Dissertations / Theses on the topic 'Mécanismes – Informatique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Mécanismes – Informatique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Quétier, Benjamin. "EmuGrid : études de mécanismes de virtualisation pour l'émulation conforme de Grilles à grande échelle." Paris 11, 2008. http://www.theses.fr/2008PA112200.
Full textIn the distributed systems domain, emulation is a significant methodology. It allows to test real applications, observe their behavior, experimentally verify some of their properties and achieving measurements in a controlled environment. However, there is no emulator for the large scale which owns essential characteristics like reproducibility. The main goal of this thesis is to make up an environment to emulate large scale distributed systems (typically 100 000 nodes). The accomplished work has been first to enumerate the different ways for evaluating distributed system at large scale. Then, we have defined expected characteristics for a tool which could emulate many machines while showing essentials characteristics like fairness, reproducibility, etc. This specification is the root of an architecture proposal for the V-DS tool (Virtualization environment for large-scale Distributed Systems). The continuation of this thesis describes implementation choices and the software / middleware selection to realize the emulator. A set of experiments achieved with 10 000 virtual machines on a 250 nodes cluster with bi-processors validates the initially defined properties. The validated emulator has been used to study virtualization impact on parallel applications execution. Experiments have mainly consisted in measuring execution time of MPI (Message Passing Interface) processes by varying the amount of virtual machines per physical node. V-DS has permitted us to test how scale different Distributed Hash Table (DHT) implementations. At last, the emulator is actually being upgraded to allow “data link” network layer emulation
Carmo, Rosa Maria Leão. "Le réseau DQDB : spécification, modélisation et évaluation de performances de mécanismes pour des services temps réel." Toulouse 3, 1994. http://www.theses.fr/1994TOU30243.
Full textGaugain, Claire. "Exploitation bioinformatique des relations entre mécanismes moléculaires et fonctions cellulaires." Bordeaux 2, 2007. http://www.theses.fr/2007BOR21461.
Full textBiological data integration is one of the major challenge in bioinformatics today. The availability of amounts of data concerning all the level of cell organisation, requires strategies of integration to bring together these data and thus better understand how the cell works. We have focused our work on the use of the concept of neighbourhood in order to represent and integrate data. First, our work emphasizes the importance of the choice of data representation for an efficient integration. Our study on metabolism representation shows that elementary modes are a relevant alternative to the classical representation of metabolism as metabolic pathways. Moreover, elementary modes have enabled us to find metabolic routes used by the cell in response to stressed. We have also used the neighbourhood in a new angle, the one of comparative genomics. We tested if expression neighbourhood of genes (set of genes with close expression profiles) can be a signature for genes, and if it can be used to define functional similarities between genes from different organisms. The work presented here, shows the interest of the exploration of gene and protein neighbourhood in order to integrate heterogeneous data. The efficiency of this exploration is highly related to the choice of knowledge representation
Elbaz, Reouven. "Mécanismes matériels pour des transferts processeur mémoire sécurisés dans les systèmes embarqués." Montpellier 2, 2006. http://www.theses.fr/2006MON20119.
Full textArdourel, Gilles. "Modélisation des mécanismes de protection dans les langages à objets." Montpellier 2, 2002. http://www.theses.fr/2002MON20183.
Full textMounyol, Roger. "Poste de programmation pour la commande cinématique des robots manipulateurs." Paris 11, 1989. http://www.theses.fr/1989PA112045.
Full textThe aim of Inverse Kinematic transformation is to define joint motions around a configuration to obtain a desired end-effector trajectory, specified by operational coordinates. In Robotics we are interested in the performance of complex tasks industrial such as welding, assembly, or painting which all need the inverse kinmatic control. We present in this thesis efficient algorithms for solving the Inverse kinematic command used in any robot manipulator. The constraints of real time are harsly treated. The methodologes implemented take in account the position and speed aspects. In case of redundancy, the approach presented here assumed the motion of one link to be prescribed as an input and found the displacement of the rest of the mechanism as they incremented input. In fact this approach specifies an additionnal desirable trajectory which may allow an obstacle avoidance. Our programms are included by RCCL, "Robot Control under C library" which the real time advantages are well known. The singularity problem in relation to the redundancy is also analized
Del, Rio Alberto. "Mécanismes de reconnaissance chirale en chromatographie liquide haute performance : études théoriques et chimio-informatiques." Aix-Marseille 3, 2005. http://www.theses.fr/2005AIX30061.
Full textCombined theoretical and chemoinformatics studies are presented in the field of enantioselective recognition. Several approaches are used such as molecular modeling, DFT calculations, molecular dynamics, QSAR techniques and other data mining procedures. The focus is the establishment of connections between available experimental data and these diverse algorithms based on the mathematical and topological description of chiral molecules. The outcomes of the aforementioned calculations account for a use of these techniques as a core strategy to achieve reliable prediction systems, infer the mechanisms of chiral recognition, generate new lead chiral receptors and assist experimental techniques such as chiral liquid chromatography. Moreover, computational methods promise to have a wide range of applications for both academia and industries, ranging from enantioselective reactions to analytical and semi-preparative separations or large-scale, production of enantiopure compounds
He, Ruan. "Architecture et mécanismes de sécurité pour l'auto-protection des systèmes pervasifs." Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00579773.
Full textIn this thesis, we propose: - A three-layer abstract architecture: a three-layer self-protection architecture is applied to the framework. A lower execution space provides running environment for applications, a control plane controls the execution space, and an autonomic plane guides the control behavior of the control plane in taking into account system status, context evolution, administrator strategy and user preferences. - An attribute-based access control model: the proposed model (Generic Attribute-Based Access Control) is an attribute-based access control model which improves both the policy-neutrality to specify other access control policies and exibility to enable fine-grain manipulations on one policy. - A policy-based framework for authorization integrating autonomic computing: the policy-based approach has shown its advantages when handling complex and dynamic systems. In integrating autonomic functions into this approach, an Autonomic Security Policy Framework provides a consistent and decentralized solution to administer G-ABAC policies in large-scale distributed pervasive systems. Moreover, the integration of autonomic functions enhances user-friendliness and context-awareness. - A terminal-side access control enforcement OS: the distributed authorization policies are then enforced by an OS level authorization architecture. It is an effcient OS kernel which controls resource access through a dynamic manner to reduce authorization overhead. On the other hand, this dynamic mechanism improves the integrability of di_erent authorization policies. - An adaptation policy specifcation Domain Speci_c Language (DSL) for adaptation policy specification
Araujo, Ribeiro João. "Mécanismes du système d'exploitation pour le support du multimédia." Versailles-St Quentin en Yvelines, 1999. http://www.theses.fr/1999VERS0009.
Full textConstantin, Joseph. "Contrôle-Commande d'un bras robotique planaire par approches neuromimétiques." Amiens, 2001. http://www.theses.fr/2001AMIE0001.
Full textSensaoui, Abderrahmane. "Etude et implémentation de mécanismes de protection d'exécution d'applications embarquées." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALM002.
Full textLooking at the speed by which embedded systems technologies are advancing, there is no surprise the attacks' number is rising. Many applications are written quickly in a low-level language to keep up with industry pace, and they contain a variety of bugs. Bugs can be used to break into a device and to run malicious code. Reviewing code becomes more and more complex and costly due to its size. Another factor complicating code review is the use of on-the-shelf libraries. Even a detailed code review does not guarantee a bug-free application.This thesis presents an architecture to run securely untrusted applications on the same platform. We assume that the applications contain exploitable bugs, even the operating system can be exploited. We also assume that attackers can take control of In/Out hardware components (e.g., Direct Memory Access (DMA)). The device is trusted when the architecture guarantees that attackers cannot compromise the whole device and access sensitive code and data. Even when an application is compromised, our architecture guarantees a strong separation of multiple components: hardware and software. It ensures the authenticity and integrity of embedded applications and can verify their state before any sensitive operation. The architecture guarantees, for local and remote parties, that the device is running properly, and protect against software attacks.First, we study multiple attack vector and isolation and attestation architectures. We present multiple software attack vectors, and we define the security features and properties that these architectures need to ensure. We provide a detailed description of fifteen existing architectures in both academia and industry, and we compare their features. Then, we provide an in-depth study of five lightweight architectures where we give a comparison of performance, size, and how they behave against software-based attacks. From these studies, we draw our security objectives for lightweight devices: multi-layer isolation, attestation, upgradability, confidentiality, small size with a negligible run-time overhead and ease-of-use.Then, we design hybrid isolation and attestation architecture for lightweight devices. The so-called Toubkal offers multi-layered isolation; the system is composed of three layers of isolation. The first one is at the hardware level to separate In/Out components from each other. The second one is at the security monitor level; our study shows that there is a strong need to create a real separation between the security monitor and all the rest. Finally, the third layer is at the application level.However, isolation itself is not sufficient. Devices still need to ensure that the running application behaves as it was intended. For this reason, Toubkal provides attestation to be able to check the state of a device at any-time. It guarantees that a software component or data were not compromised.Finally, we prove the correctness of the security properties that Toubkal provides. We modeled Toubkal as a finite state machine and used computer-aided formal verification to prove the security properties. Then, we evaluated Toubkal's overhead. The results show that Toubkal overhead is small and fit for lightweight devices
Bernard, Simon. "Forêts aléatoires : de l’analyse des mécanismes de fonctionnement à la construction dynamique." Phd thesis, Rouen, 2009. http://www.theses.fr/2009ROUES011.
Full textThis research work is related to machine learning and more particularlydealswiththeparametrizationofRandomForests,whichareclassifierensemble methods that use decision trees as base classifiers. We focus on two important parameters of the forest induction : the number of features randomly selected at each node and the number of trees. We first show that the number of random features has to be chosen regarding to the feature space properties, and we propose hence a new algorithm called Forest-RK that exploits those properties. We then show that a static induction process implies that some of the trees of the forest make the ensemble generalisation error decrease, by deteriorating the strength/correlation compromise. We finaly propose an original random forest dynamic induction algorithm that favorably compares to static induction processes
Ravoaja, Aina. "Mécanismes et architectures P2P robustes et incitatifs pour la réputation." Rennes 1, 2008. http://www.theses.fr/2008REN1S147.
Full textReputation systems have been proved to be useful for motivating peers to participate in peer-to-peer-like applications (P2P). However, in order to be sustainable these systems need to be robust against non-cooperative behaviors both at the reputation computation level and at the underlying P2P infrastructure level. In this thesis, we present the building blocks for constructing robust and incentive-compatible reputation systems. Our main contributions are (i) a reputation computation mechanism robust against false testimonies and incentive-compatible, which is based on credibility and tit-for-tat mechanism; (ii) STORM, a robust, scalable, and incentive-compatible structured P2P infrastructure for reputation management based on self-storage; (iii) PeerCube, a robust and highly churn-resilient P2P infrastructure based on a hypercubic topoology
Belhanafi-Behlouli, Nabiha. "Ajout de mécanismes de réactivité au contexte dans les intergiciels pour composants dans le cadre d'utilisateurs nomades." Evry, Institut national des télécommunications, 2006. http://www.theses.fr/2006TELE0010.
Full textThe rapid evolution of mobile computing induced to new applicative needs to ensure the execution of the applications in dynamic environment. These applications called context-aware applications have to detect the environment changes and adapt their behavior accordingly. The development of such type of application is difficult to implement and requires main programming efforts. Most of research works dealing with context and adaptation focus their efforts either in proposing context models for context description (application developer has to deal with context and adaptation), or in proposing platforms that interact with context and adapt the application to context changes without providing any meta-model for context description. The goal of this work is to facilitate the development of component based context-aware applications. For this reason we proposed the CAMidO middleware (Context-aware Midleware based on Ontology meta-model). Our proposition provides both a meta-model for context description and a component based middleware which contains entities for context and adaptation management. The CAMidO meta-model contains description of common informations to all context-aware applications and application specific information. This description is used by a compiler to enable the automatic management of context and adaptation. In CAMidO, the adaptation granularity is the component. We consider two adaptation kinds : the reactive behavioral adaptation and the proactive behavioral adaptation. We used the component/container paradigm in order to manage these adaptation kinds using non functional properties. The CAMidO middleware can be executed in two modes : the static configuration mode and the dynamic reconfiguration mode. The static configuration mode considers only the initial descriptions of the application model, while the dynamic reconfiguration mode allows the middleware to consider all the application model changes carried out after its execution. In order to validate these propositions, we implemented a prototype of CAMidO on top of OpenCCM, and we have done qualitative and quantitative evaluations of this prototype
Palmade, Olivier. "Etude et implantation de nouveaux mécanismes d'inférence en logique propositionnelle. Application aux ATMS." Toulouse 3, 1992. http://www.theses.fr/1992TOU30197.
Full textHe, Ruan. "Architectures et mécanismes de sécurité pour l'auto-protection des systèmes pervasifs." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00579773.
Full textIssoufou, Tiado Mahamadou. "Modèles et mécanismes multiniveaux pour les réseaux sans fil." Phd thesis, Toulouse, INPT, 2006. http://oatao.univ-toulouse.fr/7445/1/issoufoutiado.pdf.
Full textMerchez, Sylvain. "Problèmes de satisfaction de contraintes : étude de mécanismes d'abstraction et de construction de hiérarchies." Artois, 2000. http://www.theses.fr/2000ARTO0405.
Full textKuhn, Daniel. "Une approche neuronale pour l'asservissement visuel d'un robot manipulateur." Mulhouse, 1997. http://www.theses.fr/1997MULH0477.
Full textHutt, Cédric. "Programmation déclarative en C. A. O. : application à la théorie des mécanismes." Châtenay-Malabry, Ecole centrale de Paris, 1990. http://www.theses.fr/1990ECAP0147.
Full textTchounikine, Pierre. "Contribution à l'étude du raisonnement par les systèmes experts : une approche fondée sur la réification des mécanismes d'inférence et de contrôle." Pau, 1990. http://www.theses.fr/1990PAUU3006.
Full textHuguet, Stéphane. "Application de classificateurs aux données d'émission acoustique : identification de la signature acoustique des mécanismes d'endommagement dans les composites à matrice polymère." Lyon, INSA, 2002. http://theses.insa-lyon.fr/publication/2002ISAL0087/these.pdf.
Full textComposites. Unidirectional samples tested in off-axis tensile tests, associated with tensile tests on resin and microcomposite, allow the identification of AE signatures of the three damage modes in composite materials: matrix cracking, fiber/matrix decohesion and fiber fracture. Statistical analysis techniques, with Keywords nearest neighbors and neural networks (Kohonen map) were used to build an automatic recognition tool able to distinguish between the signals from those damage modes. This methodology was successfully also applied on +-55 degrees glass-fiber/epoxy-resin laminates
Demay, Jonathan-Christofer. "Génération et évaluation de mécanismes de détection des intrusions au niveau applicatif." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00659694.
Full textAtighehchi, Kevin. "Contributions à l'efficacité des mécanismes cryptographiques." Thesis, Aix-Marseille, 2015. http://www.theses.fr/2015AIXM4037.
Full textThe need for continuing innovation in terms of performances and resource savings impel us to optimize the design and the use of cryptographic mechanisms. This leads us to consider several aspects in this dissertation: parallel cryptographic algorithms, incremental cryptographic algorithms and authenticated dictionaries.In the context of parallel cryptography we are interested in hash functions. In particular, we show which tree structures to use to reach an optimal running time. For this running time, we show how to decrease the amount of involved processors. We also explore alternative (sub-optimal) tree structures which decrease the number of synchronizations in multithreaded implementations while balancing at best the load of the work among the threads.Incremental cryptographic schemes allow the efficient updating of cryptographic forms when we change some blocks of the corresponding documents. We show that the existing incremental schemes restrict too much the possible modification operations. We then introduce new algorithms which use these ones as black boxes to allow a broad range of modification operations, while preserving a privacy property about these operations.We then turn our attention to authenticated dictionaries which are used to authenticate answers to queries on a dictionary, by providing to users an authentication proof for each answer. We focus on authenticated dictionaries based on hash trees and we propose a solution to remedy their main shortcoming, the size of proofs provided to users
Seitz, Ludwig. "Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentielles : application à la gestion de données biomédicales dans le cadre d'architectures de grilles de calcul / données." Lyon, INSA, 2005. http://theses.insa-lyon.fr/publication/2005ISAL0055/these.pdf.
Full textGrid computing allows users to share multiple heterogeneous resources, such as computing power, storage capacity and data, and provides an architecture for transparent interoperation of these resources from the user's point of view. An upcoming application for Grids is health-care. More than for the first applications of Grids (e. G. Particle physics, terrestrial observation), security is a major issue for medical applications. Conventional data protection mechanisms are only of limited use, due to the novel security challenges posed by Grids. To respond to these challenges we propose an access control system that is decentralized and where the owners of some data are in control of the permissions concerning their data. Furthermore data may be needed at very short notice, the access control system must support a delegation of rights that is effective immediately. Grid users also need delegation mechanisms to give rights to processes, that act on their behalf. As these processes may spawn sub processes, multi-step delegation must be possible. In addition to these usability requirements, the transparent storage and replication mechanisms of Grids make it necessary to implement additional protection mechanisms for confidential data. Access control can be circumvented by attackers having access to the physical storage medium. We therefore need encrypted storage mechanisms to enhance the protection of data stored on a Grid. In this thesis we propose a comprehensive architecture for the protection of confidential data on Grids. This architecture includes an access control system and an encrypted storage scheme
Trezentos, Daniel. "Étude des mécanismes d'accès dans les réseaux ad hoc sans fil." Rennes 1, 2005. http://www.theses.fr/2005REN1S054.
Full textAldanondo, Michel. "Modélisation des données pour la planification et l'ordonnancement de la production : mécanismes d'agrégation et de désagrégation." Toulouse, INSA, 1992. http://www.theses.fr/1992ISAT0012.
Full textMagro, Gérard. "Génération de trajectoires sans collision en robotique : principes et algorithmes pour la modélisation et la navigation." Toulouse, ENSAE, 1989. http://www.theses.fr/1989ESAE0012.
Full textSuciu, Lucian Gheorghe. "Gestion d'interfaces multiples et mécanismes de sélection automatique de l'interface réseaux." Rennes 1, 2005. http://www.theses.fr/2005REN1S012.
Full textMartin-Guillerez, Damien. "Mécanismes de prise de points de reprise opportunistes pour robots mobiles autonomes." Rennes 1, 2009. ftp://ftp.irisa.fr/techreports/theses/2009/martin-guillerez.pdf.
Full textFailures of mobile computing devices can lead to severe data loss. Collaborative robotic systems, designed to work in total autonomy, are sensitive to these failures. Usual methods relying on remote backup can no longer be used in a context of high mobility. Short-range communication media can be used to overcome data failure through opportunistic communications for data backup. When two devices enter their respective communication range, they can initiate an ephemeral data exchange. To overcome the lack of global network coverage in those system, we propose a backup system based on opportunistic communications to reduce the costs induced by failures inside a swarm of autonomous mobile robots
Sanders, Olivier. "Conception et optimisation de mécanismes cryptographique anonymes." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0027/document.
Full textNew technologies offer greater convenience for end-users but usually at the cost of a loss in terms of privacy, which is often underestimated by the latter. For example, knowledge by a third party of the information related to a transaction is far from insignificant since it may reveal intimate details such as whereabouts, religious beliefs or health status.In this thesis, we are interested in cryptographic technics allowing to reconcile both security requirements and user’s privacy. In a first part, we will focus on two specific cases: anonymous payment and anonymous authentication. We propose new constructions, improving the efficiency of state-of-the-art solutions, which make all the features of these primitives more accessible for practical applications. We provide a detailed security analysis for each scheme, proving that they achieve the expected properties under reasonable assumptions.However, to fulfill the strong technical constraints of these use cases, it may be necessary to optimize these constructions which are usually rather complex. To this end, we propose in a second part, new solutions to improve the efficiency of most common operations and algorithms. Each of these contributions is not restricted to anonymous systems and thus may be of independent interest
Gibet, Sylvie. "Codage, représentation et traitement du geste instrumental : application à la synthèse de sons musicaux par simulation de mécanismes instrumentaux." Grenoble INPG, 1987. http://www.theses.fr/1987INPG0142.
Full textJulien, Christine. "Bases d'informations généralisées : Contribution à l'étude des mécanismes de consultation d'objets multimédia." Toulouse 3, 1988. http://www.theses.fr/1988TOU30208.
Full textBeaugé, Lionel. "Définition de mécanismes de mémorisation pour les systèmes neuromimétiques (inspirations pluridisciplinaires)." Nancy 1, 1995. http://www.theses.fr/1995NAN10407.
Full textMarpinard, Alain. "Effets des mécanismes d'exception sur la structure des logiciels : Application aux systémes ADA sûrs de fonctionnement." Toulouse, INSA, 1993. http://www.theses.fr/1993ISAT0004.
Full textAdnan, Hashmi Muhammad. "Un langage de programmation agent intégrant la planification temporelle et les mécanismes de coordination de plans." Paris 6, 2012. http://www.theses.fr/2012PA066312.
Full textIapichino, Giuliana. "Architecture et mécanismes pour le support de la mobilité dans l'Internet du futur." Paris, Télécom ParisTech, 2010. http://www.theses.fr/2010ENST0032.
Full textThe evolution of Internet and its hosts does not match anymore the current Internet architecture. A novel mobility architecture for future Internet is proposed in this thesis based on Host Identity Protocol (HIP) and Proxy Mobile IPv6 (PMIPv6), and mainly on the two principle ideas behind them. The first idea is the concept of host identity layer located between network and transport layer. It provides unique cryptographic identifiers for hosts, called host identifiers, which are independent of host’s current location and network address. The second idea is to create a locator which defines the topological location of a host in a way that is routable in the Internet, but has a specific scheme for routing in the local domain to which the host is attached. From these two basic ideas we have defined a unique architecture where each host has an identifier which uniquely identify the host and which is created as the public key of a public/private key pair, bringing built-in security support and one or several locators, depending on the fact of having multiple interfaces and being multihomed; locators are used for routing, but they have different topological semantics depending on the network considered, allowing inherent location privacy. The result is an architecture which not only has the advantages of HIP and PMIPv6 protocols, such as on one side security, global mobility, multihoming and on the other side local mobility and location privacy, but it includes efficient and dynamic mobility and multihoming scheme at local and global level, ad-hoc networking, traffic engineering and addressing scheme
Mouchère, Harold. "Etude des mécanismes d'adaptation et de rejet pour l'optimisation de classifieurs : Application à la reconnaissance de l'écriture manuscrite en-ligne." Rennes, INSA, 2007. ftp://ftp.irisa.fr/techreports/theses/2007/mouchere.pdf.
Full textThis work aims at improving performances of on-line handwriting characters recognizer for low resource systems using rejection and adaptation mechanisms. Reject option allows deciding if the classifier answer is relevant or not. We define a generic reject option based on reliability functions and a generic learning algorithm named AMTL. The comparison in different contexts with more classical reject options shows the generalization capacities of our approach. The adaptation specializes on the fly a writer independent system in a writer dependent recognizer. Our approach named ADAPT adapts fuzzy inference systems by moving, reshaping and adding its prototypes. To speed up the adaptation, we synthesize artificial new characters from available ones. We validate our approach in ideal experimental conditions and in a real use context
Xue, Xiaoyun. "Mécanismes de Sécurité pour des Protocoles de Routage des Réseaux ad hoc." Phd thesis, Paris, ENST, 2006. http://www.theses.fr/2006ENST0045.
Full textMobile Ad hoc Networks (MANETs) refer to mobile and wireless networks independent of any infrastructure. Some ad hoc scenarios are in a hostile environment. Moreover, due to numerous constraints such as the lack of infrastructure, the lack of a-priori trust relationship, resource-constrained nodes, mobility, etc. , the ad hoc routing is vulnerable to numerous attacks. In this dissertation, we first present a classification of ad hoc routing vulnerabilities using the attack tree analysis model. The main characteristic of this work is that we distinguish objectives and mechanisms of attacks. This distinction can help security defenders to easily notice which attacks should be prevented under which security objectives. We then focus on the propositions of new secure mechanisms for ad hoc routing protocols, and we also pay attention to limit the performance degradation caused by security mechanisms. First of all, we proposed a Secure Watchdog for Ad hoc Networks (SWAN) to ensure the authentication in supervision and to reduce the storage requirement of watchdog. Secondly, a Trust-based Routing Protocol (TRP) is proposed, which is a protocol based on source routing and a trust model. Thirdly, two security mechanisms for Optimized Link State Routing protocol (OLSR), respectively Hash Proved Link State (HPLS) and TC Securing (TCSec), are proposed to reinforce the security and to reduce the cryptography overhead required by an existing solution. Simulations show that our mechanisms are both robust and lightweight. The dissertation is ended with some guidelines for the design of a new ad hoc routing protocol secured from scratch
Breil, Pascal. "Drainage des eaux claires parasites par les réseaux sanitaires ; mécanismes et approche quantitative." Montpellier 2, 1990. http://www.theses.fr/1990MON20103.
Full textGermain, Cécile. "Étude des mécanismes de communication pour une machine massivement parallèle : mega." Paris 11, 1989. http://www.theses.fr/1989PA112385.
Full textThe Machine to Explore Giant Architectures (MEGA) project of the "Architecture et Conception des Circuits Intégrés" team of the LRI includes both the study of a logical model, the Dynamic Processes Networks, and of a hardware architecture, the MEGA machine. MEGA is a MIMD message-passing machine, intended to support an Ether communication model. Its target is very massive parallelism, up to 1 Million Elementary Processors. Each of these processors integrates in a single VLSI chip a processing unit, a local memory and a communication management unit. The communication design is one of the key features of such an architecture. It bears a very high technological constraint from a feasibility point of view, but it's performances determines the whole system ones. Therefore hardware parallelism may be actually useful only if the communication to computation ratio may be balanced. The communication design study includes three points of view : the communication model as an interface between software and hardware communication tools, the network topology and the routing strategy. In the three cases, the extreme parallelism target induced us to propose solutions which are original beside these in use in medium-grain multicomputers such as the commercial hypercubes. The communication model offers a direct interprocess relation when possible and allows however the processes graph dynamicity. The constant wiring density comparison for topologies shows that low dimensional meshes have better performances than hypercubes; the 3D mesh is then a good compromise between performances and feasibility constraints. We developed also a new routing strategy which we called Forced Routing. This strategy provides an efficient channels use. It limits contention by a randomized dispersion of messages and only needs very little buffering area. We achieved a logical specification for a routing and network/processor interface circuit. This circuit manages the messages without interfering with the processing unit activity and implements Forced Routing
Zimmer, Sébastien. "Mécanismes cryptographiques pour la génération de clefs et l'authentification." Phd thesis, Ecole Polytechnique X, 2008. http://pastel.archives-ouvertes.fr/pastel-00004271.
Full textMehani, Olivier. "Contributions aux mécanismes de réseau pour un usage adaptatif des ressources mobiles." Phd thesis, École Nationale Supérieure des Mines de Paris, 2011. http://pastel.archives-ouvertes.fr/pastel-00711154.
Full textBlanc, Frédéric. "Des mécanismes pour la modélisation d'environnements interactifs d'apprentissage avec ordinateur, basés sur la simulation qualitative." Toulouse 3, 1996. http://www.theses.fr/1996TOU30099.
Full textCrépin, Ludivine. "Les systèmes multi-agents hippocratiques : mécanismes sociaux entre agents pour la protection de la sphère privée." Saint-Etienne, 2009. http://www.theses.fr/2009STET4019.
Full textWith the explosion of the Web and multi-agent technologies, the current evolution of information systems leads to an automatic processing of users' data. The development of user centered multi-agent systems brings a new research topic : the management and the protection of users' sensitive data in order to preserve privacy. This thesis focuses on privacy management coming from the user's delegation to an agent of his sensitive data. Interaction between agents being one of the main feature of a multi-agent system, the possible risks for the sensitive data become more and more important in terms of disclosure, alteration, etc. This thesis primarly focuses on sensitive data communications and on the sensitive data becoming after being sent. In order to consider these important questions about the privacy preservation, we propose the model of Hippocratic Multi-Agent System (HiMAS). This model gives to agent the capacity to manage the sensitive users' data thanks to the notion of private sphere, and to protect this kind of data against suspicious behavior thanks to a specific interaction protocol and some mechanisms for the regulation of the agent behavior as trust and reputation. Our approach is based on a moral and ethic focus in order to assist the many propositions on these problems in security and network research
Ribeiro, Gouveia Feliz Alberto. "Contribution à l'étude des mécanismes de coordination dans les systèmes d'agents autonomes." Compiègne, 1992. http://www.theses.fr/1992COMPD554.
Full textPoulin, Régis. "Architecture et commande d'une interface de locomotion utilisant un mécanisme parallèle entraîné à l'aide de câbles." Master's thesis, Université Laval, 2005. http://hdl.handle.net/20.500.11794/35381.
Full textQuébec Université Laval, Bibliothèque 2019
Hourtolle, Catherine. "Conception de logiciels sûrs de fonctionnement : analyse de la sécurité des logiciels : mécanismes de décision pour la programmation en n-versions." Toulouse, INPT, 1987. http://www.theses.fr/1987INPT059H.
Full textIbănescu, Liliana. "Programmation par règles et stratégies pour la génération automatique de mécanismes de combustion d'hydrocarbures polycycliques." Vandoeuvre-les-Nancy, INPL, 2004. http://www.theses.fr/2004INPL031N.
Full textThe primary objective ofthis thesis is to explore the approach ofusing rule-based systems and strategies, for a complex problem of chemical kinetic: the automated generation of reaction niechanisms. The thesis presents the basic concepts of the chemical kinetics, the chemical and computational problems related to the conception and validation of a reaction mechanism, and gives a general structure for the generator of reaction mechanisms called Ga sEl. The representation of the chemical species uses the notion of molecular graphs, encoded by a term structure called GasEI terms. The chemical reactions are expressed by rewriting roles on molecular graphs, encoded by a set of conditional rewriting roles on GasEI terms. The strategies language of the ELAN system is used to express the reactions chaining. Qualitative chemical validations are presented for acyclic and polycyclic molecules
Taïani, François. "Programmation des grands systèmes distribués: quelques mécanismes, abstractions, et outils." Habilitation à diriger des recherches, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00643729.
Full text