Зміст
Добірка наукової літератури з теми "Complexité Borélienne de relations d'équivalence"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Complexité Borélienne de relations d'équivalence".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Дисертації з теми "Complexité Borélienne de relations d'équivalence"
Robert, Simon. "Une approche par les groupes amples pour l’équivalence orbitale des actions minimales de Z sur l’espace de Cantor." Electronic Thesis or Diss., Lyon 1, 2023. http://www.theses.fr/2023LYO10142.
Повний текст джерелаThis thesis takes place in the context of topological dynamics, a branch of dynamical systems concerned with the asymptotic qualitative behavior of continuous transformations arising from a group or semigroup action on a usually compact metric space. For example, a classic question might be whether a dynamical system admits recurrent points, i.e. points that will return arbitrarily close to their starting point infinitely often under the dynamics. Often, because of their qualitative and asymptotic nature, these properties do not depend precisely on the system but rather on the orbits of the points, i.e. the positions they will reach. Hence the notion of orbit equivalence at the heart of this thesis, which consists in considering that, after identification of the underlying spaces, two systems whose points all have the same orbits would be "qualitatively the same". In the 1990s, Giordano Putnam and Skau used homological algebra to establish a classification up to orbit equivalence of minimal dynamical systems arising from Z-actions on a Cantor space in terms of both full groups and invariant measures. This result shows in particular that there are non-countably many such different systems up to orbit equivalence, which contrasts quite strongly with the framework of ergodic theory, a very close field concerned with measured dynamical systems, in which the combination of two famous results, one due to Ornstein and Weiss and the other to Dye, shows that there is only one amenable group action on a standard probability space up to orbit equivalence. My main contribution in the present manuscript is to bring an elementary perpective and dynamical proofs to the classifications obtained by Giordano, Putnam and Skau (the one on orbital equivalence mentioned above as well as another one dealing with a variation called strong orbital equivalence), both in order to understand them from another perspective and to try to extend them to other contexts. Along the way, I will also prove a result of Borelian complexity, namely that the isomorphism relation of countable, locally finite and simple groups and a universal relation arising from a Borelian action of S_\infty, and improve a result of Krieger about the conjugation of ample groups
Cheikh-Alili, Fahima. "Composition de services: algorithmes et complexité." Phd thesis, Université Paul Sabatier - Toulouse III, 2009. http://tel.archives-ouvertes.fr/tel-00459114.
Повний текст джерелаCheikh, Fahima. "Composition de services : algorithmes et complexités." Toulouse 3, 2009. http://thesesups.ups-tlse.fr/712/.
Повний текст джерелаThe problem of combining services, also called the services composition problem, constitutes the centre of intense research activity. To compose services consists of merging their action sequences in order to obtain new sequences that satisfy the client requirements. This problem is in general difficult to solve. In this thesis, we consider services that are able to perform two kinds of actions: communication actions and internal actions. Moreover, services are able to verify conditions before an action execution and to change the value of variables after an action execution. Formally, services are represented by conditional communicating automata. We define for this model the services composition problem and we study its decidability for the following preorder and equivalence relations: traces inclusion, trace equivalence, simulation and bisimulation. Further to the decidability results obtained we propose three variants of the initial model. For each variant we define the composition problem and we study its complexity regarding the relations cited above
Melleray, Julien. "Géométrie de l' espace d' Urysohn et théorie descriptive des ensembles." Paris 6, 2005. https://tel.archives-ouvertes.fr/tel-00011694.
Повний текст джерелаRakotonirina, Itsaka. "Efficient verification of observational equivalences of cryptographic processes : theory and practice." Electronic Thesis or Diss., Université de Lorraine, 2021. http://www.theses.fr/2021LORR0052.
Повний текст джерелаThis thesis studies the analysis of cryptographic protocols. They are sequences of instructions permitting to interact with a recipient remotely while protecting the sensitive content of the communication from a potential malicious third party. Classical cases where the confidentiality and the integrity of the communication are critical are, among others, online payments and medical-service booking, or electronic voting. We study notions of security defined technically by observational equivalences (which includes among others confidentiality, anonymity or non-traceability). We designed a program, DeepSec, which, from the description of a protocol for a fixed number of participants, verifies in a fully-automated way whether the protocol offers a security guarantee of this type. We demonstrate the ability of this tool to analyse complex attack scenarios through several examples. After that, we present an optimization technique exploiting symmetries in security proofs. Typically, participants with similar roles in the protocol often have similar instructions to follow, inducing redundant work during the analysis. On several examples, using this technique allowed to reduce the analysis time of DeepSec by several orders of magnitude. Finally, we also studied the theoretical aspect the problem in order to determine to which extent DeepSec’s algorithm could be improved (can we make the tool faster?) or made more expressive (can we get rid of some of the limitations of the tool?). For that we carried out a complete analysis of the computational complexity of DeepSec’s algorithm, and integrated it to a detailed survey of the state of the art regarding complexity results in similar contexts. This meticulous survey allowed us to expose subtle variations in how the problem is formalised across the literature—sometimes impacting its complexity. We also include new results and improve some of the surveyed ones, resulting in a clearer understanding of the problem