Academic literature on the topic 'Opportuniste'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Opportuniste.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Opportuniste"
Bourée, Patrice, and Andre Paugam. "Aspergillus : un dangereux opportuniste." Option/Bio 26, no. 532 (October 2015): 13–17. http://dx.doi.org/10.1016/s0992-5945(15)30295-6.
Full textVatani, Mohiaddin. "Un opportuniste à Ispahan." La pensée de midi N° 27, no. 1 (February 1, 2009): 48–53. http://dx.doi.org/10.3917/lpm.027.0048.
Full textMofredj, A., H. Bahloul, and C. Chanut. "Lactococcus lactis: un pathogène opportuniste?" Médecine et Maladies Infectieuses 37, no. 4 (April 2007): 200–207. http://dx.doi.org/10.1016/j.medmal.2007.01.005.
Full textSegonds, C., N. Marty, L. Agueda, and G. Chabanon. "Pseudomonas cepacia: la percée d'un opportuniste." Revue Française des Laboratoires 1995, no. 274 (March 1995): 87–93. http://dx.doi.org/10.1016/s0338-9898(95)80297-5.
Full textD., Y. M. "Détection de l’infection opportuniste à Cryptococcus." Option/Bio 26, no. 536 (December 2015): 7. http://dx.doi.org/10.1016/s0992-5945(16)30010-1.
Full textFauchais, A. L., S. Roques, N. Frébourg, L. Druesne, A. Verdonck, P. Chassagne, E. Bercoff, and J. Doucet. "Leuconostoc, une cause rare d’infection opportuniste." La Revue de Médecine Interne 24, no. 4 (April 2003): 268–69. http://dx.doi.org/10.1016/s0248-8663(03)00032-8.
Full textCorreia, Patrice. "Dakar-Pékin : une réconciliation opportuniste mais problématique." Outre-Terre 30, no. 4 (2011): 351. http://dx.doi.org/10.3917/oute.030.0351.
Full textRolland, Didier. "Le sapeur-pompier, courageux, téméraire ou opportuniste ?" Inflexions N° 22, no. 1 (2013): 111. http://dx.doi.org/10.3917/infle.022.0111.
Full textReboul, Stéphane. "Maxence Alcalde, « L’Artiste opportuniste. Entre posture et transgression »." Marges, no. 13 (September 1, 2011): 148–49. http://dx.doi.org/10.4000/marges.465.
Full textMcAlpine, Jessica N., Alicia A. Tone, and Gillian E. Hanley. "La salpingectomie opportuniste : Nous choisissons d'agir, pas d'attendre." Journal of Obstetrics and Gynaecology Canada 38, no. 5 (May 2016): 428–31. http://dx.doi.org/10.1016/j.jogc.2016.04.090.
Full textDissertations / Theses on the topic "Opportuniste"
Baklouti, Fadhlallah. "Service composition in opportunistic networks." Thesis, Lorient, 2019. http://www.theses.fr/2019LORIS523/document.
Full textThis thesis is related to the domain of Ubiquitous computing and Internet ofThings (IoT), and focuses on networks that can be formed spontaneously bymobile or fixed devices. These devices can be connected using aninfrastructure, or in a peer-to-peer mode using ad hoc communications.Connection disruptions may occur in the network frequently andunpredictably. These connection disruptions can be problematic when a givendevice tries to access remote resources provided by other devices, or when ittries to offer its own resources to these ones.Opportunistic computing extends the paradigm of opportunistic networkingby abstracting local resources as services accessible remotely using theprotocols of opportunistic networking that implement the "store, carry andforward" principle.In this thesis, we focus on service composition in order to combineelementary services and offer new, rich and high level composite services tousers. Service composition can be a very difficult task to perform inopportunistic networks due to connection disruptions. In this thesis, we propose a solution to compose services using twostrategies: orchestration and choreography. This solution also relies on autility function that selects service providers. We also propose an optimizedversion of our solution that exploits a distributed cache of data and aproactive service composition mechanism based on the user interest profile
Benchi, Abdulkader. "Middleware Systems for Opportunistic Computing in Challenged Wireless Networks." Thesis, Lorient, 2015. http://www.theses.fr/2015LORIS372/document.
Full textOpportunistic networks (OppNets) constitute an appealing solution to complement fixed network infrastructures –or make up for the lack thereof– in challenged areas. Researches in the last few years have mostly addressed the problem of supporting networking in OppNets, yet this can only be a first step towards getting real benefit from these networks. Opportunistic computing goes beyond the concept of opportunistic networking, and provides a new paradigm to enable collaborative computing tasks in such environments. In the realm of opportunistic computing, properly designing, implementing and deploying distributed applications are important tasks. An OppNet-dedicated application must be able to operate and maintain an acceptable level of service while addressing the many problems that can occur in these networks, such as disconnections, partitioning, long transmission delays, transmission failures, resource constraints, frequent changes in topology, and heterogeneous devices. Much of the complexity and cost of building OppNet-dedicated applications can be alleviated by the use of high-level programming models. Such models can be supported by middleware systems capable of transparently addressing all the above-mentioned problems. The work reported in this dissertation focused on providing insight into the fundamental problems posed by OppNets, so as to analyze and solve the problems faced by application developers while dealing with these environments. The research focused on identifying well-known high-level programming models that can be satisfactorily implemented for OppNets, and that can prove useful for application developers. In order to demonstrate the feasibility of application development for OppNets, while assessing the benefits brought about by carefully designed middleware systems, a couple of such systems have been designed, implemented, and evaluated as part of this work. These middleware systems respectively support distributed messaging (through message queues and topics), the tuple-space model, and consensus solving in OppNets. They are supplemented with fully-functional implementations, that can be used in real settings, and that are all distributed under the terms of the GNU General Public License (GPL). Real-life experiments and simulations have been realized so as to evaluate the effectiveness and efficiency of these systems in real conditions
Pillé, Ariane. "Amyloïdes fonctionnelles du pathogène opportuniste Aspergillus fumigatus." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066696/document.
Full textHydrophobins are fungal proteins characterised by their amphipatic properties and a pattern of four disulfide bridges. Their soluble form self-assembles at hydrophobic/hydrophilic interfaces to form an amphipatic layer. These proteins are used by fungi to breach the air/water barrier, to form aerial hyphae, or to cover spores rendering them hydrophobic, thus facilitating spore dispersal. The RodA hydrophobin of the opportunistic pathogen Aspergillus fumigatus forms an amyloid monolayer with a rodlet morphology that covers the surface of spores rendering them inert relative to the immune system. We aim at describing the self-association of RodA into rodlets, characterising the structure of the amyloid rodlets and shedding light on the possible relationships between structure and immunological inertness. Recombinant RodA expressed in Escherichia coli can be successfully refolded in vitro and it can auto-associate into amyloid rodlets. As a first step, we have studied the structure and dynamics of RodA by solution NMR and shown that the protein displays new as well as conserved structural features relative to other hydrophobins. A mutational analysis has highlighted important residues for rodlet formation that may be involved on the one hand in the spine of the amyloid fibres and on the other hand on the lateral association of the rodlets to form a monolayer. We have also established the relationship between structure and immunological inertness. We have initiated the study of other hydrophobins from A. fumigatus, that are most likely involved in biofilm formation or in conidiation and spore survival
Esnault, Armel. "Systèmes pair-à-pair pour l’informatique opportuniste." Thesis, Lorient, 2017. http://www.theses.fr/2017LORIS432/document.
Full textThe number of devices that are likely to get connected to the Internet (e.g., smartphones, sensors), and the amount of data produced by people using these devices grow continuously, especially in cellular networks. Latest developments performed on the physical layer to increase the networks' bandwidth might be insufficient in the future, because of the emergence of the Internet of things. Therefore, it seems to be interesting to study new or complementary network architectures. Intermittently-Connected Hybrid Networks (ICHN), which are composed both of an infrastructure part and of parts formed by mobile device communicating using ad hoc mode, are examples of those architectures that deserve to be studied. In this thesis, we study benefits that peer-to-peer mechanisms and opportunistic networking techniques could bring to ICHN. We propose a decentralized unstructured peer-to-peer overlay architecture that supports communications between devices in wide ICHNs. A prototype named Nephila has been developed to evaluate this approach in simulation
Gits-Muselli, Maud. "Etude de la variabilité moléculaire de Pneumocystis jirovecii : du génotype à la variabilité antigénique." Thesis, Université de Paris (2019-....), 2020. http://www.theses.fr/2020UNIP7179.
Full textPneumocystis jirovecii is an atypical opportunistic pathogen of the fungal world. This cosmopolitan fungus, whose studies agree on a very probable airborne transmission between individuals, is encountered very early in life. P. jirovecii can be detected in the airways of all types of individuals, with or without symptoms, after exposure. Severe pneumonia secondary to the infection, called pneumocystosis (PCP), is observed only in immunocompromised patients. All infected individuals, both symptomatic (PCP) and asymptomatic carriers (PCC) would participate in the maintenance of the chain of transmission between individuals, and many outbreaks are described within health care wards. The number of pneumocystosis cases is estimated at 500,000/year worldwide, with mortality up to 40%. Historically diagnosed in HIV-infected patients not receiving HAART, pneumocystosis is now common in non-HIV immunocompromised patients. For these non-HIV immunocompromised patients the disease presents a more acute evolution and a higher mortality. The pathophysiology of this pneumonia is still poorly understood. Indeed, studies on this pathogen are limited by the lack of a culture system. Consequently, only molecular techniques applied directly to samples from infected patients are currently available to study transmission, genetic diversity and evaluate the performance of diagnostic approaches. In order to study transmission, the first theme of this work will focus on the development and validation of a genotyping method based on the analysis of genomic microsatellite markers (MLP). A monocentric study and a larger collaborative multi-center study, allowed the observation of a wide variety of genotypes and a high frequency (2/3) of genotype mixing in patients' samples. These two studies also allowed the identification of specific genotypes, found preferentially in kidney transplant subjects. Then, the comparison of the MLP method with the MLST genotyping technique allowed us to confirm performance. The development of this genotyping method, which has been shown to be effective for the detection of mixed genotypes, is therefore an appropriate tool for the selection of samples hosting a single genomic genotype, in order to subsequently search for a possible link between genotype and MSG surface antigens.Considering diagnosis approaches, qPCR is considered as the most sensitive method for the detection of the fungus. However, due to its high sensitivity, this approach also allows the detection of the fungus in samples from asymptomatic patients, then defined as asymptomatic carriers (PCC). Previous work carried out in our laboratory has allowed us to observe a better sensitivity of the mitochondrial mtSSU target compared to the mtLSU target, classically used in many laboratories. The second theme of this work was therefore, to study the impact of targets and material, amplified in qPCR, for the detection of P. jirovecii in respiratory samples.Then, a first European collaborative study determined that total nucleic acids (WNA=DNA +RNA) detection is earlier than DNA detection alone, and that the mtSSU target provided the earliest Cycles of Quantification (Cq). Finally, a prospective study, carried out on 120 patients samples, consisted in evaluating the performance of the two mitochondrial targets mtSSU and mtLSU, with DNA and WNA amplification for the detection of the fungus. The detection of the mtSSU WNA was confirmed as the earliest. In parallel with the performance evaluation, an evaluation of the benefit of the 2 mitochondrial genes expression ratio for PCP diagnosis strategy was performed. A ratio >5 presented a Negative Predictive Value of 100% for BAL and 87.5% for induced sputum specimens, to exclude PCP. This new, simple tool, based on the double detection of WNA from mtSSU and mtLSU, could be useful for patient management
Dunat, Jean-Christophe. "Allocation opportuniste de spectre pour les radios cognitives." Phd thesis, Paris : École nationale supérieure des télécommunications, 2006. http://catalogue.bnf.fr/ark:/12148/cb40978484c.
Full textMARCOMBES, VERONIQUE. "Les infections opportunistes au cours du sida : a propos de 37 cas observes au chru de clermont-ferrand." Clermont-Ferrand 1, 1990. http://www.theses.fr/1990CLF13005.
Full textKhawam, Kinda. "Ordonnancement opportuniste dans les réseaux mobiles de nouvelle génération." Phd thesis, Télécom ParisTech, 2006. http://pastel.archives-ouvertes.fr/pastel-00002059.
Full textKhawam, Kinda. "L'ordonnancement opportuniste dans les réseaux mobiles de nouvelle génération /." Paris : École nationale supérieure des télécommunications, 2007. http://catalogue.bnf.fr/ark:/12148/cb41024537q.
Full textKang, GuoDong. "Géolocalisation en intérieur opportuniste à base d'inégalités matricielles linéaires." Toulouse, ISAE, 2010. http://www.theses.fr/2010ESAE0016.
Full textBooks on the topic "Opportuniste"
Opportunistic infections: Treatment and prophylaxis. Totowa, N.J: Humana Press, 2003.
Find full textSymposium on Topics in Mycology on Mycoses in AIDS Patients (1989 Paris, France). Mycoses in AIDS patients. New York: Plenum Press, 1990.
Find full textGeorgiev, Vassil St. Opportunistic Infections. New Jersey: Humana Press, 2003. http://dx.doi.org/10.1385/1592592961.
Full textVerma, Anshul, Pradeepika Verma, Sanjay Kumar Dhurandher, and Isaac Woungang. Opportunistic Networks. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003132585.
Full textBook chapters on the topic "Opportuniste"
Gooch, Jan W. "Opportunist." In Encyclopedic Dictionary of Polymers, 912. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-6247-8_14391.
Full textNajafzadeh, Sara. "Vehicular Ad Hoc Networks." In Opportunistic Networks, 133–58. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-7.
Full textAbouaroek, Musaeed, and Khaleel Ahmad. "Foundations of Opportunistic Networks." In Opportunistic Networks, 1–10. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-1.
Full textBiasi, Gabriel de, and Luiz F. M. Vieira. "Taxonomy of Security Attacks in Opportunistic Networks." In Opportunistic Networks, 193–212. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-10.
Full textAl-Gburi, Ahmed, Abduljaleel Al-Hasnawi, Raed Mahdi Salih, and Leszek T. Lilien. "Pervasive Trust Foundation for Security and Privacy in Opportunistic Resource Utilization Networks." In Opportunistic Networks, 213–27. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-11.
Full textVerma, Anshul, Mahatim Singh, K. K. Pattanaik, and B. K. Singh. "Future Networks Inspired by Opportunistic Networks." In Opportunistic Networks, 230–46. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-12.
Full textNath, Rintu. "Time and Data-Driven Triggering to Emulate Cross-Layer Feedback in Opportunistic Networks." In Opportunistic Networks, 247–57. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-13.
Full textJohari, Rahul, Prachi Garg, Riya Bhatia, Kalpana Gupta, and Afreen Fatimah. "Applications of DTN." In Opportunistic Networks, 260–66. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-14.
Full textRahman, Makshudur, and Md Sharif Hossen. "Performance Evaluation of Social-Aware Routing Protocols in an Opportunistic Network." In Opportunistic Networks, 267–77. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-15.
Full textChhabra, Anshuman, Vidushi Vashishth, and Deepak Kumar Sharma. "Hands-On ONE Simulator: Opportunistic Network Environment." In Opportunistic Networks, 280–303. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429453434-16.
Full textConference papers on the topic "Opportuniste"
Roggen, Daniel, Kilian Forster, Alberto Calatroni, Thomas Holleczek, Yu Fang, Gerhard Troster, Alois Ferscha, et al. "OPPORTUNITY: Towards opportunistic activity and context recognition systems." In 2009 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WowMoM). IEEE, 2009. http://dx.doi.org/10.1109/wowmom.2009.5282442.
Full textZhao, Qing. "Spectrum Opportunity and Interference Constraint in Opportunistic Spectrum Access." In 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/icassp.2007.366752.
Full textKim, H., and G. de Veciana. "Losing Opportunism: Evaluating Service Integration in an Opportunistic Wireless System." In IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications. IEEE, 2007. http://dx.doi.org/10.1109/infcom.2007.119.
Full textNeinavaie, Mohammad, Joe Khalife, and Zaher M. Kassas. "Blind Opportunistic Navigation: Cognitive Deciphering of Partially Known Signals of Opportunity." In 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2020). Institute of Navigation, 2020. http://dx.doi.org/10.33012/2020.17592.
Full textSong, Xiaoshi, Changchuan Yin, Danpu Liu, and Rui Zhang. "Spatial opportunity in cognitive radio networks with threshold-based opportunistic spectrum access." In ICC 2013 - 2013 IEEE International Conference on Communications. IEEE, 2013. http://dx.doi.org/10.1109/icc.2013.6654944.
Full textSong, Xiaoshi, Changchuan Yin, Danpu Liu, and Rui Zhang. "Spatial opportunity in cognitive radio networks with primary transmitter assisted opportunistic spectrum access." In 2013 IEEE International Wireless Symposium (IWS). IEEE, 2013. http://dx.doi.org/10.1109/ieee-iws.2013.6616817.
Full textLohachab, Ankur, and Ajay Jangra. "Opportunistic Internet of Things (IoT): Demystifying the Effective Possibilities of Opportunisitc Networks Towards IoT." In 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2019. http://dx.doi.org/10.1109/spin.2019.8711621.
Full textRezar, Matija, Erik Strumbelj, Giacomo Pojani, and Chris Marshall. "Opportunistic Positioning Using Unsynchronized References: Crowd Systems - Smartphones: Signals of opportunity, cellular systems (4G, 5G, WLAN, …)." In 2020 European Navigation Conference (ENC). IEEE, 2020. http://dx.doi.org/10.23919/enc48637.2020.9317503.
Full textClare, H. "UK MNT network." In IEE Seminar on Microtechnology Meets Nanoscience - a Commercial Opportunity? IEE, 2004. http://dx.doi.org/10.1049/ic:20040151.
Full textAtherton, P. "Commercialising MNT." In IEE Seminar on Microtechnology Meets Nanoscience - a Commercial Opportunity? IEE, 2004. http://dx.doi.org/10.1049/ic:20040152.
Full textReports on the topic "Opportuniste"
Harkins, D., and W. Kumari, eds. Opportunistic Wireless Encryption. RFC Editor, March 2017. http://dx.doi.org/10.17487/rfc8110.
Full textPhilippon, Thomas. The FinTech Opportunity. Cambridge, MA: National Bureau of Economic Research, August 2016. http://dx.doi.org/10.3386/w22476.
Full textHancock, Ed, and Carl Mas. Renewable Energy Opportunity Assessment. Office of Scientific and Technical Information (OSTI), November 1998. http://dx.doi.org/10.2172/1115786.
Full textMurray, Craig H. Gallipoli 1915-Opportunity Lost? Fort Belvoir, VA: Defense Technical Information Center, May 1994. http://dx.doi.org/10.21236/ada283403.
Full textNottingham, M., and M. Thomson. Opportunistic Security for HTTP/2. RFC Editor, May 2017. http://dx.doi.org/10.17487/rfc8164.
Full textWhitehead, Gary W. Missed Opportunity: Reducing the Bulge. Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada394050.
Full textnone,. Steel Industry Marginal Opportunity Analysis. Office of Scientific and Technical Information (OSTI), September 2005. http://dx.doi.org/10.2172/1218676.
Full textStevens, Charles G. German Reunification: A Soviet Opportunity. Fort Belvoir, VA: Defense Technical Information Center, March 1989. http://dx.doi.org/10.21236/ada208041.
Full textCuddy, Jack C. Lee's Maryland Campaign: Opportunity Lost. Fort Belvoir, VA: Defense Technical Information Center, June 1995. http://dx.doi.org/10.21236/ada297737.
Full textBeattie, Ross James. An Advanced Materials Commercial Opportunity. Office of Scientific and Technical Information (OSTI), April 2019. http://dx.doi.org/10.2172/1504666.
Full text