Добірка наукової літератури з теми "Vérification de modèles bornés"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Vérification de modèles bornés".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Vérification de modèles bornés"
Kamsu-Foquem, Bernard, Vincent Chapurlat, and François Prunet. "Vérification de modèles de processus d'entreprise : une approche formelle." Journal Européen des Systèmes Automatisés 39, no. 9-10 (December 30, 2005): 1051–78. http://dx.doi.org/10.3166/jesa.39.1051-1078.
Повний текст джерелаTorres, Lucile, and Claudia Frydman. "Vérification et validation de modèles CommonKADS par réseaux de Petri." Revue d'intelligence artificielle 15, no. 2 (June 15, 2001): 247–76. http://dx.doi.org/10.3166/ria.15.247-276.
Повний текст джерелаGillet, Roland. "Efficience informationnelle du marché boursier: vérification empirique et implications théoriques." Recherches économiques de Louvain 57, no. 3 (1991): 297–308. http://dx.doi.org/10.1017/s0770451800031778.
Повний текст джерелаGauthier, Yvon. "Vérité et vérification en logique mathématique et dans les théories physiques." Articles 9, no. 1 (January 9, 2007): 135–45. http://dx.doi.org/10.7202/203186ar.
Повний текст джерелаRougier, Éric. "Croissance démographique, capital humain et technologie : un modèle de croissance endogène «simonien» appliqué aux pays en développement." Économie appliquée 53, no. 4 (2000): 31–59. http://dx.doi.org/10.3406/ecoap.2000.1741.
Повний текст джерелаJellad, Asma. "Identification des propriétés élastoplastiques des films minces de CrN en utilisant la technique de nanoindentation et la modélisation par éléments finis (FEM)." Matériaux & Techniques 111, no. 4 (2023): 403. http://dx.doi.org/10.1051/mattech/2023029.
Повний текст джерелаCafiau, Sybille, Patrick Girard, Laurent Guittet, and Xavier Blanc. "Vérification de cohérence entre modèles de tâches et de dialogue en conception centrée-utilisateur." Ingénierie des systèmes d'information 16, no. 5 (October 30, 2011): 9–41. http://dx.doi.org/10.3166/isi.16.5.9-41.
Повний текст джерелаHarnois, Claudie, Karine Picard, Sébastien Rivard, Jean-François Tremblay, and Éric Gosselin. "La dynamique du stress au travail est-elle transactionnelle?" Ad machina, no. 4 (February 26, 2021): 75–90. http://dx.doi.org/10.1522/radm.no4.1245.
Повний текст джерелаTidjani, A. E. B., D. Yebdri, J. C. Roth, and Z. Derriche. "Exploration des séries chronologiques d’analyse de la qualité des eaux de surface dans le bassin de la Tafna (Algérie)." Revue des sciences de l'eau 19, no. 4 (January 17, 2007): 315–24. http://dx.doi.org/10.7202/014418ar.
Повний текст джерелаRaffestin, Claude. "Espace, temps, frontière." Cahiers de géographie du Québec 18, no. 43 (April 12, 2005): 23–34. http://dx.doi.org/10.7202/021174ar.
Повний текст джерелаДисертації з теми "Vérification de modèles bornés"
Kheireddine, Anissa. "Contribution to SAT-based Bounded Model Checking." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS566.
Повний текст джерелаComputer systems have become omnipresent in our daily lives. Ensuring the reliability and robustness of these systems is an absolute necessity. Model-Checking is one of the approaches dedicated to this purpose. Its objective is to either prove the absence of failures or identify potential ones. Model-Checking is declined into several technique. Among these, there is Bounded Model Checking (BMC), a technique that relies on Boolean satisfiability (SAT). The core idea behind BMC is to verify that a model, restricted to executions bounded by some integer k, satisfies its specification, often defined as a set of temporal logic expressions. In this approach, system behaviors are expressed as SAT problems. Unlike other formal verification methods, SAT-based BMC is generally not prone to the state space explosion problem, which can be problematic when dealing with designs involving millions of variables and constraints. However, the trade-off lies in the time complexity, as SAT problems are known to be NP-complete. Over the past few decades, significant advancements have been made in sequential SAT solving. These developments have mainly focused on utilizing dynamic information, acquired during the solving process (e.g., Learning Binary Clauses), or static information, extracted from the inherent structure of the SAT problem (e.g., community structure). However, less attention has been given to the structural information embedded within the original problem. For instance, when a BMC problem is reduced to SAT, critical information is lost in the translation. As this thesis emphasizes, reintegrating this lost information can greatly enhance the solving process. This work explores ways to improve SAT-based BMC problem-solving, both in sequential and parallel settings, by harnessing and leveraging pertinent information extracted from the problem's inherent characteristics. This may involve improving existing generic heuristics or effectively breaking down the formula into partitions
Duclos, Mathilde. "Méthodes pour la vérification des protocoles cryptographiques dans le modèle calculatoire." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM002/document.
Повний текст джерелаCritical and private information are exchanged on public environment. To protect it from dishonest users, we use cryptographic tools. Unfortunately, bad conception, poorly written security properties and required security hypothesis lead to attacks, and it may take years before one discover the attack and fix the security schemes involved. In this context, provable security provides formal definitions for security objectives and implied mathematical proofs that these objectives are fullfilled. On another hand, complexity and variety of cryptographic systems are increasing, and proofs by hand are too complicated to write and to verify (Bellare& Rogaway 2004, Shoup 2004, Halevi 2005). Thus, we need computer-assisted verification methods for cryptographic systems. The aim of this thesis is to progress in this direction. More precisely we want significant progress over formal proofs on cryptographic protocols. To verify cryptographic protocols we need to develop a theoritical framework providing: - a precise modelisation for cryptographic protocols and security properties we want to prove in the computationnal model, - designing tactics to automate proofs, - taking into account realistic models for adversary (side-channels...). By the end of the thesis we have enhanced a theoretical framework and computing tools helping verifying cryptographic protocols
Harrou, Fouzi. "Détection d'anomalies en présence de paramètres de nuisance bornés." Troyes, 2010. http://www.theses.fr/2010TROY0002.
Повний текст джерелаAnomaly detection is addressed within a statistical framework. Often the statistical model is composed of two types of parameters: the informative parameters and the nuisance ones. The nuisance parameters are of no interest for detection but they are necessary to complete the model. In the case of unknown, non-random and non-bounded nuisance parameters, their elimination is unavoidable. Unfortunately, this can lead to a serious degradation of the detector capacity because some anomalies are masked by nuisance parameters. Nevertheless, in many cases, the physical nature of nuisance parameter is known, and this may allow set bounds to the values taken by this parameter. In this work, the problem of anomaly detection with bounded nuisance parameters has been addressed from the statistical point of view in the context of linear model. The con-strained generalized likelihood ratio test has been studied. It has been shown that the performances of anomaly detector can be drastically improved by taking into account the lower and upper bounds, naturally imposed on the nuisance parameters. Some applications to integrity control of GPS positioning systems are developed in fields of train navigation. Finally, the detection of abnormal ozone measurements by using a regional ozone surveillance network has been used to illustrate the theoretical findings and to show the relevance of the proposed method
El, Smaily Mohammad. "Equations de réaction-diffusion dans des milieux hétérogènes non bornés." Aix-Marseille 3, 2008. http://www.theses.fr/2008AIX30010.
Повний текст джерелаIn this thesis, we study some propagation phenomena related to the heterogenous reaction-advection-diffusion. This thesis is composed of three parts. If the nonlinearity f is of "KPP", there exists a minimal speed c*. In the first part, we study the asymptotics and some homogenization regimes of the minimal speed c* with respect to the factors of reaction and diffusion and with respect to the parameter of periodicity. In the second part, we give several min-max and max-min formulae for the speeds of pulsating travelling fronts according to the type of the nonlinearity. The third part is concerned with the variation of the minimal speed with respect to the periodicity parameter L and also with the homogenized speed of a reaction-diffusion equation in the one dimensional case, but in a setting more general than that of the first part
Lacresse, Hervé. "Détection de pannes en présence de paramètres de nuisance non-linéaires bornés." Troyes, 2004. http://www.theses.fr/2004TROY0001.
Повний текст джерелаFault detection schemes usually aim at eliminating nuisance parameters from the decision process upon wich they rely. However, it is often possible to determine some bounds to the variations ot these parameters, taking into account physical considerations. Neglecting these bounds is a potential loss of relevant information. A fault detection methodology for models with non-linear bounded nuisance parameters is suggested. This methodology is based upon the design of the optimal staistical tests obtained in the linear nuisance case. This detection scheme uses non conventional linear approximations, whose impact on the performances of the tests can be assessed through a comparison to the optimal results of the linear case. This comparison is expressed in terms of modifications in the false-alarm and non-detection probabilities of the tests, reflecting the "non linearity" of the model. Some applications to integrity control of GPS/GNSS positioning systems are developed in the fields of plane and train navigation
Bouyer-Decitre, Patricia. "Modèles et algorithmes pour la vérification des systèmes temporisés." Cachan, Ecole normale supérieure, 2002. http://www.theses.fr/2002DENS0008.
Повний текст джерелаBeaudenon, Vincent. "Diagrammes de décision de données pour la vérification de systèmes matériels." Paris 6, 2006. http://www.theses.fr/2006PA066337.
Повний текст джерелаJacquemard, Florent. "Modèles d'automates d'arbres étendus pour la vérification de systèmes infinis." Habilitation à diriger des recherches, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00643595.
Повний текст джерелаColin, Séverine. "Procédures de recherche en génération de testes à partir de modèles de spécifications." Besançon, 2005. http://www.theses.fr/2005BESA2042.
Повний текст джерелаThe works introduced in this thesis give operational research procedures in the context of automatic functional test generation from specification models. The operations of the model are transformed into graphs. The paths of these graphs represent the behaviors of the model. The constraint animation (i. E. The simulation of the execution) of the behaviors is performed by the set constraint solver CLPS-BZ. The main goal of the generation method is to produce a set of tests designed to cover a specific set of test targets. These targets are computed from the model behaviors and in accordance with coverage criteria. The most delicate part of a test generation is to find a path, called preamble, that allows to reach a test target from the initial state of the system. The part of the test called postamble resets the system in a state that allows to resume the test procedure and comes under a similar problem. This PhD thesis gives several procedures in order to generate the preamble and postamble. A breadth search algorithm based on the system behaviors is given for the preamble computation. Besides, several Best-First search procedures are evaluated in the context of forward and backward chaining animations to compute the preamble and postamble. These algorithms have been implemented and adapted to several notations of specifications: B and Statemate statecharts. These algorithms have been used on many industrial projects and are optimized to go large scale
Cortier, Véronique. "Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires." Habilitation à diriger des recherches, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00578816.
Повний текст джерелаКниги з теми "Vérification de modèles bornés"
Wang-Foucher, Haiying. La vérification de comptabilité en Chine à l'épreuve des modèles occidentaux. Paris: Harmattan, 2008.
Знайти повний текст джерелаЧастини книг з теми "Vérification de modèles bornés"
PAULEVÉ, Loïc. "Réseaux booléens : formalisme, sémantiques et complexité." In Approches symboliques de la modélisation et de l’analyse des systèmes biologiques, 163–200. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9029.ch5.
Повний текст джерелаТези доповідей конференцій з теми "Vérification de modèles bornés"
Tomashenko, Natalia, Salima Mdhaffar, Marc Tommasi, Yannick Estève, and Jean-François Bonastre. "Sur la vérification du locuteur à partir de traces d'exécution de modèles acoustiques personnalisés." In XXXIVe Journées d'Études sur la Parole -- JEP 2022. ISCA: ISCA, 2022. http://dx.doi.org/10.21437/jep.2022-91.
Повний текст джерела