Menu
Header
Footer
SideBar
Cours
Participer à l'évaluation du cours (anonyme et facultatif)
View Survey
Semaine 1
Semaine 2
Semaine 3
Semaine 4
Séance du vendredi matin
Vincent Alloy , Safe P2P self-downloading
Trong-Hieu Ha, Huy-Ngoc Dau, Karim Bessaoud , Distributed Synthesis of Fault-Tolerant Programs in the High Atomicity Model
Quan Kong, Abbas Hatoum , Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
David Auriol , A Self-stabilizing Link-Coloring Protocol Resilient to Byzantine Faults in Tree Networks
Cherif Zakat , Push-to-Pull Peer-to-Peer Live Streaming
Nor Kichou , An Architectural Approach to Preventing Code Injection Attacks
Ali El Masri , The Case for FEC-based Reliable Multicast in Wireless Mesh Networks
Fazia Laoussati , Scaling Byzantine Fault-Tolerant Replication toWide Area Networks
TRAN Chi Thang, TRAN Dinh Nam , Countering web spam with credibility-based link analysis
Xu Meng , Deleting files in the Celeste peer to peer storage system
Zhang Tuo , the mailbox problem
Mustapha SAIDJ , Simple Technique de Localisation à Base de Signature
Insaf M'HISSEN, Oussema Habbach , Synchronous Consensus with Mortal Byzantines
Séance du vendredi après-midi
Lila Kenoui , Using Loop Invariants to Fight Soft Errors in Data Caches
Fayçal Kassa, Reda Benaissa , Interval Tree Clocks: A Logical Clock for Dynamic Systems
Hamri Amina, Lamani Anissa Khadidja, Miloudi Narjess , Computing Without Communicating:Ring Exploration by Asynchronous Oblivious Robots
Kamelia KESSAL, Djamel MOUCHENE, Abdelkrim HADJIDJ , Protecting BitTorrent: design and evaluation of effective countermeasures against DoS attacks
MOAKHAR Bilel, TOUIL Hamza , Self-stabilizing Population Protocols
Telli Zakaria , A FORMAL ANALUSIS OF THE DEFERRED UPDATE TECHNIQUE
Sghaier Nouha, Cherfi Mehdi
Boumaaza Lamiae , Local Maps: New Insights into Mobile Agent Algorithms
Semaine 5
Examen
Documents autorisés : les documents autorisés lors de l'examen sont les impressions des documents accessible depuis cette page, et les notes manuscrites personnelles (ce qui exclut en particulier les photocopies de notes manuscrites d'autres personnes et les livres).
Stages
Les premiers sujets de stage de Master 2 Recherche sont disponibles ICI .