Author of the publication

Modélisation des connaissances émotionnelles par les cartes cognitives floues.

, , , , , and . EGC (Ateliers), volume E-5 of RNTI, page 31-36. Cépaduès-Éditions, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modélisation d'un agent émotionnel en UML et RDF., , , , and . EGC, volume RNTI-E-3 of Revue des Nouvelles Technologies de l'Information, page 637-642. Cépaduès-Éditions, (2005)Modélisation des connaissances émotionnelles par les cartes cognitives floues., , , , , and . EGC (Ateliers), volume E-5 of RNTI, page 31-36. Cépaduès-Éditions, (2005)Finite Polylogarithms, Their Multiple Analogues and the Shannon Entropy., and . GSI, volume 9389 of Lecture Notes in Computer Science, page 277-285. Springer, (2015)Polynomial multipliers for fully homomorphic encryption on FPGA., , , , and . ReConFig, page 1-6. IEEE, (2015)Decentralized Public Key Infrastructure for Autonomous Embedded Systems., , , and . C&ESAR, volume 3329 of CEUR Workshop Proceedings, page 99-114. CEUR-WS.org, (2022)A New Security Model for Authenticated Key Agreement., , and . SCN, volume 6280 of Lecture Notes in Computer Science, page 219-234. Springer, (2010)A Secure and Efficient Authenticated Diffie-Hellman Protocol., , and . EuroPKI, volume 6391 of Lecture Notes in Computer Science, page 83-98. Springer, (2009)On the separation between the FHMQV and HMQV protocols., and . Int. J. Appl. Cryptogr., 3 (4): 377-393 (2017)Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis., , , and . SPRO@CCS, page 3-14. ACM, (2019)Driving reservoir models with oscillations: a solution to the extreme structural sensitivity of chaotic networks., , and . J. Comput. Neurosci., 41 (3): 305-322 (2016)