Academic literature on the topic 'Architecture sur mesure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Architecture sur mesure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Architecture sur mesure":
Ohr, Karlfriedrich, and Jean-Jacques Malmary. "La genèse de la basilique romaine." Revue archéologique 77, no. 1 (April 29, 2024): 41–80. http://dx.doi.org/10.3917/arch.241.0041.
de Vittoris, Raphaël, and Sophie Cros. "Le « serious game », un outil pertinent pour la gestion de crise." Recherches en Sciences de Gestion N° 155, no. 2 (June 19, 2023): 77–104. http://dx.doi.org/10.3917/resg.155.0077.
Arbaoui, Saifeddine, and Nadia Jemjami. "Les déterminants de la transformation numérique dans le secteur public : proposition d’une échelle de mesure." Recherches en Sciences de Gestion N° 155, no. 2 (June 19, 2023): 339–67. http://dx.doi.org/10.3917/resg.155.0339.
Ibrahimi, Mohammed, and Fayçal El Baghdadi. "Pertinence de la valeur des informations comptables : Cas des sociétés marocaines cotées." Recherches en Sciences de Gestion N° 158, no. 5 (December 18, 2023): 219–41. http://dx.doi.org/10.3917/resg.158.0219.
Belderbos, Marc. "actualité d’Alberti." Les Pages du laa 1, no. 4 (August 24, 2023): 1–56. http://dx.doi.org/10.14428/lpl.v1i4.75473.
Friedrich, Martin. "Power, Institutions and Factions in German Protestantism." Revue d'histoire du protestantisme 8, no. 2-3 (July 13, 2023): 255–72. http://dx.doi.org/10.47421/rhp_8.2-3_255-272.
Claeys, Damien. "Discontinuités des processus de conception architecturale : Crises de la représentation ?" Acta Europeana Systemica 8 (July 9, 2020): 19–36. http://dx.doi.org/10.14428/aes.v8i1.56203.
Outers, Martin. "Du standard passif à l’architecture météorologique." lieuxdits, no. 21 (July 6, 2022): 12–19. http://dx.doi.org/10.14428/ld.vi21.67203.
Vanacker, Beatrijs. "Poétique de l’épistolarité romanesque dans l’oeuvre de Jeanne-Marie Leprince de Beaumont1." Études françaises 54, no. 3 (January 18, 2019): 147–66. http://dx.doi.org/10.7202/1055655ar.
Barrette, Jacques. "Architecture de ressources humaines." Articles 60, no. 2 (December 6, 2005): 213–43. http://dx.doi.org/10.7202/011720ar.
Dissertations / Theses on the topic "Architecture sur mesure":
Cheikho, Karim. "Conception de structures souples élastiques et applications en biomécanique." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0147.
The selection of the most-suitable porous bone scaffold for regenerative medicine applied to a given clinical application is challenging, which has motivated numerous studies especially for the repair of bone defects. Several designs have been proposed over the last decade, including structures with pore size gradients that have been proved to facilitate nutrient transport from the periphery to the core of the scaffold, and therefore to enhance tissue regeneration. The framework used to design such porous scaffolds with pore size gradients is limited by the range of the reachable pore distribution and mechanical properties.In this work, we presented a design framework to generate various three-dimensional porous scaffolds structures including cylindrical graded scaffolds from the transformations of unit cells. We proposed a methodology to generate porous scaffolds by multilayer repetition of circular cross sections, resulting in tunable anisotropy depending on the intended clinical application. We identified the apparent mechanical properties of different porous scaffold configurations using an original numerical method, highlighting the versatility of the design procedure that allows for separate tuning of longitudinal and transverse mechanical properties of porous scaffold.In order to investigate the ability of common additive manufacturing techniques to fabricate the proposed structures, we have elaborated scaffolds using FDM (fused deposition modeling) and SLA (stereolithography) techniques, we have performed experimental mechanical tests to be confronted to the predictions issued from simulations. In spite of the geometrical differences observed between the initial design and the obtained structures, the apparent properties of the structures obtained by the SLA technique agree with those predicted by the proposed computational method.Promising perspectives have been proposed concerning the design of self-fitting scaffolds that can be used for clinical applications, particularly to repair bone defects using mini-invasive surgery
Sebag, Deborah. "Recherches sur l'architecture en Palestine au Bronze ancien." Phd thesis, Université Panthéon-Sorbonne - Paris I, 2011. http://tel.archives-ouvertes.fr/tel-00781529.
Plouviez, Geoffrey. "Etude, spécification, vérification formelle de mécanismes de virtualisation sécurisés pour architecture many-cores." Paris 6, 2012. http://www.theses.fr/2012PA066045.
This thesis presents a co-hosting approach of multiple software stacks within a same multiprocessor system-on-chip. In the field of general purpose multiprocessors, the cores number is continuously increasing and so is the computation capability. But, from the trust side, this growing computer complexity deepens trust issues. This lack of trustworthiness is exacerbated by the increasing information’s value processed by computer systems. Usual isolation techniques, at both user’s or kernel’s levels, do not offer enough protection for the confidentiality, integrity and availability of the running software stacks. In this thesis, we present a trusted many-cores virtualization approach which aims to execute software stacks in trusted virtual machines. Our goal is to provide enough isolation so a malicious virtual machine user will not be able to compromise another virtual machine. We have built hardware protection mechanisms which are under the control of a software formally verified hypervisor
Senat, Claude. "Prise en compte de l'encombrement, au sein d'un modèle de prévision des niveaux de pression, reposant sur l'hypothèse de réflexion diffuse sur les parois." Toulouse 3, 1992. http://www.theses.fr/1992TOU30056.
Borrel, Nicolas. "Evaluation d'injection de fautes Laser et conception de contre-mesures sur une architecture à faible consommation." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4358.
In many applications such as credit cards, confidential data is used. In this regard, the systems-on-chip used in these applications are often deliberately attacked. This puts the security of our data at a high risk. Furthermore, many SoC devices have become battery-powered and require very low power consumption. In this context, semiconductor manufacturers should propose secured and low-power solutions.This thesis presents a security evaluation and a countermeasures design for a low-power, triple-well architecture dedicated to low-power applications. The security context of this research focuses on a Laser sensitivity evaluation of this architecture.This paper first presents the state of the art of Laser fault injection techniques, focusing on the physical effects induced by a Laser beam. Afterward, we discuss the different dual-and triple-well architectures studied in order to compare their security robustness. Then, a physical study of these architectures as substrate resistor and capacitor modeling highlights their impact on security. This evaluation lets us anticipate the phenomena potentially induced by the Laser inside the biasing well (P-well, N-well) and the MOS transistors.Following the analysis of the physical phenomena resulting from the interaction between the laser and the silicon, electrical modeling of the CMOS gates was developed for dual and triple-well architectures. This enabled us to obtain a good correlation between measurements and electrical simulations.In conclusion, this work enabled us to determine possible design rules for increasing the security robustness of CMOS gates as well as the development of Laser sensors able to detect an attack
Hentati, Raïda. "Implémentation d'algorithmes de reconnaissance biométrique par l'iris sur des architectures dédiées." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917955.
Riquet, Damien. "DISCUS : une architecture de détection d'intrusions réseau distribuée basée sur un langage dédié." Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10207/document.
Nowadays, information systems are everywhere and their interconnexion is almost complete. The rise of complex and large computing infrastructures has brought a need for increased security. We need to follow a sound methodology so that one can understand an exploit develop a counter-measure and deploy it as soon as possible. To tackle those issues, we propose DISCUS, a new distributed architecture that takes advantage of existing solutions as well as distributed probes. This approach leads to finer, collaborative analysis where each probe enrich the global knowledge of the architecture as a whole. Our solution introduces two main issues : determine efficient distribution mechanism to implement collaboration and facilitate the developpement of the software that will run on highly heterogeneous hardware. This thesis mainly focuses on the later. The actual development of the software that will run on the probes can not be made by a security special or a system administrator because of the diversity of the probes (in term of memory, computing power, network location…). This would imply that the developer has strong knowledge on security, networking, kernel development, embeded systems, hardware development. Such a developer is hard to find. To overcome this problem, we propose DISCUS, a domain specific language. With this langage, one can implement security rules without the need to take implementation details into account. Our compiler chain takes the rules and is able to build software, or hardware, image specific for each probes of the network. This thesis presents this language, some case studies and its evaluation in term of expressivity, robustness and performances
Kortebi, Abdesselem. "Evaluation d' une architecture IP orientée flot." Paris 6, 2005. http://www.theses.fr/2005PA066517.
Dévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore." Electronic Thesis or Diss., Paris 6, 2017. http://www.theses.fr/2017PA066138.
Manycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Dévigne, Clément. "Exécution sécurisée de plusieurs machines virtuelles sur une plateforme Manycore." Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066138/document.
Manycore architectures, which comprise a lot of cores, are a way to answer the always growing demand for digital data processing, especially in a context of cloud computing infrastructures. These data, which can belong to companies as well as private individuals, are sensitive by nature, and this is why the isolation problematic is primordial. Yet, since the beginning of cloud computing, virtualization techniques are more and more used to allow different users to physically share the same hardware resources. This is all the more true for manycore architectures, and it partially comes down to the architectures to guarantee that data integrity and confidentiality are preserved for the software it executes. We propose in this thesis a secured virtualization environment for a manycore architecture. Our mechanism relies on hardware components and a hypervisor software to isolate several operating systems running on the same architecture. The hypervisor is in charge of allocating resources for the virtualized operating systems, but does not have the right to access the resources allocated to these systems. Thus, a security flaw in the hypervisor does not imperil data confidentiality and integrity of the virtualized systems. Our solution is evaluated on a cycle-accurate virtual prototype and has been implemented in a coherent shared memory manycore architecture. Our evaluations target the hardware and performance overheads added by our mechanisms. Finally, we analyze the security provided by our solution
Books on the topic "Architecture sur mesure":
Fabris, Luca Maria Francesco. Architecture sur mesure: ECDM architectes. Santarcangelo di Romagna (RN) [i.e. Rimini, Italy]: Maggioli, 2009.
Tournus, Jacques. La maison sur mesure. 3rd ed. Paris: E d. du Moniteur, 1991.
Michelin, Nicolas. Cinq sur cinq : dix projets sur mesure, architecture et urbanisme =: Five by five : ten custom-made projects architecture and urban planning. Paris: Archibooks, 2008.
Nicolas, Michelin, Pierre Catherine, Agence Nicolas Michelin et Associés., and Arc en rêve centre d'architecture., eds. Cinq sur cinq : dix projets sur mesure, architecture et urbanisme =: Five by five : ten custom-made projects architecture and urban planning. Paris: Archibooks, 2008.
Cinq sur cinq : dix projets sur mesure, architecture et urbanisme =: Five by five : ten custom-made projects architecture and urban planning. Paris: Archibooks, 2008.
Corbusier, Le. Le modulor: Essai sur une mesure harmonique a l'echelle humaine applicable universellement a l'architecture et `a la mechanique. Birkhauser, 2000.
Book chapters on the topic "Architecture sur mesure":
"Mesures anti-corruption visant à endiguer les flux financiers illicites." In Rapport sur la gouvernance économique I: Architecture institutionnelle pour lutter contre les flux financiers illicites, 113–29. United Nations, 2023. http://dx.doi.org/10.18356/9789210010665c009.
Letesson, Quentin, and Carl Knappett. "Processes and Patterns at the Macro-Scale: Crete and Beyond." In Minoan Architecture and Urbanism. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198793625.003.0019.
DERVEAUX, Virginie, and Cécile FRIES-PAIOLA. "L’architecture scolaire face à la pandémie, conséquences spatiales de la gestion de crise." In Les épidémies au prisme des SHS, 205–20. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.6007.
Conference papers on the topic "Architecture sur mesure":
Alison, Aurosa. "Les « Unités » Modulor dans la Philosophie de l’Espace de Gaston Bachelard." In LC2015 - Le Corbusier, 50 years later. Valencia: Universitat Politècnica València, 2015. http://dx.doi.org/10.4995/lc2015.2015.1045.