Dissertations / Theses on the topic 'Les systèmes politiques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Les systèmes politiques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kung, Chaang Yung. "Le régime politique de Taiwan : essai comparatif avec les systèmes politiques occidentaux et régionaux." Paris 2, 1995. http://www.theses.fr/1995PA020029.
Full textThe object of this research is to study the evolution of the politic systel of taiwan and her reformation. At first, we study the role of taiwan in chinese history. Next, we analyse the main part of the five powers' 1947 constitution and the "temporary provisions" which has controled the politic life of taiwan from 1948 to 1991. And then, we study the processes of the democratization in taiwan during the past few years and compare them with the experiences of democratization in south korea and the thailand. Finally, we analyse the constitutional problems of taixan after the democratization and her revision in ordre to resolving the insufficiency of the constitutional fonction
Liu, Pengfei. "Intégration de politiques de sécurité dans les systèmes ubiquitaires." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00799284.
Full textMvé, Ella Léandre. "La responsabilité de protéger et l’internationalisation des systèmes politiques." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0331.
Full textFrom the perspective of international law, the responsibility to protect is traditionally analyzed in order to determine its normative scope. The attractiveness of the internationalist doctrine for the question of the normativity of the principle and the habitual indifference of international law to the political system of States ended up confining developments to the sometimes overly simplistic prisms of international law and international relations.This research intends to propose a different perspective by taking a contrary view of this classic approach. It addresses the issue of the responsibility to protect not only the point of view of third parties to the failed state, but also, and above all, the State itself and its population. It is therefore a question of revisiting the approach of apprehending the responsibility to protect in order to show that international law is no longer indifferent to the political systems of the States - let alone in crisis.In questioning the link between the responsibility to protect and the state's political system, the analysis leads irreparably to the conclusion that the responsibility to protect is “enshrined” in norms that are not exclusively legal and that currently analyze in the network. The study therefore proposes to define it as an norme de congruence since it leads to the assessment of the legal value of a rule of law taking into account the different influences contained in it
Mercier, Sophie. "Modèles et optimisation de politiques de maintenance de systèmes." Université de Marne-la-Vallée, 2000. http://www.theses.fr/2000MARN0087.
Full textHabib, Lionel. "Formalisations et comparaisons de politiques et de systèmes de sécurité." Paris 6, 2011. http://www.theses.fr/2011PA066146.
Full textBollon, Jean-Marc. "Etude de différentes politiques de pilotage de systèmes de production." Grenoble INPG, 2001. http://www.theses.fr/2001INPG0029.
Full textLetsios, Dimitrios. "Politiques de gestion d'énergie et de température dans les systèmes informatiques." Thesis, Evry-Val d'Essonne, 2013. http://www.theses.fr/2013EVRY0016/document.
Full textNowadays, the enegy consumption and the heat dissipation of computing environments have emerged as crucial issues. Indeed, large data centers consume as muse electricity as a city while modern processors attain high temperatures degrading their performance and decreasing their reliability.. In this thesis, we study various energy and temperature aware scheduling problems and we focus on their complexity and approximability. A dominant technique for saving energy is by prosper scheduling of the jobs through the operating system combined with appropriate scaling of the processor's speed. This technique is referred to as speed scaling in the literature and its theoretical study was initiated by Yao, Demers and Shenker (FOCS'1995). In order to manage the thermal behavior of a computing device, we adaopt the approach of Chrobak, Dürr, Hurand and Robert (AAIM'2008). The main assumption is that some jobs are more CPU intensive than others and more heat is generated during their execution. Moreover, the cooling of a computing device occurs by introducing appropriate idle periods
Mendonca, Fernando. "Politiques polyvalentes et efficientes d'allocation de ressources pour les systèmes parallèles." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM021/document.
Full textThe field of parallel supercomputing has been changing rapidly inrecent years. The reduction of costs of the parts necessary to buildmachines with multicore CPUs and accelerators such as GPUs are ofparticular interest to us. This scenario allowed for the expansion oflarge parallel systems, with machines far apart from each other,sometimes even located on different continents. Thus, the crucialproblem is how to use these resources efficiently.In this work, we first consider the efficient allocation of taskssuitable for CPUs and GPUs in heterogeneous platforms. To that end, weimplement a tool called SWDUAL, which executes the Smith-Watermanalgorithm simultaneously on CPUs and GPUs, choosing which tasks aremore suited to one or another. Experiments show that SWDUAL givesbetter results when compared to similar approaches available in theliterature.Second, we study a new online method for scheduling independent tasksof different sizes on processors. We propose a new technique thatoptimizes the stretch metric by detecting when a reasonable amount ofsmall jobs is waiting while a big job executes. Then, the big job isredirected to separate set of machines, dedicated to running big jobsthat have been redirected. We present experiment results that show thatour method outperforms the standard policy and in many cases approachesthe performance of the preemptive policy, which can be considered as alower bound.Next, we present our study on constraints applied to the Backfillingalgorithm in combination with the FCFS policy: Contiguity, which is aconstraint that tries to keep jobs close together and reducefragmentation during the schedule, and Basic Locality, that aims tokeep jobs as much as possible inside groups of processors calledclusters. Experiment results show that the benefits of using theseconstrains outweigh the possible decrease in the number of backfilledjobs due to reduced fragmentation.Finally, we present an additional constraint to the Backfillingalgorithm called Full Locality, where the scheduler models the topologyof the platform as a fat tree and uses this model to assign jobs toregions of the platform where communication costs between processors isreduced. The experiment campaign is executed and results show that FullLocality is superior to all the previously proposed constraints, andspecially Basic Backfilling
Lohata, Tambwe. "L'idéologie démocratique au Zaïre : contribution à l'étude des systèmes politiques africains." Amiens, 1990. http://www.theses.fr/1990AMIE0004.
Full textSupport of offical ideology in Zaire (and also in Africa), the discourse of authenticity follows necessary social functions to the construction of the State-nation. Taking into account the "plurality" of nature of social structures in Zaire ; the does not dispose of the monopoly of allegiance nor that of legitimate physical violence : this and the fragility of political consensus gives rise to difficult unitarian state ; where the importance is apparently placed an ideology an culture. The cultural primate, ancestral or national, expressed the authenticity which also refers to eastern pressiure, relative to the multiportism institution : it is a resistance strategy which still expresses itself through use of the theme of democraty. On the other hand, isnpite of the passionate nature of the themes -unity, order, autority- vehicules, also inspite of the taking over of "production" and the progagation of authenticity by "neutral-areas" and state civil-servants. The discourse has been realed to be non-efficient. The massive reference to repressive state violence is moreover sign and factor of inefficiency. This feeds mobutist authoritarianism. It's a question of un edited authoritarianism : it is an invention of african leaders due to neo-patrimonial domination using at the same time civil and repressive administration, the central and peripheral supportes, the discourse and violence etc. . . This complexity parthy explains the longetivity ohf the authentic regime, which is going to evolve from april 1990 on words, thanks to extra-mobutist factors
Sassine, Chadi. "Intégration des politiques de maintenance dans les systèmes de production manufacturiers." Grenoble INPG, 1998. http://www.theses.fr/1998INPG0080.
Full textSantana, de Oliveira Anderson. "Réécriture et modularité pour les politiques de sécurité." Thesis, Nancy 1, 2008. http://www.theses.fr/2008NAN10007/document.
Full textIn this thesis we address the modular specification and analysis of flexible, rule-based policies. We introduce the use of the strategic rewriting formalism in this domain, such that our framework inherits techniques, theorems, and tools from the rewriting theory. This allows us to easily state and verify important policy properties such as the absence of conflicts, for instance. Moreover, we develop rewrite-based methods to verify elaborate policy properties such as the safety problem in access control and the detection of information flows in mandatory policies. We show that strategies are important to preserve policy properties under composition. The rich strategy languages available in systems like Tom, Stratego, Maude, ASF+SDF and Elan allows us to define several kinds of policy combiners. Finally, in this thesis we provide a systematic methodology to enforce rewrite-based policies on existing applications through aspect-oriented programming. Policies are weaved into the existing code, resulting in programs that implement a reference monitor for the given policy. Reuse is improved since policies and programs can be maintained independently from each other
Masson, Diane. "La construction des systèmes politiques en Serbie et en Croatie (1989-1995) : de l'ethnification de l'espace politique à l'utilisation politique de la guerre." Paris, Institut d'études politiques, 2000. http://www.theses.fr/2000IEPP0025.
Full textZequeira, Alfonso Romulo Isbel. "Modélisation stochastique pour l'évalusation de politiques d'inspection et de maintenance des systèmes de sécurité." Troyes, 2005. http://www.theses.fr/2005TROY0008.
Full textHigh safety systems availability is important to keep industrial risks at low levels. Usually the failures of those systems can be detected only by periodic inspections. Besides, they deteriorate in time. Hence to replace them periodically may decrease total cost. We consider the determination of inspection and maintenance policies of safety systems. Important practical aspects considered in this thesis are the quality of inspections, the quality of maintenance actions and the use of predictive maintenance. We study how to include in the models the opportunities for inspecting and replacing the system. Further, we examine the inspection and maintenance policy for two-components parallel systems with dependent component lifetimes, for two criteria: the cost rate and a reliability constraint
Milhau, Jérémy. "Un processus formel d'intégration de politiques de contrôle d'accès dans les systèmes d'information." Phd thesis, Université Paris-Est, 2011. http://tel.archives-ouvertes.fr/tel-00674865.
Full textLagier-Marchand, Christèle. "Les électrices du Front national : trajectoires familiales, systèmes de valeurs et dispositions politiques." Amiens, 2005. http://www.theses.fr/2005AMIE0052.
Full textLeconte, Cécile. "Entre systèmes politiques nationaux et espace public européen : les dimensions politiques de l'intégration européenne à travers l'analyse de la crise autrichienne." Paris, Institut d'études politiques, 2003. http://www.theses.fr/2003IEPP0018.
Full textBoulares, Féthi. "La corruption et la répression : une nouvelle approche dans l'analyse des systèmes politiques arabes." Toulouse 1, 2007. http://www.theses.fr/2007TOU10021.
Full textA great number of Arab researchers concerned the gray zones following the application of the traditional approaches in the analysis of the Arab political systems, which testify to the insufficiency ot these models as soon as they are projected in Arab political reality. That being, the analysis of the political process in this area, was focused on the direct application of these approaches, without taking into account inherent specificities of the Arab world. These models were elaborate in different environments and besides it is what explains the thin results obtained in this field. Also, is necessary it right now to note a certain conceptual blur in the field of analysis of which the abundance of the former studies was not enough convincing to clarify the nature of the Arab political systems theoretically
Ponchet-Durupt, Amélie. "Modèles stochastiques pour l'évaluation de politiques de maintenance sur des systèmes à dégradation graduelle." Troyes, 2010. http://www.theses.fr/2010TROY0018.
Full textMost of systems in the industry are gradually deteriorating systems or devices which undergo a change in their deterioration rate, e. G. , be-cause of environmental or use conditions. This change can impact the degradation of the sys-tem and leads to a sudden increase of the system's deterioration rate. The consideration of such changes leads to a more realistic degradation model and opens perspectives in a maintenance decision making point of view. Several condition-based maintenance policies are then suggested and each of them is adapted to the available, or used, information on the system. The impact of the available information on the average long-run cost rate of the maintained system is studied for each maintenance policy considering perfect maintenance actions. In practical cases, maintenance actions do not lead to the renewal of the system. Hence a second study is performed on a maintenance policy adapted to large structures such as bridges, dikes, or pipelines. Such systems are built in order to be operational for a given finite time span which can be seen, for example, as an insurance deadline. Based on existing imperfect maintenance models, several improvement functions which model the impact of an imperfect maintenance action on the system, are proposed. A systematic maintenance policy is then considered and evaluated on a finite time span
Bouriche, Khalid. "Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès." Thesis, Artois, 2013. http://www.theses.fr/2013ARTO0406/document.
Full textThis thesis focuses on encoding default-based SELinux security policy in OrBAC and propose an extension of this model. We presented the state of the art of different models of access controls present in the literature underlining the limitations of each of these models. Then we presented the model OrBAC as an extension of the RBAC model, firstly because he brought the notion of context and organization and secondly it allows expressing, in addition to permissions, prohibitions and obligation. Then we presented the SELinux security solution that uses a set of access control models such as DAC, RBAC and MAC. We identified several hundreds or even thousands of rules in SELinux security policy, these rules may be access decisions or decisions of transition. We could then encode these rules in OrBAC model, and via filling its tables of entities, then transform relations OrBAC. Our thesis also reviewed the foundations of possibilistic logic, and then made an important enlargement in OrBAC model; it's to introduce an entity called "priority" in each relationship model OrBAC. The entity "priority" quantifies the certainty for concrete entity injection into the corresponding abstract entity, in general, it's meaning the degree of certainty that a relationship is performed. We proposed three modes of combination (pessimistic, optimistic and advanced) that can be adopted to determine the concrete relations priority value from priorities values of each corresponding abstract relationship. Finally, we implement, via an application developed by DELPHI, coding access decisions rules of the SELinux policy in OrBAC model introducing the priority entity
Hricovová, Zuzana. "La comparaison des héritages coloniaux britanniques et français dans les systèmes politiques d'Afrique de l'Ouest." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193689.
Full textGuerroudji, Nacira. "Politiques de gestion : de la spécification à la mise en oeuvre." Versailles-St Quentin en Yvelines, 1997. http://www.theses.fr/1997VERS0013.
Full textChambon, André. "Les modalités du développement éducatif local : des zones d'éducation prioritaires aux politiques éducatives urbaines." Paris 8, 1998. http://www.theses.fr/1998PA081447.
Full textIn a decentralization context trends in external state service - national education were confronted with the ambitions of various local education agents ; these new situations may be the keynote of educational mode and systems change, according to B. Gharlot's analysis in "l'école en mutation" ("the changing school"). Our hypothesis is that this change would be expressed though specific conditions, appropriate to each local ground of educational development. Surveys of the development of partnership were especially concerned, since 1982 with first "zones d'éducation prioritaires" (epa) experiments, then, from 1989, in the context of "zep" revival, with relations between "zep" and "developpement social des quartiers" (urban renewal) proceedings, and finally with educational initiatives in three medium sized cites, Evry, Amiens, Calais. Thanks to there interventions, local communities appear as the backbare of many achievements carried out in two major and correlated fields : youth elected mode of socialization and the planning of a sort of educational geopolitics which over determins then. So, local educational development seems to generate a style of operation contradictory to the logics inherited from territorialized education but related to that of local training areas. However, in spite of the reference to a global management of urban areas ("contrat de ville"), the lack of institutional apparatus in the educational field presently prevents from obtaining a real consistency : processes of local educational development observed in various areas only display the life size emergence of education modes and systems change
Nguyen, Hai Binh. "Politiques de pilotage pour l'optimisation d'un système de production de semi-conducteurs." Phd thesis, Grenoble INPG, 2007. http://tel.archives-ouvertes.fr/tel-00212271.
Full textOuld-Slimane, Hakima. "Réécriture de programmes pour une application effective des politiques de sécurité." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28026/28026.pdf.
Full textDuring the last decades, we have witnessed a massive automation of the society at all levels. Unfortunately, this technological revolution came with its burden of disadvantages. Indeed, a new generation of criminals emerged and is benefitting from continuous progress of information technologies to cause more illegal activities. Thus, to protect computer systems, it has become very crucial to rigorously define security policies and provide the effective mechanisms required to enforce them. Usually, the main objective of a security mechanism is to control the executions of a software and ensure that it will never violate the enforced security policy. However, the majority of security mechanisms are based on ad hoc methods and thus, are not effective. In addition, they are unreliable, since there is no evidence on their ability to enforce security policies. Therefore, there is a need to develop novel security mechanisms that allow enforcing security policies in a formal, correct, and accurate way. In this context, our thesis targets the formal characterization of effective security policies enforcement that is based on programs rewriting. We mean by “effective” enforcement preventing all the “bad” behaviors of a program while keeping all its "good" behaviors. In addition, effective enforcement should not compromise the semantics of controlled programs. We have chosen for rewriting programs, because it has a great power compared to other security mechanisms that are either permissive or too restrictive. Themain contributions of this thesis are the following : – Formal characterization of security enforcement of safety properties through program rewriting. Safety properties represent the main class of properties usually enforced by security mechanisms. – Formal characterization of any security property using program rewriting. This contribution shows how program rewriting allows the enforcement of security policies that no other class of security mechanisms can enforce. – Algebraic approach as an alternative formal characterization of program rewriting based security enforcement. In this contribution, we investigate an algebraic formal model in order to reduce the gap between the specification and the implementation of program rewriting based security mechansisms.
Abou, El Kalam Anas. "Modèles et politiques de sécurité pour les domaines de la santé et des affaires sociales." Toulouse, INPT, 2003. http://www.theses.fr/2003INPT043H.
Full textGusdorf, François. "L'inertie des systèmes urbains et le tempo des politiques publiques face aux risques énergétiques et climatiques." Phd thesis, Ecole des Ponts ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00005181.
Full textLefresne, Florence. "Systèmes nationaux d'insertion professionnelle et politiques publiques de l'emploi en direction des jeunes : une comparaison européenne." Paris 1, 1999. http://www.theses.fr/1999PA010048.
Full textThe cross-national comparison method used in this dissertation is applied to both structural aspects (coherence of national systems) and dynamic questions (national trajectories, convergence). The concept of "national systems for integrating youth into the labour market" links vocational training, young people's jobs, and their position within mobility systems, including internal, external and occupational labour markets. The first part of the dissertation analyses public policy regarding youth employment and training in six countries: france, italy, spain and the u. K. Have diagnosed structural problems in this area, whereas the other two germany and sweden - have not called their traditional systems into question until recently. Policy measures are interpreted as a "strategic adjustment space" within which the actors who play a role in integrating youth into the labour market contribute to defining employment and training norms. The second part focuses on a more thorough empirical and theoretical comparison between france and the u. K. By highlighting heterogeneity within each country, this analysis throws into question much of the description that societal theories have formulated of the two systems. It also leads to the hypothesis that the two systems are converging, although specific national traits which have proven useful in adapting to exogenous change have been maintained. This trend stems from the weakening of labour market rules which, until the eighties, limited competition among workers and contributed to stabilising work groups. One key to understanding changes in employment and mobility systems is the emergence of new patterns of interaction between internal labour markets and the external labour market. Young people entering the labour market can be seen not only as a category prey to certain forms of selection on the labour market, studied by segmentation theories, but also as a vector of general structural transformations in employment and mobility patterns
Vodovar, Christine. "Le PSI, la SFIO et l'évolution des systèmes politiques italien et français de 1943 à 1956." Paris 10, 2006. http://www.theses.fr/2006PA100002.
Full textGodonou, Théophane Gloria. "Combinaison d'approche statique et dynamique pour l'application de politiques de sécurité." Thesis, Université Laval, 2014. http://www.theses.ulaval.ca/2014/30434/30434.pdf.
Full textIn this Master thesis, we present an approach to enforce information flow policies using a multi-valued type-based analysis followed by an instrumentation when needed. The target is a core imperative language. Our approach aims at reducing false positives generated by static analysis, and at reducing execution overhead by instrumenting only when needed. False positives arise in the analysis of real computing systems when some information is missing at compile time, for example the name of a file, and consequently, its security level. The key idea of our approach is to distinguish between negative and may responses. Instead of rejecting the possibly faulty commands, they are identified and annotated for the second step of the analysis; the positive and negative responses are treated as is usually done. This work is a hybrid security enforcement mechanism: the maybe-secure points of the program detected by our type based analysis are instrumented with dynamic tests. The basic type based analysis has been reported by Desharnais et al. [12], this work deals with the modification of the type system and the instrumentation step. It has been accepted for publication [7]. The novelty of our approach is the handling of four security types, but we also treat variables and channels in a special way. Programs interact via communication channels. Secrecy levels are associated to channels rather than to variables whose security levels change according to the information they store. Thus the analysis is flow-sensitive.
Bourdier, Tony. "Méthodes algébriques pour la formalisation et l'analyse de politiques de sécurité." Phd thesis, Université Henri Poincaré - Nancy I, 2011. http://tel.archives-ouvertes.fr/tel-00646401.
Full textGodechot, Olivier. "L’appropriation du profit : politiques des bonus dans l’industrie financière." Paris, CNAM, 2004. http://www.theses.fr/2004CNAM0453.
Full textWe study the distribution of bonuses, i. E. Wage premiums, in French financial industry for the last ten years. Bonuses are both very important and very unequal. In the year 2000 in Paris, some heads of dealing rooms were granted over 10 million euros. Even if bonuses depend on results, they are not optimal incentives: Their setting-up is not related to a lack of “effort”; Their correlations with security prices indicates that bonuses do not use all available information; The higher are the fixed wages, the higher the bonuses. Thus traders and salesmen acquire rents [1st part]. Therefore, to understand the distribution of bonuses, a discretionary procedure, we enter inside financial companies. We detail employees’ feelings of justice, bosses’ plural conceptions of bonus, and the negotiation process [2nd part]. We analyze the debates and the balance of power during the construction of bonus pools [3rd part]. The organization of work is then considered as an allocation of property rights on the company’s assets. These rights are the basis of both a legitimate and effective appropriation of profit. Employees who hold the most important and most detachable assets may at the same time legitimately claim the profit as the fruit of their assets, and obtain it by threatening, as in “holdups”, to redeploy their assets internally or externally [4th part]
Lepert, Thierry. "Risques économiques et politiques : proposition d'un modèle de choix de type d'implantation à l'étranger." Paris 9, 1991. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=1991PA090033.
Full textThe purpose of this thesis is to propose a decision model for implantations abroad, model based on socio-economic and political risk. Economic and political risks in the literature are examined. A set of variables that can be sued as indicators of the economic and political risks of an international investment is selected. Then, economic and political risk evaluation methods and decision models for international investments are analyzed. Additional micro-economic variables are selected. Two decision models for the choice of an international investment are proposed, having in common economic and political evaluation tables constructed with the formerly defined variables. The first model is based on expert evaluation with the use of a notation table for investment types; the second model is based on discriminant analysis. 29 international investments cases are collected with the cooperation of firms from various sizes and activity sectors. These cases are used to test the models: -convergent validity of the first model is tested, comparing notation tables of experts with that of the author. -predictive validity of both models are tested. Results show that both models, using the data collected by the tables, provide significantly better results than random forecasts, the best forecasts being those of the discriminant analysis. Advantages and limits of both the notation table and the discriminant analysis are discussed
Meinier, Bertrand. "La réforme des systèmes d'irrigation en Chine : évaluation des politiques de décentralisation et de tarification de l'eau." Thesis, Université Laval, 2007. http://www.theses.ulaval.ca/2007/25003/25003.pdf.
Full textArda, Yosemin. "Politiques d'approvisionnement dans les systèmes à plusieurs fournisseurs et optimisation des décisions dans les chaînes logistiques décentralisées." Phd thesis, INSA de Toulouse, 2008. http://tel.archives-ouvertes.fr/tel-00480960.
Full textArda, Yasemin. "Politiques d’approvisionnement dans les systèmes à plusieurs fournisseurs et optimisation des décisions dans les chaînes logistiques décentralisées." Toulouse, INSA, 2008. http://eprint.insa-toulouse.fr/archive/00000208/.
Full textMorvan, Régis. "Les politiques publiques locales de protection de l'environnement : éléments d'analyse des systèmes comptables des administrations publiques locales." Montpellier 1, 2003. http://www.theses.fr/2003MON10050.
Full textCasalino, Matteo Maria. "Approches pour la gestion de configurations de sécurité dans les systèmes d'information distribués." Phd thesis, Université Claude Bernard - Lyon I, 2014. http://tel.archives-ouvertes.fr/tel-01058803.
Full textAkl, Marie-Thérèse. "Cohabitation communautaire et cohabitation politique : recherches sur les relations entre le Président de la République et le Premier ministre dans les systèmes politiques libanais et français." Poitiers, 2003. http://www.theses.fr/2003POIT3004.
Full textKounougous, Anicet. "L'armée dans le processus de démocratisation des systèmes politiques africains : le cas de la République du Congo-Brazzaville." Toulouse 1, 2001. http://www.theses.fr/2001TOU10010.
Full textCongo-Brazzaville, as with many African nations, stands at an historical crossroads; a tumultuous recent past, a present full of hope, and an uncertain future that must be build by the Congolese themselves. Four major periods characterize the history of the Congo : the period leading up to independence, the era of Marxism-Leninism, the years of attempted but failed democratization, and today' s period of rebuilding and national reconciliation. Today, the role of the army remains essential in rebuilding the Congo' s infrastructure and bringing reconciliation to its warring factions. The army must support the revaluing and reaccredidation of the praetorian institution for the civilian society and the political community. Therefore it doesn' t have to be neglected if the Congo wants to clear the way for democracy
Duhamel, Virginie. "Les représentations du handicap. Approche anthropologique des systèmes politiques et de santé du Sud-Ouest de la France." Thesis, Pau, 2018. http://www.theses.fr/2018PAUU1061/document.
Full textThis thesis deals with the social representations of handicap in French society, by questionning the fundamental subject of otherness, our conception of difference, in both political and sanitary fields. The observation held in South West region highlighted the cultural and heritage of where the current representations of handicap come from : fantasies, fears, idea of a contagion of handicap... the social representation would therefore have barely progressed in spite of the globalization of culture (J.P. Warnier, 2008). Limited to the picture of a wheelchair, the subject of handicap consists more in a political and sanitary stake, since it is in the heart of the evolution of society. As a matter of fact, the law of February 11th 2005 impose on communities to assure their accessibility, in order to allow equal opportunities for handicapped people. Through this compliance of the environment, the conception of handicap is limited to mobility. Therefore, it seems that there is still an unconscious will to keep handicapped people at the margin of society. Therefore, we can claim that social representations still hold an important role in collective behavior. Their evolution requires to purchase an experiential knowledge. That's why we wanted to corroborate this statement thanks to a qualitative investigation organized with students in nursing school
Hamdi, Hedi. "Une architecture logicielle et un langage métier pour la sécurité à base de politiques dans les systèmes distribués." Thesis, Bordeaux 1, 2009. http://www.theses.fr/2009BOR13764.
Full textDistributed systems support the execution of a large number of applications that have different performance constraints. Security for these systems has a decisive influence on the performance and quality of service of such applications. The use of security-based policies to secure these systems is particularly attractive. However, this approach involves the specification and the deployment of policies, which remains a laborious task, often conducive to error, and requires a thorough knowledge of security mechanisms. In this thesis we propose a framework for specification, verification and implementation of security policies for distributed systems. This framework is based on a policy specification language called PPL (Policy Programming Language) and an architecture of policies deployment. This architecture is based on PPL language and offers a support for the compilation of policies in different mechanisms of implementation, taking into account the requirements of the application or the underlying service. It also enables automatic distribution of security policies to their implementation components. The PPL language provides specific abstractions to allow the specification of security policies and facilitating their development and integration in the deployment support. It is declarative, robust, highly expressive, and allows several possibilities of verification. It also has a formal semantic, which allows you to validate, verify and prove the properties of a security policy
Chang, Tai-Lin. "La réception de la notion de démocratie en Chine de 1895 à 1911." Paris 1, 1986. http://www.theses.fr/1986PA010299.
Full textThe introduction of the western democratic notion in China is significant in the period : 1895-1911. This notion is studied and propagated as well by intellectuals and statemen as by the movements of reform (constitutionalist and revolutionary). Considering the difficulties of translation, understanding and interpretation, the conception of democracy is observed at first sight, as one of political regimes in that period, then, it is analyzed in its philosophical aspect, and finally, as a subject for establishment of a democratic system. A few years before the fall of Ch'ing's dynasty, the government can take a series of measures tracing on western examples in order to establish a democratic regime. In this way, it seems that the ch'ing's government learns and well imitates the western political systems, in other words, that it has a good theorization of the democratic systems in china at this time. However, these new democratic arrangements can not prevent the end of the dynasty, and neither bring the China toward a western democratic regime. Is the problem setting on the pratical field, and is the pratical problem itself a function of socio-cultural aspect? This question remains to be asked
Mallouli, Wissam. "Une approche formelle pour le test des politiques de sécurité." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0021.
Full textSecurity is a critical issue especially in dynamic and open distributed environments such as World Wide Web or wireless networks. To ensure that a certain level of security is always maintained, the system behavior must be restrained by a security policy. In this thesis, we propose a framework to specify security policies and test their implementation on networking and information systems. Security policies, nowadays, are a key point for the success of every modern infrastructure. The specification and the testing of security policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. We rely on two different test approaches to build our framework: the active and the passive approaches. The active testing consists in generating a set of test cases that can be applied on a specific implementation to study its conformance according to its security requirements. Whereas, the passive testing consists in passively observing the traffic of the system under test, without interrupting its normal operations. In the active approach, we propose a framework to automatically generate test sequences to validate the conformance of a security policy. The functional behavior of the system is specified using a formal description technique based on Extended Finite State Machines (EFSM), while the security requirement is specified using two formals languages (Or-BAC and Nomad). We developed specific algorithms to integrate the security rules within the functional system specification. In this way, we obtain a complete specification of the secured system. Then, the automatic test generation is performed using dedicated tools to produce test suites in a standard language (TTCN or MSC) facilitating their portability. In the passive testing approach, we specify, using Nomad formal language, the security policy the system under test has to respect. We analyze then the collected traces of the system execution in order to deduce verdicts of their conformity with respect to the system security requirements. Several algorithms are developed to check whether the collected traces conform or not to the security policy. We applied our framework on diverse systems ranging from wireless networking (OLSR ad hoc routing protocol) to computer systems including audit systems (SAP R/3), web services (France Télécom Travel) and web applications (Weblog Application). This wide range of applications allows to demonstrate the efficiency and the reliability of the proposed approaches
Thiard, Philippe. "Les dynamiques du Bassin parisien (1975-1990) : un système spatial entre mutations du système productif et impact des politiques publiques." Paris 1, 2001. http://www.theses.fr/2001PA010622.
Full textButeau, Martin. "Les politiques de formation à l'informatique utilisateur : étude empirique." Montpellier 2, 1992. http://www.theses.fr/1992MON20299.
Full textBali, Mounir. "Dynamique des systèmes monétaires et financiers et développement économique : analyse des politiques de libéralisation financière (application au cas tunisien)." Nice, 2003. http://www.theses.fr/2003NICE0046.
Full textFor a long time, the paradoxical statute of the currency in the theories of growth is explained by heterodox-orthodox cleavage concerning its endogeneity-exogeneity according to direction's allotted to causality saving-investment. But, since the Eighties, following the crisis of the foreign debt, the models of endogenous growth which integrate the role of finance conclude that the level of financial development can constitute an effect of correction and economic convergence, or contrary traps of poverty. The results of our study of the Tunisian case indicate the existence of a positive interrelationship between the level of financial development and the economic degree of development which is dominated by the demande-following phenomen. In addition, the policies of financial liberalization constitute a discussed strategy of economic development. Our econometric tests show the validity of their assumptions in Tunisia. On the other hand, theoretically, the rationing of the credit, financial dualism, and the imperfections of the market, constitute the critical bases of these policies. Macro-economic stability, séquentialisation of reforms, prudential regulation and supervision, and good gouvernance, are essential conditions to avoid the possible perverse effects. Moreover, the total convertibility of the currency of the developing countries such as Tunisia, requires the adaptation of their exchange rate regimes, and the signature of the bilateral or regional monetary agreements to guard itself against the risk of monetary and financial crises in the case of asymmetrical shocks. In this respect, the theory of financial repression cannot be rejected if and only if it falls under economic policies of long term which combine market with government
Dunbay, Seda. "Les conséquences de l'élection des présidents de la République au suffrage universel direct sur le régime politique : Étude comparative des systèmes constitutionnels français et turc." Thesis, Bordeaux, 2019. http://www.theses.fr/2019BORD0438.
Full textFrance and Turkey are two countries which have long histories of parliamentary rule in parliamentary system. However, they both conducted a constitutional review relating to the method of presidential elections which created vast reaching effects within the structure of their political regime. As is well known, the President of the Republic has only a symbolic role in the running of the institutions and is theoretically placed above party politics, according to the monistic parliamentary system. There are two essential factors directly related to the reinforcement of the President’s position and the change to the original structure of the parliamentary system: His extensive powers and his election through direct universal suffrage. Therefore, the method of presidential elections is especially important. Consequently, the comparative study of the constitutional systems of these two countries would aid in the understanding of the causes that led to constitutional revisions and their political consequences
Brunel, Julien. "Combinaison des logiques temporelle et déontique pour la spécification de politiques de sécurité." Toulouse 3, 2007. http://thesesups.ups-tlse.fr/138/.
Full textIn order to formally specify a security policy, it is natural to reason about time on the one hand, and obligations, permissions, and prohibitions on the other hand. Indeed, we have to express for instance the permission to access a resource for a certain period, the obligation to release a resource before a deadline, or the prohibition to execute a task for a too long period. Temporal and deontic logics seem well suited to specify such concepts. In this thesis, we study how to combine these logics. Firstly, we study the product of linear temporal logic and standard deontic logic, and define obligation with deadline in this context. It has to satisfy a property called propagation property: while it is not fulfilled, it is propagated to the next instant. We then propose a more general propagation property, and propose a semantics to validate it. For the until-free fragment of our logic, we define an axiomatics and a tableaux-like decision procedure. Lastly, we investigate the notion of compliance of a system with respect to a policy specified in such a language. The first definition we come up with is a weak version of compliance called compatibility. For a new fragment of our logic, we adapt the Büchi approach of Vardi and Wolper to decide whether a system is compliant with a policy. We then restrict again the language so that we can define a stronger version of compliance. Actually, a careful analysis shows the necessity to refine the notion of compliance into 5 different diagnostic cases which give 'levels of compliance'. We provide an algorithm to establish this diagnostic
De, Waele Jean-Michel. "Analyse comparée du processus d'émergence des partis et des systèmes politiques en Europe centrale après 1989: la République tchèque, la Slovaquie et la Pologne." Doctoral thesis, Universite Libre de Bruxelles, 1996. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/212287.
Full textPerronnet, Florent. "Régulation coopérative des intersections : protocoles et politiques." Thesis, Belfort-Montbéliard, 2015. http://www.theses.fr/2015BELF0259/document.
Full textThe objective of this work is to use the potential offered by the wireless communication and autonomous vehicles to improve traffic flow in an isolated intersection and in a network of intersections. We define a protocol, called CVAS (Cooperative Vehicle Actuator System) for managing an isolated intersection. CVAS distributes separately the right of way to each vehicle according to a specific order determined by a computed sequence.In order to optimize the sequence, we define a DCP (Distributed Clearing Policy) to improve the total evacuation time of the intersection. The control strategy is investigated through two modeling approaches. First graph theory is used for calculating the optimal solution according to the arrival times of all vehicles, and then a timed Petri Net model is used to propose a real-time control algorithm. Tests with real vehicles are realized to study the feasibility of CVAS. Simulations of realistic traffic flows are performed to assess our algorithm and to compare it versus conventional traffic lights.Managing a network of intersections raises the issue of gridlock. We propose CVAS-NI protocol (Cooperative Vehicle actuator system for Networks of Intersections), which is an extension of CVAS protocol. This protocol prevents the deadlock in the network through occupancy and reservation constraints. With a deadlock free network we extend the study to the traffic routing policy. Finally, we generalize the proposed control system for synchronizing the vehicle velocities at intersections