Serge Chaumette

Learn More
Besides the complexity in time or in number of messages, a common approach for analyzing distributed algorithms is to look at their assumptions on the underlying network. This paper focuses on the study of such assumptions in dynamic networks, where the connectivity is expected to change, predictably or not, during the execution. Our main contribution is a(More)
Till recently it was impossible to have more than one single application running on a smart card. Multiapplication cards, and especially Java Cards TM1 , now make it possible to have several applications sharing the same physical piece of plastic. This raises new security problems by creating additional ways to attack a card. These problems are the topic of(More)
In this paper, we present the HPFIT project whose aim is to provide a set of interactive tools integrated in a single environment to help users to parallelize scientiic applications to be run on distributed memory parallel computers. HPFIT is built around a restructuring tool called TransTOOL which includes an editor, a parser, a dependenceanalysis tool and(More)
—This paper proposes a new solution to the problem of self-deploying a network of wireless mobile robots with simultaneous consideration to several criteria, that are, the fault-tolerance (biconnectivity) of the resulting network, its coverage, its diameter, and the quantity of movement required to complete the deployment. These criteria have already been(More)
Multiapplication smart cards now make it possible to have several applications sharing the same physical piece of plastic.This raises new security problems by creating additional ways to attack them. This is particularly true with future open multiapplication cards that allow anybody to load his/her own application. For example an attacker can load her own(More)
Till recently it was only possible to have one single application running on a smart card. Multi-applicative cards, and especially Java Cards, now makes it possible to have several applications sharing the same physical piece of plastic. This causes security problems and security assessment has to be provided. Therefore we have developed the JCAT(More)
More and more applications make use of hardware resources that are available all over the network at different physical places and that are the property of unknown persons or organizations. One of the major problems of such a configuration is that it requires a mutual trust between the owner of the application to be executed and the owners of the resources(More)