Gotowa bibliografia na temat „Internet des objets – Informatique”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Internet des objets – Informatique”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Internet des objets – Informatique"
Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, nr 4 (19.03.2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Pełny tekst źródłaDUCHASTEL, Jules. "Discours et informatique : des objets sociologiques?" Sociologie et sociétés 25, nr 2 (30.09.2002): 157–70. http://dx.doi.org/10.7202/001206ar.
Pełny tekst źródłaVarenne, Franck. "Simulation informatique et pluriformalisation des objets composites". Philosophia Scientae, nr 13-1 (1.04.2009): 135–54. http://dx.doi.org/10.4000/philosophiascientiae.79.
Pełny tekst źródłaFruchier, Olivier, Philippe Egea, Faissal Bakali i Thierry Talbert. "Retour sur le jeu sérieux : Initiation à la sécurité informatique des objets connectés". J3eA 21 (2022): 2008. http://dx.doi.org/10.1051/j3ea/20222008.
Pełny tekst źródłaGAZEL, Hervé. "G2I : géographie, informatique et internet". Ingénierie des systèmes d'information 22, nr 5 (28.05.2017): 127–43. http://dx.doi.org/10.3166/isi.22.5.127-143.
Pełny tekst źródłaSantolini, Arnaud, i Agnès Danis. "Le tutorat des objets connectés : modélisation informatique du conflit forme couleur". Enfance N°3, nr 3 (2019): 375. http://dx.doi.org/10.3917/enf2.193.0375.
Pełny tekst źródłaPierrel, Jean-Marie. "Un ensemble de ressources de référence pour l’étude du français : tlfi, frantext et le logiciel stella". Revue québécoise de linguistique 32, nr 1 (20.02.2006): 155–76. http://dx.doi.org/10.7202/012248ar.
Pełny tekst źródłaBroisin, Julien, i Philippe Vidal. "Un environnement informatique pour l’apprentissage humain au service de la virtualisation des objets pédagogiques". Sciences et Technologies de l'Information et de la Communication pour l'Éducation et la Formation 12, nr 1 (2005): 177–204. http://dx.doi.org/10.3406/stice.2005.914.
Pełny tekst źródłaVandenbunder, B. "Nouveaux objets, nouveaux acteurs, nouveau enjeux éthiques : les interfaces entre biologie, nanotechnologie et informatique". Éthique & Santé 7, nr 1 (marzec 2010): 18–23. http://dx.doi.org/10.1016/j.etiqe.2009.12.001.
Pełny tekst źródłaVaillant, Sylvain. "Le Certificat Informatique et Internet : toute une expérience". Questions vives recherches en éducation, Vol.7 n°17 (15.10.2012): 171–74. http://dx.doi.org/10.4000/questionsvives.1053.
Pełny tekst źródłaRozprawy doktorskie na temat "Internet des objets – Informatique"
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0018.
Pełny tekst źródłaAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques". Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0018/document.
Pełny tekst źródłaAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Hachem, Sara. "Middleware pour l'Internet des Objets Intelligents". Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2014. http://tel.archives-ouvertes.fr/tel-00960026.
Pełny tekst źródłaMebrek, Adila. "Fog Computing pour l’Internet des objets". Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.
Pełny tekst źródłaFog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Bouchaud, François. "Analyse forensique des écosystèmes intelligents communicants de l'internet des objets". Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.
Pełny tekst źródłaWith the development of the Internet of Things, searching for data in a digital environment is an increasingly difficult task for the forensic investigator. It is a real challenge, especially given the heterogeneity of the connected objects. There is a lack of standardization in communication architectures and data management policies. It is accompanied by dependencies between connected ecosystems, especially through hidden links and fragmented information. In this thesis, we suggest adjusting the traditional approach of digital investigation to the constraints of the Internet of Things. We develop methodologies and tools to understand and analyze the connected environment. We assume that the crime scene is a connected whole and not an aggregate of independent digital objects. It contains key data for understanding and contextualizing a past event or phenomenon as evidence for the criminal trial. Digital forensics is considered to be the og extit{application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data fg~ (National Institute of Standards and Technology). Faced with a crime scene, the investigator seeks to understand the criminal event. He examines the data stored in the physical medium and/or in a remote part of the cloud. Our work develops a process of rapid identification of the phenomenon according to four phases: detection, localization, object recognition and information crosschecking. It is enriched with radio signature search tools~: single-sensor and multi-sensor mesh network. This approach is built around the problem of apprehending a multiform connected environment, containing devices that are not always visible or identifiable during a field approach. We integrate in our study the strategy of equipment collection. The challenge lies in the ability to extract one or more connected objects, without compromising the stored data, to place them in a controlled and secure environment. The object is maintained in a state that guarantees the non-alteration or loss of data. The study includes a first phase of understanding the physical environment and dependencies. It seeks to determine the mechanisms of information migration to online platforms and to isolate groups of objects by intelligently breaking the connections. Devices are extracted, then packaged and sealed according to their technical characteristics and the connected infrastructure. We then deepen the exploitation of the information collected using forensic methods. The data is then analyzed according to temporal, spatial and contextual axes. We also propose a classification and a prioritization of the connected structure according to the characteristics of the desired data. The work gives a reading of the life cycle of the data within the Internet of Things infrastructure. In a prospective approach, we deepen the questions of the fine identification of the connected object according to these hardware and software characteristics. The acoustic signature of electronics appears as a relevant physical property in the study of equipment. This feature completes our range of tools in the identification of connected objects
Jallouli, Ons. "Chaos-based security under real-time and energy constraints for the Internet of Things". Thesis, Nantes, 2017. http://www.theses.fr/2017NANT4035/document.
Pełny tekst źródłaNowadays, due to the rapid growth of Internet of Things (IoT) towards technologies, the protection of transmitted data becomes an important challenge. The devices of the IoT are very constrained resource in terms of computing capabilities, energy and memory capacities. Thus, the design of secure, efficient and lightweight crypto-systems becomes more and more crucial. In this thesis, we have studied the problem of chaos based data security under real-time and energy constraints. First, we have designed and implemented three pseudo-chaotic number generators (PCNGs). These PCNGs use a weak coupling matrix or a high diffusion binary coupling matrix between chaotic maps and a chaotic multiplexing technique. Then, we have realized three stream ciphers based on the proposed PCNGs. Security performance of the proposed stream ciphers were analysed and several cryptanalytic and statistical tests were applied. Experimental results highlight robustness as well as efficiency in terms of computation time. The performance obtained in computational complexity indicates their use in real-time applications. Then, we integrated these chaotic stream ciphers within the real-time operating system Xenomai. Finally, we have measured the energy and power consumption of the three proposed chaotic systems, and the average computing performance. The obtained results show that the proposed stream ciphers can be used in practical IoT applications
Laarouchi, Mohamed Emine. "A safety approach for CPS-IoT". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS010.
Pełny tekst źródłaFor several years, we have been witnessing a convergence between cyber-physical systems (CPS) and the Internet of Things (IoT). CPS integrate embedded systems with their physical and human environment by ensuring communication between different sensors and actuators. The IoT targets the network and communication protocols between connected objects. This convergence offers prospects for various applications ranging from connected vehicles to smart grids and the factories of the future. The aim of this thesis is to ensure and guarantee the operational safety of CPS-IoT systems. For this, we have considered a specific case study throughout the thesis which is UAVs. Initially, we focused on the different methods of analysis of operational safety that already exist. These methods have proved their worth for the design and implementation of on-board systems. Throughout this process, we tried to answer the following question: are these existing methods adequate to perform the necessary safety analyses for CPS-IoT? It was concluded that new approaches to analyse the safety of operation of CPS-IoT systems are needed due to the significant complexity of these systems. As a second step, a methodology for predictive analysis of the resilience of CPS-IoTs was proposed. Resilience is defined as being the ability of a system to tolerate failures, to continue to provide the requested service while considering the various internal and external constraints of the system. Two different types of resilience have been differentiated: endogenous and exogenous resilience. Endogenous resilience is the inherent ability of the system to detect and deal with internal faults and malicious attacks. Exogenous resilience is the ongoing ability of the system to maintain safe operation in its surrounding environment. The last part of our work was to investigate the impact of artificial intelligence on the safe operation of CPS-IoTs. More specifically, we looked at how artificial intelligence could be used to enhance UAV safety in the path planning phase. The results obtained were compared with existing planning algorithms
Challal, Yacine. "Sécurité de l'Internet des Objets : vers une approche cognitive et systémique". Habilitation à diriger des recherches, Université de Technologie de Compiègne, 2012. http://tel.archives-ouvertes.fr/tel-00866052.
Pełny tekst źródłaPatrigeon, Guillaume. "Systèmes intégrés adaptatifs ultra basse consommation pour l’Internet des Objets". Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS036.
Pełny tekst źródłaThe Internet of Things is an infrastructure enabling advanced services by interconnecting things. Although the large variety of Internet of Things applications involve many kinds of technical solutions, many of those are based on a typical architecture that can be divided in three layers: the perception layer, the transport layer and the services layer. The dispositive that composed the perception layer, called “sensor nodes”, are subject of technical requirements: size, security, reliability, autonomous, and long lifetime. Sensor nodes’ energy efficiency is the most critical point where traditional technologies show their limitations. New strategies and solutions are proposed to overcome this technical challenge; however, how can those be evaluated, with which tools and at which level? How emerging technologies can be optimized and integrated inside microcontrollers for Internet of Things applications? Which are the new strategies for energy management to adopt with technologies such as 28 nm FD-SOI and non-volatiles memories? What are their limitations? Will they be sufficient?To evaluate the integration of emerging technologies inside low power microcontrollers, we propose a new methodology using an FPGA-based sensor node prototyping platform. Able to operate in already deployed wireless sensor networks, we use it to perform fast and precise evaluations, taking account of the application context. We studied and evaluated multiple memory architecture configurations based on STT magnetic memories as a replacement of traditional solutions, and showed that the non-volatile STT memory technology can improve a microcontroller’s energy efficiency for embedded applications
Patel, Pankesh. "Environnement de développement d'applications pour l'Internet des objets". Phd thesis, Université Pierre et Marie Curie - Paris VI, 2013. http://tel.archives-ouvertes.fr/tel-00927150.
Pełny tekst źródłaKsiążki na temat "Internet des objets – Informatique"
Kathy, Walrath, red. The Java tutorial: Object-oriented programming for the Internet. Wyd. 2. Reading, Mass: Addison-Wesley, 1998.
Znajdź pełny tekst źródłaCampione, Mary. The Java tutorial: Object-oriented programming for the Internet. Reading, Mass: Addison Wesley, 1996.
Znajdź pełny tekst źródłaKathy, Walrath, red. The Java tutorial: Object-oriented programming for the Internet. Reading, Mass: Addison Wesley, 1996.
Znajdź pełny tekst źródła1965-, Noumeir Rita, red. Programmation en Java, version 1.2: Concepts et applications. Montréal: Chenelière/McGraw-Hill, 1998.
Znajdź pełny tekst źródłaKathy, Walrath, i Huml Alison, red. The Java tutorial: A short course on the basics. Wyd. 3. Boston: Addison-Wesley, 2001.
Znajdź pełny tekst źródłaJava la synthèse: Des concepts objets aux architectures Web. Wyd. 3. Paris: Dunod, 2000.
Znajdź pełny tekst źródłaPro Perl. Berkeley, CA: Apress, 2005.
Znajdź pełny tekst źródłaFormation à-- ASP.net. Les Ulis, France: Microsoft Press, 2001.
Znajdź pełny tekst źródłaDugerdil, Philippe. Smalltalk-80: Programmation par objets. Lausanne: Presses polytechniques et universitaires romandes, 1990.
Znajdź pełny tekst źródłaFerber, Jacques. Conception et programmation par objets. Wyd. 2. Paris: Hermès, 1991.
Znajdź pełny tekst źródłaCzęści książek na temat "Internet des objets – Informatique"
Joshi, Keyur, Angelina Aziz, Philip Dietrich i Markus König. "Efficient Data Curation Using Active Learning for a Video-Based Fire Detection". W CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 616–24. Florence: Firenze University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0289-3.60.
Pełny tekst źródłaJoshi, Keyur, Angelina Aziz, Philip Dietrich i Markus König. "Efficient Data Curation Using Active Learning for a Video-Based Fire Detection". W CONVR 2023 - Proceedings of the 23rd International Conference on Construction Applications of Virtual Reality, 616–24. Florence: Firenze University Press, 2023. http://dx.doi.org/10.36253/10.36253/979-12-215-0289-3.60.
Pełny tekst źródłaNovicky, Filip, Joshua Offergeld, Simon Janssen i Pablo Lanillos. "Robotic Active Tactile Sensing Inspired by Serotonergic Modulation Using Active Inference". W Biomimetic and Biohybrid Systems, 33–55. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38857-6_3.
Pełny tekst źródłaBenghozi, Pierre-Jean, Sylvain Bureau i Françoise Massit-Folléa. "Defining the Internet of Things". W L’Internet des objets, 91–99. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.97.
Pełny tekst źródłaCarroué, Laurent. "Informatique, électronique, télécommunications, Internet, médias". W Images économiques du monde 2019, 79–81. Armand Colin, 2018. http://dx.doi.org/10.3917/arco.bost.2018.01.0079.
Pełny tekst źródłaCarroué, Laurent. "Informatique, électronique, télécommunications, Internet, médias". W Images économiques du monde 2018, 103–5. Armand Colin, 2017. http://dx.doi.org/10.3917/arco.bost.2017.01.0103.
Pełny tekst źródłaBenghozi, Pierre-Jean, Sylvain Bureau i Françoise Massit-Folléa. "Technical evolution of the Internet of Things". W L’Internet des objets, 111–20. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.99.
Pełny tekst źródłaBenghozi, Pierre-Jean, Sylvain Bureau i Françoise Massit-Folléa. "The prominence and challenges of the Internet of Things". W L’Internet des objets, 101–10. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.98.
Pełny tekst źródłaHONBA HONBA, Cédric. "Sémiotique et archive d’images". W Corpus audiovisuels, 125–46. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.5705.
Pełny tekst źródłaERTZ, Myriam, Shouheng SUN, Émilie BOILY, Gautier Georges Yao QUENUM, Kubiat PATRICK, Yassine LAGHRIB, Damien HALLEGATTE, Julien BOUSQUET i Imen LATROUS. "Les produits augmentés : la contribution de l’industrie 4.0 à la consommation durable". W Le marketing au service du développement durable, 277–300. ISTE Group, 2021. http://dx.doi.org/10.51926/iste.9036.ch14.
Pełny tekst źródłaStreszczenia konferencji na temat "Internet des objets – Informatique"
Heiwy, Véronique. "Design guidelines for the internet of things". W the 15th Ergo'IA "Ergonomie Et Informatique Avancé" Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/3050385.3050392.
Pełny tekst źródłaGarrett, Timothy, Saverio Debernardis, Rafael Radkowski, Carl K. Chang, Michele Fiorentino, Antonio E. Uva i James Oliver. "Rigid Object Tracking Algorithms for Low-Cost AR Devices". W ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-35304.
Pełny tekst źródłaHaboyan, Razmik. "La Grande Réinitialisation : projet, symptôme ou promesse ? La transition comme une arme de guérilla sémiotique". W Actes du congrès de l’Association Française de Sémiotique. Limoges: Université de Limoges, 2024. http://dx.doi.org/10.25965/as.8487.
Pełny tekst źródłaBouraoui, Zied, i Steven Schockaert. "Learning Conceptual Space Representations of Interrelated Concepts". W Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/243.
Pełny tekst źródłaSorbo, Emanuela, i Gianluca Spironelli. "INFORMATIVE MODELS OF CULTURAL HERITAGE. THE “UNFINISHED” CHURCH OF BRENDOLA." W ARQUEOLÓGICA 2.0 - 9th International Congress & 3rd GEORES - GEOmatics and pREServation. Editorial Universitat Politécnica de Valéncia: Editorial Universitat Politécnica de Valéncia, 2021. http://dx.doi.org/10.4995/arqueologica9.2021.12097.
Pełny tekst źródłaRastogi, Pramod K. "State of the Art in Optical Stress Analysis". W The European Conference on Lasers and Electro-Optics. Washington, D.C.: Optica Publishing Group, 1996. http://dx.doi.org/10.1364/cleo_europe.1996.cwb1.
Pełny tekst źródłaCmeciu, Doina, i Camelia Cmeciu. "VIRTUAL MUSEUMS - NON-FORMAL MEANS OF TEACHING E-CIVILIZATION/CULTURE". W eLSE 2013. Carol I National Defence University Publishing House, 2013. http://dx.doi.org/10.12753/2066-026x-13-108.
Pełny tekst źródłaKatkeviča, Santa, i Aina Strode. "Projection Mapping Method in Advertising Design". W 80th International Scientific Conference of the University of Latvia. University of Latvia Press, 2022. http://dx.doi.org/10.22364/htqe.2022.71.
Pełny tekst źródłaORLIANGES, Jean-Christophe, Younes El Moustakime, Aurelian Crunteanu STANESCU, Ricardo Carrizales Juarez i Oihan Allegret. "Retour vers le perceptron - fabrication d’un neurone synthétique à base de composants électroniques analogiques simples". W Les journées de l'interdisciplinarité 2023. Limoges: Université de Limoges, 2024. http://dx.doi.org/10.25965/lji.761.
Pełny tekst źródłaRaporty organizacyjne na temat "Internet des objets – Informatique"
Aubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin i Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, grudzień 2023. http://dx.doi.org/10.51203/rapport.nu.000003.
Pełny tekst źródła