<?xml version="1.0" encoding="utf-8"?>
<raweb xmlns:xlink="http://www.w3.org/1999/xlink" xml:lang="en" year="2013">
  <identification id="carte" isproject="true">
    <shortname>CARTE</shortname>
    <projectName>Theoretical adverse computations, and safety</projectName>
    <theme-de-recherche>Security and Confidentiality</theme-de-recherche>
    <domaine-de-recherche>Algorithmics, Programming, Software and Architecture</domaine-de-recherche>
    <urlTeam>http://carte.loria.fr/</urlTeam>
    <datecreation>2009 January 01</datecreation>
    <structure_exterieure type="Labs">
      <libelle>Laboratoire lorrain de recherche en informatique et ses applications (LORIA)</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>CNRS</libelle>
    </structure_exterieure>
    <structure_exterieure type="Organism">
      <libelle>Université de Lorraine</libelle>
    </structure_exterieure>
    <UR name="Nancy"/>
    <keywords>
      <term>Formal Methods</term>
      <term>Security</term>
      <term>Virology</term>
      <term>Complexity</term>
      <term>Model Of Computation</term>
      <term>Real Numbers</term>
      <term>Dynamical System</term>
      <term>Rewriting</term>
    </keywords>
    <moreinfo/>
  </identification>
  <team id="uid1">
    <person key="carte-2012-idp140481669148656">
      <firstname>Emmanuel</firstname>
      <lastname>Jeandel</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Team leader (from July 2013), Univ. Lorraine, Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="protheo-2006-id18179">
      <firstname>Isabelle</firstname>
      <lastname>Gnaedig</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria, Researcher</moreinfo>
    </person>
    <person key="carte-2008-id18429">
      <firstname>Mathieu</firstname>
      <lastname>Hoyrup</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria, Researcher</moreinfo>
    </person>
    <person key="carte-2013-idp140481271742128">
      <firstname>Simon</firstname>
      <lastname>Perdrix</lastname>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>CNRS, Researcher, from Sep 2013</moreinfo>
    </person>
    <person key="calligramme-2005-id18205">
      <firstname>Guillaume</firstname>
      <lastname>Bonfante</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine, Associate Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="protheo-2005-id18389">
      <firstname>Emmanuel</firstname>
      <lastname>Hainry</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine, Associate Professor</moreinfo>
    </person>
    <person key="calligramme-2005-id18192">
      <firstname>Jean-Yves</firstname>
      <lastname>Marion</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Team leader (until July 2013), Univ. Lorraine, Professor</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="calligramme-2005-id18324">
      <firstname>Romain</firstname>
      <lastname>Péchoux</lastname>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine, Associate Professor</moreinfo>
    </person>
    <person key="carte-2012-idp140462941597344">
      <firstname>Fabrice</firstname>
      <lastname>Sabatier</lastname>
      <categoryPro>Technique</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria, granted by FP7 FI WARE project (until September 2013) then by ADT Inria (from October 2013)</moreinfo>
    </person>
    <person key="carte-2009-id59563">
      <firstname>Joan</firstname>
      <lastname>Calvet</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine, until Aug 2013</moreinfo>
    </person>
    <person key="carte-2010-id59800">
      <firstname>Hugo</firstname>
      <lastname>Férée</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine</moreinfo>
    </person>
    <person key="carte-2013-idp140481271761504">
      <firstname>Hubert</firstname>
      <lastname>Godfroy</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria, half-funded by DGA, since Oct 2013</moreinfo>
    </person>
    <person key="carte-2010-id59776">
      <firstname>Thanh Dinh</firstname>
      <lastname>Ta</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria, Cordi-S</moreinfo>
    </person>
    <person key="carte-2013-idp140481271766112">
      <firstname>Aurélien</firstname>
      <lastname>Thierry</lastname>
      <categoryPro>PhD</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria, Cordi-S</moreinfo>
    </person>
    <person key="carte-2013-idp140481271768416">
      <firstname>Bruno</firstname>
      <lastname>Bauwens</lastname>
      <categoryPro>PostDoc</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine, from Feb 2013</moreinfo>
    </person>
    <person key="carte-2013-idp140481271770720">
      <firstname>Neil</firstname>
      <lastname>Jones</lastname>
      <categoryPro>Visiteur</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Professor, from Mar 2013 until Apr 2013</moreinfo>
    </person>
    <person key="carte-2013-idp140481271773024">
      <firstname>Subramanian</firstname>
      <lastname>Kumbakonam Govindarajan</lastname>
      <categoryPro>Visiteur</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Professor, Feb 2013</moreinfo>
    </person>
    <person key="carte-2013-idp140481271775328">
      <firstname>Véronique</firstname>
      <lastname>Constant</lastname>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Inria</moreinfo>
    </person>
    <person key="cortex-2005-id18098">
      <firstname>Martine</firstname>
      <lastname>Kuhlmann</lastname>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>CNRS</moreinfo>
    </person>
    <person key="carte-2013-idp140481271779936">
      <firstname>Delphine</firstname>
      <lastname>Hubert</lastname>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Univ. Lorraine</moreinfo>
    </person>
    <person key="carte-2013-idp140481271782240">
      <firstname>Claude-Antoine</firstname>
      <lastname>Loudenot</lastname>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Intern, Mines Nancy, from Jul 2013 until Sep 2013</moreinfo>
    </person>
    <person key="carte-2013-idp140481271784608">
      <firstname>François</firstname>
      <lastname>Menet</lastname>
      <categoryPro>AutreCategorie</categoryPro>
      <research-centre>Nancy</research-centre>
      <moreinfo>Intern, Mines Nancy, from Jul 2013 until Sep 2013</moreinfo>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection id="uid3" level="1">
      <bodyTitle>Introduction</bodyTitle>
      <p>The aim of the CARTE research team is to take into account adversity in
computations, which is implied by actors whose behaviors are unknown or
unclear. We call this notion adversary computation.</p>
      <p>The project combines two approaches.
The first one is the analysis of the behavior of systems, using tools
coming from Continuous Computation Theory.
The second approach is to build defenses with tools coming from logic,
rewriting and, more generally, from Programming Theory.</p>
      <p>The activities of the CARTE team are organized around two
research actions:</p>
      <simplelist>
        <li id="uid4">
          <p noindent="true">Computation over Continuous Structures</p>
        </li>
        <li id="uid5">
          <p noindent="true">Computer Virology.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection id="uid6" level="1">
      <bodyTitle>Highlights of the Year</bodyTitle>
      <p>Our team made remarkable progress into the difference between
“real world” systems and artefacts due to exact (infinite) precision computations.
Olivier Bournez, Daniel Graça and Emmanuel Hainry succeeded in proving
an equivalence between robustness and computability: Robust dynamical
systems have computable dynamical properties <ref xlink:href="#carte-2013-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>,
a strong evidence that “real world” systems will not
exhibit undecidability properties.</p>
      <p>Another highlight of the year is a paper by Hugo Férée, Mathieu Hoyrup
and Walid Gomaa, accepted in LICS 2013 <ref xlink:href="#carte-2013-bid1" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> that provides a
systematic approach to define and analyse the complexity of algorithms
acting on infinite precision numbers (infinite words).</p>
    </subsection>
  </presentation>
  <fondements id="uid7">
    <bodyTitle>Research Program</bodyTitle>
    <subsection id="uid8" level="1">
      <bodyTitle>Computer Virology</bodyTitle>
      <p>From a historical point of view, the first official virus appeared in
1983 on Vax-PDP 11. At the very same time, a series of papers was
published which always remains a reference in computer virology: Thompson 
<ref xlink:href="#carte-2013-bid2" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Cohen  <ref xlink:href="#carte-2013-bid3" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> and
Adleman  <ref xlink:href="#carte-2013-bid4" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
The literature which explains and discusses practical issues is
quite extensive  <ref xlink:href="#carte-2013-bid5" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid6" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. However, there are only a few
theoretical/scientific studies, which attempt to give a model of
computer viruses.</p>
      <p>A virus is essentially a self-replicating program inside an
adversary environment. Self-replication has a solid background
based on works on fixed point in <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>λ</mi></math></formula>-calculus and on
studies of von Neumann <ref xlink:href="#carte-2013-bid7" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. More precisely we establish in  <ref xlink:href="#carte-2013-bid8" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>
that Kleene's second recursion theorem  <ref xlink:href="#carte-2013-bid9" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> is the
cornerstone from which viruses and infection scenarios can be defined
and classified. The bottom line of a virus
behavior is</p>
      <orderedlist>
        <li id="uid9">
          <p noindent="true">a virus infects programs by modifying them,</p>
        </li>
        <li id="uid10">
          <p noindent="true">a virus copies itself and can mutate,</p>
        </li>
        <li id="uid11">
          <p noindent="true">it spreads throughout a system.</p>
        </li>
      </orderedlist>
      <p>The above scientific foundation justifies our position to use
the word virus as a generic word for self-replicating
malwares. There is yet a difference. A malware has a
payload, and virus may not have one. For example, worms are an autonous
self-replicating malware and so fall into our definition. In
fact, the current malware taxonomy (virus, worms, trojans,
...) is unclear and subject to debate.
</p>
    </subsection>
    <subsection id="uid12" level="1">
      <bodyTitle>Computation over continuous structures</bodyTitle>
      <p>Classical recursion theory deals with computability over discrete structures (natural numbers, finite symbolic words). There is a growing community of researchers working on the extension of this theory to continuous structures arising in mathematics. One goal is to give foundations of numerical analysis, by studying the limitations of machines in terms of computability or complexity, when computing with real numbers. Classical questions are : if a function <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>:</mo><mi>ℝ</mi><mo>→</mo><mi>ℝ</mi></mrow></math></formula> is computable in some sense, are its roots computable? in which time? Another goal is to investigate the possibility of designing new computation paradigms, transcending the usual discrete-time, discrete-space computer model initiated by the Turing machine that is at the base of modern computers.</p>
      <p>While the notion of a computable function over discrete data is captured by the model of Turing machines, the situation is more delicate when the data are continuous, and several non-equivalent models exist. In this case, let us mention computable analysis, which relates computability to topology <ref xlink:href="#carte-2013-bid10" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid11" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>; the Blum-Shub-Smale model (BSS), where the real numbers are treated as elementary entities <ref xlink:href="#carte-2013-bid12" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>; the General Purpose Analog Computer (GPAC) introduced by Shannon <ref xlink:href="#carte-2013-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>with continuous time.</p>
    </subsection>
    <subsection id="uid13" level="1">
      <bodyTitle>Rewriting</bodyTitle>
      <p>The rewriting paradigm is
now widely used for specifying, modelizing, programming and proving.
It allows to easily express deduction systems in a declarative way,
and to express complex relations on infinite sets of states in a finite way,
provided they are countable.
Programming languages and environments with a rewriting
based semantics have been developed ; see <span class="smallcap" align="left">ASF+SDF</span>  <ref xlink:href="#carte-2013-bid14" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <span class="smallcap" align="left">Maude</span>  <ref xlink:href="#carte-2013-bid15" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>,
and <span class="smallcap" align="left">Tom</span>  <ref xlink:href="#carte-2013-bid16" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>For basic rewriting, many techniques have been developed to prove
properties of rewrite systems like confluence, completeness, consistency or various
notions of termination. Proof methods have
also been proposed for extensions of rewriting such as
equational extensions, consisting of rewriting modulo a set of axioms,
conditional extensions where rules are applied under
certain conditions only, typed extensions, where rules are applied only if there is
a type correspondence between the rule and the term to be rewritten, and constrained
extensions, where rules are enriched by formulas to be satisfied  <ref xlink:href="#carte-2013-bid17" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid18" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid19" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>An interesting aspect of the rewriting paradigm is that it allows automatable or
semi-automatable correctness proofs for systems or programs:
the properties of rewriting systems as those cited above are translatable
to the deduction systems or programs they formalize and the proof techniques
may directly apply to them.</p>
      <p>Another interesting aspect is that it allows characteristics or properties
of the modelled systems to be expressed as equational theorems, often automatically
provable using the rewriting mechanism itself or induction
techniques based on completion  <ref xlink:href="#carte-2013-bid20" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
Note that the rewriting and the completion mechanisms also enable
transformation and simplification of formal systems or programs.</p>
      <p>Applications of rewriting-based proofs to computer security are various.
Approaches using rule-based specifications have recently been proposed for detection of
computer viruses  <ref xlink:href="#carte-2013-bid21" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid22" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
For several years, in our team, we have also been working in this direction.
We already have proposed an approach using rewriting techniques to abstract program behaviors for detecting
suspicious or malicious programs  <ref xlink:href="#carte-2013-bid23" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
  </fondements>
  <domaine id="uid14">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection id="uid15" level="1">
      <bodyTitle>Computer Virology</bodyTitle>
      <subsection id="uid16" level="2">
        <bodyTitle>The theoretical track.</bodyTitle>
        <p>It is rightful to wonder why there is only a few fundamental studies on computer viruses while it is one of the
important ﬂaws in software engineering. The lack of theoretical studies explains maybe the weakness in the
anticipation of computer diseases and the difﬁculty to improve defenses. For these reasons, we do think that it
is worth exploring fundamental aspects, and in particular self-reproducing behaviors.</p>
      </subsection>
      <subsection id="uid17" level="2">
        <bodyTitle>The virus detection track</bodyTitle>
        <p>The crucial question is how to detect viruses or self-replicating malwares. Cohen demonstrated that this
question is undecidable. The anti-virus heuristics are based on two methods. The ﬁrst one consists in searching
for virus signatures. A signature is a regular expression, which identiﬁes a family of viruses. There are obvious
defects. For example, an unknown virus will not be detected, like ones related to a 0-day exploit. We strongly
suggest to have a look at the independent audit <ref xlink:href="#carte-2013-bid24" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> in order to understand the limits of this method. The
second one consists in analysing the behavior of a program by
monitoring it. Following <ref xlink:href="#carte-2013-bid25" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, this kind of
methods is not yet really implemented. Moreover, the large number of false-positive implies this is barely
usable. To end this short survey, intrusion detection encompasses virus detection. However, unlike computer
virology, which has a solid scientiﬁc foundation as we have seen, the IDS notion of “malwares” with respect
to some security policy is not well deﬁned. The interested reader may
consult <ref xlink:href="#carte-2013-bid26" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      </subsection>
      <subsection id="uid18" level="2">
        <bodyTitle>The virus protection track</bodyTitle>
        <p>The aim is to deﬁne security policies in order to prevent malware propagation. For this, we need (i) to deﬁne
what is a computer in different programming languages and setting, (ii) to take into consideration resources
like time and space. We think that formal methods like rewriting, type theory, logic, or formal languages,
should help to deﬁne the notion of a formal immune system, which deﬁnes a certiﬁed protection.</p>
      </subsection>
      <subsection id="uid19" level="2">
        <bodyTitle>The experimentation track</bodyTitle>
        <p>This study on computer virology leads us to propose and construct a “high security lab” in which experiments
can be done in respect with the French law. This project of “high security lab” in one of the main project of
the CPER 2007-2013.
</p>
      </subsection>
    </subsection>
    <subsection id="uid20" level="1">
      <bodyTitle>Computations and Dynamical Systems</bodyTitle>
      <subsection id="uid21" level="2">
        <bodyTitle>Continuous computation theories</bodyTitle>
        <p>Understanding computation theories for continuous systems leads to studying hardness of veriﬁcation and
control of these systems. This has been used to discuss problems in ﬁelds as diverse as veriﬁcation (see e.g.
  <ref xlink:href="#carte-2013-bid27" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>), control theory (see e.g. <ref xlink:href="#carte-2013-bid28" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>), neural
networks (see e.g. <ref xlink:href="#carte-2013-bid29" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>), and so on.
We are interested in the formal decidability of properties of
dynamical systems, such as reachability <ref xlink:href="#carte-2013-bid30" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>,
the Skolem-Pisot problem <ref xlink:href="#carte-2013-bid31" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, the computability of
the <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>ω</mi></math></formula>-limit set <ref xlink:href="#carte-2013-bid32" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. Those problems are analogous to
veriﬁcation of safety properties.
Contrary to computability theory, complexity theory over continuous spaces is underdeveloped and not
well understood. A central issue is the choice of the representation of objects by discrete data and its
effects on the induced complexity notions. As for computability, it is well known that a representation is
gauged by the topology it induces. However more structure is needed to capture the complexity notions:
topologically equivalent representations may induce different classes of polynomial-time computable objects,
e.g. Developing a sound complexity theory over continuous structures would enable us to make abstract
computability results more applicable by analysing the corresponding complexity issues. We think that the
preliminary step towards such a theory is the development of higher-order complexity, which we are currently
carrying out.
In contrast with the discrete setting, it is of utmost importance to compare the various models of computation
over the reals, as well as their associated complexity theories. In particular, we focus on the General Purpose
Analog Computer of Claude Shannon <ref xlink:href="#carte-2013-bid13" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, on recursive
analysis <ref xlink:href="#carte-2013-bid11" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, on the algebraic approach <ref xlink:href="#carte-2013-bid33" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> and on
computability in a probabilistic context <ref xlink:href="#carte-2013-bid34" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
A crucial point for future investigations is to ﬁll the gap between continuous and discrete computational
models. This is one deep motivation of our work on computation theories for continuous systems.</p>
      </subsection>
      <subsection id="uid22" level="2">
        <bodyTitle>Analysis and veriﬁcation of adversary systems</bodyTitle>
        <p>The other research direction on dynamical systems we are interested in is the study of properties of adversary
systems or programs, i.e. of systems whose behavior is unknown or indistinct, or which do not have classical
expected properties. We would like to offer proof and veriﬁcation tools, to guarantee the correctness of such
systems.
On one hand, we are interested in continuous and hybrid systems. In a mathematical sense, a hybrid system can
be seen as a dynamical system, whose transition function does not satisfy the classical regularity hypotheses,
like continuity, or continuity of its derivative. The properties to be veriﬁed are often expressed as reachability
properties. For example, a safety property is often equivalent to (non-)reachability of a subset of unsure states
from an initial conﬁguration, or to stability (with its numerous variants like asymptotic stability, local stability,
mortality, etc ...). Thus we will essentially focus on veriﬁcation of these properties in various classes of
dynamical systems.</p>
        <p>We are also interested in rewriting techniques, used to describe dynamic systems, in particular in the adversary
context. As they were initially developed in the context of automated deduction, the rewriting proof techniques,
although now numerous, are not yet adapted to the complex framework of modelization and programming. An
important stake in the domain is then to enrich them to provide realistic validation tools, both in providing
ﬁner rewriting formalisms and their associated proof techniques, and in developing new validation concepts
in the adversary case, i.e. when usual properties of the systems like, for example, termination are not veriﬁed.
For several years, we have been developing speciﬁc procedures for property proofs of rewriting, for the
sake of programming, in particular with an inductive technique, already applied with success to termination
under strategies <ref xlink:href="#carte-2013-bid35" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid36" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid37" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, to weak
termination <ref xlink:href="#carte-2013-bid38" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, sufﬁcient
completeness <ref xlink:href="#carte-2013-bid39" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> and probabilistic
termination <ref xlink:href="#carte-2013-bid40" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
The last three results take place in the context of adversary computations, since they allow for proving that
even a divergent program, in the sense where it does not terminate, can give the expected results.
A common mechanism has been extracted from the above works, providing a generic inductive proof
framework for properties of reduction relations, which can be parametrized by the property to be proved
<ref xlink:href="#carte-2013-bid41" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid42" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. Provided program code can be translated into rule-based speciﬁcations, this approach can be applied to
correctness proof of software in a larger context.
A crucial element of safety and security of software systems is the problem of resources. We are working in
the ﬁeld of Implicit Computational Complexity. Interpretation based methods like Quasi-interpretations (QI)
or sup-interpretations, are the approach we have been developing these last years
<ref xlink:href="#carte-2013-bid43" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid44" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid45" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.
Implicit complexity is an approach to the analysis of the resources that are used by a program. Its tools come
essentially from proof theory. The aim is to compile a program while certifying its complexity.
</p>
      </subsection>
    </subsection>
  </domaine>
  <logiciels id="uid23">
    <bodyTitle>Software and Platforms</bodyTitle>
    <subsection id="uid24" level="1">
      <bodyTitle>Morphus/MMDEX</bodyTitle>
      <p>MMDEX is a virus detector based on morphological analysis. It is composed of
our own disassembler tool, on a graph transformer and a specific tree-automaton
implementation. The tool is used in the EU-Fiware project and by some other
partners (e.g. DAVFI project).</p>
      <p noindent="true">Written in C, 20k lines.</p>
      <p noindent="true">APP License, IDDN.FR.001.300033.000.R.P.2009.000.10000, 2009.
</p>
    </subsection>
    <subsection id="uid25" level="1">
      <bodyTitle>TraceSurfer</bodyTitle>
      <p>TraceSurfer is a self-modifying code analyzer coming with an IDA add-on. It works as a wave-builder. In the analysis of self-modifying programs, one basic task is indeed
to separate parts of the code which are self-modifying into successive layers, called waves. TraceSurfer extracts waves from traces of program executions.
Doing so drastically simplifies program verification.</p>
      <p noindent="true">Written in C, 5k lines.</p>
      <p noindent="true">
        <ref xlink:href="http://code.google.com/p/tartetatintools/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>code.<allowbreak/>google.<allowbreak/>com/<allowbreak/>p/<allowbreak/>tartetatintools/</ref>
      </p>
    </subsection>
    <subsection id="uid26" level="1">
      <bodyTitle>CROCUS</bodyTitle>
      <p>CROCUS is a program interpretation synthetizer. Given a first order program (possibly written in OCAML), it outputs a quasi-interpretation based on max, addition and product. It is based on a random algorithm. The interpretation is actually a certificate for the program's complexity. Users are non academics (some artists).</p>
      <p noindent="true">Written in Java, 5k lines.</p>
      <p noindent="true"/>
    </subsection>
  </logiciels>
  <resultats id="uid27">
    <bodyTitle>New Results</bodyTitle>
    <subsection id="uid28" level="1">
      <bodyTitle>Computation and Dynamical Systems</bodyTitle>
      <p>In <ref xlink:href="#carte-2013-bid0" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, we analyzed the power of dynamical
system that are robust to infinitesimal perturbations. While previous
works on this question were limited to very specific kinds of systems
such as piecewise constant derivative systems, we obtained results for a
quite general class of systems: the main hypothesis being smoothness
(which is already a prerequisite in systems that perform analog
computation). We show that if a system is robust, then the language it
recognizes is computable, and the converse: all computable languages can
be recognized by a robust smooth system. Those results are true for
discrete-time as well as continuous-time dynamical systems on bounded or
unbounded domains.</p>
      <p>We investigated in
<ref xlink:href="#carte-2013-bid46" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid47" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid48" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>
the isomorphism (conjugacy) problem for dynamical systems.
While the decidability in the one-dimensional case is a long-standing
open problem, we characterize its exact complexity
<ref xlink:href="#carte-2013-bid46" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> in higher dimensions. Our result suggest
that the isomorphism problem is easier than the factoring and embedding
problem (decide if one dynamical system is a subsystem of another).
A traditional approach to prove two dynamical systems are not
isomorphic is to prove that they have different dynamical invariants.
We characterised in terms of complexity and computability classes
different well known dynamic invariants (periodic points, Turing
degrees) in <ref xlink:href="#carte-2013-bid46" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, <ref xlink:href="#carte-2013-bid48" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      <p>While Turing machines are usually used for computing, it is an
interesting model of dynamical systems, which looks very much like
two-dimensional piecewise-affine maps.
We investigated dynmacial invariants (entropy and Lyapunov exponents)
for Turing machines, and proved quite surprisingly that they are
computable. Essentially this means that Turing machines that do
interesting computations must do it so slowly that this cannot be seen
in their dynamics. This work will be presented in STACS 2014</p>
    </subsection>
    <subsection id="uid29" level="1">
      <bodyTitle>Computability, Complexity and Topology</bodyTitle>
      <subsection id="uid30" level="2">
        <bodyTitle>Complexity of real functionals</bodyTitle>
        <p>Computability and topology are closely related as computability assumptions impose topological restrictions: on a topological
space, computable functions are continuous and continuous functions are computable relative to some oracle. In the same way,
complexity assumptions as bounds on the computation time impose analytical restrictions, but in a way that is not understood yet.
For functions from the real numbers to the real numbers, it is known that polynomial-time computable functions correspond to
functions with a polynomial modulus of continuity. However for functions on other spaces no such correspondence is known. We
investigate the particular case of norms on the space of continuous real functions defined on the unit interval. We introduce
analytical characteristics of a norm, namely its dependency on points and the concept of <i>relevant points</i>, and use them to characterize the
polynomial-time computable norms. This work was presented at LICS 2013 <ref xlink:href="#carte-2013-bid1" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. A full version including other
results on non-deterministic complexity classes is currently submitted <ref xlink:href="#carte-2013-bid49" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      </subsection>
      <subsection id="uid31" level="2">
        <bodyTitle>Higher-order complexity</bodyTitle>
        <p>While computability theory is well-developed and understood on large classes of topological spaces, complexity theory in analysis
is still in its infancy. We argue that the usual way of representing mathematical objects by functions from finite strings to
finite strings (order 1 functions) is not appropriate for general spaces. We show that as soon as the space becomes large in a
topological sense, it cannot be represented by order 1 functions in a way that respects complexity notions, so we propose to
represent objects using higher order functions over finite strings. However higher order complexity theory is not
well-understood. The only known class to date is BFF, the class of Basic Feasible Functionals, which does not enjoy nice
properties: some intuitively feasible functionals do not belong to the class. We develop a new way of carrying out complexity
theory at higher order types, using an adaptation of game semantics. A preliminary version of this work was presented at CCA 2013
<ref xlink:href="#carte-2013-bid50" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      </subsection>
      <subsection id="uid32" level="2">
        <bodyTitle>Irreversible computable functions</bodyTitle>
        <p>As mentioned before, computable functions must be continuous. It gives a simple way of proving that some operator is not
computable by showing that it is discontinuous. We recall that a function <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>f</mi></math></formula> is computable if there is a <i>single</i> oracle
Turing machine M that on each <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>x</mi></math></formula> given by an oracle, computes <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mi>x</mi><mo>)</mo></mrow></math></formula>. The following weaker notion is also interesting: a
function <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>f</mi></math></formula> <i>preserves computability</i> if for each computable <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>x</mi></math></formula>, <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>f</mi><mo>(</mo><mi>x</mi><mo>)</mo></mrow></math></formula> is computable. Preservation of computability no
more implies continuity, so there is no topological argument to show that some operator does not preserve computability. We
develop a strong notion of discontinuity and prove a general result stating that this notion of discontinuity prevents
preservation of computability. We apply this result to solve an open problem about the non-computability of the ergodic
decomposition. We show that many classical constructions in computability theory are instances of our result. Hence we exhibit
deeper connections between computability and topology. The work has been accepted at STACS 2014 <ref xlink:href="#carte-2013-bid51" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. A
partial result was published in <ref xlink:href="#carte-2013-bid52" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
      </subsection>
    </subsection>
    <subsection id="uid33" level="1">
      <bodyTitle>Implicit Computational Complexity</bodyTitle>
      <p>In the setting of non-interference and implicit computational
complexity, Emmanuel Hainry, Jean-Yves Marion, and Romain Péchoux
presented a characterization of FPSPACE in a language with a fork/wait
mechanism <ref xlink:href="#carte-2013-bid53" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. The language used in this work
is a classical imperative language with while loops complemented with a
mechanism to launch new processes through forks. The fork instruction is
heavily inspired by C's fork/wait construction for Unix operating
systems, which anchors this work in a down-to-earth setting. Using a
type system that enforces a data-ramification on variables, they show that
all programs that can be typed and are terminating compute an FPSPACE
function, that with a natural evaluation strategy, they indeed use only
polynomial space, and conversely that this type system is complete as
all FPSPACE functions can be implemented in this language in a typable way.</p>
      <p>Emmanuel Hainry and Romain Péchoux also used data-ramification combined
with non-interference principles to effectively bound the memory used by
object oriented languages in <ref xlink:href="#carte-2013-bid54" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>. This work
introduces a type system for an object oriented language (derived from
java). This type system allows to compute polynomial bounds on the heap
and stack used by a typable program, ensuring that if the program halts,
it will only use memory under this explicit bound. As the typing
procedure is doable in time polynomial in the size of the program, those
bounds are easy to obtain, though not tight. Interesting features of
this work include inheritance (with overloading and overriding) and,
the ability to analyze programs with flow statements controled by objects,
contrary to most other works in implicit computational complexity.
In <ref xlink:href="#carte-2013-bid55" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, Romain Péchoux has shown that the notion
of (polynomial) interpretation over term rewrite systems can be adapated
on a process language, a variant of the pi-calculus with process recursive
definitions. This work shows that the order induced by simulation can be used
wrt a given process semantics to infer time and space upper bounds on process
resource usage (reduction length, size of sent values, ...).</p>
    </subsection>
    <subsection id="uid34" level="1">
      <bodyTitle>Computer Virology</bodyTitle>
      <p>The study on behavioural malware detection has been continued.
Guillaume Bonfante, Isabelle Gnaedig and Jean-Yves Marion have been developing an approach detecting
suspicious schemes on an abstract representation of the behavior of a program, by
abstracting program traces, rewriting given subtraces into abstract symbols representing their functionality. Considering
abstract behaviors allows us to be implementation-independent and robust to variants and mutations of malware.
Suspicious behaviors are then detected by comparing trace abstractions to reference malicious behaviors.</p>
      <p>Model checking is a strong point of our approach: the predefined
behavior patterns, used to abstract program traces, are defined by first order temporal logic formulas, as well as the reference suspicious behaviors, given in a signature. The infection
problem can then be seen as the satisfaction problem of the formula of the signature by an abstracted trace of the program, which
can be checked using existing model checking techniques</p>
      <p>The previous work by the team involved abstracting trace automata by rewriting them with respect to a set of predefined behavior patterns
defined as a regular language described by a string rewriting system  <ref xlink:href="#carte-2013-bid23" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, and then, by a
term rewriting system  <ref xlink:href="#carte-2013-bid56" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>, which allows to
detect information leak.</p>
      <p>This work has been finished this year by designing a probabilistic generalization of our approach.
Introducing probabilities in our technique allows to express a pertinence degree of detection when analysis of the program
results in an incomplete or uncertain program dataflow, or when abstraction cannot be performed reliably.
Proposing malware detection with a probabilistic rate is finer and more realistic in practice than giving the binary answer of
whether a program is infected or not.</p>
      <p>Using a tropical semiring over the reals, they have presented a formalism relying on a weighted term rewriting mechanism, where a
weight <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>w</mi></math></formula>, naturally associated to a probability <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>p</mi></math></formula> by the formula: <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mrow><mi>w</mi><mo>=</mo><mi>−</mi><mi>l</mi><mi>o</mi><mi>g</mi><mo>(</mo><mi>p</mi><mo>)</mo></mrow></math></formula>, represents the probability that the
realized abstraction be right.</p>
      <p>Detection of an abstract behavior has then be defined with respect to a threshold, and a program <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>P</mi></math></formula> exhibits an abstract behavior
<formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>M</mi></math></formula> if and only if one of its traces admits an abstract form realizing <formula type="inline"><math xmlns="http://www.w3.org/1998/Math/MathML" overflow="scroll"><mi>M</mi></math></formula> with a weight not exceeding this threshold.</p>
      <p>The weighted abstraction formalism has the advantage of providing a detection algorithm with the same complexity as
in the unweighted case, that is linear in the size of the trace automaton <ref xlink:href="#carte-2013-bid57" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/>.</p>
    </subsection>
    <subsection id="uid35" level="1">
      <bodyTitle>Graph rewriting</bodyTitle>
      <p>Guillaume Bonfante and Bruno Guillaume provide a new graph rewriting
framework adapted to Natural Language Processing. It involves a new
form of edge transformation. A new termination technique is also
described. The extended paper <ref xlink:href="#carte-2013-bid58" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> is accepted for publication in
Mathematical Structure in Computer Science.
</p>
    </subsection>
  </resultats>
  <contrats id="uid36">
    <bodyTitle>Bilateral Contracts and Grants with Industry</bodyTitle>
    <subsection id="uid37" level="1">
      <bodyTitle>Bilateral Contracts with Industry</bodyTitle>
      <p>We are currently working with the consortium “malware.lu”.
</p>
    </subsection>
  </contrats>
  <partenariat id="uid38">
    <bodyTitle>Partnerships and Cooperations</bodyTitle>
    <subsection id="uid39" level="1">
      <bodyTitle>National Initiatives</bodyTitle>
      <subsection id="uid40" level="2">
        <bodyTitle>ANR</bodyTitle>
        <simplelist>
          <li id="uid41">
            <p noindent="true">The team was a funding parter in ANR Complice (Implicit Computational Complexity, Concurrency and Extraction), ref.:
ANR-08-BLANC-0211-01, that ended in april 2013 and whose aim was to extend the results of ICC to other paradigms (process
languages, ...) and take benefice of proof extraction techniques in order to synthesize resoure certificates. This ANR
should be followed by a new ANR submission (ANR Elica proposal) involving Paris 7 PPS team, Paris 13 LCC team, ENS Lyon Plume team and Bologna Inria team Focus.</p>
          </li>
          <li id="uid42">
            <p noindent="true">The team is a funding parter in ANR Binsec, whose aim is to fill part of the gap between formal methods over executable code on one side, and binary-level security analyses currently used in the security industry.
Two main applicative domains are targeted: vulnerability analysis and virus detection. Two other closely related applications will also be investigated: crash analysis and program deobfuscation.</p>
          </li>
          <li id="uid43">
            <p noindent="true">Emmanuel Jeandel is a member of ANR Blanche ANR-09-BLAN-0164 (EMC: <i>Emerging
Phenomena in Computation Models</i>), that ended in April 2013.</p>
          </li>
        </simplelist>
      </subsection>
      <subsection id="uid44" level="2">
        <bodyTitle>PEPS</bodyTitle>
        <simplelist>
          <li id="uid45">
            <p noindent="true">Simon Perdrix is a member of a PEPS INS2I “Information et
Communication Quantique: Cryptographie et Calcul Quantiques
Distribués.“ with partners in Telecom ParisTech and other labs.</p>
          </li>
          <li id="uid46">
            <p noindent="true">Mathieu Hoyrup is principal investigator of a PEPS INS2I “Approches Topologiques de l'Information et de la Calculabilité”, with Emmanuel Jeandel and Laurent Bienvenu (CNRS, LIAFA).</p>
          </li>
        </simplelist>
      </subsection>
    </subsection>
    <subsection id="uid47" level="1">
      <bodyTitle>European Initiatives</bodyTitle>
      <subsection id="uid48" level="2">
        <bodyTitle>FP7 Projects</bodyTitle>
        <subsection id="uid49" level="3">
          <bodyTitle>FI-WARE</bodyTitle>
          <sanspuceslist>
            <li id="uid50">
              <p noindent="true">Title: Morphus</p>
            </li>
            <li id="uid51">
              <p noindent="true">Type: COOPERATION</p>
            </li>
            <li id="uid52">
              <p noindent="true">Defi: PPP FI: Technology Foundation: Future Internet Core Platform</p>
            </li>
            <li id="uid53">
              <p noindent="true">Instrument: Integrated Project (IP)</p>
            </li>
            <li id="uid54">
              <p noindent="true">Objectif: PPP FI: Technology Foundation:Future Internet Core Platform</p>
            </li>
            <li id="uid55">
              <p noindent="true">Duration: September 2011 - May 2014</p>
            </li>
            <li id="uid56">
              <p noindent="true">Coordinator: Telefonica (Spain)</p>
            </li>
            <li id="uid57">
              <p noindent="true">Other Partners: Thales, SAP, Inria</p>
            </li>
            <li id="uid58">
              <p noindent="true">Inria contact: Olivier Festor</p>
            </li>
            <li id="uid59">
              <p noindent="true">Abstract: See also: <ref xlink:href="http://www.fi-ware.eu/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>www.<allowbreak/>fi-ware.<allowbreak/>eu/</ref>.
FI-WARE will deliver a novel service infrastructure, building upon
elements (called Generic Enablers) which offer reusable and
commonly shared functions making it easier to develop Future
Internet Applications in multiple sectors. This infrastructure will
bring significant and quantifiable improvements in the performance,
reliability and production costs linked to Internet Applications
for building a true foundation for the Future Internet.</p>
            </li>
          </sanspuceslist>
        </subsection>
      </subsection>
    </subsection>
    <subsection id="uid60" level="1">
      <bodyTitle>International Initiatives</bodyTitle>
      <subsection id="uid61" level="2">
        <bodyTitle>Inria International Partners</bodyTitle>
        <subsection id="uid62" level="3">
          <bodyTitle>Informal International Partners</bodyTitle>
          <p>The team has an informal partnership with Pr. James Royer (University of Syracuse) and PhD. Norman Danner (Wesleyan
University) on the study of program higher order complexity (an Inria associated team proposal has been submitted on this
domain). On the Implicit Computational Complexity part, the team has strong contacts with Universita di Torino (Pr Simona Ronchi Della Rocca), Dundee University(PhD
Marco Gaboardi), Universita di Bologna (Pr Simone Martini and PhD Ugo Dal Lago).</p>
        </subsection>
      </subsection>
    </subsection>
    <subsection id="uid63" level="1">
      <bodyTitle>International Research Visitors</bodyTitle>
      <subsection id="uid64" level="2">
        <bodyTitle>Visits of International Scientists</bodyTitle>
        <p>Subramanian Kumbakonam Govindarajan, professor in Universiti Sains
Malaysia, was visiting Carte team in february. He works on computational
models and Parikh matrices.</p>
        <p>Neil Jones, professor in the University of Copenhagen, visited Carte
team for one month in March. He is currently working on program
transformation and program obfuscation, which have obvious
applications to Computer Virology.</p>
      </subsection>
      <subsection id="uid65" level="2">
        <bodyTitle>Visits to International Teams</bodyTitle>
        <p>Mathieu Hoyrup visited Universidad Andres Bello in Santiago de Chile
during february. He worked there with Cristobal Rojas on extending the results <ref xlink:href="#carte-2013-bid51" location="biblio" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest"/> from functions to
relations.</p>
      </subsection>
    </subsection>
  </partenariat>
  <diffusion id="uid66">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection id="uid67" level="1">
      <bodyTitle>Scientific Animation</bodyTitle>
      <subsection id="uid68" level="2">
        <bodyTitle>Conference organization and program committee</bodyTitle>
        <p>Mathieu Hoyrup was in the Program Committee of
<ref xlink:href="http://ccr2013.mccme.ru/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Computability, Complexity and Randomness (CCA) 2013</ref>.
He is guest editor for the post-proceedings of CCA 2013, special issue of Logical Methods in Computer Science.
He has been invited to organize the special session <ref xlink:href="http://cie2013.disco.unimib.it/special-sessions/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Algorithmic Randomness</ref> of the conference Computability in Europe (CiE) 2013.</p>
        <p>Simon Perdrix is a member of the Program Committee of the first
Workshop on <ref xlink:href="https://sites.google.com/site/parallelqc/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Parallel
Quantum Computing (ParQ)</ref>.</p>
        <p>Guillaume Bonfante was in the Program Committee of
<ref xlink:href="http://isiom.wssrl.org/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Malware 2013</ref> and
<ref xlink:href="http://conferences.telecom-bretagne.eu/fps/2013/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Symposium on Foundations &amp; Practice of Security (FPS) 2013</ref>.</p>
        <p>The Carte Team has organized a few conferences and workshops in Nancy this year:</p>
        <simplelist>
          <li id="uid69">
            <p noindent="true"><ref xlink:href="http://www.loria.fr/~hoyrup/Computability/home.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Journées Calculabilités 2013</ref>, April</p>
          </li>
          <li id="uid70">
            <p noindent="true"><ref xlink:href="http://www.loria.fr/~hoyrup/ARA/ARAhome.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Analysis, Randomness and Applications (ARA) 2013</ref>, June.</p>
          </li>
          <li id="uid71">
            <p noindent="true"><ref xlink:href="http://cca-net.de/cca2013/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Computability and Complexity in Analysis (CCA) 2013</ref>, July.</p>
          </li>
          <li id="uid72">
            <p noindent="true"><ref xlink:href="http://www.loria.fr/~sperdrix/JIQ13.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Journées Informatique Quantique</ref>, October.</p>
          </li>
        </simplelist>
      </subsection>
      <subsection id="uid73" level="2">
        <bodyTitle>Talks</bodyTitle>
        <p>Emmanuel Jeandel gave an invited Talk at the conference
(<ref xlink:href="http://ccr2013.mccme.ru/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">Computability, Complexity and Randomness (CCR) 2013</ref>) on entropy of Turing machines.
He also presented his work on multidimensional symbolic dynamics in
the <ref xlink:href="http://www.pims.math.ca/scientific-event/130603-atsdw" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">PIMS
Workshop on Automata Theory and Symbolic Dynamics</ref>.</p>
        <p>Guillaume Bonfante was invited to present his work to workshop “Proof
Theory and Rewriting” (Kanazawa, february) and “Journées Francophones
d'Investigation Numérique” (Neuchâtel, october).</p>
        <p>Guillaume Bonfante, Hugo Férée and Jean-Yves Marion were invited to
workshop “Advances in implicit computational complexity” in Shonan
Village in november.</p>
        <p>Mathieu Hoyrup, Emmanuel Hainry, Emmanuel Jeandel, were invited to
present their work to
(<ref xlink:href="http://perso.ens-lyon.fr/nathalie.aubrun/DySyCo.html" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">workshop
DySyCo</ref>) in Lyon,
december 2013.</p>
        <p>Emmanuel Hainry presented <i>Complexité d'ordre supérieur, de
l'Analyse Récursive aux Basic Feasible Functionals</i> at the Séminaire
d'algorithmique et de complexité du plateau de Saclay
(<ref xlink:href="http://www.lix.polytechnique.fr/~bodirsky/seminaire/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>www.<allowbreak/>lix.<allowbreak/>polytechnique.<allowbreak/>fr/<allowbreak/>~bodirsky/<allowbreak/>seminaire/</ref>) in LIX,
Palaiseau in June 2013.</p>
      </subsection>
      <subsection id="uid74" level="2">
        <bodyTitle>Referees</bodyTitle>
        <p>Emmanuel Hainry reviewed articles for the journal <i>Computability</i>, for
<i>SIAM Journal on Computing</i>, and for the <i>STACS 2014</i> conference.</p>
        <p>Emmanuel Jeandel reviewed articles for the <i>LICS 2013</i> and the
<i>STACS 2014</i> conference.</p>
        <p>Romain Péchoux reviewed articles for the <i>WORDS 2013</i> conference</p>
        <p>Mathieu Hoyrup reviewed articles for the CiE 2013, STACS 2014, STOC
2014 conferences and the journals Logical Methods in Computer Science
and Theory of Computing Systems.</p>
      </subsection>
      <subsection id="uid75" level="2">
        <bodyTitle>Others</bodyTitle>
        <p>Isabelle Gnaedig is member of the scientific mediation committee of
Inria Nancy Grand-Est and researcher social referee at Inria Nancy-Grand Est.</p>
      </subsection>
    </subsection>
    <subsection id="uid76" level="1">
      <bodyTitle>Teaching - Supervision - Juries</bodyTitle>
      <subsection id="uid77" level="2">
        <bodyTitle>Teaching</bodyTitle>
        <p>Unless specified otherwise, all teaching is done at Université de
Lorraine, France.</p>
        <sanspuceslist>
          <li id="uid78">
            <p noindent="true">Licence :</p>
            <simplelist>
              <li id="uid79">
                <p noindent="true">Guillaume Bonfante</p>
                <simplelist>
                  <li id="uid80">
                    <p noindent="true">Java, L3, Mines Nancy</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid81">
                <p noindent="true">Emmanuel Hainry</p>
                <simplelist>
                  <li id="uid82">
                    <p noindent="true">Operating Systems, 60 hours, L1, IUT Nancy Brabois</p>
                  </li>
                  <li id="uid83">
                    <p noindent="true">Algorithms and Programs, 60 hours, L1, IUT Nancy Brabois</p>
                  </li>
                  <li id="uid84">
                    <p noindent="true">Object Oriented Programming, 24 hours, L1, IUT Nancy Brabois</p>
                  </li>
                  <li id="uid85">
                    <p noindent="true">Databases, 24 hours, L2, IUT Nancy Brabois</p>
                  </li>
                  <li id="uid86">
                    <p noindent="true">Complexity, 28 hours, L1, IUT Nancy Brabois</p>
                  </li>
                  <li id="uid87">
                    <p noindent="true">Algorithmics, 12 hours, DU PFST (eq. L1), IUT Nancy Brabois</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid88">
                <p noindent="true">Emmanuel Jeandel</p>
                <simplelist>
                  <li id="uid89">
                    <p noindent="true">Statistics for Computer Science, 46 hours,
L3 Informatique</p>
                  </li>
                  <li id="uid90">
                    <p noindent="true">Linear Programming, 46 hours,
L3 Informatique</p>
                  </li>
                  <li id="uid91">
                    <p noindent="true">Algorithmics and Programming 1, 60 hours, L1 Maths-Info</p>
                  </li>
                  <li id="uid92">
                    <p noindent="true">Algorithmics and Programming 4, 30 hours, L3 Informatique</p>
                  </li>
                  <li id="uid93">
                    <p noindent="true">Networking, 20 hours, L2 and L3 Informatique</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid94">
                <p noindent="true">Romain Péchoux</p>
                <simplelist>
                  <li id="uid95">
                    <p noindent="true">Introduction to OO programming, 55 hours, L3
MIASHS parcours MIAGE.</p>
                  </li>
                  <li id="uid96">
                    <p noindent="true">Databases, 42 hours, L3 SG, ISAM-IAE</p>
                  </li>
                  <li id="uid97">
                    <p noindent="true">Propositional logic, 35 hours, L1 MIASHS</p>
                  </li>
                  <li id="uid98">
                    <p noindent="true">Algorithmic complexity, 30 hours, L3 MIASHS parcours MIAGE, IGA Casablanca, Marocco.</p>
                  </li>
                </simplelist>
              </li>
            </simplelist>
          </li>
          <li id="uid99">
            <p noindent="true">Master</p>
            <simplelist>
              <li id="uid100">
                <p noindent="true">Guillaume Bonfante</p>
                <simplelist>
                  <li id="uid101">
                    <p noindent="true">Modelling and UML, M1, Mines Nancy</p>
                  </li>
                  <li id="uid102">
                    <p noindent="true">Video Games, M1, Mines Nancy</p>
                  </li>
                  <li id="uid103">
                    <p noindent="true">Semantics, M1, Mines Nancy</p>
                  </li>
                  <li id="uid104">
                    <p noindent="true">Safety of Software, M2, Mines Nancy</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid105">
                <p noindent="true">Isabelle Gnaedig</p>
                <simplelist>
                  <li id="uid106">
                    <p noindent="true">Design of Safe Software, Coordination of the module, M2, Telecom-Nancy</p>
                  </li>
                  <li id="uid107">
                    <p noindent="true">Rule-based Programming, 20 hours, M2, Telecom-Nancy</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid108">
                <p noindent="true">Emmanuel Jeandel</p>
                <simplelist>
                  <li id="uid109">
                    <p noindent="true">Algorithmics and Complexity, M1 Informatique and M1 ENSEM, 60 hours</p>
                  </li>
                  <li id="uid110">
                    <p noindent="true">Combinatorial Optimization, M1 Informatique, 30 hours.</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid111">
                <p noindent="true">Romain Péchoux</p>
                <simplelist>
                  <li id="uid112">
                    <p noindent="true">Mathematics for computer science, 20 hours, M1 SC</p>
                  </li>
                  <li id="uid113">
                    <p noindent="true">Advanced Java, 52 hours, M1 MIAGE</p>
                  </li>
                </simplelist>
              </li>
              <li id="uid114">
                <p noindent="true">Simon Perdrix</p>
                <simplelist>
                  <li id="uid115">
                    <p noindent="true">Pépites Algorithmiques — Informatique Quantique, 14 hours, M1/M2, Ecole des Mines de Nancy.</p>
                  </li>
                </simplelist>
              </li>
            </simplelist>
          </li>
        </sanspuceslist>
      </subsection>
      <subsection id="uid116" level="2">
        <bodyTitle>Supervision</bodyTitle>
        <sanspuceslist>
          <li id="uid117">
            <p noindent="true">PhD : Joan Calvet, Analyse Dynamique de Logiciels
Malveillants, Université de Lorraine and Ecole
Polytechnique de Montreal, defended August 23rd, supervised by Jean-Yves Marion
and José M. Fernandez.</p>
          </li>
          <li id="uid118">
            <p noindent="true">PhD in progress: David Cattanéo, Combinatorial Modelization in Quantum Computation and Generalized Cover Problems, started sept. 2012, Pablo Arrighi (director), Simon Perdrix (co-advisor)</p>
          </li>
          <li id="uid119">
            <p noindent="true">PhD in progress: Hugo Férée, Computational Complexity in Analysis, defense planned in December 2014, Jean-Yves Marion (director) and Mathieu Hoyrup (co-advisor).</p>
          </li>
          <li id="uid120">
            <p noindent="true">PhD in progress: Hubert Godfroy, Semantics of Self-modifying Programs, Jean-Yves Marion</p>
          </li>
          <li id="uid121">
            <p noindent="true">PhD in progress: Jérôme Javelle , Quantum Cryptography: Protocols and Graphs, started Jan. 2011, Pablo Arrighi (director), Mehdi Mhalla (co-advisor), Simon Perdrix (co-advisor)</p>
          </li>
          <li id="uid122">
            <p noindent="true">PhD in progress: Thanh Dinh Ta, Malware Algebraic Modeling and Detection, started Sept. 2010, Jean-Yves Marion (director) and Guillaume Bonfante (co-advisor)</p>
          </li>
          <li id="uid123">
            <p noindent="true">PhD in progress: Aurélien Thierry, Morphological Analysis of Malware, started Oct. 2011 supervised by Jean-Yves Marion.</p>
          </li>
        </sanspuceslist>
      </subsection>
      <subsection id="uid124" level="2">
        <bodyTitle>Juries</bodyTitle>
        <p>Isabelle Gnaedig:</p>
        <simplelist>
          <li id="uid125">
            <p noindent="true">participation to the Telecom-Nancy admission committee.</p>
          </li>
        </simplelist>
        <p>Emmanuel Jeandel</p>
        <simplelist>
          <li id="uid126">
            <p noindent="true">Selection committee for a research assistant position in Nice (MCF 1114).</p>
          </li>
          <li id="uid127">
            <p noindent="true">Jury of Razvan Barbulescu's PhD Defense on “Algorithmes de
logarithmes discrets dans les corps ﬁnis”, defended in Université
de Lorraine, December 5th.</p>
          </li>
        </simplelist>
      </subsection>
    </subsection>
    <subsection id="uid128" level="1">
      <bodyTitle>Popularization</bodyTitle>
      <p>Isabelle Gnaedig is member of the scientific vulgarization committee of
Inria Nancy Grand-Est. This committee is a choice and guidance
instance helping the direction of the center and the person in charge
of popularization events, to elaborate a strategy, to
realize events and to help researchers to get involved in various
actions aiming at popularizing our research themes, and more generally
computer science and mathematics.</p>
      <p>This year, in particular, the center participated to organization of mathematics competitions and
projects for high school students, to conferences for computer science
high school teachers, to the “Fête de la Science”, to
the "Moments d'invention" exhibition of the “Nancy Renaissance”
event, and received several high school classes in various research
teams of Inria Nancy Grand-Est.
Details can be found at
<ref xlink:href="https://iww.inria.fr/NanSciNum/#.UsGBEWTuKY8" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">https://<allowbreak/>iww.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>NanSciNum/<allowbreak/>#.<allowbreak/>UsGBEWTuKY8</ref>.</p>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    
    <biblStruct id="carte-2013-bid68" type="article" rend="refer" n="refercite:bonfante:2011:hal-00591862:1">
      <identifiant type="doi" value="10.1016/j.tcs.2011.02.007"/>
      <identifiant type="hal" value="hal-00591862"/>
      <analytic>
        <title level="a">Quasi-interpretations a way to control resources</title>
        <author>
          <persName key="calligramme-2005-id18205">
            <foreName>Guillaume</foreName>
            <surname>Bonfante</surname>
            <initial>G.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="calligramme-2005-id18246">
            <foreName>Jean-Yves</foreName>
            <surname>Moyen</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes">
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">412</biblScope>
          <biblScope type="number">25</biblScope>
          <dateStruct>
            <month>May</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">2776-2796</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00591862/en" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00591862/<allowbreak/>en</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid76" type="article" rend="refer" n="refercite:bournez:hal-00861041">
      <identifiant type="doi" value="10.1016/j.jcss.2013.01.025"/>
      <identifiant type="hal" value="hal-00861041"/>
      <analytic>
        <title level="a">Computation with perturbed dynamical systems</title>
        <author>
          <persName key="protheo-2005-id18131">
            <foreName>Olivier</foreName>
            <surname>Bournez</surname>
            <initial>O.</initial>
          </persName>
          <persName key="protheo-2005-id18590">
            <foreName>Daniel</foreName>
            <surname>Graça</surname>
            <initial>D.</initial>
          </persName>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes">
        <title level="j">Journal of Computer and System Sciences</title>
        <imprint>
          <biblScope type="volume">79</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month>August</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">714-724</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00861041" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00861041</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid74" type="inproceedings" rend="refer" n="refercite:feree:2010:inria-00518381:1">
      <analytic>
        <title level="a">Interpretation of stream programs: characterizing type 2 polynomial time complexity</title>
        <author>
          <persName key="carte-2010-id59800">
            <foreName>Hugo</foreName>
            <surname>Férée</surname>
            <initial>H.</initial>
          </persName>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">21st International Symposium on Algorithms and Computation - ISAAC 2010</title>
        <loc>Corée, République De Jeju Island</loc>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>Dec</month>
            <year>2010</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/inria-00518381" type="hal" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00518381</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid77" type="inproceedings" rend="refer" n="refercite:feree:hal-00773653">
      <identifiant type="doi" value="10.1109/LICS.2013.15"/>
      <identifiant type="hal" value="hal-00773653"/>
      <analytic>
        <title level="a">On the query complexity of real functionals</title>
        <author>
          <persName key="carte-2010-id59800">
            <foreName>Hugo</foreName>
            <surname>Férée</surname>
            <initial>H.</initial>
          </persName>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
          <persName key="carte-2008-id18404">
            <foreName>Walid</foreName>
            <surname>Gomaa</surname>
            <initial>W.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">LICS - 28th ACM/IEEE Symposium on Logic in Computer Science</title>
        <loc>New Orleans, United States</loc>
        <imprint>
          <dateStruct>
            <month>January</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">103-112</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00773653" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00773653</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid69" type="article" rend="refer" n="refercite:gnaedig:2011:inria-00592271:1">
      <identifiant type="doi" value="10.1016/j.tcs.2011.04.028"/>
      <identifiant type="hal" value="inria-00592271"/>
      <analytic>
        <title level="a">Proving Weak Properties of Rewriting</title>
        <author>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes">
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">412</biblScope>
          <dateStruct>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">4405-4438</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00592271/en" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00592271/<allowbreak/>en</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid72" type="inproceedings" rend="refer" n="refercite:hainry:hal-00755450">
      <identifiant type="doi" value="10.1007/978-3-642-37075-5_20"/>
      <identifiant type="hal" value="hal-00755450"/>
      <analytic>
        <title level="a">Type-based complexity analysis for fork processes</title>
        <author>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName key="parsifal-2006-id18343">
            <foreName>Frank</foreName>
            <surname>Pfenning</surname>
            <initial>F.</initial>
          </persName>
        </editor>
        <title level="m">16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS)</title>
        <loc>Rome, Italy</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">7794</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">305-320</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00755450" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00755450</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid70" type="inproceedings" rend="refer" n="refercite:hoyrup:hal-00678161">
      <identifiant type="hal" value="hal-00678161"/>
      <analytic>
        <title level="a">The dimension of ergodic random sequences</title>
        <author>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Christoph</foreName>
            <surname>Dürr</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Wilke</surname>
            <initial>T.</initial>
          </persName>
        </editor>
        <title level="m">STACS'12 (29th Symposium on Theoretical Aspects of Computer Science)</title>
        <loc>Paris, France</loc>
        <imprint>
          <biblScope type="volume">14</biblScope>
          <publisher>
            <orgName>LIPIcs</orgName>
          </publisher>
          <dateStruct>
            <month>March</month>
            <year>2012</year>
          </dateStruct>
          <biblScope type="pages">567-576</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00678161" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00678161</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid75" type="inproceedings" rend="refer" n="refercite:jeandel:hal-00840384">
      <identifiant type="doi" value="10.4230/LIPIcs.STACS.2013.490"/>
      <identifiant type="hal" value="hal-00840384"/>
      <analytic>
        <title level="a">Hardness of Conjugacy, Embedding and Factorization of multidimensional Subshifts of Finite Type</title>
        <author>
          <persName key="carte-2012-idp140481669148656">
            <foreName>Emmanuel</foreName>
            <surname>Jeandel</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Vanier</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Natacha</foreName>
            <surname>Portier</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Wilke</surname>
            <initial>T.</initial>
          </persName>
        </editor>
        <title level="m">STACS - 30th International Symposium on Theoretical Aspects of Computer Science</title>
        <loc>Kiel, Germany</loc>
        <title level="s">Leibniz International Proceedings in Informatics (LIPIcs)</title>
        <imprint>
          <biblScope type="volume">20</biblScope>
          <publisher>
            <orgName>Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">Christian-Albrechts-Universität zu Kiel</orgName>
          </publisher>
          <dateStruct>
            <month>February</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">490–501</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00840384" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00840384</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid71" type="inproceedings" rend="refer" n="refercite:marion:2011:hal-00591853:1">
      <identifiant type="hal" value="hal-00591853"/>
      <analytic>
        <title level="a">A type system for complexity flow analysis</title>
        <author>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Twenty-Sixth Annual IEEE Symposium on Logic in Computer Science - LICS 2011</title>
        <loc>Toronto, Canada</loc>
        <imprint>
          <publisher>
            <orgName>ACM</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2011</year>
          </dateStruct>
          <biblScope type="pages">1–10</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00591853/en" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00591853/<allowbreak/>en</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid73" type="inproceedings" rend="refer" n="refercite:CALVET:2010:Inria-00536706:1">
      <identifiant type="hal" value="inria-00536706"/>
      <analytic>
        <title level="a">The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet</title>
        <author>
          <persName key="carte-2009-id59563">
            <foreName>Joan</foreName>
            <surname>Calvet</surname>
            <initial>J.</initial>
          </persName>
          <persName key="mere-2009-id59742">
            <foreName>José</foreName>
            <surname>Fernandez</surname>
            <initial>J.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Annual Computer Security Applications Conference</title>
        <loc>Austin, Texas États-Unis</loc>
        <imprint>
          <dateStruct>
            <month>12</month>
            <year>2010</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/inria-00536706/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00536706/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid65" type="phdthesis" rend="year" n="cite:calvet:tel-00922384">
      <identifiant type="hal" value="tel-00922384"/>
      <monogr>
        <title level="m">Analyse Dynamique de Logiciels Malveillants</title>
        <author>
          <persName key="carte-2009-id59563">
            <foreName>Joan</foreName>
            <surname>Calvet</surname>
            <initial>J.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">Université de Lorraine</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/tel-00922384" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>tel-00922384</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Ph. D. Thesis</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid0" type="article" rend="year" n="cite:bournez:hal-00861041">
      <identifiant type="doi" value="10.1016/j.jcss.2013.01.025"/>
      <identifiant type="hal" value="hal-00861041"/>
      <analytic>
        <title level="a">Computation with perturbed dynamical systems</title>
        <author>
          <persName key="protheo-2005-id18131">
            <foreName>Olivier</foreName>
            <surname>Bournez</surname>
            <initial>O.</initial>
          </persName>
          <persName key="protheo-2005-id18590">
            <foreName>Daniel</foreName>
            <surname>Graça</surname>
            <initial>D.</initial>
          </persName>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" id="rid01195">
        <idno type="issn">0022-0000</idno>
        <title level="j">Journal of Computer and System Sciences</title>
        <imprint>
          <biblScope type="volume">79</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month>August</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">714-724</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00861041" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00861041</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid52" type="article" rend="year" n="cite:hoyrup:hal-00746473">
      <identifiant type="doi" value="10.1016/j.apal.2012.11.005"/>
      <identifiant type="hal" value="hal-00746473"/>
      <analytic>
        <title level="a">Computability of the ergodic decomposition</title>
        <author>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" id="rid00160">
        <idno type="issn">0168-0072</idno>
        <title level="j">Annals of Pure and Applied Logic</title>
        <imprint>
          <biblScope type="volume">164</biblScope>
          <biblScope type="number">5</biblScope>
          <dateStruct>
            <month>May</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">542-549</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00746473" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00746473</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid59" type="article" rend="year" n="cite:jeandel:hal-00783099">
      <identifiant type="doi" value="10.1016/j.ic.2013.01.003"/>
      <identifiant type="hal" value="hal-00783099"/>
      <analytic>
        <title level="a">Subshifts as models for MSO logic</title>
        <author>
          <persName key="carte-2012-idp140481669148656">
            <foreName>Emmanuel</foreName>
            <surname>Jeandel</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Guillaume</foreName>
            <surname>Theyssier</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" id="rid00905">
        <idno type="issn">0890-5401</idno>
        <title level="j">Information and Computation</title>
        <imprint>
          <biblScope type="number">225</biblScope>
          <dateStruct>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">1-15</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00783099" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00783099</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid47" type="article" rend="year" n="cite:vanier:hal-00613165">
      <identifiant type="doi" value="10.1016/j.tcs.2012.08.027"/>
      <analytic>
        <title level="a">Turing degrees of multidimensional SFTs</title>
        <author>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Vanier</surname>
            <initial>P.</initial>
          </persName>
          <persName key="carte-2012-idp140481669148656">
            <foreName>Emmanuel</foreName>
            <surname>Jeandel</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes" id="rid01946">
        <idno type="issn">0304-3975</idno>
        <title level="j">Journal of Theoretical Computer Science (TCS)</title>
        <imprint>
          <dateStruct>
            <month>November</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://dx.doi.org/10.1016/j.tcs.2012.08.027" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>dx.<allowbreak/>doi.<allowbreak/>org/<allowbreak/>10.<allowbreak/>1016/<allowbreak/>j.<allowbreak/>tcs.<allowbreak/>2012.<allowbreak/>08.<allowbreak/>027</ref>
          <ref xlink:href="http://hal.inria.fr/hal-00613165" type="hal" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00613165</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid60" type="inproceedings" rend="year" n="cite:bauwens:hal-00920894">
      <identifiant type="hal" value="hal-00920894"/>
      <analytic>
        <title level="a">Asymmetry of the Kolmogorov complexity of online predicting odd and even bits</title>
        <author>
          <persName>
            <foreName>Bruno</foreName>
            <surname>Bauwens</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">STACS - 31th Symposium on Theoretical Aspects of Computer Science - 2014</title>
        <loc>Lyon, France</loc>
        <imprint>
          <dateStruct>
            <month>March</month>
            <year>2014</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00920894" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00920894</ref>
        </imprint>
        <meeting id="cid318933">
          <title>International Symposium on Theoretical Aspects of Computer Science</title>
          <num>31</num>
          <abbr type="sigle">STACS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid58" type="inproceedings" rend="year" n="cite:bonfante:hal-00921053">
      <identifiant type="hal" value="hal-00921053"/>
      <analytic>
        <title level="a">Non-simplifying Graph Rewriting Termination</title>
        <author>
          <persName key="calligramme-2005-id18205">
            <foreName>Guillaume</foreName>
            <surname>Bonfante</surname>
            <initial>G.</initial>
          </persName>
          <persName key="calligramme-2005-id18137">
            <foreName>Bruno</foreName>
            <surname>Guillaume</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Rachid</foreName>
            <surname>Echahed</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Detlef</foreName>
            <surname>Plump</surname>
            <initial>D.</initial>
          </persName>
        </editor>
        <title level="m">TERMGRAPH</title>
        <loc>Rome, Italy</loc>
        <imprint>
          <dateStruct>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">4-16</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00921053" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00921053</ref>
        </imprint>
        <meeting id="cid323502">
          <title>International Workshop on Computing with Terms and Graphs</title>
          <num>2013</num>
          <abbr type="sigle">TERMGRAPH</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid62" type="inproceedings" rend="year" n="cite:bonfante:hal-00925517">
      <identifiant type="hal" value="hal-00925517"/>
      <analytic>
        <title level="a">Analysis and Diversion of Duqu's Driver</title>
        <author>
          <persName key="calligramme-2005-id18205">
            <foreName>Guillaume</foreName>
            <surname>Bonfante</surname>
            <initial>G.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="carte-2012-idp140462941597344">
            <foreName>Fabrice</foreName>
            <surname>Sabatier</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Aurélien</foreName>
            <surname>Thierry</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Malware 2013 - 8th International Conference on Malicious and Unwanted Software</title>
        <loc>Fajardo, Puerto Rico</loc>
        <imprint>
          <publisher>
            <orgName>IEEE</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00925517" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00925517</ref>
        </imprint>
        <meeting id="cid290439">
          <title>International Conference on Malicious and Unwanted Software</title>
          <num>8</num>
          <abbr type="sigle">MALWARE</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid61" type="inproceedings" rend="year" n="cite:bonfante:hal-00925184">
      <identifiant type="hal" value="hal-00925184"/>
      <analytic>
        <title level="a">Duqu contre Duqu : Analyse et détournement du driver de Duqu</title>
        <author>
          <persName key="calligramme-2005-id18205">
            <foreName>Guillaume</foreName>
            <surname>Bonfante</surname>
            <initial>G.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="carte-2012-idp140462941597344">
            <foreName>Fabrice</foreName>
            <surname>Sabatier</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Aurélien</foreName>
            <surname>Thierry</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="no" x-proceedings="yes">
        <title level="m">SSTIC - Symposium sur la sécurité des technologies de l'information et des communications</title>
        <loc>Rennes, France</loc>
        <imprint>
          <dateStruct>
            <month>June</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00925184" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00925184</ref>
        </imprint>
        <meeting id="cid390117">
          <title>Symposium sur la sécurité des technologies de l'information et des communications</title>
          <num>11</num>
          <abbr type="sigle">SSTIC</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid50" type="inproceedings" rend="year" n="cite:feree:hal-00915973">
      <identifiant type="hal" value="hal-00915973"/>
      <analytic>
        <title level="a">Higher-order complexity in analysis</title>
        <author>
          <persName key="carte-2010-id59800">
            <foreName>Hugo</foreName>
            <surname>Férée</surname>
            <initial>H.</initial>
          </persName>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="no">
        <title level="m">CCA - 10th International Conference on Computability and Complexity in Analysis - 2013</title>
        <loc>Nancy, France</loc>
        <imprint>
          <dateStruct>
            <month>July</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00915973" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00915973</ref>
        </imprint>
        <meeting id="cid393796">
          <title>International Conference on Computability and Complexity in Analysis</title>
          <num>10</num>
          <abbr type="sigle">CCA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid1" type="inproceedings" rend="year" n="cite:feree:hal-00773653">
      <identifiant type="doi" value="10.1109/LICS.2013.15"/>
      <identifiant type="hal" value="hal-00773653"/>
      <analytic>
        <title level="a">On the query complexity of real functionals</title>
        <author>
          <persName key="carte-2010-id59800">
            <foreName>Hugo</foreName>
            <surname>Férée</surname>
            <initial>H.</initial>
          </persName>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
          <persName key="carte-2008-id18404">
            <foreName>Walid</foreName>
            <surname>Gomaa</surname>
            <initial>W.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">LICS - 28th ACM/IEEE Symposium on Logic in Computer Science</title>
        <loc>New Orleans, United States</loc>
        <imprint>
          <dateStruct>
            <month>January</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">103-112</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00773653" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00773653</ref>
        </imprint>
        <meeting id="cid31229">
          <title>Annual IEEE Symposium on Logic in Computer Science</title>
          <num>28</num>
          <abbr type="sigle">LICS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid53" type="inproceedings" rend="year" n="cite:hainry:hal-00755450">
      <identifiant type="doi" value="10.1007/978-3-642-37075-5_20"/>
      <identifiant type="hal" value="hal-00755450"/>
      <analytic>
        <title level="a">Type-based complexity analysis for fork processes</title>
        <author>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName key="parsifal-2006-id18343">
            <foreName>Frank</foreName>
            <surname>Pfenning</surname>
            <initial>F.</initial>
          </persName>
        </editor>
        <title level="m">16th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS)</title>
        <loc>Rome, Italy</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">7794</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">305-320</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00755450" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00755450</ref>
        </imprint>
        <meeting id="cid282113">
          <title>International Conference on Foundations of Software Science and Computational Structures</title>
          <num>16</num>
          <abbr type="sigle">FOSSACS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid54" type="inproceedings" rend="year" n="cite:hainry:hal-00910166">
      <identifiant type="hal" value="hal-00910166"/>
      <analytic>
        <title level="a">Types for controlling heap and stack in Java</title>
        <author>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA)</title>
        <loc>Bertinoro, Italy</loc>
        <imprint>
          <publisher>
            <orgName type="organisation">Ugo Dal Lago and Ricardo Pena</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00910166" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00910166</ref>
        </imprint>
        <meeting id="cid339370">
          <title>International workshop on Foundational and Practical Aspects of Resource Analysis</title>
          <num>3</num>
          <abbr type="sigle">FOPARA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid51" type="inproceedings" rend="year" n="cite:hoyrup:hal-00915952">
      <identifiant type="hal" value="hal-00915952"/>
      <analytic>
        <title level="a">Irreversible computable functions</title>
        <author>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">STACS - 31st Symposium on Theoretical Aspects of Computer Science - 2014</title>
        <loc>Lyon, France</loc>
        <imprint>
          <dateStruct>
            <month>March</month>
            <year>2014</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00915952" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00915952</ref>
        </imprint>
        <meeting id="cid318933">
          <title>International Symposium on Theoretical Aspects of Computer Science</title>
          <num>31</num>
          <abbr type="sigle">STACS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid46" type="inproceedings" rend="year" n="cite:jeandel:hal-00840384">
      <identifiant type="doi" value="10.4230/LIPIcs.STACS.2013.490"/>
      <identifiant type="hal" value="hal-00840384"/>
      <analytic>
        <title level="a">Hardness of Conjugacy, Embedding and Factorization of multidimensional Subshifts of Finite Type</title>
        <author>
          <persName key="carte-2012-idp140481669148656">
            <foreName>Emmanuel</foreName>
            <surname>Jeandel</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Vanier</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Natacha</foreName>
            <surname>Portier</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>Thomas</foreName>
            <surname>Wilke</surname>
            <initial>T.</initial>
          </persName>
        </editor>
        <title level="m">STACS - 30th International Symposium on Theoretical Aspects of Computer Science</title>
        <loc>Kiel, Germany</loc>
        <title level="s">Leibniz International Proceedings in Informatics (LIPIcs)</title>
        <imprint>
          <biblScope type="volume">20</biblScope>
          <publisher>
            <orgName>Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">Christian-Albrechts-Universität zu Kiel</orgName>
          </publisher>
          <dateStruct>
            <month>February</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">490–501</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00840384" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00840384</ref>
        </imprint>
        <meeting id="cid318933">
          <title>International Symposium on Theoretical Aspects of Computer Science</title>
          <num>30</num>
          <abbr type="sigle">STACS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid55" type="inproceedings" rend="year" n="cite:pechoux:hal-00910170">
      <identifiant type="hal" value="hal-00910170"/>
      <analytic>
        <title level="a">Bounding Reactions in the Pi-calculus using Interpretations</title>
        <author>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Third International Workshop on Foundational and Practical Aspects of Resource Analysis (FOPARA 2013)</title>
        <loc>Bertinoro, Italy</loc>
        <imprint>
          <publisher>
            <orgName type="organisation">Ugo Dal Lago and Ricardo Pena</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00910170" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00910170</ref>
        </imprint>
        <meeting id="cid339370">
          <title>International workshop on Foundational and Practical Aspects of Resource Analysis</title>
          <num>3</num>
          <abbr type="sigle">FOPARA</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid57" type="techreport" rend="year" n="cite:beaucamps:hal-00803412">
      <identifiant type="hal" value="hal-00803412"/>
      <monogr>
        <title level="m">Behavior Analysis of Malicious Code by Weighted Behavior Abstraction</title>
        <author>
          <persName key="carte-2007-id18280">
            <foreName>Philippe</foreName>
            <surname>Beaucamps</surname>
            <initial>P.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>March</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00803412" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00803412</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Research Report</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid49" type="techreport" rend="year" n="cite:feree:hal-00848482">
      <identifiant type="hal" value="hal-00848482"/>
      <monogr>
        <title level="m">Analytical properties of resource-bounded real functionals</title>
        <author>
          <persName key="carte-2010-id59800">
            <foreName>Hugo</foreName>
            <surname>Férée</surname>
            <initial>H.</initial>
          </persName>
          <persName key="carte-2008-id18404">
            <foreName>Walid</foreName>
            <surname>Gomaa</surname>
            <initial>W.</initial>
          </persName>
          <persName key="carte-2008-id18429">
            <foreName>Mathieu</foreName>
            <surname>Hoyrup</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>July</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">33</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00848482" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00848482</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Research Report</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid64" type="techreport" rend="year" n="cite:rousseau:hal-00804915">
      <identifiant type="hal" value="hal-00804915"/>
      <monogr>
        <title level="m">Médiation Scientifique : une facette de nos métiers de la recherche</title>
        <author>
          <persName key="omega-2005-id18365">
            <foreName>Antoine</foreName>
            <surname>Rousseau</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Aurélie</foreName>
            <surname>Darnaud</surname>
            <initial>A.</initial>
          </persName>
          <persName key="reso-2005-id18326">
            <foreName>Brice</foreName>
            <surname>Goglin</surname>
            <initial>B.</initial>
          </persName>
          <persName>
            <foreName>Céline</foreName>
            <surname>Acharian</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Christine</foreName>
            <surname>Leininger</surname>
            <initial>C.</initial>
          </persName>
          <persName key="virtualplants-2005-id18079">
            <foreName>Christophe</foreName>
            <surname>Godin</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Clarisse</foreName>
            <surname>Holik</surname>
            <initial>C.</initial>
          </persName>
          <persName key="protheo-2005-id18078">
            <foreName>Claude</foreName>
            <surname>Kirchner</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Diane</foreName>
            <surname>Rives</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>Elodie</foreName>
            <surname>Darquie</surname>
            <initial>E.</initial>
          </persName>
          <persName key="magrite-2005-id18117">
            <foreName>Erwan</foreName>
            <surname>Kerrien</surname>
            <initial>E.</initial>
          </persName>
          <persName key="evasion-2005-id18151">
            <foreName>Fabrice</foreName>
            <surname>Neyret</surname>
            <initial>F.</initial>
          </persName>
          <persName key="axis-2005-id18166">
            <foreName>Florent</foreName>
            <surname>Masseglia</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Florian</foreName>
            <surname>Dufour</surname>
            <initial>F.</initial>
          </persName>
          <persName key="indes-2009-id59389">
            <foreName>Gérard</foreName>
            <surname>Berry</surname>
            <initial>G.</initial>
          </persName>
          <persName key="logical-2005-id18086">
            <foreName>Gilles</foreName>
            <surname>Dowek</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Robak</surname>
            <initial>H.</initial>
          </persName>
          <persName>
            <foreName>Hélène</foreName>
            <surname>Xypas</surname>
            <initial>H.</initial>
          </persName>
          <persName key="parole-2005-id18255">
            <foreName>Irina</foreName>
            <surname>Illina</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName>
            <foreName>Joanna</foreName>
            <surname>Jongwane</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Jocelyne</foreName>
            <surname>Ehrel</surname>
            <initial>J.</initial>
          </persName>
          <persName key="gyroweb-2005-id18078">
            <foreName>Laurent</foreName>
            <surname>Viennot</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Laure</foreName>
            <surname>Guion</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Lisette</foreName>
            <surname>Calderan</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Lola</foreName>
            <surname>Kovacic</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Marie</foreName>
            <surname>Collin</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Marie-Agnès</foreName>
            <surname>Enard</surname>
            <initial>M.-A.</initial>
          </persName>
          <persName>
            <foreName>Marie-Hélène</foreName>
            <surname>Comte</surname>
            <initial>M.-H.</initial>
          </persName>
          <persName key="algorille-2005-id18140">
            <foreName>Martin</foreName>
            <surname>Quinson</surname>
            <initial>M.</initial>
          </persName>
          <persName key="apics-2005-id18164">
            <foreName>Martine</foreName>
            <surname>Olivi</surname>
            <initial>M.</initial>
          </persName>
          <persName key="symbiose-2005-id18398">
            <foreName>Mathieu</foreName>
            <surname>Giraud</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Mathilde</foreName>
            <surname>Dorémus</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Mia</foreName>
            <surname>Ogouchi</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Muriel</foreName>
            <surname>Droin</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Nathalie</foreName>
            <surname>Lacaux</surname>
            <initial>N.</initial>
          </persName>
          <persName key="cortex-2005-id18118">
            <foreName>Nicolas</foreName>
            <surname>Rougier</surname>
            <initial>N.</initial>
          </persName>
          <persName key="in-situ-2005-id18153">
            <foreName>Nicolas</foreName>
            <surname>Roussel</surname>
            <initial>N.</initial>
          </persName>
          <persName key="iparla-2005-id18078">
            <foreName>Pascal</foreName>
            <surname>Guitton</surname>
            <initial>P.</initial>
          </persName>
          <persName key="helix-2006-id18894">
            <foreName>Pierre</foreName>
            <surname>Peterlongo</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Rose-Marie</foreName>
            <surname>Cornus</surname>
            <initial>R.-M.</initial>
          </persName>
          <persName>
            <foreName>Simon</foreName>
            <surname>Vandermeersch</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Sophie</foreName>
            <surname>Maheo</surname>
            <initial>S.</initial>
          </persName>
          <persName key="evasion-2005-id18348">
            <foreName>Sylvain</foreName>
            <surname>Lefebvre</surname>
            <initial>S.</initial>
          </persName>
          <persName key="arenaire-2005-id18308">
            <foreName>Sylvie</foreName>
            <surname>Boldo</surname>
            <initial>S.</initial>
          </persName>
          <persName key="odyssee-2005-id18207">
            <foreName>Thierry</foreName>
            <surname>Viéville</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>Véronique</foreName>
            <surname>Poirel</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Aline</foreName>
            <surname>Chabreuil</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Arnaud</foreName>
            <surname>Fischer</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Claude</foreName>
            <surname>Farge</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Claude</foreName>
            <surname>Vadel</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Isabelle</foreName>
            <surname>Astic</surname>
            <initial>I.</initial>
          </persName>
          <persName>
            <foreName>Jean-Pierre</foreName>
            <surname>Dumont</surname>
            <initial>J.-P.</initial>
          </persName>
          <persName key="mosel-2005-id18406">
            <foreName>Loic</foreName>
            <surname>Féjoz</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Patrick</foreName>
            <surname>Rambert</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Pierre</foreName>
            <surname>Paradinas</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Sophie</foreName>
            <surname>De Quatrebarbes</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Stéphane</foreName>
            <surname>Laurent</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>March</month>
            <year>2013</year>
          </dateStruct>
          <biblScope type="pages">34</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00804915" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00804915</ref>
        </imprint>
      </monogr>
      <note type="typdoc">Interne</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid66" type="unpublished" rend="year" n="cite:ballier:hal-00868899">
      <identifiant type="hal" value="hal-00868899"/>
      <monogr>
        <title level="m">Structuring multi-dimensional subshifts</title>
        <author>
          <persName>
            <foreName>Alexis</foreName>
            <surname>Ballier</surname>
            <initial>A.</initial>
          </persName>
          <persName key="carte-2012-idp140481669148656">
            <foreName>Emmanuel</foreName>
            <surname>Jeandel</surname>
            <initial>E.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00868899" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00868899</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid67" subtype="nonparu-n" type="unpublished" rend="year" n="cite:bonfante:hal-00921038">
      <identifiant type="hal" value="hal-00921038"/>
      <monogr>
        <title level="m">Non-size increasing Graph Rewriting for Natural Language Processing</title>
        <author>
          <persName key="calligramme-2005-id18205">
            <foreName>Guillaume</foreName>
            <surname>Bonfante</surname>
            <initial>G.</initial>
          </persName>
          <persName key="calligramme-2005-id18137">
            <foreName>Bruno</foreName>
            <surname>Guillaume</surname>
            <initial>B.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00921038" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00921038</ref>
        </imprint>
      </monogr>
      <note type="bnote">Accepted for publication in MSCS (Mathematical Structures for Computer Science)</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid63" type="misc" rend="year" n="cite:hainry:hal-00773141">
      <identifiant type="hal" value="hal-00773141"/>
      <monogr>
        <title level="m">Type-based heap and stack space analysis in Java</title>
        <author>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>January</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00773141" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00773141</ref>
        </imprint>
      </monogr>
      <note type="bnote">Rapport technique</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid48" type="unpublished" rend="year" n="cite:jeandel:hal-00798336">
      <identifiant type="hal" value="hal-00798336"/>
      <monogr>
        <title level="m">Characterizations of periods of multidimensional shifts</title>
        <author>
          <persName key="carte-2012-idp140481669148656">
            <foreName>Emmanuel</foreName>
            <surname>Jeandel</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Pascal</foreName>
            <surname>Vanier</surname>
            <initial>P.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <month>March</month>
            <year>2013</year>
          </dateStruct>
          <ref xlink:href="http://hal.inria.fr/hal-00798336" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00798336</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid4" type="inproceedings" rend="foot" n="footcite:Adleman88">
      <analytic>
        <title level="a">An Abstract Theory of Computer Viruses</title>
        <author>
          <persName>
            <foreName>L.M.</foreName>
            <surname>Adleman</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Advances in Cryptology — CRYPTO'88</title>
        <imprint>
          <biblScope type="volume">403</biblScope>
          <publisher>
            <orgName>Lecture Notes in Computer Science</orgName>
          </publisher>
          <dateStruct>
            <year>1988</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid27" type="article" rend="foot" n="footcite:AMP95">
      <analytic>
        <title level="a">Reachability analysis of dynamical systems having piecewise-constant derivatives</title>
        <author>
          <persName>
            <foreName>Eugene</foreName>
            <surname>Asarin</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Oded</foreName>
            <surname>Maler</surname>
            <initial>O.</initial>
          </persName>
          <persName>
            <foreName>Amir</foreName>
            <surname>Pnueli</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">138</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <month>February</month>
            <year>1995</year>
          </dateStruct>
          <biblScope type="pages">35–65</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid17" type="book" rend="foot" n="footcite:BaaderNipkow-1998">
      <monogr>
        <title level="m">Term rewriting and all that</title>
        <author>
          <persName>
            <foreName>Franz</foreName>
            <surname>Baader</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Tobias</foreName>
            <surname>Nipkow</surname>
            <initial>T.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>Cambridge University Press<address><addrLine>New York, NY, USA</addrLine></address></orgName>
          </publisher>
          <dateStruct>
            <year>1998</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid23" type="inproceedings" rend="foot" n="footcite:BEAUCAMPS:2010:Inria-00536500:1">
      <identifiant type="hal" value="inria-00536500"/>
      <analytic>
        <title level="a">Behavior Abstraction in Malware Analysis</title>
        <author>
          <persName key="carte-2007-id18280">
            <foreName>Philippe</foreName>
            <surname>Beaucamps</surname>
            <initial>P.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Grigore</foreName>
            <surname>Rosu</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Oleg</foreName>
            <surname>Sokolsky</surname>
            <initial>O.</initial>
          </persName>
        </editor>
        <title level="m">1st International Conference on Runtime Verification</title>
        <loc>St. Julians, Malte</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">6418</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <publisher>
            <orgName type="organisation">Howard Barringer, Klaus Havelund, Insup Lee</orgName>
          </publisher>
          <dateStruct>
            <month>August</month>
            <year>2010</year>
          </dateStruct>
          <biblScope type="pages">168-182</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00536500/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00536500/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid56" type="inproceedings" rend="foot" n="footcite:beaucamps:hal-00762252">
      <identifiant type="doi" value="10.1007/978-3-642-33167-1"/>
      <identifiant type="hal" value="hal-00762252"/>
      <analytic>
        <title level="a">Abstraction-based Malware Analysis Using Rewriting and Model Checking</title>
        <author>
          <persName key="carte-2007-id18280">
            <foreName>Philippe</foreName>
            <surname>Beaucamps</surname>
            <initial>P.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Sara</foreName>
            <surname>Foresti</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Moti</foreName>
            <surname>Yung</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">ESORICS</title>
        <loc>Pisa, Italie</loc>
        <title level="s">LNCS</title>
        <imprint>
          <biblScope type="volume">7459</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2012</year>
          </dateStruct>
          <biblScope type="pages">806-823</biblScope>
          <ref xlink:href="http://hal.inria.fr/hal-00762252" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>hal-00762252</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid31" type="misc" rend="foot" n="footcite:bell-2008">
      <monogr>
        <title level="m">The Continuous Skolem-Pisot Problem: On the Complexity of Reachability for Linear Ordinary Differential Equations</title>
        <author>
          <persName>
            <foreName>Paul</foreName>
            <surname>Bell</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Jean-Charles</foreName>
            <surname>Delvenne</surname>
            <initial>J.-C.</initial>
          </persName>
          <persName>
            <foreName>Raphael</foreName>
            <surname>Jungers</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Vincent D.</foreName>
            <surname>Blondel</surname>
            <initial>V. D.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <ref xlink:href="http://arxiv.org/abs/0809.2189" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>arxiv.<allowbreak/>org/<allowbreak/>abs/<allowbreak/>0809.<allowbreak/>2189</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid12" type="article" rend="foot" n="footcite:BSS89">
      <analytic>
        <title level="a">On a theory of computation and complexity over the real numbers; NP completeness, recursive functions and universal machines</title>
        <author>
          <persName>
            <foreName>Lenore</foreName>
            <surname>Blum</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>Michael</foreName>
            <surname>Shub</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Stephen</foreName>
            <surname>Smale</surname>
            <initial>S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Bulletin of the American Mathematical Society</title>
        <imprint>
          <biblScope type="volume">21</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <month>July</month>
            <year>1989</year>
          </dateStruct>
          <biblScope type="pages">1–46</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid8" type="article" rend="foot" n="footcite:BKM06">
      <analytic>
        <title level="a">On abstract computer virology: from a recursion-theoretic perspective</title>
        <author>
          <persName key="calligramme-2005-id18205">
            <foreName>Guillaume</foreName>
            <surname>Bonfante</surname>
            <initial>G.</initial>
          </persName>
          <persName key="calligramme-2006-id18435">
            <foreName>Matthieu</foreName>
            <surname>Kaczmarek</surname>
            <initial>M.</initial>
          </persName>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal in Computer Virology</title>
        <imprint>
          <biblScope type="volume">1</biblScope>
          <biblScope type="number">3-4</biblScope>
          <dateStruct>
            <year>2006</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid14" type="inproceedings" rend="foot" n="footcite:ASF+SDF-01">
      <analytic>
        <title level="a">The ASF+SDF Meta-Environment: a Component-Based Language Development Environment</title>
        <author>
          <persName>
            <foreName>M.G.J. van den</foreName>
            <surname>Brand</surname>
            <initial>M.G.J. van den.</initial>
          </persName>
          <persName>
            <foreName>A. van</foreName>
            <surname>Deursen</surname>
            <initial>A. van.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Heering</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>H.A.</foreName>
            <surname>de Jong</surname>
            <initial>H.A.</initial>
          </persName>
          <persName>
            <foreName>M.</foreName>
            <surname>de Jonge</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>T.</foreName>
            <surname>Kuipers</surname>
            <initial>T.</initial>
          </persName>
          <persName key="ateams-2009-id59389">
            <foreName>P.</foreName>
            <surname>Klint</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>L.</foreName>
            <surname>Moonen</surname>
            <initial>L.</initial>
          </persName>
          <persName>
            <foreName>P.A.</foreName>
            <surname>Olivier</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Scheerder</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>J.J.</foreName>
            <surname>Vinju</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>E.</foreName>
            <surname>Visser</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Visser</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>R.</foreName>
            <surname>Wilhelm</surname>
            <initial>R.</initial>
          </persName>
        </editor>
        <title level="m">Compiler Construction (CC '01)</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">2027</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">365–370</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid28" type="article" rend="foot" n="footcite:Bra95">
      <analytic>
        <title level="a">Universal computation and other capabilities of hybrid and continuous dynamical systems</title>
        <author>
          <persName>
            <foreName>M. S.</foreName>
            <surname>Branicky</surname>
            <initial>M. S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">138</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <month>6 February</month>
            <year>1995</year>
          </dateStruct>
          <biblScope type="pages">67–100</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid15" type="inproceedings" rend="foot" n="footcite:Maude2:03">
      <analytic>
        <title level="a">The Maude 2.0 System</title>
        <author>
          <persName>
            <foreName>Manuel</foreName>
            <surname>Clavel</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Francisco</foreName>
            <surname>Durán</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Steven</foreName>
            <surname>Eker</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Patrick</foreName>
            <surname>Lincoln</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>Narciso</foreName>
            <surname>Martí-Oliet</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>José</foreName>
            <surname>Meseguer</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Carolyn</foreName>
            <surname>Talcott</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Robert</foreName>
            <surname>Nieuwenhuis</surname>
            <initial>R.</initial>
          </persName>
        </editor>
        <title level="m">Proceedings of the 14th International Conference on Rewriting Techniques and Applications</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">2706</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>June</month>
            <year>2003</year>
          </dateStruct>
          <biblScope type="pages">76-87</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid3" type="phdthesis" rend="foot" n="footcite:Cohen86">
      <monogr>
        <title level="m">Computer Viruses</title>
        <author>
          <persName key="ariana-2005-id18557">
            <foreName>F.</foreName>
            <surname>Cohen</surname>
            <initial>F.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">University of Southern California</orgName>
          </publisher>
          <dateStruct>
            <month>January</month>
            <year>1986</year>
          </dateStruct>
        </imprint>
      </monogr>
      <note type="typdoc">Ph. D. Thesis</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid20" type="incollection" rend="foot" n="footcite:Comon:HandbookAR:rewriting:2001">
      <analytic>
        <title level="a">Inductionless Induction</title>
        <author>
          <persName>
            <foreName>Hubert</foreName>
            <surname>Comon</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Alan</foreName>
            <surname>Robinson</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Andrei</foreName>
            <surname>Voronkov</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Handbook of Automated Reasoning</title>
        <imprint>
          <biblScope type="volume">I</biblScope>
          <biblScope type="chapter">14</biblScope>
          <publisher>
            <orgName>Elsevier Science</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">913-962</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid18" type="incollection" rend="foot" n="footcite:DershowitzPlaisted:HandbookAR:rewriting:2001">
      <analytic>
        <title level="a">Rewriting</title>
        <author>
          <persName key="deducteam-2012-idp140539070305792">
            <foreName>N.</foreName>
            <surname>Dershowitz</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>D.A.</foreName>
            <surname>Plaisted</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Alan</foreName>
            <surname>Robinson</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Andrei</foreName>
            <surname>Voronkov</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Handbook of Automated Reasoning</title>
        <imprint>
          <biblScope type="volume">I</biblScope>
          <biblScope type="chapter">9</biblScope>
          <publisher>
            <orgName>Elsevier Science</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
          <biblScope type="pages">535-610</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid10" type="article" rend="foot" n="footcite:EdaSun99">
      <analytic>
        <title level="a">A domain-theoretic approach to computability on the real line</title>
        <author>
          <persName>
            <foreName>Abbas</foreName>
            <surname>Edalat</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Philipp</foreName>
            <surname>Sünderhauf</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">210</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>1999</year>
          </dateStruct>
          <biblScope type="pages">73–98</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid5" type="book" rend="foot" n="footcite:Filiol05">
      <monogr>
        <title level="m">Computer Viruses: from Theory to Applications</title>
        <author>
          <persName key="codes-2005-id18229">
            <foreName>Eric</foreName>
            <surname>Filiol</surname>
            <initial>E.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year>2005</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid24" type="article" rend="foot" n="footcite:FiliolMalware06">
      <analytic>
        <title level="a">Malware Pattern Scanning Schemes Secure Against Black-box Analysis</title>
        <author>
          <persName key="codes-2005-id18229">
            <foreName>Eric</foreName>
            <surname>Filiol</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal in Computer Virology</title>
        <imprint>
          <biblScope type="volume">2</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>2006</year>
          </dateStruct>
          <biblScope type="pages">35-50</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid6" type="book" rend="foot" n="footcite:Filiol07">
      <monogr>
        <title level="m">Techniques virales avancées</title>
        <author>
          <persName key="codes-2005-id18229">
            <foreName>Eric</foreName>
            <surname>Filiol</surname>
            <initial>E.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2007</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid25" type="article" rend="foot" n="footcite:FiliolJacobLiard07">
      <analytic>
        <title level="a">Evaluation methodology and theoretical model for antiviral behavioural detection strategies</title>
        <author>
          <persName key="codes-2005-id18229">
            <foreName>Eric</foreName>
            <surname>Filiol</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>Grégoire</foreName>
            <surname>Jacob</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Michaël</foreName>
            <surname>Le Liard</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal in Computer Virology</title>
        <imprint>
          <biblScope type="volume">3</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">23-37</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid35" type="inproceedings" rend="foot" n="footcite:FGK-local-strat-ENTCS-2001">
      <analytic>
        <title level="a">Termination of rewriting with local strategies</title>
        <author>
          <persName>
            <foreName>Olivier</foreName>
            <surname>Fissore</surname>
            <initial>O.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>M. P.</foreName>
            <surname>Bonacina</surname>
            <initial>M. P.</initial>
          </persName>
          <persName>
            <foreName>B.</foreName>
            <surname>Gramlich</surname>
            <initial>B.</initial>
          </persName>
        </editor>
        <title level="m">Selected papers of the 4th International Workshop on Strategies in Automated Deduction</title>
        <title level="s">Electronic Notes in Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">58</biblScope>
          <publisher>
            <orgName>Elsevier Science Publishers</orgName>
          </publisher>
          <dateStruct>
            <year>2001</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid36" type="inproceedings" rend="foot" n="footcite:FGK-PPDP-2002">
      <analytic>
        <title level="a">CARIBOO : An induction based proof tool for termination with strategies</title>
        <author>
          <persName>
            <foreName>Olivier</foreName>
            <surname>Fissore</surname>
            <initial>O.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the Fourth International Conference on Principles and Practice of Declarative Programming</title>
        <loc>Pittsburgh (USA)</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>October</month>
            <year>2002</year>
          </dateStruct>
          <biblScope type="pages">62–73</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid37" type="inproceedings" rend="foot" n="footcite:FGK-WRLA-2002">
      <analytic>
        <title level="a">Outermost ground termination</title>
        <author>
          <persName>
            <foreName>Olivier</foreName>
            <surname>Fissore</surname>
            <initial>O.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the Fourth International Workshop on Rewriting Logic and Its Applications</title>
        <loc>Pisa, Italy</loc>
        <title level="s">Electronic Notes in Theoretical Computer Science</title>
        <imprint>
          <biblScope type="volume">71</biblScope>
          <publisher>
            <orgName>Elsevier Science Publishers</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2002</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid38" type="inproceedings" rend="foot" n="footcite:FGK-ter-faible-ICTAC-2004">
      <analytic>
        <title level="a">A proof of weak termination providing the right way to terminate</title>
        <author>
          <persName>
            <foreName>Olivier</foreName>
            <surname>Fissore</surname>
            <initial>O.</initial>
          </persName>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">First International Colloquium on Theoretical Aspect of Computing</title>
        <loc>Guiyang, China</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3407</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>September</month>
            <year>2004</year>
          </dateStruct>
          <biblScope type="pages">356-371</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid39" type="inproceedings" rend="foot" n="footcite:GK-C-red-2006">
      <analytic>
        <title level="a">Computing Constructor Forms with Non Terminating Rewrite Programs</title>
        <author>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the Eighth ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming</title>
        <loc>Venice, Italy</loc>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <month>July</month>
            <year>2006</year>
          </dateStruct>
          <biblScope type="pages">121–132</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid41" type="article" rend="foot" n="footcite:GK-TOCL-2009">
      <identifiant type="hal" value="inria-00182432"/>
      <analytic>
        <title level="a">Termination of Rewriting under Strategies</title>
        <author>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">ACM Transactions on Computational Logic</title>
        <imprint>
          <biblScope type="volume">10</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <year>2009</year>
          </dateStruct>
          <biblScope type="pages">1-52</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00182432/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00182432/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid32" type="inproceedings" rend="foot" n="footcite:HAINRY:2008:Inria-00250111:3">
      <identifiant type="hal" value="inria-00250111"/>
      <analytic>
        <title level="a">Computing omega-limit Sets in Linear Dynamical Systems</title>
        <author>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Cristian S.</foreName>
            <surname>Calude</surname>
            <initial>C. S.</initial>
          </persName>
          <persName>
            <foreName>José Félix</foreName>
            <surname>Costa</surname>
            <initial>J. F.</initial>
          </persName>
          <persName>
            <foreName>Rudolf</foreName>
            <surname>Freund</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>Marion</foreName>
            <surname>Oswald</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Grzegorz</foreName>
            <surname>Rozenberg</surname>
            <initial>G.</initial>
          </persName>
        </editor>
        <title level="m">Unconventional Computation</title>
        <loc>Autriche Vienne</loc>
        <imprint>
          <biblScope type="volume">5204</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">83–95</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00250111/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00250111/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid30" type="inproceedings" rend="foot" n="footcite:HAINRY:2008:Inria-00202674:2">
      <identifiant type="hal" value="inria-00202674"/>
      <analytic>
        <title level="a">Reachability in linear dynamical systems</title>
        <author>
          <persName key="protheo-2005-id18389">
            <foreName>Emmanuel</foreName>
            <surname>Hainry</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Arnold</foreName>
            <surname>Beckmann</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Costas</foreName>
            <surname>Dimitracopoulos</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Benedikt</foreName>
            <surname>Löwe</surname>
            <initial>B.</initial>
          </persName>
        </editor>
        <title level="m">Computability in Europe Logic and Theory of Algorithms</title>
        <loc>Grèce Athènes</loc>
        <imprint>
          <biblScope type="volume">5028</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">241-250</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00202674/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00202674/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid9" type="book" rend="foot" n="footcite:Kleene52">
      <monogr>
        <title level="m">Introduction to Metamathematics</title>
        <author>
          <persName>
            <foreName>S.C.</foreName>
            <surname>Kleene</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>Van Nostrand</orgName>
          </publisher>
          <dateStruct>
            <year>1952</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid34" type="book" rend="foot" n="footcite:Ko91">
      <monogr>
        <title level="m">Complexity Theory of Real Functions</title>
        <author>
          <persName>
            <foreName>Ker-I</foreName>
            <surname>Ko</surname>
            <initial>K.-I.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>Birkhäuser</orgName>
          </publisher>
          <dateStruct>
            <year>1991</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid43" type="hdrthesis" rend="foot" n="footcite:MarionHDR">
      <monogr>
        <title level="m">Complexité implicite des calculs, de la théorie à la pratique</title>
        <author>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName type="school">Université Nancy 2</orgName>
          </publisher>
          <dateStruct>
            <year>2000</year>
          </dateStruct>
        </imprint>
      </monogr>
      <note type="typdoc">Habilitation à diriger les recherches</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid44" type="inproceedings" rend="foot" n="footcite:MM00">
      <analytic>
        <title level="a">Efficient first order functional program interpreter with time bound certifications</title>
        <author>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="calligramme-2005-id18246">
            <foreName>Jean-Yves</foreName>
            <surname>Moyen</surname>
            <initial>J.-Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Michel</foreName>
            <surname>Parigot</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Andrei</foreName>
            <surname>Voronkov</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Logic for Programming and Automated Reasoning, 7th International Conference, LPAR 2000, Reunion Island, France</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">1955</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <month>Nov</month>
            <year>2000</year>
          </dateStruct>
          <biblScope type="pages">25–42</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid45" type="inproceedings" rend="foot" n="footcite:MP06">
      <analytic>
        <title level="a">Resource Analysis by Sup-interpretation</title>
        <author>
          <persName key="calligramme-2005-id18192">
            <foreName>Jean-Yves</foreName>
            <surname>Marion</surname>
            <initial>J.-Y.</initial>
          </persName>
          <persName key="calligramme-2005-id18324">
            <foreName>Romain</foreName>
            <surname>Péchoux</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">FLOPS</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">3945</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2006</year>
          </dateStruct>
          <biblScope type="pages">163–176</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid33" type="article" rend="foot" n="footcite:Moore96">
      <analytic>
        <title level="a">Recursion Theory on the Reals and Continuous-Time Computation</title>
        <author>
          <persName>
            <foreName>Cristopher</foreName>
            <surname>Moore</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Theor. Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">162</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>1996</year>
          </dateStruct>
          <biblScope type="pages">23-44</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid16" type="inproceedings" rend="foot" n="footcite:MoreauRV-2003">
      <analytic>
        <title level="a">A Pattern Matching Compiler for Multiple Target Languages</title>
        <author>
          <persName key="protheo-2005-id18172">
            <foreName>Pierre-Etienne</foreName>
            <surname>Moreau</surname>
            <initial>P.-E.</initial>
          </persName>
          <persName key="cassis-2005-id18180">
            <foreName>Christophe</foreName>
            <surname>Ringeissen</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Marian</foreName>
            <surname>Vittek</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>G.</foreName>
            <surname>Hedin</surname>
            <initial>G.</initial>
          </persName>
        </editor>
        <title level="m">12th Conference on Compiler Construction, Warsaw (Poland)</title>
        <title level="s">LNCS</title>
        <imprint>
          <biblScope type="volume">2622</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <month>May</month>
            <year>2003</year>
          </dateStruct>
          <biblScope type="pages">61–76</biblScope>
          <ref xlink:href="http://www.loria.fr/~moreau/Papers/MoreauRV-CC2003.ps.gz" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>www.<allowbreak/>loria.<allowbreak/>fr/<allowbreak/>~moreau/<allowbreak/>Papers/<allowbreak/>MoreauRV-CC2003.<allowbreak/>ps.<allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid26" type="article" rend="foot" n="footcite:Morin07">
      <analytic>
        <title level="a">Intrusion detection and virology: an analysis of differences, similarities and complementariness</title>
        <author>
          <persName key="triskell-2007-id18672">
            <foreName>B.</foreName>
            <surname>Morin</surname>
            <initial>B.</initial>
          </persName>
          <persName key="cidre-2011-idp140411653617744">
            <foreName>L.</foreName>
            <surname>Mé</surname>
            <initial>L.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal in Computer Virology</title>
        <imprint>
          <biblScope type="volume">3</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">33-49</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid29" type="inproceedings" rend="foot" n="footcite:Orponen">
      <identifiant type="doi" value=""/>
      <analytic>
        <title level="a">A Survey of Continuous-Time Computation Theory</title>
        <author>
          <persName>
            <foreName>Pekka</foreName>
            <surname>Orponen</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>D.-Z.</foreName>
            <surname>Du</surname>
            <initial>D.-Z.</initial>
          </persName>
          <persName>
            <foreName>Ker-I</foreName>
            <surname>Ko</surname>
            <initial>K.-I.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Algorithms, Languages, and Complexity</title>
        <imprint>
          <publisher>
            <orgName>Kluwer Academic Publishers</orgName>
          </publisher>
          <dateStruct>
            <year>1997</year>
          </dateStruct>
          <biblScope type="pages">209-224</biblScope>
          <ref xlink:href="http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.1991" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>citeseerx.<allowbreak/>ist.<allowbreak/>psu.<allowbreak/>edu/<allowbreak/>viewdoc/<allowbreak/>summary?doi=10.<allowbreak/>1.<allowbreak/>1.<allowbreak/>53.<allowbreak/>1991</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid13" type="article" rend="foot" n="footcite:Sha41">
      <analytic>
        <title level="a">Mathematical Theory of the Differential Analyser</title>
        <author>
          <persName>
            <foreName>C. E.</foreName>
            <surname>Shannon</surname>
            <initial>C. E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal of Mathematics and Physics MIT</title>
        <imprint>
          <biblScope type="volume">20</biblScope>
          <dateStruct>
            <year>1941</year>
          </dateStruct>
          <biblScope type="pages">337-354</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid19" type="book" rend="foot" n="footcite:Terese-2003">
      <monogr>
        <title level="m">Term Rewriting Systems</title>
        <title level="s">Cambridge Tracts in Theoretical Computer Science</title>
        <author>
          <persName>
            <foreName/>
            <surname>Terese</surname>
            <initial/>
          </persName>
        </author>
        <imprint>
          <biblScope type="number">55</biblScope>
          <publisher>
            <orgName>Cambridge University Press</orgName>
          </publisher>
          <dateStruct>
            <year>2003</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid2" type="article" rend="foot" n="footcite:Thompson84">
      <analytic>
        <title level="a">Reflections on Trusting Trust</title>
        <author>
          <persName>
            <foreName>K.</foreName>
            <surname>Thompson</surname>
            <initial>K.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Communication of the ACM</title>
        <imprint>
          <biblScope type="volume">27</biblScope>
          <dateStruct>
            <month>august</month>
            <year>1984</year>
          </dateStruct>
          <biblScope type="pages">761–763</biblScope>
        </imprint>
      </monogr>
      <note type="bnote">Also appears in ACM Turing Award Lectures: The First Twenty Years 1965-1985</note>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid21" type="article" rend="foot" n="footcite:WebsterM06">
      <analytic>
        <title level="a">Detection of metamorphic computer viruses using algebraic specification</title>
        <author>
          <persName>
            <foreName>Matt</foreName>
            <surname>Webster</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Grant</foreName>
            <surname>Malcolm</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal in Computer Virology</title>
        <imprint>
          <biblScope type="volume">2</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <year>2006</year>
          </dateStruct>
          <biblScope type="pages">149-161</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid22" type="article" rend="foot" n="footcite:WebsterM09">
      <analytic>
        <title level="a">Detection of metamorphic and virtualization-based malware using algebraic specification</title>
        <author>
          <persName>
            <foreName>Matt</foreName>
            <surname>Webster</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>Grant</foreName>
            <surname>Malcolm</surname>
            <initial>G.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal in Computer Virology</title>
        <imprint>
          <biblScope type="volume">5</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <year>2009</year>
          </dateStruct>
          <biblScope type="pages">221-245</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid11" type="book" rend="foot" n="footcite:Wei00">
      <monogr>
        <title level="m">Computable Analysis</title>
        <author>
          <persName>
            <foreName>Klaus</foreName>
            <surname>Weihrauch</surname>
            <initial>K.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2000</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid40" type="inproceedings" rend="foot" n="footcite:GNAEDIG:2007:Inria-00182435:1">
      <identifiant type="hal" value="inria-00182435"/>
      <analytic>
        <title level="a">Induction for Positive Almost Sure Termination</title>
        <author>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">Proceedings of the 9th ACM-SIGPLAN International Symposium on Principles and Practice of Declarative Programming - PPDP 2007</title>
        <loc>Wroclaw, Pologne</loc>
        <imprint>
          <publisher>
            <orgName>ACM</orgName>
          </publisher>
          <dateStruct>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">167-177</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00182435/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00182435/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid42" type="inproceedings" rend="foot" n="footcite:GNAEDIG:2007:Inria-00182434:1">
      <identifiant type="hal" value="inria-00182434"/>
      <analytic>
        <title level="a">Narrowing, Abstraction and Constraints for Proving Properties of Reduction Relations</title>
        <author>
          <persName key="protheo-2006-id18179">
            <foreName>Isabelle</foreName>
            <surname>Gnaedig</surname>
            <initial>I.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Hubert</foreName>
            <surname>Comon</surname>
            <initial>H.</initial>
          </persName>
          <persName key="protheo-2005-id18078">
            <foreName>Claude</foreName>
            <surname>Kirchner</surname>
            <initial>C.</initial>
          </persName>
          <persName key="protheo-2005-id18158">
            <foreName>Hélène</foreName>
            <surname>Kirchner</surname>
            <initial>H.</initial>
          </persName>
        </editor>
        <title level="m">Rewriting, Computation and Proof - Essays Dedicated to Jean-Pierre Jouannaud on the Occasion of His 60th Birthday</title>
        <loc>Paris, France</loc>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">4600</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year>2007</year>
          </dateStruct>
          <biblScope type="pages">44-67</biblScope>
          <ref xlink:href="http://hal.inria.fr/inria-00182434/en/" location="extern" xlink:type="simple" xlink:show="replace" xlink:actuate="onRequest">http://<allowbreak/>hal.<allowbreak/>inria.<allowbreak/>fr/<allowbreak/>inria-00182434/<allowbreak/>en/</ref>
        </imprint>
      </monogr>
    </biblStruct>
    
    <biblStruct id="carte-2013-bid7" type="book" rend="foot" n="footcite:vonNeumann66">
      <monogr>
        <title level="m">Theory of Self-Reproducing Automata</title>
        <author>
          <persName>
            <foreName>John</foreName>
            <surname>von Neumann</surname>
            <initial>J.</initial>
          </persName>
        </author>
        <imprint>
          <publisher>
            <orgName>University of Illinois Press<address><addrLine>Urbana, Illinois</addrLine></address></orgName>
          </publisher>
          <dateStruct>
            <year>1966</year>
          </dateStruct>
        </imprint>
      </monogr>
      <note type="bnote">edited and completed by A.W.Burks</note>
    </biblStruct>
  </biblio>
</raweb>
