Academic literature on the topic 'Confidentialité dans le texte'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Confidentialité dans le texte.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Confidentialité dans le texte"
Pepin, René. "La vérité et la liberté d’expression." Congrès de l’Association Henri Capitant : la vérité et le droit 18, no. 4 (April 8, 2019): 869–81. http://dx.doi.org/10.7202/1058582ar.
Full textLavallée, Carmen. "Le secret de l’adoption en France et au Québec." Revue générale de droit 27, no. 4 (March 23, 2016): 441–73. http://dx.doi.org/10.7202/1035751ar.
Full textTurkalj, Kristian. "Les enjeux de la réglementation sur la conservation des données de communications électroniques á la lumière de la jurisprudence de la cour de justice d l’Union Européenne." Zbornik radova Pravnog fakulteta u Splitu 57, no. 1 (February 19, 2020): 53–84. http://dx.doi.org/10.31141/zrpfs.2020.57.135.53.
Full textIsapof, Arnaud. "La confidentialité dans les équipes." Contraste N°50, no. 2 (2019): 155. http://dx.doi.org/10.3917/cont.050.0155.
Full textBonnet, Grégory, Laurent Vercouter, and Damien Lelerre. "Confidentialité dans les systèmes de réputation." Revue Ouverte d'Intelligence Artificielle 3, no. 5-6 (November 22, 2022): 671–89. http://dx.doi.org/10.5802/roia.47.
Full textMillot, Philippe. "La confidentialité dans les courriers électroniques professionnels." ASp, no. 55 (March 1, 2009): 45–63. http://dx.doi.org/10.4000/asp.244.
Full textGagnon, Mélanie, and Elhadji M. Niang. "Nouveau cadre juridique québécois en matière de protection des renseignements personnels dans le secteur privé." Pin Code N° 13, no. 1 (January 28, 2023): 18–21. http://dx.doi.org/10.3917/pinc.013.0018.
Full textRiou, C., M. Cuggia, and N. Garcelon. "Comment assurer la confidentialité dans les entrepôts de données biomédicaux ?" Revue d'Épidémiologie et de Santé Publique 60 (March 2012): S19—S20. http://dx.doi.org/10.1016/j.respe.2011.12.116.
Full textCAMILLERI, Sylvain. "«Dieu» dans le texte." Revue Théologique de Louvain 41, no. 2 (June 30, 2010): 180–207. http://dx.doi.org/10.2143/rtl.41.2.2049210.
Full textFumaroli, Sébastien. "Obama dans le texte." Commentaire Numéro 124, no. 4 (2008): 1205. http://dx.doi.org/10.3917/comm.124.1205.
Full textDissertations / Theses on the topic "Confidentialité dans le texte"
Hammoud, Khodor. "Trust in online data : privacy in text, and semantic-based author verification in micro-messages." Electronic Thesis or Diss., Université Paris Cité, 2021. http://www.theses.fr/2021UNIP5203.
Full textMany Problems surround the spread and use of data on social media. There is a need to promote trust on social platforms, regarding the sharing and consumption of data. Data online is mostly in textual form which poses challenges for automation solutions because of the richness of natural language. In addition, the use of micro-messages as the main means of communication on social media makes the problem much more challenging because of the scarceness of features to analyze per body of text. Our experiments show that data anonymity solutions cannot preserve user anonymity without sacrificing data quality. In addition, in the field of author verification, which is the problem of determining if a body of text was written by a specific person or not, given a set of documents known to be authored by them, we found a lack of research working with micro-messages. We also noticed that the state-of-the-art does not take text semantics into consideration, making them vulnerable to impersonation attacks. Motivated by these findings, we devote this thesis to tackle the tasks of (1) identifying the current problems with user data anonymity in text, and provide an initial novel semantic-based approach to tackle this problem, (2) study author verification in micro-messages and identify the challenges in this field, and develop a novel semantics-based approach to solve these challenges, and (3) study the effect of including semantics in handling manipulation attacks, and the temporal effect of data, where the authors might have changing opinions over time. The first part of the thesis focuses on user anonymity in textual data, with the aim to anonymize personal information from online user data for safe data analysis without compromising users’ privacy. We present an initial novel semantic-based approach, which can be customized to balance between preserving data quality and maximizing user anonymity depending on the application at hand. In the second part, we study author verification in micro-messages on social media. We confirm the lack of research in author verification on micro-messages, and we show that the state-of-the-art, which primarily handles long and medium-sized texts, does not perform well when applied on micro-messages. Then we present a semantics-based novel approach which uses word embeddings and sentiment analysis to collect the author’s opinion history to determine the correctness of the claim of authorship, and show its competitive performance on micro-messages. We use these results in the third part of the thesis to further improve upon our approach. We construct a dataset consisting of the tweets of the 88 most followed twitter influencers. We use it to show that the state-of-the-art is not able to handle impersonation attacks, where the content of a tweet is altered, changing the message behind the tweet, while the writing pattern is preserved. On the other hand, since our approach is aware of the text’s semantics, it is able to detect text manipulations with an accuracy above 90%. And in the fourth part of the thesis, we analyze the temporal effect of data on our approach for author verification. We study the change of authors’ opinions over time, and how to accommodate for that in our approach. We study trends of sentiments of an author per a specific topic over a period of time, and predict false authorship claims depending on what timeframe does the claim of authorship fall in
Jawad, Mohamed. "Confidentialité de données dans les systèmes P2P." Phd thesis, Université de Nantes, 2011. http://tel.archives-ouvertes.fr/tel-00638721.
Full textMundler, Helen Esther. "Le texte dans le texte dans l'oeuvre d'a. S. Byatt (1978-1996)." Strasbourg 2, 1998. http://www.theses.fr/1998STR20023.
Full textThe work of a. S. Byatt (born 1938) has been surprisingly neglected by many studies of the contemporary british novel. This thesis constitutes the first full-length study of her fiction. I have concentrated on the self- reflexive processes used by byatt, particularly tne intertextual and the intratextual, which are examined in order to establish a poetics of byatt's work, and to situate this in the postmodern ethic and esthetic. Byatt multiplies diegetic levels, includes the mise en abyme of the writing character, uses a wide range of inserted texts, real and fictional, and invents new hybrid forms, making a particular feature of brilliant neo- victorian pastiche in possession her most acclaimed work. The thesis falls into 3 parts, corresponding approximately to what have termed (1) canonic intertextuality, (2) forms of intertextuality other than the canonic (such as reference to the fairy tale or to the painting, which i have united by analysing their emblematic aspects in the novel), and (3) the degree of innovation in the deployment of the text in the text in byatt's most recent novel, babel tower. The structure of the thesis is thus roughly chronological, and follows the natural evolution of byatt's work. In each chapter i have begun at the hermeneutic level, establishing the relationship between the various levels of the text in order to elucidate the project of the work as a whole. This basic analysis is then rendered more complex and is completed by the study of what i have termed the 'double form', which consists of modes such as irony and parody, as well as rhetorical tropes such as metaphor and allegory, or - representing amn innovation - intersemiotic illustration
Morogan, Elena-Maria. "Du texte narratif au texte dramatique : quatre couples symbiotiques dans l'oeuvre d'Eugène Ionesco /." Stockholm : Universitets Stockholms, 2000. http://catalogue.bnf.fr/ark:/12148/cb388272909.
Full textDesgranges, Marc. "L'obligation de confidentialité dans le droit de la représentation du personnel." Paris 2, 2002. http://www.theses.fr/2002PA020038.
Full textLadjali, Cécile. "Androgynie et hermaphrodite dans le texte décadent." Paris 4, 2002. http://www.theses.fr/2002PA040083.
Full textLiterature has long preferred Ovid's hermaphrodite to PLato's androgyne ; but this tendency seems to change at the end of the nineteenth century. Analysing such evidence, the present thesis tries to understand the meaning of the emergence of a symbol in literature, which comes to supersede another one. .
Aliukonytė, Aurelija. "Les series lexicales, leur role dans le texte." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20060605_093139-93112.
Full textGroen, Saskia. "Les inférences émotionnelles dans la compréhension de texte." Montpellier 3, 2002. http://www.theses.fr/2002MON30002.
Full textLacourarie, Chantal. "Texte et tableau dans l'oeuvre de Virginia Woolf." Paris 3, 1996. http://www.theses.fr/1996PA030190.
Full textA keen visual sense and a critical pictorial eye inform virginia woolf's writing. Her landscapes are for the most part impressionistic. Often associated to childhood and described by children characters, they tally with a nostalgia for a natural world bathed in light and heat, with pure and shimmering colours. Adults tend to turn their backs on landscapes and go in for portraits which are influenced by expressionnist aesthetics. From a harmonious relation with nature, the human being shifts to a stage of conflict. The mastery of form consists in integrating portraits into landscapes thanks to post-impressionism. Virginia woolf reaches this synthesis in her most fulfilled works
Delpiroux, Jean-Philippe. "Rapports-parole-texte dans une machine a dicter." Toulouse 3, 1986. http://www.theses.fr/1986TOU30097.
Full textBooks on the topic "Confidentialité dans le texte"
Milly, Jean. Proust dans le texte et l'avant-texte. Paris: Flammarion, 1985.
Find full textLe texte dans le texte: L'interpolation médiévale. Paris: Classiques Garnier, 2013.
Find full textProust dans le texte et l'avant-texte. Paris: Flammarion, 1985.
Find full textMallol, Francis. Le secret professionnel: Transparence et confidentialité dans la vie publique et privée. Paris: Sorman, 2000.
Find full textFrançois, Ansermet, Grosrichard Alain 1941-, Méla Charles 1942-, and Centre freudien romand d'études cliniques et littéraires., eds. La Psychose dans le texte. Paris: Navarin, 1989.
Find full textDubuc, Robert. En français dans le texte. Brossard, Qué: Linguatech, 1994.
Find full textMarcel, Chatillon, Martinique Bureau du patrimoine, Martinique Conseil régional, Musée régional d'histoire et d'ethnographie (Martinique). Association des amis., and Musée municipal Saint-John Perse de Pointe-à-Pitre., eds. En créole dans le texte. Fort-de-France: Bureau du patrimoine, 1996.
Find full textMilelli, Jean-Pierre. Al-Qaïda dans le texte. Paris: Presses universitaires de France, 2005.
Find full textChirac, Jacques. Jacques Chirac dans le texte. Paris: Ramsay, 2000.
Find full textJardon, Denise. Du comique dans le texte littéraire. Paris-Gembloux: Duculot, 1989.
Find full textBook chapters on the topic "Confidentialité dans le texte"
Nieves Canal, Maria. "Écrire dans les marges. Références et interventions de Regnaud Le Queux dans le Baratre Infernal." In Texte, Codex & Contexte, 43–55. Turnhout: Brepols Publishers, 2006. http://dx.doi.org/10.1484/m.tcc-eb.3.3892.
Full text"Texte." In La Famille 13 dans l'evangile de Marc, 255–361. BRILL, 2013. http://dx.doi.org/10.1163/9789004234468_006.
Full textSEMMOUD, Abderrazaq, and Badr BENMAMMAR. "La sécurité intelligente des réseaux informatiques." In Gestion et contrôle intelligents des réseaux, 5–28. ISTE Group, 2020. http://dx.doi.org/10.51926/iste.9008.ch1.
Full textRayna, Sylvie. "Hors-texte." In Avec les familles dans les crèches !, I. ERES, 2016. http://dx.doi.org/10.3917/eres.rayn.2016.01.0001.
Full text"Hors texte." In Héritages arabo-islamiques dans l'Europe méditerranéenne, 495–503. La Découverte, 2015. http://dx.doi.org/10.3917/dec.richa.2015.01.0495.
Full textBERGERON, Cyril, Wassim HAMIDOUCHE, and Olivier DÉFORGES. "Crypto-compression de vidéos." In Sécurité multimédia 2, 145–89. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9027.ch5.
Full textRiegert, Guy. "Breughel dans le texte." In Giono dans sa culture, 537–54. Presses universitaires de Perpignan, 2003. http://dx.doi.org/10.4000/books.pupvd.9326.
Full textGeneix, Gilles. "Jussieu dans le texte." In Antoine-Laurent de Jussieu (1748-1836), 572–659. Publications scientifiques du Muséum, 2022. http://dx.doi.org/10.4000/books.mnhn.13391.
Full textCasajus, Dominique. "Cahier hors texte." In La tente dans la solitude. Éditions de la Maison des sciences de l’homme, 1987. http://dx.doi.org/10.4000/books.editionsmsh.6158.
Full textSalaun, Vincent. "Cas en logistique et Supply Chain Management." In Cas en logistique et Supply Chain Management, 206–15. EMS Editions, 2023. http://dx.doi.org/10.3917/ems.lavas.2023.01.0206.
Full textConference papers on the topic "Confidentialité dans le texte"
Boulanger, J.-L., and L. Zhao. "Sécurité, confidentialité et intégrité dans les systèmes ferroviaires." In Congrès Lambda Mu 19 de Maîtrise des Risques et Sûreté de Fonctionnement, Dijon, 21-23 Octobre 2014. IMdR, 2015. http://dx.doi.org/10.4267/2042/56197.
Full textGlinoer, Anthony. "Les éditeurs dans le roman français contemporain : au service ou au détriment de la littérature." In Trajectoires du texte littéraire. Fabula, 2021. http://dx.doi.org/10.58282/colloques.7316.
Full textBourgeois, Jolianne G. "« On a la madeleine qu’on peut » : usages autobiographiques des textes romanesques (préférés) dans quelques essais sur le roman." In Trajectoires du texte littéraire. Fabula, 2021. http://dx.doi.org/10.58282/colloques.7305.
Full textVaugeois, Dominique. "« Faire son cinéma » : la citation audiovisuelle dans le texte critique." In Mémoire audiovisuelle de la littérature. Fabula, 2023. http://dx.doi.org/10.58282/colloques.9165.
Full textGuilloux, Florian. "Figures beethovéniennes dans Elephant (2003) de Gus Van Sant." In Figure(s) du musicien. Corps, gestes, instruments en texte. Fabula, 2016. http://dx.doi.org/10.58282/colloques.4045.
Full textDavoine, Patrick. "L’instrumentarium dans la poésie de Georg Trakl : vers une abstraction musicale." In Figure(s) du musicien. Corps, gestes, instruments en texte. Fabula, 2016. http://dx.doi.org/10.58282/colloques.4081.
Full textGignoux, Anne-Claire. "Les figures de l’interprète dans Si le grain ne meurt d’André Gide." In Figure(s) du musicien. Corps, gestes, instruments en texte. Fabula, 2016. http://dx.doi.org/10.58282/colloques.4026.
Full textHölzle, Dominique. "L’inspiration médiévale de Sade dans Le Président Mystifié (1787) : un texte charivarique ?" In Sade en jeu. Fabula, 2018. http://dx.doi.org/10.58282/colloques.5872.
Full textDauge, Damien. "La mélomanie à fleur d’oreilles : l’épreuve musicale des corps dans l’œuvre de Flaubert." In Figure(s) du musicien. Corps, gestes, instruments en texte. Fabula, 2016. http://dx.doi.org/10.58282/colloques.4024.
Full textMüller, Welleda. "Figures du musicien dans l’art gothique en France Instruments et corps mis en jeu." In Figure(s) du musicien. Corps, gestes, instruments en texte. Fabula, 2016. http://dx.doi.org/10.58282/colloques.4069.
Full textReports on the topic "Confidentialité dans le texte"
Radonić, Ljiljana. L’usage de la Shoah dans la mémoire des crimes du XXe siècle en Europe de l’est. Verlag der Österreichischen Akademie der Wissenschaften, January 2023. http://dx.doi.org/10.1553/0x003dfcbb.
Full textRousseau, Henri-Paul. De Gutenberg à ChatGPT: Le défi de l'université numérique. CIRANO, January 2023. http://dx.doi.org/10.54932/lrku8746.
Full textLanglois, Lyse, Marc-Antoine Dilhac, Jim Dratwa, Thierry Ménissier, Jean-Gabriel Ganascia, Daniel Weinstock, Luc Bégin, and Allison Marchildon. L'éthique au cœur de l'IA. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, October 2023. http://dx.doi.org/10.61737/mdhp6080.
Full textPoussart, Denis. Le métavers : autopsie d’un fantasme Réflexion sur les limites techniques d’une réalité synthétisée, virtualisée et socialisée. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, February 2024. http://dx.doi.org/10.61737/sgkp7833.
Full textDufour, Quentin, David Pontille, and Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, April 2021. http://dx.doi.org/10.52949/2.
Full textVaillancourt, François, and Michel Magnan. Le partage du financement des services de l’agglomération de Montréal en 2020: État des lieux, analyse et éléments de comparaison. CIRANO, August 2022. http://dx.doi.org/10.54932/cvub5177.
Full textRousseau, Henri-Paul. Gutenberg, L’université et le défi numérique. CIRANO, December 2022. http://dx.doi.org/10.54932/wodt6646.
Full textInitiation au logiciel Nvivo. Instats Inc., 2023. http://dx.doi.org/10.61700/fzb3icwf9pox5469.
Full text