default search action
Akka Zemmari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Rupayan Mallick, Jenny Benois-Pineau, Akka Zemmari, Kamel Guerda, Boris Mansencal, Hélène Amieva, Laura Middleton:
A hybrid transformer with domain adaptation using interpretability techniques for the application to the detection of risk situations. Multim. Tools Appl. 83(35): 83339-83356 (2024) - [j36]Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfattah Belghith:
Investigating the impact of body node coordinator position on communication reliability in wireless body area networks. Netw. Model. Anal. Health Informatics Bioinform. 13(1): 50 (2024) - [j35]Alexey Zhukov, Alain Rivero, Jenny Benois-Pineau, Akka Zemmari, Mohamed Mosbah:
A Hybrid System for Defect Detection on Rail Lines through the Fusion of Object and Context Information. Sensors 24(4): 1171 (2024) - [c54]Rupayan Mallick, Jenny Benois-Pineau, Akka Zemmari:
IFI: Interpreting for Improving: A Multimodal Transformer with an Interpretability Technique for Recognition of Risk Events. MMM (4) 2024: 117-131 - [i11]Maxime Fuccellaro, Laurent Simon, Akka Zemmari:
Drift Detection: Introducing Gaussian Split Detector. CoRR abs/2405.08637 (2024) - 2023
- [c53]Maxime Fuccellaro, Laurent Simon, Akka Zemmari:
A Robust Drift Detection Algorithm with High Accuracy and Low False Positives Rate. SafeAI@AAAI 2023 - [c52]Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distribution of the Training Data Over the Shortest Path Between the Servers. AINA (3) 2023: 351-356 - [c51]Meghna P. Ayyar, Jenny Benois-Pineau, Akka Zemmari, Hélène Amieva, Laura Middleton:
Entropy-based Sampling for Streaming learning with Move-to-Data approach on Video. CBMI 2023: 21-27 - [c50]Éric Grivel, Baptiste Pesquet, Tudor-Bogdan Airimitoaie, Akka Zemmari:
Artificial Intelligence for Defence in an EQF6 Training and Education Program, from the Design to the Execution. EDUCON 2023: 1-5 - [c49]Meaza Eyakem Gebreamlak, Meghna P. Ayyar, Jenny Benois-Pineau, Jean-Pierre Salmon, Akka Zemmari:
Leveraging Explainability methods in Spectral Domain for Data Augmentation and efficient training of CNN classifiers for Covid-19 Detection. IPTA 2023: 1-6 - 2022
- [j34]Rupayan Mallick, Thinhinane Yebda, Jenny Benois-Pineau, Akka Zemmari, Marion Pech, Hélène Amieva:
Detection of Risky Situations for Frail Adults With Hybrid Neural Networks on Multimodal Health Data. IEEE Multim. 29(1): 7-17 (2022) - [c48]Ibrahim Dahaoui, Mohamed Mosbah, Akka Zemmari:
Distributed Training from Multi-sourced Data. AINA (2) 2022: 339-347 - [c47]Abel Kahsay Gebreslassie, Jenny Benois-Pineau, Akka Zemmari:
Streaming learning with Move-to-Data approach for image classification. CBMI 2022: 167-173 - [c46]Rupayan Mallick, Jenny Benois-Pineau, Akka Zemmari:
I Saw: A Self-Attention Weighted Method for Explanation of Visual Transformers. ICIP 2022: 3271-3275 - [c45]Rupayan Mallick, Jenny Benois-Pineau, Akka Zemmari, Thinhinane Yebda, Marion Pech, Hélène Amieva, Laura Middleton:
Pooling Transformer for Detection of Risk Events in In-The-Wild Video Ego Data. ICPR 2022: 2778-2784 - [c44]Maxime Fuccellaro, Laurent Simon, Akka Zemmari:
Partially Supervised Classification for Early Concept Drift Detection. ICTAI 2022: 190-196 - [c43]Rupayan Mallick, Jenny Benois-Pineau, Akka Zemmari, Marion Pech, Thinhinane Yebda, Hélène Amieva, Laura Middleton:
A Hybrid Transformer Network for Detection of Risk Situations on Multimodal Life-Log Health Data. ICDAR@ICMR 2022: 22-26 - [i10]Pierre-Etienne Martin, Jenny Benois-Pineau, Renaud Péteri, Akka Zemmari, Julien Morlier:
3D Convolutional Networks for Action Recognition: Application to Sport Gesture Recognition. CoRR abs/2204.08460 (2022) - 2021
- [j33]Meghna P. Ayyar, Jenny Benois-Pineau, Akka Zemmari:
Review of white box methods for explanations of convolutional neural networks in image classification tasks. J. Electronic Imaging 30(5) (2021) - [c42]Asha S, P. Vinod, Varun G. Menon, Akka Zemmari:
Downsampling Attack on Automatic Speaker Authentication System. AICCSA 2021: 1-7 - [c41]Rupayan Mallick, Thinhinane Yebda, Jenny Benois-Pineau, Akka Zemmari, Marion Pech, Hélène Amieva:
A GRU Neural Network with attention mechanism for detection of risk situations on multimodal lifelog data. CBMI 2021: 1-6 - [c40]Meghna P. Ayyar, Jenny Benois-Pineau, Akka Zemmari:
A Hierarchical Classification System for the Detection of Covid-19 from Chest X-Ray Images. ICCVW 2021: 519-528 - [c39]Meghna P. Ayyar, Jenny Benois-Pineau, Akka Zemmari, Gwenaelle Catheline:
Explaining 3D CNNs for Alzheimer's Disease Classification on sMRI Images with Multiple ROIs. ICIP 2021: 284-288 - [c38]Ijas Ah, Vinod P., Akka Zemmari, Harikrishnan D, Godvin Poulose, Don Jose, Francesco Mercaldo, Fabio Martinelli, Antonella Santone:
Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples. KES 2021: 3320-3331 - [c37]Pranav Kotak, Shweta Bhandari, Akka Zemmari, Jaykrishna Joshi:
Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions. PST 2021: 1-5 - [p4]Akka Zemmari, Jenny Benois-Pineau:
Deep Neural Networks: Models and Methods. Multi-faceted Deep Learning 2021: 5-38 - [p3]Pierre-Etienne Martin, Jenny Benois-Pineau, Renaud Péteri, Akka Zemmari, Julien Morlier:
3D Convolutional Networks for Action Recognition: Application to Sport Gesture Recognition. Multi-faceted Deep Learning 2021: 199-229 - [p2]Jenny Benois-Pineau, Akka Zemmari:
Conclusion. Multi-faceted Deep Learning 2021: 315-316 - [e2]Jenny Benois-Pineau, Akka Zemmari:
Multi-faceted Deep Learning - Models and Data. Springer 2021, ISBN 978-3-030-74477-9 [contents] - [i9]Meghna P. Ayyar, Jenny Benois-Pineau, Akka Zemmari:
White Box Methods for Explanations of Convolutional Neural Networks in Image Classification Tasks. CoRR abs/2104.02548 (2021) - 2020
- [b3]Akka Zemmari, Jenny Benois-Pineau:
Deep Learning in Mining of Visual Content. Springer Briefs in Computer Science, Springer 2020, ISBN 978-3-030-34375-0, pp. 1-97 - [j32]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j31]Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Comput. Commun. 154: 148-159 (2020) - [j30]Jyoti Gajrani, Umang Agarwal, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur, Meenakshi Tripathi, Akka Zemmari:
EspyDroid+: Precise reflection analysis of android apps. Comput. Secur. 90: 101688 (2020) - [j29]Van Linh Le, Marie Beurton-Aimar, Akka Zemmari, Alexia Marie, Nicolas Parisey:
Automated landmarking for insects morphometric analysis using deep neural networks. Ecol. Informatics 60: 101175 (2020) - [j28]Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Partha S. Roop:
SneakLeak+: Large-scale klepto apps analysis. Future Gener. Comput. Syst. 109: 593-603 (2020) - [c36]Kazi Ahmed Asif Fuad, Pierre-Etienne Martin, Romain Giot, Romain Bourqui, Jenny Benois-Pineau, Akka Zemmari:
Features Understanding in 3D CNNs for Actions Recognition in Video. IPTA 2020: 1-6 - [c35]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac:
A OneM2M Intrusion Detection and Prevention System based on Edge Machine Learning. NOMS 2020: 1-7 - [c34]Afaf Bouhoute, Mohamed Mosbah, Akka Zemmari, Ismail Berrada:
On the Application of Machine Learning for Cut-in Maneuver Recognition in Platooning Scenarios. VTC Spring 2020: 1-5 - [i8]Miltiadis Poursanidis, Jenny Benois-Pineau, Akka Zemmari, Boris Mansencal, Aymar de Rugy:
Move-to-Data: A new Continual Learning approach with Deep CNNs, Application for image-class recognition. CoRR abs/2006.07152 (2020)
2010 – 2019
- 2019
- [j27]Arnaud Casteigts, Yves Métivier, J. M. Robson, Akka Zemmari:
Deterministic Leader Election Takes Θ(D+log n) Bit Rounds. Algorithmica 81(5): 1901-1920 (2019) - [j26]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac, Parvez Faruki:
Network Intrusion Detection for IoT Security Based on Learning Techniques. IEEE Commun. Surv. Tutorials 21(3): 2671-2701 (2019) - [j25]Vinod P, Akka Zemmari, Mauro Conti:
A machine learning based approach to detect malicious android apps using discriminant system calls. Future Gener. Comput. Syst. 94: 333-350 (2019) - [j24]Arnaud Casteigts, Yves Métivier, John Michael Robson, Akka Zemmari:
Design patterns in beeping algorithms: Examples, emulation, and analysis. Inf. Comput. 264: 32-51 (2019) - [j23]Arnaud Casteigts, Yves Métivier, J. M. Robson, Akka Zemmari:
Counting in one-hop beeping networks. Theor. Comput. Sci. 780: 20-28 (2019) - [c33]Nadia Chaabouni, Mohamed Mosbah, Akka Zemmari, Cyrille Sauvignac:
An Intrusion Detection System for the OneM2M Service Layer Based on Edge Machine Learning. ADHOC-NOW 2019: 508-523 - [c32]Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith, Nesrine Ouled Abdallah:
Leveraging the link quality awareness for body node coordinator (BNC) placement in WBANs. SAC 2019: 754-761 - [e1]Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - 2018
- [j22]Wafa Ben Jaballah, Mauro Conti, Gilberto Filé, Mohamed Mosbah, Akka Zemmari:
Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119: 66-82 (2018) - [j21]Shweta Bhandari, Rekha Panihar, Smita Naval, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur:
SWORD: Semantic aWare andrOid malwaRe Detector. J. Inf. Secur. Appl. 42: 46-56 (2018) - [c31]Shweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari:
Privacy Preserving Data Offloading Based on Transformation. CRiSIS 2018: 86-92 - [c30]Pierre Gillot, Jenny Benois-Pineau, Akka Zemmari, Yurii E. Nesterov:
Increasing Training Stability for Deep CNNS. ICIP 2018: 3423-3427 - [c29]Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, Manoj Singh Gaur:
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. ISEA-ISAP 2018: 125-139 - [c28]Rim Negra, Imen Jemili, Akka Zemmari, Mohamed Mosbah, Abdelfettah Belghith:
WBAN Path Loss Based Approach For Human Activity Recognition With Machine Learning Techniques. IWCMC 2018: 470-475 - [c27]Van Linh Le, Marie Beurton-Aimar, Akka Zemmari, Nicolas Parisey:
Landmarks Detection by Applying Deep Networks. MAPR 2018: 1-6 - 2017
- [j20]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti:
Android inter-app communication threats and detection techniques. Comput. Secur. 70: 392-421 (2017) - [j19]Souad Chaabouni, Jenny Benois-Pineau, Francois Tison, Chokri Ben Amar, Akka Zemmari:
Prediction of visual attention with deep CNN on artificially degraded videos for studies of attention of patients with Dementia. Multim. Tools Appl. 76(21): 22527-22546 (2017) - [c26]Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur:
Detecting Inter-App Information Leakage Paths. AsiaCCS 2017: 908-910 - [c25]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c24]Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur:
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps. TrustCom/BigDataSE/ICESS 2017: 285-292 - [p1]Souad Chaabouni, Jenny Benois-Pineau, Akka Zemmari, Chokri Ben Amar:
Deep Saliency: Prediction of Interestingness in Video with CNN. Visual Content Indexing and Retrieval with Psycho-Visual Models 2017: 43-74 - 2016
- [j18]Allyx Fontaine, Akka Zemmari:
RDA: A Coq Library to Reason about Randomised Distributed Algorithms in the Message Passing Model. Sci. Ann. Comput. Sci. 26(2): 157-186 (2016) - [j17]Yves Métivier, John Michael Robson, Akka Zemmari:
A distributed enumeration algorithm and applications to all pairs shortest paths, diameter... Inf. Comput. 247: 141-151 (2016) - [j16]Yves Métivier, J. M. Robson, Akka Zemmari:
Randomised distributed MIS and colouring algorithms for rings with oriented edges in O(√(log n)) bit rounds. Inf. Comput. 251: 208-214 (2016) - [c23]Allyx Fontaine, Mohamed Mosbah, Mohamed Tounsi, Akka Zemmari:
A Fault-Tolerant Handshake Algorithm for Local Computations. AINA Workshops 2016: 475-480 - [c22]Shweta Bhandari, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur:
Intersection Automata Based Model for Android Application Collusion. AINA 2016: 901-908 - [c21]Parvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers. DSN Workshops 2016: 60-65 - [c20]Allyx Fontaine, Akka Zemmari:
Certified Impossibility Results and Analyses in Coq of Some Randomised Distributed Algorithms. ICTAC 2016: 69-81 - [c19]Arnaud Casteigts, Yves Métivier, John Michael Robson, Akka Zemmari:
Design Patterns in Beeping Algorithms. OPODIS 2016: 15:1-15:16 - [c18]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, D. Vijay Rao, Akka Zemmari:
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks. Wireless Days 2016: 1-6 - [c17]Arnaud Casteigts, Yves Métivier, John Michael Robson, Akka Zemmari:
Deterministic Leader Election in O(D+\log n) Time with Messages of Size O(1). DISC 2016: 16-28 - [i7]Arnaud Casteigts, Yves Métivier, John Michael Robson, Akka Zemmari:
Deterministic Leader Election in O(D+ log n) Time with Messages of Size O(1). CoRR abs/1605.01903 (2016) - [i6]Arnaud Casteigts, Yves Métivier, John Michael Robson, Akka Zemmari:
Counting in One-Hop Beeping Networks. CoRR abs/1605.09516 (2016) - [i5]Arnaud Casteigts, Yves Métivier, John Michael Robson, Akka Zemmari:
Design Patterns in Beeping Algorithms. CoRR abs/1607.02951 (2016) - [i4]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
Android App Collusion Threat and Mitigation Techniques. CoRR abs/1611.10076 (2016) - 2015
- [j15]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari:
Lightweight secure group communications for resource constrained devices. Int. J. Space Based Situated Comput. 5(4): 187-200 (2015) - [j14]Yves Métivier, John Michael Robson, Akka Zemmari:
Analysis of fully distributed splitting and naming probabilistic procedures and applications. Theor. Comput. Sci. 584: 115-130 (2015) - [c16]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari:
A Totally Distributed Fair Scheduler for Population Protocols by Randomized Handshakes. ICTAC 2015: 290-306 - [c15]Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev:
DRACO: DRoid analyst combo an android malware analysis framework. SIN 2015: 283-289 - [i3]Yves Métivier, John Michael Robson, Akka Zemmari:
On Distributed Computing with Beeps. CoRR abs/1507.02721 (2015) - [i2]Yves Métivier, John Michael Robson, Akka Zemmari:
A Distributed Enumeration Algorithm and Applications to All Pairs Shortest Paths, Diameter. CoRR abs/1507.03376 (2015) - [i1]Jean-François Marckert, Nasser Saheb-Djahromi, Akka Zemmari:
Election algorithms with random delays in trees. CoRR abs/1507.04909 (2015) - 2014
- [c14]Nesrine Ouled Abdallah, Mohamed Jmaiel, Mohamed Mosbah, Akka Zemmari:
Greedy Flooding in Redoubtable Sensor Networks. AINA 2014: 899-906 - [c13]Allyx Fontaine, Yves Métivier, John Michael Robson, Akka Zemmari:
On Lower Bounds for the Time and the Bit Complexity of Some Probabilistic Distributed Graph Algorithms - (Extended Abstract). SOFSEM 2014: 235-245 - 2013
- [j13]Nesrine Ouled Abdallah, Hatem Hadj Kacem, Mohamed Mosbah, Akka Zemmari:
Randomized broadcasting in wireless mobile sensor networks. Concurr. Comput. Pract. Exp. 25(2): 203-217 (2013) - [j12]Allyx Fontaine, Yves Métivier, John Michael Robson, Akka Zemmari:
Optimal bit complexity randomised distributed MIS and maximal matching algorithms for anonymous rings. Inf. Comput. 233: 32-40 (2013) - [j11]Yves Métivier, J. M. Robson, Nasser Saheb-Djahromi, Akka Zemmari:
On the time and the bit complexity of distributed randomised anonymous ring colouring. Theor. Comput. Sci. 502: 64-75 (2013) - [c12]Wafa Ben Jaballah, Mohamed Mosbah, Habib Youssef, Akka Zemmari:
Lightweight Source Authentication Mechanisms for Group Communications in Wireless Sensor Networks. AINA 2013: 598-605 - [c11]Yves Métivier, John Michael Robson, Akka Zemmari:
Analysis of Fully Distributed Splitting and Naming Probabilistic Procedures and Applications - (Extended Abstract). SIROCCO 2013: 153-164 - 2011
- [j10]Yves Métivier, John Michael Robson, Nasser Saheb-Djahromi, Akka Zemmari:
An optimal bit complexity randomized distributed MIS algorithm. Distributed Comput. 23(5-6): 331-340 (2011) - 2010
- [j9]Abdelaaziz El Hibaoui, John Michael Robson, Nasser Saheb-Djahromi, Akka Zemmari:
Uniform election in trees and polyominoids. Discret. Appl. Math. 158(9): 981-987 (2010) - [j8]Yves Métivier, John Michael Robson, Nasser Saheb-Djahromi, Akka Zemmari:
About randomised distributed graph colouring and graph partition algorithms. Inf. Comput. 208(11): 1296-1304 (2010) - [j7]Bilel Derbel, Mohamed Mosbah, Akka Zemmari:
Sublinear Fully Distributed Partition with Applications. Theory Comput. Syst. 47(2): 368-404 (2010) - [c10]Nesrine Ouled Abdallah, Hatem Hadj Kacem, Mohamed Mosbah, Akka Zemmari:
Broadcast in wireless mobile sensor networks with population protocols and extension with the rendezvous model. NOTERE 2010: 219-226
2000 – 2009
- 2009
- [b2]Akka Zemmari:
Présentation et analyse de quelques algorithmes distribués probabilistes. (Presentation and analysis of some distributed randomized algorithms). University of Bordeaux, France, 2009 - [c9]Yves Métivier, John Michael Robson, Nasser Saheb-Djahromi, Akka Zemmari:
Brief Annoucement: Analysis of an Optimal Bit Complexity Randomised Distributed Vertex Colouring Algorithm. OPODIS 2009: 359-364 - [c8]Yves Métivier, John Michael Robson, Nasser Saheb-Djahromi, Akka Zemmari:
An Optimal Bit Complexity Randomized Distributed MIS Algorithm (Extended Abstract). SIROCCO 2009: 323-337 - 2008
- [j6]Akka Zemmari:
On handshakes in random graphs. Inf. Process. Lett. 108(3): 119-123 (2008) - 2007
- [c7]Shehla Abbas, Mohamed Mosbah, Akka Zemmari:
Merging Time of Random Mobile Agents. LDIC 2007: 179-190 - [c6]Brahim Hamid, Mohamed Mosbah, Akka Zemmari:
A Self-stabilizing Distributed Algorithm for Resolving Conflicts. OTM Workshops (2) 2007: 1042-1051 - [c5]Shehla Abbas, Mohamed Mosbah, Akka Zemmari:
A Generic Distributed Algorithm for Computing by Random Mobile Agents. PRIMA 2007: 392-397 - 2006
- [j5]Philippe Duchon, Nicolas Hanusse, Nasser Saheb, Akka Zemmari:
Broadcast in the rendezvous model. Inf. Comput. 204(5): 697-712 (2006) - [c4]Bilel Derbel, Mohamed Mosbah, Akka Zemmari:
Fast distributed graph partition and application. IPDPS 2006 - 2005
- [j4]Yves Métivier, Nasser Saheb-Djahromi, Akka Zemmari:
Locally guided randomized elections in trees: The totally fair case. Inf. Comput. 198(1): 40-55 (2005) - 2004
- [c3]Philippe Duchon, Nicolas Hanusse, Nasser Saheb, Akka Zemmari:
Broadcast in the Rendezvous Model. STACS 2004: 559-570 - 2003
- [j3]Yves Métivier, Nasser Saheb, Akka Zemmari:
Analysis of a randomized rendezvous algorithm. Inf. Comput. 184(1): 109-128 (2003) - [j2]Cyril Gavoille, Akka Zemmari:
The compactness of adaptive routing tables. J. Discrete Algorithms 1(2): 237-254 (2003) - [c2]Yves Métivier, Nasser Saheb-Djahromi, Akka Zemmari:
A uniform randomized election in trees. SIROCCO 2003: 259-274 - 2002
- [j1]Yves Métivier, Nasser Saheb, Akka Zemmari:
Randomized local elections. Inf. Process. Lett. 82(6): 313-320 (2002) - 2000
- [b1]Akka Zemmari:
Contribution à l'analyse d'algorithmes distribués. (Contribution to the analysis of distributed algorithms). University of Bordeaux, France, 2000 - [c1]Cyril Gavoille, Akka Zemmari:
The compactness of adaptive routing tables. SIROCCO 2000: 127-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint