EN FR
EN FR


Bibliography

Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 2A. Ahmed Nacer, E. Goettelmann, S. Youcef, A. Tari, C. Godart.

    A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation, in: International Journal of Web Services Research, October 2018, vol. 15, no 4. [ DOI : 10.4018/IJWSR.20181001 ]

    https://hal.archives-ouvertes.fr/hal-01888396
  • 3S. Atarodi, A. Berardi, A.-M. Toniolo.

    The technology acceptance model since 1986: 30 years of development, in: Psychologie du travail et des organisations, September 2018.

    https://hal.archives-ouvertes.fr/hal-01943567
  • 4H. Le Nguyen, C.-L. Ignat.

    An Analysis of Merge Conflicts and Resolutions in Git-based Open Source Projects, in: Computer Supported Cooperative Work, June 2018, vol. 27, no 3-6, pp. 741-765. [ DOI : 10.1007/s10606-018-9323-3 ]

    https://hal.archives-ouvertes.fr/hal-01917249

Invited Conferences

  • 5C.-L. Ignat.

    Keynote: From groupware to large-scale trustworthy distributed collaborative systems, in: CRIWG 2018 - 24th International Conference on Collaboration and Technology, Costa de Caparica, Portugal, September 2018.

    https://hal.archives-ouvertes.fr/hal-01875534

International Conferences with Proceedings

  • 6Q.-V. Dang, C.-L. Ignat.

    Link-Sign Prediction in Dynamic Signed Directed Networks, in: CIC 2018 - 4th IEEE International Conference on Collaboration and Internet Computing, Philadelphia, United States, October 2018.

    https://hal.inria.fr/hal-01881035
  • 7V. Elvinger, G. Oster, F. Charoy.

    Prunable Authenticated Log and Authenticable Snapshot in Distributed Collaborative Systems, in: CIC 2018 - 4th IEEE International Conference on Collaboration and Internet Computing, Philadelphia, United States, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), October 2018.

    https://hal.univ-lorraine.fr/hal-01932528
  • 8A. Ismaili-Alaoui, K. Baïna, K. Benali, J. Baïna.

    Towards Smart Incident Management Under Human Resource Constraints for an IoT-BPM Hybrid Architecture, in: ICWS 2018 - 25th International Conference on Web Services, Seattle, United States, H. Jin, Q. Wang, L.-J. Zhang (editors), Lecture Notes in Computer Science, Springer International Publishing, June 2018, vol. 10966, pp. 457-471. [ DOI : 10.1007/978-3-319-94289-6_29 ]

    https://hal.inria.fr/hal-01843095
  • 9A. Ismaili-Alaoui, K. Benali, K. Baïna, J. Baïna.

    Business Process Instances Scheduling with Human Resources Based on Event Priority Determination, in: BDCA 2018 - Third International Conference on Big Data, Cloud and Applications, Kenitra, Morocco, Y. Tabii, M. Lazaar, M. A. Achhab, N. Enneya (editors), springer, April 2018, vol. 872, pp. 118-130. [ DOI : 10.1007/978-3-319-96292-4_10 ]

    https://hal.inria.fr/hal-01889906
  • 10B. Linot, J. Dinet, F. Charoy, V. Shalin.

    Information gain in sociotechnical systems, in: ISCRAM 2018 - 15th International Conference on Information Systems for Crisis Response and Management, Rochester, United States, May 2018.

    https://hal.inria.fr/hal-01823245
  • 11B. Linot.

    Trust in Computer-Supported crisis management information sharing, in: ECSCW'2018 - 16th European Conference on Computer-Supported Cooperative Work: The International venue on Practice-centred computing and the Design of cooperation technologies, Nancy, France, June 2018. [ DOI : 10.18420/ecscw2018_dc07 ]

    https://halshs.archives-ouvertes.fr/halshs-01896410
  • 12H.-L. Nguyen, J.-P. Eisenbarth, C.-L. Ignat, O. Perrin.

    Blockchain-Based Auditing of Transparent Log Servers, in: 32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Bergamo, Italy, F. Kerschbaum, S. Paraboschi (editors), Data and Applications Security and Privacy XXXII, Springer International Publishing, July 2018, vol. LNCS-10980, pp. 21-37, Part 1: Administration.

    https://hal.archives-ouvertes.fr/hal-01917636
  • 13H.-L. Nguyen, C.-L. Ignat, O. Perrin.

    Trusternity: Auditing Transparent Log Server with Blockchain, in: Companion of the The Web Conference 2018, Lyon, France, April 2018. [ DOI : 10.1145/3184558.3186938 ]

    https://hal.inria.fr/hal-01883589
  • 14M. Nicolas.

    Efficient renaming in CRDTs, in: Middleware 2018 - 19th ACM/IFIP International Middleware Conference, Rennes, France, December 2018.

    https://hal.inria.fr/hal-01932552
  • 15G. Rosinosky, C. Labba, V. Ferme, S. Youcef, F. Charoy, C. Pautasso.

    Evaluating Multi-Tenant Live Migrations Effects on Performance, in: CoopIS 2018 - 26th International Conference on Cooperative Information Systems, Valetta, Malta, Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I, Springer, October 2018, no 11229, 16 p.

    https://hal.archives-ouvertes.fr/hal-01870812
  • 16G. Rosinosky, S. Youcef, F. Charoy.

    A Genetic Algorithm for Cost-Aware Business Processes Execution in the Cloud, in: ICSOC 2018 - The 16th International Conference on Service-Oriented Computing, Hangzhou, China, Lecture Notes in Computer Science, Springer, November 2018, no 11236, 14 p.

    https://hal.archives-ouvertes.fr/hal-01870828

Conferences without Proceedings

Books or Proceedings Editing

  • 18C.-L. Ignat, P. Bjørn, P. Dewan (editors)

    Special Issue: ECSCW 2018: The 16th European Conference on Computer-Supported Cooperative Work, The International Venue on Practice-centred Computing and the Design of Cooperation Technologies, Springer Verlag, Nancy, France, December 2018, vol. 27, no 3-6, pp. 291-1020.

    https://hal.archives-ouvertes.fr/hal-01917238
References in notes
  • 19S. Bhiri, W. Gaaloul, C. Godart.

    Mining and Improving Composite Web Services Recovery Mechanisms, in: International Journal of Web Services Research, 03 2008, vol. 3.

    http://hal.inria.fr/inria-00438424/en/
  • 20S. Bhiri, O. Perrin, W. Gaaloul, C. Godart.

    An Object-Oriented Metamodel For Inter-Enterprises Cooperative Processes Based on Web Services, in: Journal of Integrated Design and Process Science, 2004, vol. 8, pp. 37–55.

    http://hal.inria.fr/inria-00099953/en/
  • 21J. Bonneau.

    EthIKS: Using Ethereum to audit a CONIKS key transparency log, in: International Conference on Financial Cryptography and Data Security, Springer, 2016, pp. 95–105.
  • 22F. Casati.

    Promises and Failures of Research in Dynamic Service Composition, in: Seminal Contributions to Information Systems Engineering, J. Bubenko, J. Krogstie, O. Pastor, B. Pernici, C. Rolland, A. Sølvberg (editors), Springer Berlin Heidelberg, 2013, pp. 235-239.

    http://dx.doi.org/10.1007/978-3-642-36926-1_18
  • 23C. A. Ellis, S. J. Gibbs.

    Concurrency Control in Groupware Systems, in: Proceedings of the ACM SIGMOD Conference on the Management of Data - SIGMOD 89, Portland, Oregon, USA, May 1989, pp. 399–407.

    http://doi.acm.org/10.1145/67544.66963
  • 24S. Hochreiter, J. Schmidhuber.

    Long Short-Term Memory, in: Neural Comput., November 1997, vol. 9, no 8, pp. 1735–1780.

    http://dx.doi.org/10.1162/neco.1997.9.8.1735
  • 25Q. V. Le, T. Mikolov.

    Distributed Representations of Sentences and Documents, in: ICML, JMLR Workshop and Conference Proceedings, JMLR.org, 2014, vol. 32, pp. 1188–1196.
  • 26C. D. Manning, P. Raghavan, H. Schütze.

    Introduction to Information Retrieval, Cambridge University Press, New York, NY, USA, 2008.
  • 27M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, M. J. Freedman.

    CONIKS: Bringing key transparency to end users, in: 24th USENIX Security Symposium (USENIX Security 15), 2015, pp. 383–398.
  • 28G. Oster, P. Urso, P. Molli, A. Imine.

    Data Consistency for P2P Collaborative Editing, in: ACM Conference on Computer-Supported Cooperative Work - CSCW 2006, Banff, Alberta, Canada, ACM Press, 11 2006, pp. 259 - 268.

    http://hal.inria.fr/inria-00108523/en/
  • 29M. P. Papazoglou, P. Traverso, S. Dustdar, F. Leymann.

    Service-Oriented Computing: State of the Art and Research Challenges, in: Computer, 2007, vol. 40, pp. 38-45.
  • 30N. Preguiça, J. M. Marquès, M. Shapiro, M. Letia.

    A commutative replicated data type for cooperative editing, in: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Québec Canada, IEEE Computer Society, 2009, pp. 395-403. [ DOI : 10.1109/ICDCS.2009.20 ]

    http://hal.inria.fr/inria-00445975/en/
  • 31D. E. Rumelhart, G. E. Hinton, R. J. Williams.

    Neurocomputing: Foundations of Research, J. A. Anderson, E. Rosenfeld (editors), MIT Press, Cambridge, MA, USA, 1988, chap. Learning Representations by Back-propagating Errors, pp. 696–699.

    http://dl.acm.org/citation.cfm?id=65669.104451
  • 32Y. Saito, M. Shapiro.

    Optimistic Replication, in: Computing Surveys, March 2005, vol. 37, no 1, pp. 42–81.

    http://doi.acm.org/10.1145/1057977.1057980
  • 33S. Schulte, C. Janiesch, S. Venugopal, I. Weber, P. Hoenisch.

    Elastic Business Process Management: State of the art and open challenges for BPM in the cloud, in: Future Generation Computer Systems, 2015, vol. 46, pp. 36 - 50. [ DOI : 10.1016/j.future.2014.09.005 ]

    http://www.sciencedirect.com/science/article/pii/S0167739X1400168X
  • 34C. Sun, X. Jia, Y. Zhang, Y. Yang, D. Chen.

    Achieving Convergence, Causality Preservation, and Intention Preservation in Real-Time Cooperative Editing Systems, in: ACM Transactions on Computer-Human Interaction, March 1998, vol. 5, no 1, pp. 63–108.

    http://doi.acm.org/10.1145/274444.274447