Índice
Literatura académica sobre el tema "Réseau de bordure"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Réseau de bordure".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Réseau de bordure"
Gelinas, P., J. Locat y R. Drouin. "Performance des lieux d'enfouissement sanitaire de Laterrière et de Ste-Sophie, Québec, Canada". Revue des sciences de l'eau 2, n.º 1 (12 de abril de 2005): 109–38. http://dx.doi.org/10.7202/705026ar.
Texto completoLelong, Benjamin y Claude Lavoie. "Est-ce que le roseau commun exotique envahit les marais adjacents aux routes ?" Botanique 138, n.º 1 (6 de enero de 2014): 13–19. http://dx.doi.org/10.7202/1021039ar.
Texto completoDussault, Christian, Catherine Laurian y Jean-Pierre Ouellet. "Réactions comportementales de l’orignal à la présence d’un réseau routier dans un milieu forestier". Les routes et la grande faune 136, n.º 2 (11 de mayo de 2012): 48–53. http://dx.doi.org/10.7202/1009106ar.
Texto completoBourduas Crouhen, Valérie, Robert Siron, Hélène Côté, Travis Logan y Isabelle Charron. "Les changements climatiques attendus et leurs impacts potentiels sur l’écologie routière au Québec". Connectivité et adaptation aux changements climatiques 143, n.º 1 (28 de noviembre de 2018): 18–24. http://dx.doi.org/10.7202/1054113ar.
Texto completoPrichonnet, Gilbert, Ghismond Martineau y Louis Bisson. "Les dépôts quaternaires de la région de Chibougamau, Québec". Géographie physique et Quaternaire 38, n.º 3 (29 de noviembre de 2007): 287–304. http://dx.doi.org/10.7202/032569ar.
Texto completoCornille, Jean-Louis. "Éc(h)o-textes : Man Grove et la Ville-Rhizome". RELIEF - Revue électronique de littérature française 16, n.º 1 (8 de julio de 2022): 166–76. http://dx.doi.org/10.51777/relief12376.
Texto completoDeschodt, Laurent, Mathieu Lançon, Samuel Desoutter, Guillaume Hulin, François-Xavier Simon, Bruno Vanwalscappel, Yves Créteur et al. "Exploration archéologique de 170 hectares de plaine maritime (Bourbourg, Saint-Georges-sur-l’Aa, Craywick, Nord de la France) : restitution de la fermeture d’un estuaire au Moyen Âge et mise en évidence de mares endiguées". BSGF - Earth Sciences Bulletin 192 (2021): 12. http://dx.doi.org/10.1051/bsgf/2021004.
Texto completoWilton, Derek H. C. "Albert Peter Low — The Iron Man of Labrador". Geoscience Canada 45, n.º 1 (20 de abril de 2018): 43–58. http://dx.doi.org/10.12789/geocanj.2018.45.130.
Texto completoTarrius, Alain. "Migrations en réseaux et cohabitations urbaines aux bordures de l'Europe". L'Année sociologique 58, n.º 1 (2008): 71. http://dx.doi.org/10.3917/anso.081.0071.
Texto completoMeier, Daniel. "New Border Studies On Israel/Palestine: Review of Two Books". Borders in Globalization Review 2, n.º 2 (11 de junio de 2021): 160–62. http://dx.doi.org/10.18357/bigr22202120209.
Texto completoTesis sobre el tema "Réseau de bordure"
Pichot, Simon. "Algorithmes d'intelligence artificielle pour l'optimisation de la trajectoire des drones et la redirection de trafic dans le réseau de bordure". Electronic Thesis or Diss., Université de Toulouse (2023-....), 2024. http://www.theses.fr/2024TLSEP122.
Texto completoThe latest developments of network science paved the way for more flexibility and adaptability in historically rigid segments of the network. It allowed new paradigms to emerge such as Multi-Access edge computing (MEC), making services closer to access network, hence to end users. This benefits several members of the network, but also brings new problems that need to be adressed by new solving techniques, including Artificial Intelligence. This field of study have lately drawn the attention of the public, but its principles are already well known and widely used in the industry, particularly in computer and network sciences, particularly through machine learning. The concept of training is closely linked to that of data, making its use in networks very natural. However, numerous actors do not have access to the existing flow of data. Fortunately, there are machine learning solutions for them that do not rely on data.This thesis investigate this approach, using dataless training techniques to design support tools in edge networks. Firstly, is considered the use of genetic algorithms for dynamic path planning with communication constraints, that is resilient to realistic changes of the environment. Then, through reinforcement learning, a agent is conceived for dynamic traffic routing between edge and core networks. This agent aims at satisfying delay requirements for services with different priorities while minimizing energy consumption, and this work includes the framework to fine-tune the balance between these two contradictory goals
Gama, Remigius. "Structure et propagation d'un rift magmatique en bordure de craton : approche intégrée de la divergence Nord-Tanzanienne par analyse des populations de failles et du réseau de drainage". Thesis, Brest, 2018. http://www.theses.fr/2018BRES0047/document.
Texto completoAny kinematic model applied to the southerly-propagating and diverging South Kenya rift (SKR) should necessarily integrate the structure of the Magadi-Natron axial trough (previous studies), but also those of the Oldoinyo Ogol (OOB) offset block to the west. Our work is chiefly based on SRTM 30 m satellite imagery analysis, and allows us (1) to precise the morphostructural arrangement of the entire SKR,(2) to identify 2 successive border faults systems, (3) to emphasize the role of the Ol Doinyo Ogol master fault, (4) to elaborate a 2-stage rift model (7-3 Ma et <3 Ma), and (5) to attribute a key-role to a transverse Proterozoic discontinuity on the lateral shift of the OOB, as well as on the split of the rift into the Eyasi rift arm and on the off-axis location of the early Crater Highlands magmatic segment, hence demonstrating the importance of basement structural inheritance on rift kinematics.The quantitative analysis of fault populations shows the restricted nature of most intra-rift faults, and leads us to precise the spatiotemporal evolution of extension from a stage of localized strain (border faults) to a stage of diffuse extension (<3 Ma).From the analysis of the river drainage extracted from the basement uplifted block bounding the rift system to the west, it is assumed that (1) lithological and tectonic basement features exerted a strong control on the river network, (2) fault-related basement uplift is polyphased, and (3) the unsteady nature of the present-day river drainage is due to still active rift-flank uplift in the southern portion of the rift system
Marini, Daniel. "Étude des minéralisations Zn, Pb, Ba des conglomérats triasiques de la bordure du district des Maines (Gard, France) : comparaisons sédimentologique, minéralogique et géochimique des séries sulfatées et de leurs équivalents latéraux à l'aplomb des sites minéralisés". Paris 6, 1986. http://www.theses.fr/1986PA066607.
Texto completoCamus, Hubert. "Vallées et réseaux karstiques de la bordure carbonatée sud cévenole : Relations avec la surrection, le volcanisme et les paléoclimats". Bordeaux 3, 2003. http://www.theses.fr/2003BOR3A001.
Texto completoJacquemart, Quentin. "Déceler les attaques par détournement BGP". Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0063/document.
Texto completoThe Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing information using the Border Gateway Protocol (BGP). Consequently, every AS implicitly trusts every other ASes to provide accurate routing information. Prefix hijacking is an attack against the inter-domain routing infrastructure that abuses mutual trust in order to propagate fallacious routes. The current detection techniques pathologically raise a large number of alerts, mostly composed of false positives resulting from benign routing practices. In this Dissertation, we seek the root cause of routing events beyond reasonable doubts. First, we reduce the global number of alerts by analyzing false positive alerts, from which we extract constructs that reflect real-world standard routing practices. We then consider the security threat associated with these constructs in a prefix hijacking scenario. Second, we use a variety of auxiliary datasets that reflect distinct facets of the networks involved in a suspicious routing event in order to closely approximate the ground-truth, which is traditionally only known by the network owner. Specifically, we investigate Multiple Origin AS (MOAS) prefixes, and introduce a classification that we use to discard up to 80% of false positive. Then we show a real-world case where a MOAS coincided with spam and web scam traffic. We look at prefix overlaps, clarify their global use, and present a prototype that discards around 50% of false positive sub-MOAS alerts. Finally, we explore the IP blackspace, study the routing-level characteristics of those networks, find live IP addresses, and uncover a large amount of spam and scam activities
Gourbet, Loraine. "Évolution morphologique et sédimentologique des bordures ouest et sud-est du plateau du Tibet". Thesis, Lyon, École normale supérieure, 2015. http://www.theses.fr/2015ENSL0982/document.
Texto completoTibet is the widest and highest plateau on Earth. Tectonics, climate evolution and ante-surrection geomorphology are the main factors controlling the plateau formation. In order to assess the relative influence of these factors, we study the relief evolution on the plateau edges using geomorphic analysis, sedimentology and exhumation rates based on low-temperature thermochronometry.The results show that the western and eastern plateau edges were already at high elevation at ca 35 Ma, only 20 Ma after the India-Asia collision. This favors an “en bloc” uplift model for the plateau.In western Tibet, the hydrographic network was connected to the Indus river, allowing the early development of a >1000 m amplitude relief, probably before 35 Ma. The relief was preserved due to low erosion conditions. Western Tibet was then isolated from the Indus drainage network due to the Karakorum fault slip.The relief formation in Eastern Tibet is older than in western Tibet: at ca 35 Ma, in the Jianchuan area (northern Yunnan), which was already at high elevation, was a large braided river system. This implies a moderate regional slope. It also implies a local relief further north and significant precipitations
Edouard, Jean-Charles. "Organisation et dynamique urbaines de la bordure septentrionale du Massif central : Auvergne, Limousin, Nivernais". Clermont-Ferrand 2, 1999. http://www.theses.fr/1999CLF20003.
Texto completoThe northern edge of the massif central is one of france's low density areas, and yet it is far from being the largely rural region often described in regional geographic surveys. The city unquestionably asserts its presence and the rates of urbanization are very close to national averages (75%). However the still predominantly rural mountain zones - combraille, plateau de millevaches, monts d'auvergne. . . - must be clearly differentiated from the low lands the valleys and main traffic corridors - whose population rates compare to those of the densely populated countries of northern europe with more than 80% city dwellers. This region is thus perfectly integrated into urban france. The population growth of these cities is comparable to that of other french cities, with the highest expansion mainly in the larger cities - clermont-ferrand and limoges. Nor is there any particular functional backwardness; indeed, the division of the population according to the different socioprofessional categories such as defined by insee is also close to that of other french cities of similar size. Of a type with urban france, the northern part of the massif central is also characterized by a clearly ordered system with each urban level represented, allowing efficient servicing of the whole region. In fact the different populations of auvergne, limousin or nivernais have remarkably easy access to a wide range of tertiary facilities with few communication obstacles. The rational organization of space is evident in the region's conformity to the great theoretical models -christaller and reilly. Here in fact is a nearly perfect christallerian network, but its evolution raises many problems and conflicting issues. Indeed, a phenomenon of regional metropolization can be seen through the spontaneous strengthening of each metropolis of the northern massif central on its zone of influence. But at the same time, the cities' influence is gradually dwindling in the french urban network due to the concentration of the rarer services in the major urban centres deemed large enough to be likely to achieve "european size". The future of the urban network in the northern massif central will depend on the two cities developing a deliberate policy of town and country planning which can reconcile two apparently contradictory objectives : a balanced distribution of services and transport within the
Jacquemart, Quentin. "Déceler les attaques par détournement BGP". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0063.
Texto completoThe Internet is composed of tens of thousands Autonomous Systems (ASes) that exchange routing information using the Border Gateway Protocol (BGP). Consequently, every AS implicitly trusts every other ASes to provide accurate routing information. Prefix hijacking is an attack against the inter-domain routing infrastructure that abuses mutual trust in order to propagate fallacious routes. The current detection techniques pathologically raise a large number of alerts, mostly composed of false positives resulting from benign routing practices. In this Dissertation, we seek the root cause of routing events beyond reasonable doubts. First, we reduce the global number of alerts by analyzing false positive alerts, from which we extract constructs that reflect real-world standard routing practices. We then consider the security threat associated with these constructs in a prefix hijacking scenario. Second, we use a variety of auxiliary datasets that reflect distinct facets of the networks involved in a suspicious routing event in order to closely approximate the ground-truth, which is traditionally only known by the network owner. Specifically, we investigate Multiple Origin AS (MOAS) prefixes, and introduce a classification that we use to discard up to 80% of false positive. Then we show a real-world case where a MOAS coincided with spam and web scam traffic. We look at prefix overlaps, clarify their global use, and present a prototype that discards around 50% of false positive sub-MOAS alerts. Finally, we explore the IP blackspace, study the routing-level characteristics of those networks, find live IP addresses, and uncover a large amount of spam and scam activities
Lalem, Farid. "Cadre méthodologique et applicatif pour le développement de réseaux de capteurs fiables". Thesis, Brest, 2017. http://www.theses.fr/2017BRES0063/document.
Texto completoWireless sensor networks emerge as an innovative technology that can revolutionize and improve our way to live, work and interact with the physical environment around us. Nevertheless, the use of such technology raises new challenges in the development of reliable and secure systems. These wireless sensor networks are often characterized by dense deployment on a large scale in resource-onstrained environments. The constraints imposed are the limitation of the processing, storage and especially energy capacities since they are generally powered by batteries.Our main objective is to propose solutions that guarantee a certain level of reliability in a WSN dedicated to sensitive applications. We have thus proposed three axes, which are:- The development of methods for detecting failed sensor nodes in a WSN.- The development of methods for detecting anomalies in measurements collected by sensor nodes, and subsequently fault sensors (providing false measurements).- The development of methods ensuring the integrity and authenticity of transmitted data over a WSN
Pollack, Guillaume. "A travers les frontières : la résistance des réseaux (1940-1945)". Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H045.
Texto completoThis thesis is the first global study about French Resistance networks during the Second World War (1940-1945). We ask several questions. How did these organisations break out political borders built in Europe by the Nazis after their victory in France in May-June 1940 ? How did these networks construct communications beyond these borders (by air, earth and sea) with the Allied secret services in only four years ? Finally, through the study of fighting experience, the role distribution in these networks and the question of repression, we also wonder : how did the clandestine war disrupt gender relations between men and women fighting against the Nazis ?
Libros sobre el tema "Réseau de bordure"
Solidarities beyond borders: Transnationalizing women's movements. Vancouver: UBC Press, 2010.
Buscar texto completoSolidarities Beyond Borders: Transnationalizing Women's Movements. University of British Columbia Press, 2011.
Buscar texto completoSolidarities Beyond Borders: Transnationalizing Women's Movements. University of British Columbia Press, 2010.
Buscar texto completo