Academic literature on the topic 'Proxys (logiciels)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Proxys (logiciels).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Proxys (logiciels)"
Merghit, Rachid, Mouloud Ait Athmane, and Abdelhak Lakehal. "Weak diagnostic performance of resting ankle ABI compared with lower limb's arterial Doppler in the diagnosis of PAD in coronary patients: about a hospital serial study." Batna Journal of Medical Sciences (BJMS) 8, no. 2 (December 28, 2021): 105–9. http://dx.doi.org/10.48087/bjmsoa.2021.8203.
Full textDieudonné, Awo A. "L’ENSEIGNEMENT DE L’HISTOIRE ÉCONOMIQUE ET SOCIALE AU DÉPARTEMENT D’HISTOIRE ET D’ARCHÉOLOGIE DE L’UNIVERSITÉ D’ABOMEY-CALAVI : ÉTAT DES LIEUX ET DÉFIS (1976-2021) / THE TEACHING OF ECONOMIC AND SOCIAL HISTORY IN THE DEPARTMENT OF HISTORY AND ARCHAEOLOGY OF ABOMEY-CALAVI UNIVERSITY: SITUATIONAL ANALYSIS AND CHALLENGES (1976-2021)." European Journal of Social Sciences Studies 7, no. 4 (April 29, 2022). http://dx.doi.org/10.46827/ejsss.v7i4.1257.
Full textSilva, Christina, and Ligia Elliot. "Avaliação da Hipermídia para Uso em Educação: uma Abordagem Alternativa." Revista Brasileira de Estudos Pedagógicos 78, no. 188-89-90 (June 18, 2019). http://dx.doi.org/10.24109/2176-6681.rbep.78i188-89-90.1057.
Full textDissertations / Theses on the topic "Proxys (logiciels)"
Chiapponi, Elisa. "Detecting and Mitigating the New Generation of Scraping Bots." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS490.
Full textEvery day an invisible war for data takes place between e-commerce websites and web scrapers. E-commerce websites own the data at the heart of the conflict and would like to provide it only to genuine users. Web scrapers aim to have illimited and continuous access to the above-mentioned data to capitalize on it. To achieve this goal, scrapers send large amounts of requests to e-commerce websites, causing them financial problems. This led the security industry to engage in an arms race against scrapers to create better systems to detect and mitigate their requests. At present, the battle continues, but scrapers appear to have the upper hand, thanks to the usage of Residential IP Proxies (RESIPs). In this thesis, we aim to shift the balance by introducing novel detection and mitigation techniques that overcome the limitations of current state-of-the-art methods. We propose a deceptive mitigation technique that lures scrapers into believing they have obtained their target data while they receive modified information. We present two new detection techniques based on network measurements that identify scraping requests proxied through RESIPs. Thanks to an ongoing collaboration with Amadeus IT Group, we validate our results on real-world operational data. Being aware that scrapers will not stop looking for new ways to avoid detection and mitigation, this thesis provides additional contributions that can help in building the next defensive weapons for fighting scrapers. We propose a comprehensive characterization of RESIPs, the strongest weapon currently at the disposal of scrapers. Moreover, we investigate the possibility of acquiring threat intelligence on the scrapers by geolocating them when they send requests through a RESIP
Chicoulaa, Bruno. "Reflexion sur l'informatisation d'un service d'urgence : a propos d'un logiciel." Toulouse 3, 1994. http://www.theses.fr/1994TOU31030.
Full textBlanchard, Yann. "Le dossier résumé de séjour à l'hôpital général : à propos du logiciel RSSPLUS : première étape du système d'information médical des centres hospitaliers de Dax et de Bayonne." Bordeaux 2, 1989. http://www.theses.fr/1989BOR23044.
Full textGirka, Thibaut. "Differential program semantics." Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCC147/document.
Full textComputer programs are rarely written in one fell swoop. Instead, they are written in a series of incremental changes.It is also frequent for software to get updated after its initial release. Such changes can occur for various reasons, such as adding features, fixing bugs, or improving performances for instance. It is therefore important to be able to represent and reason about those changes, making sure that they indeed implement the intended modifications.In practice, program differences are very commonly represented as textual differences between a pair of source files, listing text lines that have been deleted, inserted or modified. This representation, while exact, does not address the semantic implications of those textual changes. Therefore, there is a need for better representations of the semantics of program differences.Our first contribution is an algorithm for the construction of a correlating program, that is, a program interleaving the instructions of two input programs in such a way that it simulates theirsemantics. Further static analysis can be performed on such correlating programs to compute an over-approximation of the semantic differences between the two input programs. This work draws direct inspiration from an article by Partush and Yahav, that describes a correlating program construction algorithm which we show to be unsound on loops that include `break` or `continue`statements. To guarantee its soundness, our alternative algorithm is formalized and mechanically checked within the Coq proof assistant.Our second and most important contribution is a formal framework allowing to precisely describe and formally verify semantic changes.This framework, fully formalized in Coq, represents the difference between two programs by a third program called an oracle.Unlike a correlating program, such an oracle is not required to interleave instructions of the programs under comparison, and may “skip” intermediate computation steps. In fact, such an oracle is typically written in a different programming language than the programs it relates, which allows designing correlating oracle languages specific to certain classes of program differences, andcapable of relating crashing programs with non-crashing ones.We design such oracle languages to cover a wide range of program differences on a toy imperative language. We also prove that our framework is at least as expressive as Relational Hoare Logic by encoding several variants as correlating oracle languages, proving their soundness in the process
Lardon, Jérémy. "Proxy d'interface Homme-Machine : apport des algorithmes génétiques pour l'adaptation automatique de la présentation de documents Web." Phd thesis, Université Jean Monnet - Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00573036.
Full textNigron, Pierre. "Effectful programs and their proofs in type theory : application to certified compilation and certified packet processing." Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS480.
Full textOne way to reason about our programs is to write them directly into a proof assistant. Using the Curry-Howard correspondence, programs and proofs are then one. In order not to undermine the logical consistency of the proof assistant, the system is forced to restrict the programs to have no side effects. However, side effects are ubiquitous and essential in programming. Different techniques such as monads or algebraic effects have emerged to model them, thus offering a way to write imperative programs in purely functional languages. It is therefore quite natural that the results of decades of research invested in reasoning about imperative programs try to be adapted to reasoning about programs with effects. In this thesis, we are first interested in the use of separation logic to reason about programs with effects implemented in a proof assistant. We study an approach to describe the behaviour of effects using a predicate transformer. We focus first on freshness, then on packet processing and zero-copy. To study our approach, we rely on two concrete examples which are the SimplExpr module of CompCert and the decoder library Nom. Finally, in order to compile the packet parsers produced to C, we propose a refinement method removing the continuations introduced by the use of a free monad and performing some optimizations
Nguyen, Thi Minh Tuyen. "Taking architecture and compiler into account in formal proofs of numerical programs." Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00710193.
Full textDénès, Maxime. "Étude formelle d'algorithmes efficaces en algèbre linéaire." Phd thesis, Université Nice Sophia Antipolis, 2013. http://tel.archives-ouvertes.fr/tel-00945775.
Full textPerron, Sébastien. "Détection d'erreurs et confinement logiciel : une évaluation empirique." Thèse, 2021. http://depot-e.uqtr.ca/id/eprint/9664/1/eprint9664.pdf%20.pdf.
Full textBooks on the topic "Proxys (logiciels)"
Lohr, Steve, and Joel Brinkley. U.S. v. Microsoft: The inside story of the landmark case. New York: McGraw-Hill, 2001.
Find full textSteve, Lohr, ed. U.S. v. Microsoft. New York: McGraw-Hill, 2001.
Find full textCode complete: A practical handbook of software construction. Redmond, Wash: Microsoft Press, 1993.
Find full textCode complete. 2nd ed. Redmond, Wash: Microsoft Press, 2004.
Find full textCode complete. 2nd ed. Redmond, Wash: Microsoft Press, 2004.
Find full textCode complete: [a practical handbook of software construction]. 2nd ed. Redmond, Wash: Microsoft Press, 2004.
Find full textCode Complete, Second Edition. Redmond: Microsoft Press, 2007.
Find full textCode complete. Redmond, WA: Microsoft Press, 1993.
Find full textAuletta, Ken. World War 3.0: Microsoft and its enemies. New York: Random House, 2001.
Find full textAbrahamsson, Pekka, and Jürgen Münch. Product-Focused Software Process Improvement: 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007, Proceedings. Springer London, Limited, 2007.
Find full textBook chapters on the topic "Proxys (logiciels)"
Khoury, Raphaël. "Avant-Propos." In La sécurité logicielle: une approche défensive, XIII—XVI. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.3.
Full textMignucci, Mario. "Expository Proofs In Aristotle’S Syllogistic." In Oxford Studies In Ancient Philosophy, 9–28. Oxford University PressOxford, 1991. http://dx.doi.org/10.1093/oso/9780198239659.003.0002.
Full textGrattan-Guinness, Ivor. "Turing’s mentor, Max Newman." In The Turing Guide. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198747826.003.0052.
Full textAmsler, Mark. "Margery Kempe’s Strategic Vague Language." In The Medieval Life of Language. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463721929_ch06.
Full textBalibar, Etienne. "What Is Man’ in Seventeenth-Century Philosophy? Subject, Individual, Citizen." In The Individual in Political Theory and Practice, 215–42. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780198205494.003.0010.
Full textDummett, Michael. "Some Further Topics." In Elements of Intuitionism, 211–49. Oxford University PressOxford, 2000. http://dx.doi.org/10.1093/oso/9780198505242.003.0007.
Full textFeferman, Solomon. "What Does Logic Have to Tell Us about Mathematical Proofs?" In In The Light Of Logic, 177–86. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195080308.003.0009.
Full textBarwise, Jon, and John Etchemendy. "Visual Information and Valid Reasoning." In Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0005.
Full textFisler, Kathi D. "Exploiting the Potential of Diagrams in Guiding Hardware Reasoning." In Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0016.
Full textBarwise, Jon, and John Etchemendy. "Heterogeneous Logic." In Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0014.
Full textConference papers on the topic "Proxys (logiciels)"
Costa Mendes, L., and A. G. Bodard. "Apport d’un logiciel de reconstruction 3D dans la prise en charge chirurgico-orthodontique de la dysplasie cléido-crânienne : à propos d’un cas clinique." In 63ème Congrès de la SFCO, edited by S. Boisramé, S. Cousty, J. C. Deschaumes, V. Descroix, L. Devoize, P. Lesclous, C. Mauprivez, and T. Fortin. Les Ulis, France: EDP Sciences, 2015. http://dx.doi.org/10.1051/sfco/20156302002.
Full text