@article{CDD+6,
title = { The Expressive Power of Snap-Stabilization },
author = {Cournier, Alain and Datta, Ajoy Kumar and Devismes, St\'ephane and Petit, Franck and Villain, Vincent},
year = {2016},
journal = {Theoretical Computer Science (TCS)},
pages = {40--66},
volume = {626},
team = {SYNC},
}
Home > Verimag > Publications
bibtex
Browsing
News
- Seminars
- 17 June 2024 Sylvain Boulme: Toward a ffi (foreign function interface) for embedding untrusted imperative ocaml (…)
- 18 June 2024 Matthieu Sozeau: Verified extraction from coq to ocaml
- 19 June 2024 Jean-françois Monin: Recent advances on the braga method
- 27 June 2024 Nicolas Chappe: Tba (toward a verified compilation infrastructure for concurrent programs)
Seminars
New publications
- Some Recent Publications
- Dominique Larchey-Wendling, Jean-François Monin: Proof Pearl: Faithful Computation and Extraction of \mu-Recursive Algorithms in Coq
- Karine Altisen, Alain Cournier, Geoffrey Defalque, Stéphane Devismes: Pour battre à l'unisson, il faut que tous les chemins viennent de Rome
- Claire Maiza: Hardware and software analyses for precise and efficient timing analysis
- Aina Rasoldier, Jacques Combaz, Alain Girault, Kevin Marquet, Sophie Quinton: Assessing the Potential of Carpooling for Reducing Vehicle Kilometers Traveled
Jobs and internships
- Jobs and internships
- [Master] Implementation of critical applications on multi-core: execution mode analysis to reduce interferences
- PERSYVAL Master 2 Scholarships
- [Funded PhD/PostDoc] Countermeasures to (transient) Side-Channel Attacks in a Formally Verified Compiler
- [Funded PhD] Annotations de sécurité pour compilateur optimisant formellement vérifié
- [Funded PhD] Formal Modeling and Verification of Parameterized and Distributed Systems
- [Funded PhD] Quantitative analysis of software security against adaptive attacks
- [Master] Formal Methods for the Verification of Self-Adapting Distributed Systems
- [Master] Modular Analysis for Formal Verification of Integrated Circuits at Transistor Level
- [Master]Leakage in presence of an active and adaptive adversary
- [PostDoc] Implementation of critical applications on multi-core: execution mode analysis to reduce interferences