmable Neural Arrays has been...
Colloque avec actes et comité de lecture. nationale.National audienceOn explore dans cet article que...
Ternary fission events from the decay of $^{56}$Ni compound nuclei, formed in the $^{32}$S + $^{24}$...
A lot of research has been done in routing protocols for ad-hoc network especially at the IETF in th...
As it is introduced by Bermond, Pérennes, and Kodate and by Fragopoulou and Akl, some Cayley graphs,...
We deal with a numerical method for HJB equations coming from optimal control problems with state co...
This paper studies the problem of All-to-All Communication for optical networks. In such networks th...
International audienceWe present a new tool that generates bounds on the values and the round-off er...
The form of topological derivatives for shape functionals for contact problems is established. Metho...
International audienceWe study a process calculus which combines both nondeterministic and probabili...
International audienceWe present a new tool that generates bounds on the values and the round-off er...
Projet PROMATHAsymptotic stability, conservative systems, control without regret, incomplete informa...
International audienceWe study the averaging problem for a divergence form random parabolic operator...
Ce rapport technique décrit les principales fonctionnalités du logiciel Medit. Ce programme a été dé...
Colloque avec actes et comité de lecture.A partir de techniques d'automates d'arbres, nous présenton...
Rapport interne.The theoretical and practical framework of Field Programmable Neural Arrays has been...
Colloque avec actes et comité de lecture. nationale.National audienceOn explore dans cet article que...
Ternary fission events from the decay of $^{56}$Ni compound nuclei, formed in the $^{32}$S + $^{24}$...
A lot of research has been done in routing protocols for ad-hoc network especially at the IETF in th...