|
Menu
Header
Footer
SideBar
|
Cours
|
Participer à l'évaluation du cours (anonyme et facultatif)
⚠ (:html:)
<script language="javascript" type="text/javascript">
var PDF_surveyID = 'C96676094C80F49C';
var PDF_openText = 'Cliquer ici';
</script>
<script type="text/javascript" language="javascript" src="http://www.polldaddy.com/s.js"></script>
<noscript><a href="http://www.polldaddy.com/s/C96676094C80F49C/">View Survey</a></noscript>
(:htmlend:)
|
- Semaine 1
- Semaine 2
- Semaine 3
- Semaine 4
- Séance du vendredi matin
- Vincent Alloy, Safe P2P self-downloading
- Trong-Hieu Ha, Huy-Ngoc Dau, Karim Bessaoud, Distributed Synthesis of Fault-Tolerant Programs in the High Atomicity Model
- Quan Kong, Abbas Hatoum, Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
- David Auriol, A Self-stabilizing Link-Coloring Protocol Resilient to Byzantine Faults in Tree Networks
- Cherif Zakat, Push-to-Pull Peer-to-Peer Live Streaming
- Nor Kichou, An Architectural Approach to Preventing Code Injection Attacks
- Ali El Masri, The Case for FEC-based Reliable Multicast in Wireless Mesh Networks
- Fazia Laoussati, Scaling Byzantine Fault-Tolerant Replication toWide Area Networks
- TRAN Chi Thang, TRAN Dinh Nam, Countering web spam with credibility-based link analysis
- Xu Meng, Deleting files in the Celeste peer to peer storage system
- Zhang Tuo, the mailbox problem
- Mustapha SAIDJ, Simple Technique de Localisation à Base de Signature
- Insaf M'HISSEN, Oussema Habbach, Synchronous Consensus with Mortal Byzantines
- Séance du vendredi après-midi
- Lila Kenoui, Using Loop Invariants to Fight Soft Errors in Data Caches
- Fayçal Kassa, Reda Benaissa, Interval Tree Clocks: A Logical Clock for Dynamic Systems
- Hamri Amina, Lamani Anissa Khadidja, Miloudi Narjess, Computing Without Communicating:Ring Exploration by Asynchronous Oblivious Robots
- Kamelia KESSAL, Djamel MOUCHENE, Abdelkrim HADJIDJ, Protecting BitTorrent: design and evaluation of effective countermeasures against DoS attacks
- MOAKHAR Bilel, TOUIL Hamza, Self-stabilizing Population Protocols
- Telli Zakaria, A FORMAL ANALUSIS OF THE DEFERRED UPDATE TECHNIQUE
- Sghaier Nouha, Cherfi Mehdi
- Boumaaza Lamiae, Local Maps: New Insights into Mobile Agent Algorithms
- Semaine 5
- Examen
- Documents autorisés : les documents autorisés lors de l'examen sont les impressions des documents accessible depuis cette page, et les notes manuscrites personnelles (ce qui exclut en particulier les photocopies de notes manuscrites d'autres personnes et les livres).
Stages
Les premiers sujets de stage de Master 2 Recherche sont disponibles ICI.
|