Littérature scientifique sur le sujet « Sensitivy analysis »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Sensitivy analysis ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Sensitivy analysis"
Anders, Gilberto, et Itamar Borges. « Topological Analysis of the Molecular Charge Density and Impact Sensitivy Models of Energetic Molecules ». Journal of Physical Chemistry A 115, no 32 (18 août 2011) : 9055–68. http://dx.doi.org/10.1021/jp204562d.
Texte intégralRismawati, Rismawati, Lince Bulutoding et Eka Suhartini. « PENGARUH ORGANIZATIONAL CITIZENSHIP BEHAVIOR, SELF EFFICACY DAN PROFESSIONAL ETHICAL SENSITIVY TERHADAP KINERJA AUDITOR DENGAN EMPLOYEE ENGAGEMENT SEBAGAI MODERASI ». ISAFIR : Islamic Accounting and Finance Review 2, no 1 (30 juin 2021) : 98–107. http://dx.doi.org/10.24252/isafir.v2i1.19935.
Texte intégralTaji, Kouichi, et Keiji Matsumoto. « INVERSE SENSITIVE ANALYSIS OF PAIRWISE COMPARISON MATRICES ». Journal of the Operations Research Society of Japan 49, no 4 (2006) : 332–41. http://dx.doi.org/10.15807/jorsj.49.332.
Texte intégralRiveros, Bruno, Mariana Rosim, Gabriel Pedro, Rosa Lucchetta et Marcelo Nita. « Análise de custo-efetividade e a análise de sensibilidade, um roteiro para execução de uma abordagem probabilística : Introdução à análise de sensibilidade probabilística (Parte I) ». Jornal de Assistência Farmacêutica e Farmacoeconomia 1, no 2 (décembre 2016) : 33–38. http://dx.doi.org/10.22563/2525-7323.2016.v1.n2.p.33-38.
Texte intégralHORVATH, Gabor, et Norbert PATAKI. « IMPROVING THE PRECISION OF FLOW-SENSITIVE LIFETIME ANALYSIS ». Acta Electrotechnica et Informatica 20, no 4 (21 janvier 2020) : 10–18. http://dx.doi.org/10.15546/aeei-2020-0020.
Texte intégralKucherenko, D. Yu. « APPLICATION OF GLUTAMATE-SENSITIVE BIOSENSOR FOR ANALYSIS OF FOODSTUFF ». Biotechnologia Acta 11, no 4 (août 2018) : 57–67. http://dx.doi.org/10.15407/biotech11.04.057.
Texte intégralYunanto, Muhamad, et Henny Medyawati. « Fiscal Policy and Monetary Policy : Sensitivity Analysis ». International Journal of Trade, Economics and Finance 6, no 2 (avril 2015) : 79–84. http://dx.doi.org/10.7763/ijtef.2015.v6.447.
Texte intégralDragičević, N., B. Karleuša et N. Ožanić. « Erosion Potential Method (Gavrilović method) sensitivity analysis ». Soil and Water Research 12, No. 1 (18 janvier 2017) : 51–59. http://dx.doi.org/10.17221/27/2016-swr.
Texte intégralQichang An, Qichang An, Jingxu Zhang Jingxu Zhang, Fei Yang Fei Yang et Hongchao Zhao Hongchao Zhao. « Normalized point source sensitivity analysis in GSSM prototype ». Chinese Optics Letters 15, no 11 (2017) : 111202. http://dx.doi.org/10.3788/col201715.111202.
Texte intégralJuhl, C. F. « A Context-Sensitive Liar ». Analysis 57, no 3 (1 juillet 1997) : 202–4. http://dx.doi.org/10.1093/analys/57.3.202.
Texte intégralThèses sur le sujet "Sensitivy analysis"
Fruth, Jana. « Sensitivy analysis and graph-based methods for black-box functions with on application to sheet metal forming ». Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0779/document.
Texte intégralThe general field of the thesis is the sensitivity analysis of black-box functions. Sensitivity analysis studies how the variation of the output can be apportioned to the variation of input sources. It is an important tool in the construction, analysis, and optimization of computer experiments.The total interaction index is presented, which can be used for the screening of interactions. Several variance-based estimation methods are suggested. Their properties are analyzed theoretically as well as on simulations.A further chapter concerns the sensitivity analysis for models that can take functions as input variables and return a scalar value as output. A very economical sequential approach is presented, which not only discovers the sensitivity of those functional variables as a whole but identifies relevant regions in the functional domain.As a third concept, support index functions, functions of sensitivity indices over the input distribution support, are suggested.Finally, all three methods are successfully applied in the sensitivity analysis of sheet metal forming models
Nilsson, Martina. « Mitochondrial DNA in Sensitive Forensic Analysis ». Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7458.
Texte intégralGalanopoulos, Aristides. « Analysis of frequency sensitive competitive learning / ». The Ohio State University, 1996. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487941504294837.
Texte intégralWan, Din Wan Ibrahim. « Sensitivity analysis intolerance allocation ». Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675480.
Texte intégralMunster, Drayton William. « Sensitivity Enhanced Model Reduction ». Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23169.
Texte intégralMaster of Science
Edlund, Hanna. « Sensitive Identification Tools in Forensic DNA Analysis ». Doctoral thesis, Uppsala universitet, Institutionen för genetik och patologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-131904.
Texte intégralMazanec, Josef. « Exploratory market structure analysis. Topology-sensitive methodology ». SFB Adaptive Information Systems and Modelling in Economics and Management Science, WU Vienna University of Economics and Business, 1999. http://epub.wu.ac.at/928/1/document.pdf.
Texte intégralSeries: Report Series SFB "Adaptive Information Systems and Modelling in Economics and Management Science"
Boccardo, Davidson Rodrigo [UNESP]. « Context-sensitive analysis of x86 obfuscated executables ». Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/100286.
Texte intégralCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do...
A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Boccardo, Davidson Rodrigo. « Context-Sensitive Analysis of x86 Obfuscated Executables ». Ilha Solteira : [s.n.], 2009. http://hdl.handle.net/11449/100286.
Texte intégralBanca: Sergio Azevedo de Oliveira
Banca: Francisco Villarreal Alvarado
Banca: Rodolfo Jardim Azevedo
Banca: André Luiz Moura dos Santos
Resumo: Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem^antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem^antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer^encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Doutor
Gasparini, Luca. « Severity sensitive norm analysis and decision making ». Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=231873.
Texte intégralLivres sur le sujet "Sensitivy analysis"
Borgonovo, Emanuele. Sensitivity Analysis. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3.
Texte intégralD, Roberts Gary, Bowles Kenneth J et United States. National Aeronautics and Space Administration., dir. ICAN sensitivity analysis. [Washington, DC] : National Aeronautics and Space Administration, 1990.
Trouver le texte intégralSensitivity and uncertainty analysis. Boca Raton, Fla : Chapman & Hall/CRC, 2003.
Trouver le texte intégralChoi, Kyung K. Structural sensitivity analysis and optimization. New York : Springer Science+Business Media, 2005.
Trouver le texte intégralChatterjee, Samprit. Sensitivity analysis in linear regression. New York : Wiley, 1988.
Trouver le texte intégralBarrick, Nettie J. OASDI short-range sensitivity analysis. [Washington, D.C.?] : Social Security Administration, Office of the Chief Actuary, 1996.
Trouver le texte intégralDeif, Assem. Sensitivity Analysis in Linear Systems. Berlin, Heidelberg : Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82739-6.
Texte intégralUstinov, Eugene A. Sensitivity Analysis in Remote Sensing. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15841-9.
Texte intégralYeung, Daniel S., Ian Cloete, Daming Shi et Wing W. Y. Ng. Sensitivity Analysis for Neural Networks. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-02532-7.
Texte intégralChatterjee, Samprit, et Ali S. Hadi, dir. Sensitivity Analysis in Linear Regression. Hoboken, NJ, USA : John Wiley & Sons, Inc., 1988. http://dx.doi.org/10.1002/9780470316764.
Texte intégralChapitres de livres sur le sujet "Sensitivy analysis"
Becker, Claudia. « Exploring Sensitive Topics : Sensitivity, Jeopardy, and Cheating ». Dans Studies in Classification, Data Analysis, and Knowledge Organization, 299–305. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-10745-0_32.
Texte intégralBorgonovo, Emanuele. « Decisions and Sensitivity Analysis ». Dans Sensitivity Analysis, 1–7. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_1.
Texte intégralBorgonovo, Emanuele. « What to Use and When ». Dans Sensitivity Analysis, 89–91. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_10.
Texte intégralBorgonovo, Emanuele. « Value of Information ». Dans Sensitivity Analysis, 93–100. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_11.
Texte intégralBorgonovo, Emanuele. « Local Sensitivity Analysis with Constraints ». Dans Sensitivity Analysis, 101–13. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_12.
Texte intégralBorgonovo, Emanuele. « Uncertainty Quantification ». Dans Sensitivity Analysis, 117–27. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_13.
Texte intégralBorgonovo, Emanuele. « Global Sensitivity Analysis ». Dans Sensitivity Analysis, 129–38. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_14.
Texte intégralBorgonovo, Emanuele. « Variance-Based Methods ». Dans Sensitivity Analysis, 139–62. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_15.
Texte intégralBorgonovo, Emanuele. « The $$\delta $$ —Importance Measure ». Dans Sensitivity Analysis, 163–80. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_16.
Texte intégralBorgonovo, Emanuele. « CDF-Based Sensitivity Measures ». Dans Sensitivity Analysis, 181–89. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_17.
Texte intégralActes de conférences sur le sujet "Sensitivy analysis"
SPENCE, ANNE, et ROBERTO CELI. « EFFICIENT SENSITIVY ANALYSIS FOR ROTARI-WING AEROMECHANICAL PROBLEMS ». Dans 34th Structures, Structural Dynamics and Materials Conference. Reston, Virigina : American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-1648.
Texte intégralHe-yi, Zhang, He Xuehua et Tang Sing Hai. « High Sensitive Laser Spectroscopy For Detect Trace Rare Earth Impurities In YbF3 and CaF 2 : Y b 3 + Crystals ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1990. http://dx.doi.org/10.1364/laca.1990.tuc5.
Texte intégralLi, Haofeng, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li et Lin Gao. « Generic sensitivity : customizing context-sensitive pointer analysis for generics ». Dans ESEC/FSE '22 : 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3540250.3549122.
Texte intégralVeirs, Kirk, Victor K. F. Chia et Gerd M. Rosenblatt. « Application of Position-Sensitive, Photon-Counting Detectors in Raman Spectroscopy ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.wa8.
Texte intégralMohammadi, E., et N. Manavizadeh. « Performance and sensitivity analysis of Dual-gated ion sensitive FET ». Dans 2017 Iranian Conference on Electrical Engineering (ICEE). IEEE, 2017. http://dx.doi.org/10.1109/iraniancee.2017.7985490.
Texte intégralSounders, George C., Jomes H. Jett, John C. Martin et Richard A. Keller. « Flow Cytometric Ultrasensitive Molecular Quantitation Via Antibody-Antigen Interactions ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.ma2.
Texte intégralVander Wal, R. L., R. L. Farrow et D. J. Rakestraw. « Investigation of Line Intensities and Collisional Effects in Degenerate Four-Wave Mixing in Nitric Oxide ». Dans Laser Applications to Chemical Analysis. Washington, D.C. : Optica Publishing Group, 1992. http://dx.doi.org/10.1364/laca.1992.tua2.
Texte intégralWang, Lan-Wei, Fuqin Li, Imam Alam, David Jupp, Simon Oliver et Medhavy Thankappan. « Analysis Ready Data Sensitivity Analyses ». Dans IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2019. http://dx.doi.org/10.1109/igarss.2019.8898667.
Texte intégralZayhowski, J. J., et Bernadette Johnson. « Passively Q-Switched Microchip Lasers for Environmental Monitoring ». Dans Laser Applications to Chemical and Environmental Analysis. Washington, D.C. : Optica Publishing Group, 1996. http://dx.doi.org/10.1364/lacea.1996.lwc.2.
Texte intégralMarr, Andrew J., Bor-Chen Chang, Gregory E. Hall et Trevor J. Sears. « Near-Infrared Frequency Modulated Detection of Transient Species ». Dans Laser Applications to Chemical and Environmental Analysis. Washington, D.C. : Optica Publishing Group, 1998. http://dx.doi.org/10.1364/lacea.1998.lmc.13.
Texte intégralRapports d'organisations sur le sujet "Sensitivy analysis"
Ralston-Hooper, Kimberly. Hanford Site Composite Analysis : Dose Sensitivity Analyses. Office of Scientific and Technical Information (OSTI), avril 2022. http://dx.doi.org/10.2172/1861434.
Texte intégralFlach, G. SENSITIVITY ANALYSIS FOR SALTSTONE DISPOSAL UNIT COLUMN DEGRADATION ANALYSES. Office of Scientific and Technical Information (OSTI), octobre 2014. http://dx.doi.org/10.2172/1163502.
Texte intégralLombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), août 1992. http://dx.doi.org/10.2172/7271811.
Texte intégralVan Buren, Rachel. Railcar Sensitivity Analysis. Fort Belvoir, VA : Defense Technical Information Center, novembre 2011. http://dx.doi.org/10.21236/ada565001.
Texte intégralLehoucq, Richard, Brian Franke, Stephen Bond et Scott McKinley. Particle Sensitivity Analysis. Office of Scientific and Technical Information (OSTI), septembre 2020. http://dx.doi.org/10.2172/1669202.
Texte intégralLombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), août 1992. http://dx.doi.org/10.2172/10174720.
Texte intégralCheng, J. J., C. Yu et A. J. Zielen. RESRAD parameter sensitivity analysis. Office of Scientific and Technical Information (OSTI), août 1991. http://dx.doi.org/10.2172/6400651.
Texte intégralFriedman-Hill, Ernest J., Edward L. Hoffman, Marcus J. Gibson et Robert L. Clay. Integrated Sensitivity Analysis Workflow. Office of Scientific and Technical Information (OSTI), août 2014. http://dx.doi.org/10.2172/1171554.
Texte intégralHorwedel, J. E., R. Q. Wright et R. E. Maerker. Sensitivity analysis of EQ3. Office of Scientific and Technical Information (OSTI), janvier 1990. http://dx.doi.org/10.2172/7079359.
Texte intégralKeiter, Eric R., Laura Painton Swiler, Thomas V. Russo et Ian Zachary Wilcox. Sensitivity Analysis in Xyce. Office of Scientific and Technical Information (OSTI), septembre 2016. http://dx.doi.org/10.2172/1562422.
Texte intégral