Contents lists available at ScienceDirect Journal of the Mechanics and Physics of Solids Journal of the Mechanics and Physics of Solids 63 2014 491–505 0022-50 http:d n…
Available online at wwwsciencedirectcom wwwelseviercomlocateactamat Acta Materialia 58 2010 1938–1951 Orientation dependence of plastic deformation in nickel-based single…
ED n◦432 : Sciences des Métiers de l’Ingénieur N◦ attribué par la bibliothèque THESE pour obtenir le grade de Docteur de l’Ecole Nationale Supérieure des…
Available online at wwwsciencedirectcom wwwelseviercomlocateactamat Acta Materialia 61 2013 6178–6190 Dislocation-dynamics based crystal plasticity law for the low- and…
Dislocation mechanisms microstructures and hardening 1 FROM DISLOCATION MECHANISMS TO DISLOCATION MICROSTRUCTURES AND STRAIN HARDENING LP Kubin and B Devincre LEM CNRS-ONERA…
Section 05 du CNRS Matière condensée : organisation et dynamique Rapport d’activité Période 2000-2001 Benoit Devincre CR1 Laboratoire d’Etude des Microstructures…
Mechanics of Materials 71 2014 62–73 Contents lists available at ScienceDirect Mechanics of Materials journal homepage: www.elsevier .comlocate mechmat Dislocation reactions,…
Évaluation des capacités du dos numérique Sinar 54 H dans la reproduction des couleurs du manuscrit LATIN 8500 conservé à la Bibliothèque nationale de France Tome 1…
Modeling crystal plasticity with dislocation dynamics simulations: The ’microMegas’ code B Devincre 1 R Madec 2 G Monnet 3 S Queyreau 4 R Gatti 1 L Kubin 1 1 LEM CNRS-ONERA…
Chapter 4 Cryptographic hash functions References: – A. J. Menezes, P. C. van Oorschot, S. A. Vanstone: Handbook of Applied Cryptography – Chapter 9 - Hash Functions…
Security Assessment of Information Systems Standards Methods and Tools Florent Autréau florentautreau@imagfr October 2007 Security Models Protocols and Certification…
Slide 1FROM MESOSCALE SIMULATIONS TO MULTISCALE MODELLING Discrete Dislocation Plasticity Cambridge, 1-2 July 2004 L. Kubin &, B. Devincre LEM, CNRS-ONERA, F-Châtillon…
26 Parallel Algorithms Design and Implementation Lecture 2 – Processor oblivious algorithms Jean-LouisRoch at imagfr MOAIS Lab Informatique Grenoble INRIA France 27 Lecture…
1 Sécurité, Cryptologie et Codage des Systèmes d’Information Security, Cryptology and Coding of Information Systems History / Organization / Calendar Objective…
SCCI - M2P M2R Security Cryptology and Coding of Information Systems - Sécurité Cryptologie et Codage des Systèmes d’Information SAFE– M2P Context General…
2008-2009 Sécurité Cryptologie et Codage des Systèmes d’Information Security Cryptology and Coding of Information Systems Context General presentation…
• Malleable Tasks Scheduling problem Computational units are identifed and their relations are analyzed. We determine when and where they will be executed. Scheduling
Cours 4MMCSR - Codage et sécurité des réseaux • Objectif: présentation des aspects principaux à prendre en compte pour construire un système informatique distribué…
1 Masters of Science in Informatics at Grenoble Plan • Objective and approach • Overview of program • Action Plan • Provisions for Sept 2008 • Academic program…
Day 2 – Oct 11th ● Introduction ● Concepts ● Risks and Threats ● Methods and standards ● ISO2700x, OCTAVE, Ebios, Mehari, ● Tools ● Nessus, nmap, ethereal, ntop, ...…