Dissertations / Theses on the topic 'Modèles symboliques'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Modèles symboliques.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cortier, Véronique. "Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires." Habilitation à diriger des recherches, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00578816.
Full textRodriguez-Rojas, Oldemar. "Classification et modèles linéaires en analyse des données symboliques." Paris 9, 2000. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2000PA090064.
Full textRevault, d'Allonnes Adrien. "Evaluation sémantique d'informations symboliques : la cotation." Paris 6, 2011. http://www.theses.fr/2011PA066395.
Full textSandel, Arnaud. "Outils symboliques pour l'écriture de modèles et l'étude de sensibilité des systèmes multicorps." Lyon, INSA, 2007. http://theses.insa-lyon.fr/publication/2007ISAL0081/these.pdf.
Full textAnalytical tools for systems of rigid bodies are proposed. First of all, the Global Inertia Tensors (GITs) theory, which allows the dynamic model to be written in an algebraic form (without any derivation), is extended under a new presentation to complex joints and pseudo-parameters systems. Secondly, two sensitivity analysis methods, which quantify the influence of constructive parameters on the system performances, are adapted to multibody systems ; the adjoint-state method, generally slower than the direct method, becomes interesting in the case of an integrated constraint on a single time interval and a great number of constructive parameters. Thirdly, the GITs formal tools are used to obtain the sensitivity system and the adjoint system without any derivation, and thus better organized equations. The proposed methods are validated on examples (orthogonal double pendulum, vehicles) using Maple or Matlab. The perspectives concern closed loops and second-order sensitivities
Janvier, Romain. "Lien entre modèles symboliques et computationnels pour les protocoles cryptographiques utilisant des hachages." Grenoble 1, 2006. http://www.theses.fr/2006GRE10106.
Full textCryptographic protocols are used for secure communications over unreliable channels. Two approaches are used for their verification. The symbolic approach assume perfect cryptography. Automatic verification of cryptographic protocols is common with this model. On the other hand, the computational approache focuses on the probability to break cryptographic primitives but is not well-suited for automatic verification. Recently, several works have attempted to link these two approaches and thus benefites of the advantage of each: automatic verification for symbolic model and greater realism for computational model. The works presented in this thesis allow to link the symbolic and the computationnel models for protocols using asymmetric and symmetric encryptions, signatures and hashes. We show that whatever can append in the computational model, with non negligible probability, can also happened in the symbolic model. Thus, results of automatic verification tools in the symbolic model also hold in the computational model
Rondeau, Laurent. "Identification des systèmes par modèles flous linguistiques : prise en compte des aspects numériques et symboliques." Nancy 1, 1997. http://www.theses.fr/1997NAN10278.
Full textBuilding models from numeric and symbolic information relating to system behavior is the subject of this thesis. In the first chapter, the approach used in the domain of identification which is mainly based upon numeric information is compared with the expert system approach which is based on symbolic information. Then, we propose a strategy which takes into account both types of information by using a linguistic fuzzy model. Parametric estimation of these kinds of models from numeric information leads to two possible methods, classical or fuzzy. The second, which is chosen for our development, has the advantage of highlighting two particular criteria for the choice of the model and the parametric estimation method. The second chapter presents the analysis of linguistic fuzzy models and parametric estimation methods, with respect to the criteria defined in chapter 1. We demonstrate that only one model verifies all criteria, the single-input single-output gradual rules model. We also emphasize that no parametric estimation method satisfies the specified conditions. In the third chapter, the gradual rules model is extended to the multi-inputs single-output case. A symbolic form of this model is then proposed in order to define a parametric estimation strategy which fulfills our criteria and is based on the resolution of fuzzy relational equations. A methodology of identification which takes into account numeric and symbolic information is proposed. This is applied to the modelling of a static non-linear system which showcases the main characteristics of the method
Stouls, Nicolas. "Systèmes de transitions symboliques et hiérarchiques pour la conception et la validation de modèles B raffinés." Phd thesis, Grenoble INPG, 2007. http://tel.archives-ouvertes.fr/tel-00216026.
Full textStouls, Nicolas. "Systèmes de transitions symboliques et hiérarchiques pour la conception et la validation de modèles B raffinés." Phd thesis, Grenoble INPG, 2007. http://www.theses.fr/2007INPG0180.
Full textThis thesis presents a new approach to help in the design and development of B models. This approach is based on the construction of a symbolic labeled transition system which describes the models behaviors. This description completes the data oriented description provided by the B model. It can also be used to document it or to validate it. The transition system is constructed from a user-defined data space on which transition relation is computed by solving proof obligations. We also propose to take into account the B refinement process by introducing some hierarchy in the transition systems. This representation allows exhibiting the link between data from several refinement levels. Moreover, the proposed method works by partitioning the states space of the more abstract description. This makes it possible to keep the abstract system global structure. Finally, the manuscript ends with a description of the GénéSyst tool, which implements the proposed method. We describe its use in the framework of the GECCOO project, in order to verify some security properties
El, Golli Aicha. "Extraction de données symboliques et cartes topologiques : Application aux données ayant une structure complexe." Paris 9, 2004. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2004PA090026.
Full textHördegen, Heinrich. "Vérification des protocoles cryptographiques : comparaison des modèles symboliques avec une application des résultats : étude des protocoles récursifs." Thesis, Nancy 1, 2007. http://www.theses.fr/2007NAN10083.
Full textThis thesis deals with formal verification of cryptographic protocols. It is about symbolic modelling of protocols with the objective to prove security properties. The thesis is split in two parts: The first part defines four symbolic models which differ in the syntactic resources that protocol designers may use do model cryptographic primitives. We found that engineers employ coding dodges in order to model missing cryptographic primitives in simpler models. We showed that these codings are correct in that protocol properties that are proven in lean models also hold in more elaborated models. We finish this part with the description of a module implementation for the verification plate-form AVISPA. The module is based on results that allow to automatically translate protocol properties, proven in symbolic models, to computational models. In the second part of this thesis, we develop a symbolic model in order to represent ecursive protocols. This class of protocols is difficult to analyse and, so far, there are only few decidability results. We show that our symbolic model allows us to retrieve an previously known attack against a special security property of an e-commerce protocol. We then modify this protocol and show that the property holds for the modified protocol
Hördegen, Heinrich. "Vérification des protocoles cryptographiques : Comparaison des modèles symboliques avec une application des résultats --- Etude des protocoles récursifs." Phd thesis, Université Henri Poincaré - Nancy I, 2007. http://tel.archives-ouvertes.fr/tel-00193300.
Full textAtkinson, Gordon. "Communication factuelle et évocations symboliques dans l'action du message publicitaire : une application au marché du vin." Dijon, 2000. http://www.theses.fr/2000DIJOE007.
Full textKaram, Margot. "Génération de test de circuits intégrés fondée sur des modèles fonctionnels." Phd thesis, Grenoble INPG, 1991. http://tel.archives-ouvertes.fr/tel-00339935.
Full textLestiennes, Grégory. "Contributions au test de logiciel basé sur des spécifications formelles." Paris 11, 2005. http://www.theses.fr/2005PA112164.
Full textIn this thesis, we get interested in conformance testing whose goal is to check that the implementation of a system conforms to its specification w. R. T. A conformance relation between the model of the specification and the one of the implementation. We have defined the RIOLTS model standing for Restrictive Input/Output Labeled Transition System and the conformance relation rioco standing for Restrictive Input/Output COnformance. The particularity of this model is that it makes it possible to describe systems in which some inputs are forbidden in some states. In the second part of this thesis, we have worked on test generation and selection from infinite models using complex data types. These models are called symbolic models. Complex data types makes it harder the test selection problem: we must not only deal with the possible unlimited number of behaviors of systems but also with the unlimited number of values possible for the symbols appearing in symbolic actions. Moreover as guards may condition transitions, some symbolic traces are unfeasible. We propose a selection strategy that can be applied on any model based on symbolic transition systems. We use a constraint solver to determine feasible paths of the specification automata. Such paths are difficult to calculate, and to get them faster, we have had to optimize the use of the solver. Though, we have proposed and carried out experiments on many methods to reduce solving time and ensure the termination of calculations
Issa, Razanne. "Analyse symbolique et inférence de modèles métaboliques." Thesis, Bordeaux, 2015. http://www.theses.fr/2015BORD0100/document.
Full textThe objective of this thesis is to propose a new method of constructing metabolic models in the context of comparative genomics. We have developed a tool, abpantograph, allowing the inference of metabolic models based on the Abductive logic. To do this, we have introduced a logical representation of minimal enzymatic metabolic models and from a metabolic model called reference, we derived an explicit enzymatic minimal model accompanied by gene association. Finally, by coupling this metabolic modele with the genome of a target organism, we infer abductively a model enzyme for this target organism accompanied by a set of gene associations, pattern one wants congruent to that which is could have obtained by having all the information to the target organism. The proposed tool, ab-pantograph, has been developed using constraint logic programming and Hyprolog
Ivanova, Elena. "Efficient Synthesis of Safety Controllers using Symbolic Models and Lazy Algorithms." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG088.
Full textThis thesis focuses on the development of efficient abstraction-based controller synthesis approaches for cyber-physical systems (CPS). While abstraction-based methods for CPS design have been the subject of intensive research over the last decades, the scalability of these techniques remains an issue. This thesis focus on developing lazy synthesis algorithms for safety specifications. Safety specifications consist in maintaining the trajectory of the system inside a given safe set. This specification is of the utmost importance in many engineering problems, often prioritized over other performance requirements. Lazy approaches outperform the classical synthesis algorithm [Tabuada, 2009] by avoiding computations, which are non-essential for synthesis goals. Chapter 1 motivates the thesis and discusses the state of the art. Chapter 2 structures the existing lazy synthesis approaches and emphasizes three sources of efficiency: information about a priori controllable states, priorities on inputs, and non-reachable from initial set states. Chapter 3 proposes an algorithm, which iteratively explores states on the boundary of controllable domain while avoiding exploration of internal states, supposing that they are safely controllable a priory. A closed-loop safety controller for the original problem is then defined as follows: we use the abstract controller to push the system from a boundary state back towards the interior, while for inner states, any admissible input is valid. Chapter 4 presents an algorithm that restricts the controller synthesis computations to reachable states only while prioritizing longer-duration transitions. The original system is abstracted by a symbolic model with an adaptive grid. Moreover, a novel type of time sampling is also considered. Instead of using transitions of predetermined duration, the duration of the transitions is constrained by state intervals that must contain the reachable set. Chapter 5 is dedicated to monotone transition systems. The introduced lazy synthesis approach benefits from a monotone property of transition systems and the ordered structure of the state (input) space, and the fact that directed safety specifications are considered. The considered class of specifications is then enriched by intersections of upper and lower-closed safety requirements. Chapter 6 concludes the discussion and raises new issues for future research
Hadjeres, Gaëtan. "Modèles génératifs profonds pour la génération interactive de musique symbolique." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS027/document.
Full textThis thesis discusses the use of deep generative models for symbolic music generation. We will be focused on devising interactive generative models which are able to create new creative processes through a fruitful dialogue between a human composer and a computer. Recent advances in artificial intelligence led to the development of powerful generative models able to generate musical content without the need of human intervention. I believe that this practice cannot be thriving in the future since the human experience and human appreciation are at the crux of the artistic production. However, the need of both flexible and expressive tools which could enhance content creators' creativity is patent; the development and the potential of such novel A.I.-augmented computer music tools are promising. In this manuscript, I propose novel architectures that are able to put artists back in the loop. The proposed models share the common characteristic that they are devised so that a user can control the generated musical contents in a creative way. In order to create a user-friendly interaction with these interactive deep generative models, user interfaces were developed. I believe that new compositional paradigms will emerge from the possibilities offered by these enhanced controls. This thesis ends on the presentation of genuine musical projects like concerts featuring these new creative tools
Hadjeres, Gaëtan. "Modèles génératifs profonds pour la génération interactive de musique symbolique." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS027.
Full textThis thesis discusses the use of deep generative models for symbolic music generation. We will be focused on devising interactive generative models which are able to create new creative processes through a fruitful dialogue between a human composer and a computer. Recent advances in artificial intelligence led to the development of powerful generative models able to generate musical content without the need of human intervention. I believe that this practice cannot be thriving in the future since the human experience and human appreciation are at the crux of the artistic production. However, the need of both flexible and expressive tools which could enhance content creators' creativity is patent; the development and the potential of such novel A.I.-augmented computer music tools are promising. In this manuscript, I propose novel architectures that are able to put artists back in the loop. The proposed models share the common characteristic that they are devised so that a user can control the generated musical contents in a creative way. In order to create a user-friendly interaction with these interactive deep generative models, user interfaces were developed. I believe that new compositional paradigms will emerge from the possibilities offered by these enhanced controls. This thesis ends on the presentation of genuine musical projects like concerts featuring these new creative tools
Daniel-Vatonne, Marie-Christine. "Les termes : un modèle de représentation et structuration de données symboliques." Montpellier 2, 1993. http://www.theses.fr/1993MON20031.
Full textMazaré, Laurent. "Protocoles cryptographiques : lien entre les vues symboliques et computationnelles." Grenoble INPG, 2006. http://www.theses.fr/2006INPG0118.
Full textCryptographie protocols are used to ensure secure communications over insecure channels. Two approaches are used to verify protocols : the symbolic approach, more abstract, but for which many automatic tools exist and the computational approach, more realistic but harder to use. This document links the symbolic and computational views for protocols using asymmetric and symmetric cryptography as weil as digital signature. We also propose three extensions: adding DiffieHellman to handle key exchange protocols using modular exponentiation, considering adversary with access to an unbounded number of challenges and the case of more complex properties defined using opacity
Nguyên, Duy-Tùng. "Vérification symbolique de modèles à l'aide de systèmes de ré-écriture dédiés." Phd thesis, Université d'Orléans, 2010. http://tel.archives-ouvertes.fr/tel-00579490.
Full textMaille, Nicolas. "Modèle logico-algébrique pour la fusion symbolique et l'analyse formelle." Toulouse, ENSAE, 1999. http://www.theses.fr/1999ESAE0021.
Full textLozano, Aparicio Jose Martin. "Data exchange from relational databases to RDF with target shape schemas." Thesis, Lille 1, 2020. http://www.theses.fr/2020LIL1I063.
Full textResource Description Framework (RDF) is a graph data model which has recently found the use of publishing on the web data from relational databases. We investigate data exchange from relational databases to RDF graphs with target shapes schemas. Essentially, data exchange models a process of transforming an instance of a relational schema, called the source schema, to a RDF graph constrained by a target schema, according to a set of rules, called source-to-target tuple generating dependencies. The output RDF graph is called a solution. Because the tuple generating dependencies define this process in a declarative fashion, there might be many possible solutions or no solution at all. We study constructive relational to RDF data exchange setting with target shapes schemas, which is composed of a relational source schema, a shapes schema for the target schema, a set of mappings that uses IRI constructors. Furthermore, we assume that any two IRI constructors are non-overlapping. We propose a visual mapping language (VML) that helps non-expert users to specify mappings in this setting. Moreover, we develop a tool called ShERML that performs data exchange with the use of VML and for users that want to understand the model behind VML mappings, we define R2VML, a text-based mapping language, that captures VML and presents a succinct syntax for defining mappings.We investigate the problem of checking consistency: a data exchange setting is consistent if for every input source instance, there is at least one solution. We show that the consistency problem is coNP-complete and provide a static analysis algorithm of the setting that allows to decide if the setting is consistent or not. We study the problem of computing certain answers. An answer is certain if the answer holds in every solution. Typically, certain answers are computed using a universal solution. However, in our setting a universal solution might not exist. Thus, we introduce the notion of universal simulation solution, which always exists and allows to compute certain answers to any class of queries that is robust under simulation. One such class is nested regular expressions (NREs) that are forward i.e., do not use the inverse operation. Using universal simulation solution renders tractable the computation of certain answers to forward NREs (data-complexity).Finally, we investigate the shapes schema elicitation problem that consists of constructing a target shapes schema from a constructive relational to RDF data exchange setting without the target shapes schema. We identity two desirable properties of a good target schema, which are soundness i.e., every produced RDF graph is accepted by the target schema; and completeness i.e., every RDF graph accepted by the target schema can be produced. We propose an elicitation algorithm that is sound for any schema-less data exchange setting, but also that is complete for a large practical class of schema-less settings
Cherifi, Dalila. "Utilisation d'un modèle symbolique pour l'interprétation d'images Radar à Ouverture Synthétique." Paris, ENST, 2005. http://www.theses.fr/2005ENST0036.
Full textSynthetic Aperture Radar (SAR) instruments are active microwave sensors that operate independently of time of day and weather conditions. SAR can achieve high resolution from long range and provide information about the physical structure and the electrical properties of remotely sensed objects. There has been a growing interest in SAR for automatic target recognition. We are interested in this thesis by road detection in spaceborne SAR (Synthetic Aperture Radar images. Several approaches have been proposed in the literature. They generally consist of two steps: in the first step they use a local operator like edge and line detectors and then they apply a global criterion which incorporates additional knowledge about the structure of the objects to be detected. The aim of this thesis is the detection of road on SAR images starting from a graphical sketch of road defined by a user which is considered as a model of road. To do this we propose to compare two methods. The first one combines both local and global criteria based on Markov Field(MRF). It is based on a previously published methods for road detection in SAR images. The second method uses a dynamic programming, it defines a cost, which depends on local information, and performs a summation minimization process in a graph. The results obtained with the two approaches applied to different SAR images are presented and evaluated with an objective criterion. Finnally, we applied our method based of dynamic programming to extract road network on the different SAR images and we present some applications of our work
Dumitrescu, Emil. "Construction de modèles réduits et vérification symbolique de circuits industriels décrits au niveau RTL." Université Joseph Fourier (Grenoble), 2003. http://www.theses.fr/2003GRE10101.
Full textFaget, Zoé. "Un modèle pour la gestion des séquences temporelles synchronisées : Application aux données musicales symboliques." Phd thesis, Université Paris Dauphine - Paris IX, 2011. http://tel.archives-ouvertes.fr/tel-00676537.
Full textCaillou, Philippe. "Modèle ARCO : Apprentissages multiples et Raisonnement réflexif sur des Connaissances homogènes." Paris 9, 2004. https://portail.bu.dauphine.fr/fileviewer/index.php?doc=2004PA090040.
Full textCharrier, Tristan. "Complexité théorique du raisonnement en logique épistémique dynamique et étude d’une approche symbolique." Thesis, Rennes 1, 2018. https://ged.univ-rennes1.fr/nuxeo/site/esupversions/2a4b2a55-42ff-4768-9b9e-677421fef507.
Full textWe study the theoretical complexity of reasoning tasks involving knowledge in multi-agent systems. We consider dynamic epistemic logic (DEL) as a natural way of expressing knowledge, which allows to express nested knowledge of agents and partially observed dynamic actions. We show complexity results for model checking and satisfiability of DEL formulas, and define a symbolic approach for these problems. We also study DEL-based planning and quantification over specific actions: public announcements
Sayed, Mazen El. "Une approche logico-symbolique des connaissances nuancées via des modificateurs linguistiques." Angers, 2001. http://www.theses.fr/2001ANGE0021.
Full textRebeuf, Xavier. "Un modèle de coût symbolique pour les programmes parallèles asynchrones à dépendances structurées." Orléans, 2000. http://www.theses.fr/2000ORLE2056.
Full textPaquette, Simon. "Évaluation symbolique de systèmes probabilistes à espace d'états continu." Thesis, Université Laval, 2005. http://www.theses.ulaval.ca/2005/22827/22827.pdf.
Full textLamirel, Jean-Charles. "Vers une approche systémique et multivues pour l'analyse de données et la recherche d'information : un nouveau paradigme." Habilitation à diriger des recherches, Université Nancy II, 2010. http://tel.archives-ouvertes.fr/tel-00552247.
Full textIkoki, Bukoko. "Traitement symbolique des systèmes multicorps avec KINDA (Kinematics and Dynamics Analysis)." Thesis, Université Laval, 2008. http://www.theses.ulaval.ca/2008/25575/25575.pdf.
Full textKlai, Kais. "Réseaux de Petri : vérification symbolique et modulaire." Paris 6, 2003. http://www.theses.fr/2003PA066171.
Full textMelki, Michaël. "Etude d'un modèle de représentation symbolique multi-résolution d'une image à base de graphes." Lyon, INSA, 2006. http://theses.insa-lyon.fr/publication/2006ISAL0074/these.pdf.
Full textIn this PhD, we present a symbolic, multi-resolution model for representing an image. To do that, we consider both the structure of the image, that is the blocs from which it is constituted, and its content. We first focus on the structural part of the image. Under some constraints, a few properties can be enough to fully characterize the topology of the structure. This leads us to a graph-based representation for the structure of an image, which can be completed by adding symbolic information to the nodes to represent the content part of the image. We then propose a process to build an lower resolution image from an input image. This process uses reduction rules that take into account both the structure and the content of the image, and could be used either to segment an image at different resolution levels or to extract some information from it. Then we study this process to define methods that can be used for learning some of the parameters of the rules, for speeding up the building process, or for making the whole process more reliable
Letard, Vincent. "Apprentissage incrémental de modèles de domaines par interaction dialogique." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS100/document.
Full textArtificial Intelligence is the field of research aiming at mimicking or replacing human cognitive abilities. As such, one of its subfields is focused on the progressive automation of the programming process. In other words, the goal is to transfer cognitive load from the human to the system, whether it be autonomous or guided by the user. In this thesis, we investigate the conditions for making a user-guided system autonomous using another subfield of Artificial Intelligence : Machine Learning. As an implementation framework, we chose the design of an incremental operational assistant, that is a system able to react to natural language requests from the user with relevant actions. The system must also be able to learn the correct reactions, incrementally. In our work, the requests are in written French, and the associated actions are represented by corresponding instructions in a programming language (here R and bash). The learning is performed using a set of examples composed by the users themselves while interacting. Thus they progressively define the most relevant actions for each request, making the system more autonomous. We collected several example sets for evaluation of the learning methods, analyzing and reducing the inherent collection biases. The proposed protocol is based on incremental bootstrapping of the system, starting from an empty or limited knowledge base. As a result of this choice, the obtained knowledge base reflects the user needs, the downside being that the overall number of examples is limited. To avoid this problem, after assessing a baseline method, we apply a case base reasoning approach to the request to command transfer problem: formal analogical reasoning. We show that this method yields answers with a very high precision, but also a relatively low coverage. We explore the analogical extension of the example base in order to increase the coverage of the provided answers. We also assess the relaxation of analogical constraints for an increased tolerance of analogical reasoning to noise in the examples. The running delay of the simple analogical approach is already around 1 second, and is badly influenced by both the automatic extension of the base and the relaxation of the constraints. We explored several segmentation strategies on the input examples in order to reduce reduce this time. The delay however remains the main obstacle to using analogical reasoning for natural language processing with usual volumes of data. Finally, the incremental operational assistant based on analogical reasoning was tested in simulated incremental condition in order to assess the learning behavior over time. The system reaches a stable correct answer rate after a dozen examples given in average for each command type. Although the effective performance depends on the total number of accounted commands, this observation opens interesting applicative tracks for the considered task of transferring from a rich source domain (natural language) to a less rich target domain (programming language)
Missire, Régis. "Sémantique des textes et modèle morphosémantique de l'interprétation." Toulouse 2, 2005. http://www.theses.fr/2005TOU20047.
Full textThe purpose is to contribute to the development of a morphosemantic model of interpretation for a textual semantics. We take interest in particular in the adequacy between the theory (Interpretative Semantics) and a model inspired by Gestalttheory and the Theory of Semantic Forms. To that end, we formulate several proposals :(i) Theoretical ones that aim, by restoring Interpretative Semantics within the scope of european structural semantics, and especially lexematics, at enhancing the adequacy between the structural and gestalt theories. (ii) Descriptive ones, within the scope of the morphosemantic model, focussing mainly on the " isotopy " concept and the question of temporalization of the interpretative paths (semantic rhythms). These proposals are supported by two analyses : the first one deals with a sonnet written by Baudelaire (Tristesses de la Lune), the second is about a corpus of 113 definitions produced by as many speakers to whom a text was submitted, text in wich a word was to be defined
Kerbrat, Alain. "Méthodes symboliques pour la vérification de processus communicants : étude et mise en oeuvre." Université Joseph Fourier (Grenoble), 1994. http://tel.archives-ouvertes.fr/tel-00005100.
Full textTheyssier, Guillaume. "Automates cellulaires : un modèle de complexités." Phd thesis, Ecole normale supérieure de lyon - ENS LYON, 2005. http://tel.archives-ouvertes.fr/tel-00166295.
Full textKubiak, Philippe. "Analyse symbolique des systèmes physiques modélisés par bond graph et comportant des éléments multiports." Lille 1, 1996. http://www.theses.fr/1996LIL10218.
Full textBenharrat, Nassim. "Model-Based Testing of Timed Distributed Systems : A Constraint-Based Approach for Solving the Oracle Problem." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLC021/document.
Full textModel-based testing of reactive systems is the process of checking if a System Under Test (SUT) conforms to its model. It consists of handling both test data generation and verdict computation by using models. We specify the behaviour of reactive systems using Timed Input Output Symbolic Transition Systems (TIOSTS) that are timed automata enriched with symbolic mechanisms to handle data. When TIOSTSs are used to test systems with a centralized interface, the user may completely order events occurring at this interface (i.e., inputs sent to the system and outputs produced from it). Interactions between the tester and the SUT are sequences of inputs and outputs named traces, separated by delays in the timed framework, to form so-called timed traces. Distributed systems are collections of communicating local components which interact with their environment at physically distributed interfaces. Interacting with such a distributed system requires exchanging values with it by means of several interfaces in the same testing process. Different events occurring at different interfaces cannot be ordered any more. This thesis focuses on conformance testing for distributed systems where a separate tester is placed at each localized interface and may only observe what happens at this interface. We assume that there is no global clock but only local clocks for each localized interface. The semantics of such systems can be seen as tuples of timed traces. We consider a framework for distributed testing from TIOSTS along with corresponding test hypotheses and a distributed conformance relation called dtioco. Global conformance can be tested in a distributed testing architecture using only local testers without any communication between them. We propose an algorithm to check communication policy for a tuple of timed traces by formulating the verification of message passing in terms of Constraint Satisfaction Problem (CSP). Hence, we were able to implement the computation of test verdicts by orchestrating both localised off-line testing algorithms and the verification of constraints defined by message passing that can be supported by a constraint solver. Lastly, we validated our approach on a real case study of a telecommunications distributed system
Rogacki, Rémy. "Simulation symbolique de descriptions comportementales de circuits digitaux." Montpellier 2, 1992. http://www.theses.fr/1992MON20222.
Full textGravot, Fabien. "ASyMov : fondation d'un planificateur robotique intégrant le symbolique et le géométrique." Toulouse 3, 2004. http://www.theses.fr/2004TOU30018.
Full textPavel, Sebastien. "Un modèle de composants hiérarchiques avec protocoles d'interaction." Phd thesis, Université de Nantes, 2008. http://tel.archives-ouvertes.fr/tel-00484788.
Full textMidenet, Sophie. "Modèle connexionniste d'apprentissage d'associations par carte auto-organisatrice ; Contribution à l'étude d'une mise en correspondance des représentations connexionnistes et symboliques." Paris, ENST, 1991. http://www.theses.fr/1991ENST0019.
Full textRousseaux, Francis. "Une contribution de l'intelligence artificielle et de l'apprentissage symbolique automatique à l'élaboration d'un modèle d'enseignement de l'écoute musicale." Phd thesis, Université Pierre et Marie Curie - Paris VI, 1990. http://tel.archives-ouvertes.fr/tel-00417579.
Full textC'est ainsi que ce thème devient un objectif d'études et de recherches : mais dans cette optique, il est nécessaire de prendre en compte l'état de l'art en informatique musicale, et d'écouter les besoins manifestés par les musiciens, afin de prendre pied sur une réelle communauté d'intérêts entre les deux disciplines.
En toute hypothèse, la musique est un objet abstrait dont il existe plusieurs représentations, aucune n'étant complète ni générale, et chacune possédant des propriétés spécifiques. Qui plus est, ces représentations ont tendance à évoluer, naître et mourir au gré des besoins des musiciens, même si la représentation sonore reste essentielle et par définition indissociable de l'objet abstrait : mais il faut bien admettre que le son musical n'est pas seul à évoquer la musique, et que si l'homme éprouve le besoin d'inventer des représentations pour mieux s'approprier le phénomène musical, il peut être enrichissant d'examiner la transposition de ce comportement aux machines.
On peut certes isoler une de ces représentations, la traduire informatiquement et lui dédier des outils : c'est ainsi que de nombreux systèmes informatiques abordent la musique. Mais il existe une approche plus typique de l'intelligence artificielle, qui consiste à chercher à atteindre l'objet abstrait à travers l'ensemble de ses représentations et de leurs relations : pour un système informatique, faire preuve d'intelligence dans ce contexte, c'est utiliser cette diversité et cette multiplicité de représentation; c'est savoir s'appuyer sur une réalité mouvante et se déplacer dans un univers d'abstractions.
Mais les représentations ne prennent leur sens qu'avec ceux qui communiquent à travers elles, qu'avec les activités qu'elles engendrent. On peut alors imaginer un système qui constituerait un véritable lieu de rencontre, de réflexion, de création, en un mot de communication : car la musique est avant tout un médium de communication. Mais quelle est la nature de ce qu'on pourra communiquer à travers un tel système ? Par exemple, on pourra s'exercer aux pratiques musicales, expérimenter de nouveaux rapports entre les représentations, en un mot s'approprier le médium musical lui-même.
Mais alors, on a besoin d'un système qui sache témoigner de ces rencontres, plus précisément qui apprenne à en témoigner; c'est là notre définition de l'apprentissage dans le contexte : on dira qu'un système apprend s'il témoigne, et éventuellement s'adapte à un univers de communication musicale. Sans cette exigence, la valeur de la communication est perdue : en effet les parties prenantes quittent le système avec leur nouvelle richesse, quelle que soit la réussite de la médiation. Aussi, l'enjeu pour un système apprenti consiste à retourner un témoignage aux musiciens, aux pédagogues et aux informaticiens, afin qu'ils puissent en tirer profit : bien entendu, on exigera de ce témoignage qu'il produise de la connaissance utile, sans se contenter de cumuls d'événements ou de faits ordonnés historiquement.
Ainsi, à travers un enseignement ouvert, il s'agira pour des élèves d'appréhender et d'expérimenter le médium musical, d'enrichir leurs connaissances et d'obtenir des explications. Pour des enseignants, il s'agira de créer et d'organiser cette médiation, et de rendre des oracles pédagogiques au système. Mais l'intelligence artificielle et l'apprentissage symbolique automatique sont les sciences de l'explication : il faut mettre en jeu la dimension cognitive qui permettra d'expertiser l'adéquation du lieu de rencontre; il faut se placer au cœur des besoins et des préoccupations des enseignants et des élèves, en tentant de formaliser les théories cognitives de la musique. On pourra même inventer des représentations à vocations cognitive et explicative : à terme, un système construit sur un tel modèle pourrait bien être capable de faire lui-même des découvertes dans ce domaine.
Abdellatif, Chiboub. "Elaboration automatique et symbolique de modèles dynamiques inversés de robots à chaîne cinématique simple, arborescente ou fermée en vue deleur commande." Doctoral thesis, Universite Libre de Bruxelles, 1990. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/213147.
Full textDadeau, Frédéric. "Evaluation Symbolique à Contraintes pour la Validation - Application à Java/JML." Phd thesis, Université de Franche-Comté, 2006. http://tel.archives-ouvertes.fr/tel-00329891.
Full textAu cours de ces travaux, nous nous sommes intéressés à la validation de programmes Java par l'intermédiaire de son langage de modélisation associé, nommé JML. Suite aux expériences et aux savoirs-faire accumulés au sein de l'équipe Techniques Formelles et à Contraintes du Laboratoire d'Informatique de Franche-Comté, nous avons choisi d'appliquer une représentation logico-ensembliste des modèles JML, reposant sur des solveurs de contraintes pour gérer les valeurs des variables des modèles objets que nous traitons. A partir de cette représentation symbolique, nous avons exprimé l'animation symbolique d'un modèle objet basé sur la sémantique de Java, utilisant les descriptions formelles contenues dans les pré- et postconditions des spécifications des méthodes.
Nous nous sommes ensuite appuyés sur la définition symbolique des états du système objet pour extraire des cibles de tests, liées aux comportements issus des méthodes, définies par un prédicat obtenu par conjonction de la condition d'activation du comportement et de la mise aux limites des attributs des objets du système et des paramètres de la méthode sous test. L'animation symbolique du modèle entre en jeu pour la construction des cas de tests. Un algorithme de parcours de l'espace d'états effectue la recherche d'un chemin d'exécution menant à la cible. Les cas de tests sont ensuite concrétisés pour produire un pilote de test Java. Une étude de cas a été menée sur une modélisation fonctionnelle d'un porte-monnaie électronique.
Ces travaux ont été implantés dans un prototype, nommé JML-Testing-Tools, qui permet l'animation symbolique d'un modèle JML et la génération de cas de tests pour l'implantation Java qui lui est associée. Ce prototype est composé d'un compilateur traduisant une spécification JML et des signatures de classes Java dans un format logico-ensembliste. Le modèle décrit dans ce format est ensuite animé par un interpréteur rétablissant la sémantique opérationnelle du Java/JML.
Chazoule, Guy. "Représentations analogiques et représentations symboliques des quantités : leurs relations entre quatre et six ans." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2012. http://tel.archives-ouvertes.fr/tel-01063654.
Full textGagarina, Tatiana. "Modèle pseudo-rigide pour la simulation dynamique des mécanismes flexibles." Paris 6, 1999. http://www.theses.fr/1999PA066607.
Full text