Contents
Academic literature on the topic 'Composition de preuves'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Composition de preuves.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Composition de preuves"
Jones, Michael. "Administering the Anglo-Breton Garrison at Brest, 1375-1377." Revue du Nord 446, no. 2 (March 14, 2023): 249–61. http://dx.doi.org/10.3917/rdn.1446.0249.
Full textSCIENTIFIQUE, C. "Faut-il continuer à supplémenter en Vitamine D les enfants en bonne santé ?" EXERCER 35, no. 203 (May 1, 2024): 230–31. http://dx.doi.org/10.56746/exercer.2024.203.230.
Full textBarthélemy, Dominique. "Les ordalies de l’an mil." Histoire de la justice N° 15, no. 1 (March 1, 2002): 81–92. http://dx.doi.org/10.3917/rhj.015.0081.
Full textHarbec, Jacinthe. "Cohésion compositionnelle dans Image de Germaine Tailleferre." Canadian University Music Review 18, no. 2 (March 8, 2013): 48–71. http://dx.doi.org/10.7202/1014654ar.
Full textKahn, Didier. "Quelques éléments d'alchimie péruvienne." Nottingham French Studies 56, no. 3 (December 2017): 285–95. http://dx.doi.org/10.3366/nfs.2017.0191.
Full textPayen, Pascal. "Discours Historique et Structures Narratives Chez Hérodote." Annales. Histoire, Sciences Sociales 45, no. 3 (June 1990): 527–50. http://dx.doi.org/10.3406/ahess.1990.278856.
Full textBenigno, Francesco. "The Southern Italian family in the early modern period: a discussion of co-residential patterns." Continuity and Change 4, no. 1 (May 1989): 165–94. http://dx.doi.org/10.1017/s0268416000003623.
Full textPainchaud, Louis. "« La confirmation des réalités non manifestes » (NH III 74,17-19)." Dossier 74, no. 2 (March 19, 2019): 219–33. http://dx.doi.org/10.7202/1058094ar.
Full textOKUGBO, O. T., and E. S. OMOREGIE. "PHYTOCHEMICAL SCREENING, PROXIMATE COMPOSITION AND MINERAL CONTENT OF FUMTUMIA ELASTICA (PREUSS) STAPF. LEAF EXTRACTS." Nigerian Journal of Life Sciences (ISSN: 2276-7029) 3, no. 1 (March 15, 2022): 114–22. http://dx.doi.org/10.52417/njls.v3i1.114.
Full textDagher, Julie, and Caroline Paolini. "CJUE, affaire Ferrari SPA c/ du , C-720/18 et C-721/18." Pin Code N° 8, no. 2 (July 28, 2021): 18–23. http://dx.doi.org/10.3917/pinc.008.0018.
Full textDissertations / Theses on the topic "Composition de preuves"
Bousabbah, Maha. "Preuves d'algorithmes distribués par composition et raffinement." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0799/document.
Full textIn this work, we propose formal approaches for modeling andproving distributed algorithms. Such computations are designed to run oninterconnected autonomous computing entities for achieving a common task :each entity executes asynchronously the same code and interacts locally withits immediate neighbors. Correctness of distributed algorithms is a difficulttask and requires advancing methods and tools. In this thesis, we focus onsome basic problems of distributed computing, and we propose Event-B solutionsbased on the ”correct-by-construction” approach. We consider reliablesystems. We also assume that the network is anonymous and processes communicatewith asynchronous messages. In some cases, we refer to local computationsmodel to provide an abstraction of the distributed computations.We propose a formal framework enhancing the termination detection propertyof distributed algorithms. By relying on refinement and composition,we show that an algorithm specified with “local termination detection”, canbe reused in order to compute the same algorithm with “global terminationdetection”. We then focus on the enumeration problem : we start with anabstract initial specification of the problem, and we enrich it gradually bya progressive and incremental refinement. The computed result constitutesbasic initial steps of others distributed algorithms which assume that processeshave unique identifiers. We therefore focus on snapshot problems, andwe propose to investigate how existing algorithms can be composed, withrefinement, in order to compute a global state in an anonymous network
Munch-Maccagnoni, Guillaume. "Syntaxe et modèles d'une composition non-associative des programmes et des preuves." Phd thesis, Université Paris-Diderot - Paris VII, 2013. http://tel.archives-ouvertes.fr/tel-00918642.
Full textMunch, Guillaume. "Syntaxe et modèles d'une composition non-associative des programmes et des preuves." Paris 7, 2013. http://www.theses.fr/2013PA077130.
Full textThe thesis is a contribution to the understanding of the nature, role, and mechanisms of polarisation in programming languages, proof theory and categorical models. Polarisation corresponds to the idea that we can relax the associativity of composition, as we show by relating duploids, our direct model of polarisation, to adjunctions. As a consequence, polarisation underlies many models of computation, which we further show by decomposing continuation-passing-style models of delimited control in three fondamental steps which allowing us to reconstruct four call-by-name variants of the shift and reset operators. It also explains constructiveness-related phenomena in proof theory, which we illustrate by providing a formulae-as-types interpretation for polarisation in general and for an involutive negation in particular. The cornerstone of our approach is an interactive term-based représentation of proofs and programs (L calculi) which exposes the structure of polarities. It is based on the correspondence between abstract machines and sequent calculi, and it aims at synthesising various trends: the modelling of control, evaluation order and effects in programming languages, the quest for a relationship between categorical duality and continuations, and the interactive notion of construction in proof theory. We give a gentle introduction to our approach which only assumes elementary knowledge of simply-typed lambda calculus and rewriting
Keuffer, Julien. "Calcul vérifiable et vérification biométrique." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS156.
Full textThis thesis deals with the notion of verifiable computation, which aims at adding a proof of correctness to the result of a computation. Besides, verifying the proof should be more efficient than executing it. Verifiable computation protocols pave the way for delegation of computations to an untrusted party. The first part of this thesis introduces the background required to understand the most important verifiable computation protocols and describes their construction. Many protocols have been proposed since 2012 and some are nearly practical, but the prover often lacks efficiency. Even though several specialized protocols are very efficient, it seems more appropriate to consider protocols that can verify a large class of computations, in order to avoid the multiplications of proofs for each sub-computation. In the second part of this thesis, we leverage proof composition to obtain a non-interactive verifiable computation protocol with a more efficient prover while keeping the expressiveness of the scheme. Some of the existing verifiable computation systems reach additional properties and provide zero-knowledge for the proof with little overhead for the prover. We propose two applications that leverage this property to design new primitives. This first one enables to modify a signed document while keeping a form of authenticity. The second one allows for a privacy-preserving biometric authentication
Biri, Nicolas. "Logiques spatiales de ressources, modèles d'arbres et applications." Phd thesis, Université Henri Poincaré - Nancy I, 2005. http://tel.archives-ouvertes.fr/tel-00128631.
Full textd'emplacements et de ressources jouent notamment un rôle centrale dans la représentation de ces systèmes.
On propose tout d'abord à la proposition d'une première logique, la logique linéaire distribuée et mobile (DMLL) qui intègre les notions de distribution et de mobilité. On propose également une sémantique à la Kripke et un calcul des séquents supportant l'élimination des coupures pour cette logique.
Cette première étude a mis en avant le rôle centrale de la sémantique pour la modélisation de systèmes distribués. On propose alors la structure des arbres de ressources, des arbres dont les noeuds possèdent des labels et contiennent des ressources appartenant à
monoïde partiel de ressources et BI-Loc, une logique pour raisonner sur ces arbres, un langage permettant de modifier les arbres et son axiomatisation correcte et complète sous forme de triplets de Hoare. Concernant BI-Loc, on détermine des conditions suffisantes pour décider de la satisfaction et de la validité par model-checking et on développe une méthode de preuves fondée sur les tableaux sémantiques correcte et complète.
On montre comment on peut raisonner sur les tas de pointeurs grâce aux arbres de ressources. Enfin, on détermine comment le modèle des arbres partiel peut être utilisé pour représenter et spécifier les données
semi-structurées et raisonner sur la transformation de ce type de données.
Aït-Sadoune, Idir. "Modélisation et vérification formelles de compositions de services." Chasseneuil-du-Poitou, Ecole nationale supérieure de mécanique et d'aérotechnique, 2010. http://www.theses.fr/2010ESMA0016.
Full textThe ability to compose existing services to provide more complex functionality is one of the main benefits of SOA architecture. This services compositions process, especially Web services, is generally defined by a choreography or an orchestration of atomic services. These compositions are seen as a states-transitions systems expressing the communication protocol between the participating services. Services Workflows description languages, expressing these compositions, suffer from the lack of formal semantics and the presence of ambiguities in their constructors definitions in standards defining these languages. The associated tools do not offer the possibility to formally verify and validate the behaviour and the obtained services compositions properties. This thesis focuses on modelling and formal verification of the Web services composition described with the BPEL standard using the B event method. The proposed approach models the static and dynamic parts of BPEL and is based on refinement for structuring the BPEL process development. The theorem proving technique is used for setting properties. One-to-one link is guaranteed between the BPEL elements and their B Event corresponding. This correspondence provides assistance to developers to improve the quality of the BPEL process. This approach has been implemented in the BPEL2B tool
Ciobâcǎ, Ştefan. "Verification and composition of security protocols with applications to electronic voting." Thesis, Cachan, Ecole normale supérieure, 2011. http://www.theses.fr/2011DENS0059/document.
Full textThis thesis is about the formal verification and composition of security protocols, motivated by applications to electronic voting protocols. Chapters 3 to 5 concern the verification of security protocols while Chapter 6 concerns composition.We show in Chapter 3 how to reduce certain problems from a quotient term algebra to the free term algebra via the use of strongly complete sets of variants. We show that, when the quotient algebra is given by a convergent optimally reducing rewrite system, finite strongly complete sets of variants exist and are effectively computable.In Chapter 4, we show that static equivalence for (classes of) equational theories including subterm convergent equational theories, trapdoor commitment and blind signatures is decidable in polynomial time. We also provide an efficient implementation.In Chapter 5 we extend the previous decision procedure to handle trace equivalence. We use finite strongly complete sets of variants introduced in Chapter 3 to get rid of the equational theory and we model each protocol trace as a Horn theory which we solve using a refinement of resolution. Although we have not been able to prove that this procedure always terminates, we have implemented it and used it to provide the first automated proof of vote privacy of the FOO electronic voting protocol.In Chapter 6, we study composition of protocols. We show that two protocols that use arbitrary disjoint cryptographic primitives compose securely if they do not reveal or reuse any shared secret. We also show that a form of tagging is sufficient to provide disjointness in the case of a fixed set of cryptographic primitives
Ramayo, Caldas Yuliaxis. "Dissecting the Genetic Basis of Pig Intramuscular Fatty Acid Composition." Doctoral thesis, Universitat Autònoma de Barcelona, 2013. http://hdl.handle.net/10803/120210.
Full textPigs (Sus scrofa) are relevance to humans, both as a source of food and as an animal model for scientific progress. Technological, nutritional and organoleptic properties of pork meat quality are highly dependent on lipid content and fatty acid (FA) composition. The molecular processes controlling FA composition and metabolism are highly interconnected and not fully understood. Elucidating these molecular processes will aid the technological development towards the improvement of pork meat quality and increase knowledge of FA metabolism underpinning metabolic diseases. This thesis deals with FA metabolism in pigs, analyzed from different perspectives. We have described for the first time a Copy Number Variant Regions map in swine based on whole genome SNP genotyping chips some of them may have an effect on FA. A Genome-Wide Association Study approach was carried out in a Iberian x Landrace backcross across 32 traits related to IMF FA composition and a total of 43 chromosomal regions were identified. Besides, 53.5% of these chromosomal intervals had been reported to contain QTL for lipid traits in previous studies. The liver transcriptome of two female groups of phenotypically extreme pigs for Intramuscular FA composition were sequenced using RNA-Seq. A differential expression analysis identified 55 protein-coding genes differentially-expressed between groups. Functional analysis revealed that these genes belong to biological functions, canonical pathways and three connected gene networks related to lipid and FA metabolism. Finally, a holistic gene network approach based on SNP-to-SNP co-association was employed. Supporting evidence for co-association network predictions were confirmed at tissue-specific manner by gene co-expression analysis in adipose and liver tissues. The analysis of the topological properties of both the co-association and co-expression predicted gene networks, allowed the identification of key transcription factors, candidate genes and metabolic pathways that are likely being determining meat quality and FA composition, as well as controlling energy homeostasis in pigs. Future studies targeting these genes, their pathways and interactions will continue to expand our knowledge of molecular control of FA metabolism and it might lead to discovery of functional relevant mutations, unfolding new strategies for improve pork meat quality.
Kezadri, Mounira. "Assistance à la validation et vérification de systèmes critiques : ontologies et intégration de composants." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/11130/1/kezadri.pdf.
Full textFerrer, Rosell Berta. "Tourism demand in Spain: trip duration and budget structure, a comparison of low cost and legacy airline users." Doctoral thesis, Universitat de Girona, 2014. http://hdl.handle.net/10803/145438.
Full textLa tesi compara com es comporten els turistes que arriben a Espanya amb companyies aèries de baix cost i amb companyies tradicionals, en termes de dies d’estada i distribució del pressupost del viatge. També segmenta els usuaris de baix cost segons la composició del pressupost del viatge (part relativa de les despeses de transport, de les despeses bàsiques –allotjament i manutenció– i discrecionals –activitats i compres– en destinació). La durada de l’estada s’analitza amb un lògit ordinal per tenir en compte la multimodalitat observada. Per a la distribució de la despesa turística s’utilitza la metodologia d’anàlisi de dades composicionals. Ambdós mètodes són completament nous en la recerca en turisme. Un resultat rellevant i recurrent d’aquesta tesi fa referència a les petites diferències trobades entre els usuaris dels dos tipus de companyies. Aquesta tesi fa contribucions originals quan a les variables analitzades i quan als mètodes estadístics utilitzats
Books on the topic "Composition de preuves"
William A, Schabas. Part 4 Composition and Administration of the Court: Composition et Administration de la Cour, Art.51 Rules of Procedure and Evidence/Règlement de procédure et de preuve. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198739777.003.0056.
Full text