Département des systèmes d'information

Equipe principale
Publications | Mémoires et thèses

La recherche avancée est accessible via Serval

Les publications peuvent être gérées en accédant à Serval via MyUnil


1323 publications

... | 2010 | 2009 | 2008 | 2007 | 2006 | ...
 
Generalized Boolean networks: how spatial and temporal choices influence their dynamics
Darabos C., Giacobini M., Tomassini M., 2010. pp. 429-449 dans Das, Sanjoy, Caragea, Doina, Hsu,W. H., Welch, Stephen M. (eds.) Handbook of of Research on Computational Methodologies in Gene Regulatory Networks, IGI Global.
 
GPU implementation of a road sign detector based on particle swarm optimization
Mussi L., Cagnoni S., Cardarelli E., Daolio F., Medici P., Porta P.P., 2010. Evolutionary Intelligence pp. 1--15. Peer-reviewed.
Guest editorial: special issue on parallel and distributed evolutionary algorithms, part two
Tomassini Marco, Vanneschi Leonardo, 2010. Genetic Programming and Evolvable Machines, 11 (2) pp. 129-130. Peer-reviewed.
 
Injecting Power-Awareness into Epidemic Information Dissemination in Sensor Networks
Garbinato B., Rochat D., Tomassini M., Vessaz F., 2010. Future Generation Computer Systems, 26 (6) pp. 868-876. Peer-reviewed.
 
Local Optima Networks of the Quadratic Assignment Problem
Daolio F., Vérel S., Ochoa G., Tomassini M., 2010., IEEE pp. 3145-3152 dans WCCI 2010 IEEE World Congress on Computational Intelligence. Peer-reviewed, IEEE Press.
 
Modéliser par l'exemple - Pratique des tableurs et des bases de données. 2e édition revue et augmentée
Maksay Gabor, Pigneur Yves, 2010. Diriger l'entreprise 426, Presse Polytechnique et Universitaire Romande (PPUR).
 
Mutual trust and cooperation in the evolutionary hawks-doves game
Tomassini Marco, Pestelacci Enea, Luthi Leslie, 2010/01. BioSystems, 99 (1) pp. 50-59. Peer-reviewed.
 
Organizational structures
Ghernaouti-Hélie S., Debbagh T., 2010. dans Global Cybersecurity Agenda : a Framework for International Cooperation, International Telecommunication Union (ITU).
 
Recurrent spatiotemporal firing patterns in large spiking neural networks with ontogenetic and epigenetic processes.
Iglesias J., Villa A.E., 2010. Journal of physiology, Paris, 104 (3-4) pp. 137-146. Peer-reviewed.
 
Six-shot multicast: A location-aware strategy for efficient message routing in MANETs
Garbinato B., Holzer A., Vessaz F., 2010. pp. 1-9 dans Proceedings of the 9th IEEE International Symposium on Network Computing and Applications (NCA'10), NCA '10. Peer-reviewed, IEEE Computer Society Press.
Supporting Business Model Modelling: a Compromise between Creativity and Constraints
Fritscher B., Pigneur Y., 2010/01. pp. 28-43 dans England D., Palanque P., Vanderdonckt J., Wild P. (eds.) Task Models and Diagrams for User Interface Design: 8th International Workshop, TAMODIA 2009, Brussels, Belgium, September 23-25, 2009, Revised Selected Papers, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Technocivilisation - Pour une philosophie du numérique
Berger R., Ghernaouti-Hélie S., 2010. Collection Focus Science 152, PPUR (Presses Polytechniques et Universitaires Romandes).
 
The configuration and performance of international innovation networks: some evidence from the Chinese software industry
Fang G., Pigneur Y., 2010/01. International Journal of Learning and Intellectual Capital (IJLTM), 7 (2) pp. 167-187. Peer-reviewed.
 
Tracking Games in Mobile Networks
Humbert Mathias, Manshaei Mohammad Hossein, Freudiger Julien, Hubaux Jean-Pierre, 2010. pp. 38-57 dans Alpcan Tansu, Buttyán Levente, Baras John S. (eds.) Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings. Peer-reviewed, Springer.
 
Transmission of Distributed Deterministic Temporal Information through a Diverging/Converging Three-Layers Neural Network
Asai Y., Villa A.E.P., 2010. pp. 145-154 dans Artificial Neural Networks – ICANN 2010. Peer-reviewed, Springer Berlin Heidelberg.
Les Droits de l'Homme au regard d'Internet et de la sécurité informatique : Posture ou Imposture ?, publié dans "Flash informatique", EPFL, No 10, 22 décembre 2009, pp. 11-12
Ghernaouti-Hélie S., 2009/12..
 
Pervaho: a Specialized Middleware for Mobile Context-aware Applications
Eugster P., Garbinato B., Holzer A., 2009/12. Electronic Commerce Research, 9 (4) pp. 245-268. Peer-reviewed.
The Wadge Hierarchy of Max-Regular Languages
Cabessa J., Duparc J., Facchini A., Murlak F., 2009/12. pp. 121-132 dans Kannan R., Narayan Kumar K. (eds.) IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2009), Leibniz International Proceedings in Informatics (LIPIcs). Peer-reviewed, Schloss Dagstuhl-Leibniz-Zentrum für Informatik.
 
Contribution au Rapport d'experts "Weiter knüpfen am Netz der Netze Bericht von TA-SWISS im Rahmen des Projekts Internet der Zukunft " [Aujourd'hui comme demain, tisser la toile des réseaux: Ce que disent les experts sur l'Internet du futur]
Ghernaouti-Hélie S., 2009/11., Centre d'évaluation des choix technologiques TA-SWISS, projet "L'Internet du futur" - module 2.
L'économie souterraine induite du cybercrime, publié dans "l'AGEFI", 27 novembre 2009
Ghernaouti-Hélie S., 2009/11..
 
Reliable Communication Infrastructure for Adaptive Data Replication
Allani M., Garbinato B., Malekpour A., Pedone F., 2009/11. pp. 634-652 dans On the Move to Meaningful Internet Systems: OTM 2009, Lecture Notes in Computer Science (LNCS). Peer-reviewed, Springer.
 
Business Model Generation
Osterwalder A., Pigneur Y., 2009/09. 279, self-published.
 
Knowledge Management for IT Project Portfolio
Rosselet U., Jolliet Y., Wentland M., 2009/09. dans Proceedings of the 10th European Conference on Knowledge Management (ECKM), Vicenza, Italy. Peer-reviewed.
 
Knowledge Management Framework for IT Project Portfolio Risk Management
Rosselet U., Wentland M., 2009/09., Stanford University dans Proceedings of the fifth International Conference on Knowledge Capture (KCAP), Redondo Beach, USA. Peer-reviewed, ACM New York, NY, USA.
 
Risques systémiques et contrôle des marchés
Munari S., Wentland M., 2009/09. AGEFI p. 2.
 
Reasonable Security by Effective Risk Management Practices: From Theory to Practice
Ghernaouti-Hélie S., Simms D., Tashi I., 2009/08. pp. 226-233 dans 12th International Conference on Network-Based Information Systems, 2009. NBIS '09. . Peer-reviewed, IEEE.
 
A Bio-Inspired Agent Framework for Hardware Accelerated Distributed Pervasive Applications
Brousse O., Guillot J., Sassatelli G., Gil T., Robert M., Moreno J. M., Villa A.E.P, Sanchez E., 2009/07. pp. 415-422 dans 2009 NASA/ESA Conference on Adaptive Hardware and Systems. Peer-reviewed, IEEE.
 
A Game Theoretical Approach to The Algebraic Counterpart of The Wagner Hierarchy: Part II
Cabessa J., Duparc J., 2009/07. RAIRO: Informatique Théorique et Applications / RAIRO: Theoretical Informatics and Applications, 43 (3) pp. 463-515. Peer-reviewed.
 
Conformity hinders the evolution of cooperation on scale-free networks
Peña J., Volken H., Pestelacci E., Tomassini M., 2009/07. Physical Review E, 80 (1) pp. 016110-1 - 016110-11. Peer-reviewed.
 
OpenScenario : a flexible integrated environment to develop Educational Activities based on Pedagogical Scenarios
Jullien J. M., Martel C., Vignollet L., Wentland M., 2009/07. dans Proceedings of ICALT (International Conference on Advanced Learning Technologies), Riga, Latvia. Peer-reviewed.
 
QuoCast : a Resource Aware Algorithm for Reliable Peer-to-Peer Multicast
Allani M., Garbinato B., Malekpour A., Pedone F., 2009/07. pp. 20-27 dans Proceedings of The 8th IEEE International Symposium on Networking Computing and Applications (NCA'09). Peer-reviewed, IEEE Computer Society.
 
Streamline : an Architecture for Overlay Multicast
Malekpour A., Pedone F., Allani M., Garbinato B., 2009/07. pp. 44-51 dans Proceedings of The 8th IEEE International Symposium on Networking Computing and Applications (NCA'09). Peer-reviewed, IEEE Computer Society.
 
Compliance management in multi-actor contexts
Bonazzi R., Pigneur Y., 2009/06. pp. 91-105 dans Proceedings of the 2nd International Workshop on Governance, Risk and Compliance (GRCIS'09). Peer-reviewed, CEUR.
 
Déploiement agile d'ERP open source en PME
Estier T., Métrailler A., 2009/06., Association Information et Management dans Actes du Colloque AIM 2009. Peer-reviewed.
 
E-Commerce Applications Evolution Issues: the case of E-Banking
Estier T., Partnov N., 2009/06. dans Weigand H., Werthner H., Gal G. (eds.) Procs of 4th Int. Workshop on Business IT Alignement and Interoperability (BUSITAL'09), 21st International Conference on Advanced Information Systems (CAiSE'09). Peer-reviewed.
 
Evolutionary Games on Networks and Payoff Invariance under Replicator Dynamics
Luthi Leslie, Tomassini Marco, Pestelacci Enea, 2009/06. BioSystems, 96 (3) pp. 213-222. Peer-reviewed.
 
Gestion des conflits et équipes projets TI : la nécessaire prise en compte des controverses
Loufrani-Fedida S., Missonier S., 2009/06. dans 14ème colloque de l'Association Information et Management. Peer-reviewed, Association Information et Management (AIM).
Near field communication: an assessment for future payment systems
Ondrus J., Pigneur Y., 2009/06. Information Systems and E-Business Management (ISEB), 7 (3) pp. 347-361. Peer-reviewed.
C-K design theory for information systems research
Ondrus J., Pigneur P., 2009/05. dans Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology (DESRIST'09). Peer-reviewed, ACM digital library.
Conformity and Network Effects in the Prisoner's Dilemma
Peña J., Pestelacci E., Tomassini M., Volken H., 2009/05. pp. 506-513 dans IEEE Congress on Evolutionary Computation, 2009. CEC 2009.. Peer-reviewed, Haddow P..
 
EMé, a Flexible Environment for Competences Evaluation
Jullien J.M., Martel C., Vignollet L., Wentland M., 2009/05. dans Proceedings of CESIE'09, Bordeaux, France. Peer-reviewed.
 
Information Security Management is not only Risk Management
Tashi I., Ghernaouti-Hélie S., 2009/05. pp. 116-123 dans Proceedings of the 2009 Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009). Peer-reviewed, IEEE.
 
A security management assurance model to holistically assess the information security posture
Ghernaouti-Hélie S., Tashi I., 2009/03. pp. 756-761 dans Proceedings of the 4th international conference on Availability, Reliability and Security (ARES 2009). Peer-reviewed, IEEE.
 
An inclusive information society needs a global approach of information security
Ghernaouti-Hélie S., 2009/03. pp. 658-662 dans 4th international conference on Availability, Reliability and Security (ARES 2009), Proceedings. Peer-reviewed, IEEE.
 
Application Layer Multicast
Allani M., Garbinato B., Pedone F., 2009/03. pp. 191-218 dans Garbinato B., Miranda H., Rodrigues L. (eds.) Middleware for Network Eccentric and Mobile Applications chap. 9, Berlin/Heidelberg: Springer.
Design and management of business models and processes in services science
Pigneur Y., Werthner H., 2009/03. Information Systems and E-Business Management (ISEB), 7 (2) pp. 119-121. Peer-reviewed.
 
Middleware Support for Context-aware Applications
Eugster P., Garbinato B., Holzer A., 2009/03. pp. 305-322 dans Garbinato B., Miranda H., Rodrigues L. (eds.) Middleware for Network Eccentric and Mobile Applications chap. 14, Berlin/Heidelberg: Springer.
 
A game theoretical approach to the algebraic counterpart of the Wagner hierarchy: Part I
Cabessa Jérémie, Duparc Jacques, 2009. RAIRO Theor. Informatics Appl., 43 (3) pp. 443-461. Peer-reviewed.
A Playful Glance at Hierarchical Questions for Two-Way Alternating Automata
Duparc J., Facchini A., 2009. pp. 46-55 dans Archibald M., Brattka V., Goranko V., Löwe B. (eds.) Selected Papers of the International Conference Infinity in Logic and Computation, Cape Town, South Africa, November 2007, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
An Holistic model to evaluate the Information Security Health State
Tashi I., Ghernaouti-Hélie S., 2009/01. dans European Telecommunications Standartization Institute (ETSI) 4th Security Workshop,. Peer-reviewed.
 
Avoiding Prototype proliferation in incremental vector quantitization of large heterogeneous datasets
Satizabal H. F., Pérez-Uribe A., Tomassini M., 2009. pp. 243-260 dans Constructive Neural Networks, Springer.
 
Cybersecurity Guide for Developing Countries
Ghernaouti-Hélie S., 2009., 3rd edition 165, ITU-D (International Telecommunication Union).
 
Dynamics of Unperturbed and Noisy Generalized Boolean Networks
Darabos C., Tomassini M., Giacobini M., 2009. Journal of Theoretical Biology, 260 pp. 531-544. Peer-reviewed.
 
Empirical assessment of the effects of update synchronization in Particle Swarm Optimization
Luca Mussi, Stefano Cagnoni, Fabio Daolio, 2009. pp. 1--10 dans Proc. of the 2009 AI*IA Workshop on Complexity, Evolution and Emergent Intelligence. Peer-reviewed.
 
GPU-Based Road Sign Detection Using Particle Swarm Optimization
Mussi L., Cagnoni S., Daolio F., 2009., IEEE Computer Society pp. 152--157 dans Proceedings of the 2009 Ninth International Conference on Intelligent Systems Design and Applications. Peer-reviewed.
Introduction: special issue on parallel and distributed evolutionary algorithms, part I
Tomassini Marco, Vanneschi Leonardo, 2009. Genetic Programming and Evolvable Machines, 10 (4) pp. 339-341. Peer-reviewed.
 
JubiTool: Unified design flow for the Perplexus SIMD hardware accelerator
Brousse O., Guillot J., Gil T., Grize F., Sassatelli G., Moreno J. M., Madrenas J., Villa A. E. P., Volken H., Robert M., 2009. pp. 2070-2075 dans 2009 IEEE Congress on Evolutionary Computation, Vols. 1-5 (CEC '09). Peer-reviewed, IEEE.
 
La Cybercriminalité : le visible et l'invisible
Ghernaouti-Hélie S., 2009. Le Savoir Suisse 128, PPUR (Presses Polytechniques et Universitaires Romandes).
Linear Game Automata: Decidable Hierarchy Problems for Stripped-Down Alternating Tree Automata
Duparc J., Facchini A., Murlak F., 2009. pp. 225-239 dans Grädel E., Kahle R. (eds.) Computer Science Logic: 23rd International Workshop, CSL 2009, 18th Annual Conference of the EACSL, Coimbra, Portugal, September 7-11, 2009, Proceedings, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Linear Game Automata: Decidable Hierarchy Problems for Stripped-Down Alternating Tree Automata
Duparc Jacques, Facchini Alessandro, 2009. pp. 225-239 dans Grädel Erich, Kahle Reinhard (eds.) Computer Science Logic, 23rd international Workshop, CSL 2009, 18th Annual Conference of the EACSL, Coimbra, Portugal, September 7-11, 2009. Proceedings. Peer-reviewed, Springer.
 
NK Landscapes Difficulty and Negative Slope Coefficient: How Sampling Influences the Results
Vanneschi L., Vérel S., Tomassini M., Collard P., 2009. pp. 645-654 dans Proceedings of EvoStar 2009, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Power-Efficient Epidemic Information Dissemination in Sensor Networks
Garbinato B., Rochat D., Tomassini M., 2009. pp. 69-76 dans Proceedings of Workshop on Bio-Inspired Algorithms for Distributed Systems, BADS 09. Peer-reviewed, ACM.
Resource-Aware Multimedia Content Delivery: A Gambling Approach
Allani M., Garbinato B., Pedone F., 2009. The Computer Journal, 53 (2) pp. 234-248. Peer-reviewed.
The Modal mu-Calculus and The Gödel-Löb Logic
Facchini A., Alberucci L., 2009. Studia Logica, 91 (2) pp. 145-169. Peer-reviewed.
The Modal μ-Calculus Hierarchy on Restricted Classes of Transition Systems
Facchini A., Alberucci L., 2009. The Journal of Symbolic Logic, 74 (4) pp. 1367-1400. Peer-reviewed.
 
The Topological Complexity of Models of the Modal μ-Calculus: On The Alternation Free Fragment and Beyond
Duparc J., Facchini A., 2009. hal-00396433, version 1, Laboratoire Bordelais de Recherche en Informatique et Université de Lausanne.
 
The Wadge Hierarchy of Max-Regular Languages
Cabessa Jérémie, Duparc Jacques, Facchini Alessandro, Murlak Filip, 2009. pp. 121-132 dans Kannan Ravi, Kumar Narayan (eds.) IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2009, December 15-17, 2009, IIT Kanpur, India. Peer-reviewed, Schloss Dagstuhl - Leibniz-Zentrum für Informatik.
 
Tuning parameters in the fuzzy growing hierarchical self-organizing network
Barreto M., Pérez-Uribe A., Peña-Reyes C.A., Tomassini M., 2009. pp. 261-279 dans Studies in Computational Intelligence Series, Springer.
Why Mobile Payments Fail? Towards a Dynamic and Multi-Perspective Explanation
Ondrus J., Lyytinen K., Pigneur Y., 2009/01. dans Proceedings of the 42th Annual Hawaii International Conference on System Sciences (HICSS). Peer-reviewed, IEEE Computer Society.
Comparison of Multi-criteria and Prediction Market Approaches for Technology Foresight
Gaspoz C., Ondrus J., Pigneur Y., 2008/12., Association Information and Management (AIM) p. 9 dans Proceedings of the 13th Conference of the Association Information and Management (AIM). Peer-reviewed.
 
Six-shot Broadcast: a context-aware algorithm for efficient message diffusion in MANETs
Garbinato B., Holzer A., Vessaz F., 2008/11. pp. 625-638 dans On the Move to Meaningful Internet Systems: OTM 2008, Lecture Notes in Computer Science (LNCS). Peer-reviewed, Springer.
Quantum cryptography : An Innovation in the Domain of Secure Information Transmission
Ghernaouti-Hélie S., 2008/10. dans Quantum Network Demonstration Scientific Conference. Peer-reviewed.
 
Un monde numérique particulièrement vulnérable à la criminalité
Ghernaouti-Hélie S., 2008/10. La Documentation française - Problèmes politiques et sociaux - Dossier N° 953 La délinquance électronique pp. 13-15.
 
A system controlled-openness for resources quality control and query transparency
Madhour H., Wentland M., 2008/09. dans Elearn'08 (World Conference on E-Learning in Corporate, Government, Healthcare and Higher Education), Las Vegas, USA. Peer-reviewed.
 
Modéliser par l'exemple - Pratique des tableurs et des bases de données
Maksay G., Pigneur Y., 2008/09. Diriger l'entreprise 338, Presse Polytechnique et Universitaire Romande (PPUR).
 
Efficient Security Measurements and Metrics for Risk Assessment
Tashi I., Ghernaouti-Hélie S., 2008/07. pp. 131-138 dans The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), Proceedings. Peer-reviewed.
 
SECOQC / ETSI Open Initiative for Standardisation of Quantum Cryptography and Quantum Technologies
Länger T., Ghernaouti-Hélie S., Lenhart G., 2008/07. dans Proceedings of 17th International Laser Physics workshop, The International Journal Laser Physics. Peer-reviewed.
 
Investir autrement en matière de sécurité informatique, publié dans "Le Temps", Chronique Un temps d'avance, 6 juin 2008
Ghernaouti-Hélie S., 2008/06..
 
Personalized learning path delivery: models and example of application
Madhour H., Wentland M., 2008/06. dans Proceedings of ITS (International Telecommunications Society), Montreal, Canada. Peer-reviewed.
Prediction Markets As an Innovative Way to Manage R&D Portfolios
Gaspoz C., 2008/06. pp. 62-73 dans McBrien P., Toumani F., Hunt E., Franch X., Coletta R. (eds.) Proceedings of the 15th Doctoral Consortium at CAiSE-2008. Peer-reviewed.
 
The Algebraic Counterpart of the Wagner Hierarchy
Cabessa J., Duparc J., 2008/06. Lecture Notes in Computer Science, 5028 pp. 100-109. Peer-reviewed.
 
Cooperation and community structure in social networks
Luthi L., Pestelacci E., Tomassini M., 2008/02. Physica A-statistical Mechanics and its Applications, 387 (4) pp. 955-966. Peer-reviewed.
 
Identités multiples sur Internet et identification des cybercriminels, publié dans "Revue de la Gendarmerie nationale" No 27
Ghernaouti-Hélie S., 2008/02..
 
Secure Message Relay over Networks with QKD-Links
Rass S., Sfaxi M.A., Ghernaouti-Hélie S., Kyamakya K., 2008/02. pp. 10-15 dans Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 08). Peer-reviewed.
 
A Normal Form of Borel Sets of Finite Rank
Duparc J., 2008., submitted to Notre-Dame Journal of Formal Logic radically different proofs and tools than the ones in the article submitted to JSL. These proofs are close to the ones in my Ph.D. Thesis, but extremely reduced.
 
A Study of NK Landscapes' Basins and Local Optima Networks
Ochoa G., Tomassini M., Vérel S., Darabos C., 2008. pp. 555 - 562 dans Proceedings of the genetic and evolutionary computation conference GECCO '08. Peer-reviewed, ACM Press.
 
A survey of artificial neural network-based. modeling in agroecology
Jiménez D.R., Pérez-Uribe A., Satizábal H.F., Barreto S Miguel A., Van Damme P., Tomassini M., 2008. pp. 247-269 dans Prasad B. (eds.) In Soft Computing Applications in Industry, Springer.
 
An omega-power of a context-free language which is Borel above Delta0_omega
Duparc Jacques, Finkel Olivier, 2008., Université de Lausanne, HEC Lausanne.
 
Complex Networks Analysis of Combinatorial Spaces: the NK Landscape Case
Tomassini M., Vérel S., Ochoa G., 2008. Physical Review E, 78 (6) p. 066114. Peer-reviewed.
 
Cooperation in Coevolving Networks: the Prisoner's Dilemma and Stag-Hunt Games
Pestelacci E., Tomassini M., 2008. pp. 539 - 548 dans Proceedings of Parallel Problem Solving from Nature 2008, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Describing the Wadge Hierarchy for the Alternation Free Fragment of μ -Calculus (I) The Levels Below ω 1
Duparc J., Facchini A., 2008. pp. 186-195 dans Beckmann A., Dimitracopoulos C., Löwe B. (eds.) Logic and Theory of Algorithms : Fourth Conference on Computability in Europe, CiE 2008, Athens, Greece, June 2008, Proceedings, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Describing the Wadge Hierarchy for the Alternation Free Fragment of μ-Calculus (I)
Duparc Jacques, Facchini Alessandro, 2008. pp. 186-195 dans Beckmann Arnold, Dimitracopoulos Costas, Löwe Benedikt (eds.) Logic and Theory of Algorithms, 4th Conference on Computability in Europe, CiE 2008, Athens, Greece, June 15-20, 2008, Proceedings. Peer-reviewed, Springer.
 
Design and Implementation of the Pervaho Middleware for Mobile Context-aware Applications
Eugster P., Garbinato B., Holzer A., 2008/01. pp. 125-135 dans Proceedings of the 2008 International MCETECH Conference on e-Technologies (MCETECH'08). Peer-reviewed, IEEE Computer Society.
 
Dynamics of interconnected Boolean networks with scale-free topology
Damiani C., Villani M., Darabos C., Tomassini M., 2008. pp. 271-283 dans R. Serra et al , World Scientific (eds.) Proceedings of Artificial Life and Evolutionary Computation. Peer-reviewed.
Evolution of Cooperation and Coordination in a Dynamically Networked Society
Pestelacci E., Tomassini M., Luthi L., 2008. Journal of Biological Theory, 3 (2) pp. 139-153. Peer-reviewed.
 
Evolutionary algorithms in problem-solving and machine learning
Tomassini M., Vanneschi L., 2008. pp. 124 - 137 dans Orsucci F., Sala N. (eds.) Reflexing Interfaces: the Complex Coevolution of Information Technology Ecosystems, IGI Global.
 
Fuzzy Growing Hierarchical Self-Organizing Networks
Barreto-Sanz M. A., Perez-Uribe A., Peña-Reyes C.-A., Tomassini M., 2008. pp. 713 - 722 dans Proceedings of 18th International Conference on Artificial Neural Networks, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Games, Evolution, and Society
Tomassini M., 2008. Rend. Se. Mat. Univ. Pol. Torino pp. 229-258. Peer-reviewed.
 
Global Strategic Report co-autor (Part III : Organisational Structures and Part IV : Capacity Building)
Ghernaouti-Hélie S., 2008., ITU Global Cybersecurity Agenda (GCA) - High-level Experts Group (HLEG).
 
Hawks and doves in an artificial dynamically structured society
Pestelacci E., Tomassini M., 2008. pp. 466 - 473 dans Bullock S., Noble J., Watson R., Bedau M. A. (eds.) Artificial Life XI: Proceedings of the Eleventh International Conference on the Simulation and Synthesis of Living Systems. Peer-reviewed, MIT Press, Cambridge, MA.
 
Information Security for Economic and social development
Ghernaouti-Hélie S., 2008. 122, United Nations Economic and Social Commission for Asia and the Pacific (UNESCAP).
 
Negative Slope Coefficient and the difficulty of random 3-SAT Iinstances
Tomassini M., Vanneschi L., 2008. pp. 643 - 648 dans Proceedings of Applications of Evolutionary Computing, EvoWorkshops 2008, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
Next Steps towards Practical Application of Quantum Cryptography
Länger T., Ghernaouti-Hélie S., 2008. dans Proceedings of Networking and Electronic Commerce Research Conference 2008 (NAEC 2008). Peer-reviewed.
 
Power-Efficient gossiping in multi-hop ad hoc networks
Garbinato B., Rochat D., Tomassini M., 2008. pp. 23-25 dans Proceedings of 2nd International Conference on Autonomic Computing and Communication Systems, Autonomics 2008. Peer-reviewed, ACM.
Preparing a Negotiated R&D Portfolio with a Prediction Market
Gaspoz C., Pigneur Y., 2008/01. p. 52 dans Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). Peer-reviewed, IEEE Computer Society.
 
Prototype Proliferation in the Growing Neural Gas Algorithm
Satizabal H., Perez-Uribe A., Tomassini M., 2008. pp. 793 - 802 dans Proceedings of 18th International Conference on Artificial Neural Networks, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
The Connectivity of NK Landscapes' Basins: A Network Analysis
Vérel S., Ochoa G., Tomassini M., 2008. pp. 648 - 655 dans S. Bullock et al (eds.) Proceedings of Artificial Life Conference Alife XI. Peer-reviewed, MIT Press.
 
Cyberslacking et cybersurveillance des employés, publié dans "Le Temps", Chronique Un temps d'avance, 8 décembre 2007
Ghernaouti-Hélie S., 2007/12..
 
On the topological complexity of tree languages
Arnold A., Duparc J., Murlak F., Niwiński D., 2007/12. pp. 9-28 dans Flum J., Grädel E., Wilke T. (eds.) Logic and Automata: History and Perspectives, Amsterdam University Press.
Technology Foresight for IT Investment: Multi-Criteria Decision-Making versus Prediction Markets
Ondrus J., Gaspoz C., Pigneur Y., 2007/12. p. 4 dans 6th French affiliated AIM pre-ICIS workshop. Peer-reviewed.
 
A Gambling Approach to Scalable Resource-Aware Streaming
Allani M., Garbinato B., Pedone F., Stamenkovic M., 2007/10. pp. 288-300 dans Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS'07). Peer-reviewed, IEEE Computer Society.
 
Knowledge Sharing by means of OpenAdap.net
Villa A., Iglesias J., Ghernaouti-Hélie S., 2007/10. dans Proceedings of 2nd Workshop IST_Africa - Supporting Research Engagement with Africa. Peer-reviewed.
 
Quantum security for business and commercial applications
Tashi I., Ghernaouti-Hélie S., 2007/10. dans Proceedings of Networking and Electronic Commerce Research Conference 2007 (NAEC 2007). Peer-reviewed.
 
A reference model for the consumption of protected content in home networks
Bugnon S., Garbinato B., Lebuhan-Jordan C., 2007/09. pp. 1-5 dans IEEE Press (eds.) Proceedings of the 15th IEEE International Conference on Software. Telecommunications and Computer Networks (SoftCom'07). Peer-reviewed, IEEE Press.
 
Computer Science Logic
Duparc J., Henzinger T.A., 2007/09. dans 21st International Workshop, CSL 2007 16th Annual Conference of the EACSL Lausanne, Switzerland. Peer-reviewed, Springer.
 
Evolutionary Dilemmas in a Social Network
Pestelacci E., Luthi L., Tomassini M., 2007/09. pp. 545-554 dans Almeida e Costa F., Mateus Rocha L., Costa E., Harvey I., Coutinho A. (eds.) Proceedings of Advances in Artificial Life, 9th European Conference, ECAL 2007, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
How QKD can improve the security level of future e-commerce transactions
Ghernaouti-Hélie S., Sfaxi M.A., Tashi I., 2007/09. dans Proceedings of the 18th European Regional International Telecommunication Society Conference (ITS). Peer-reviewed.
 
OpenAdap.net - A socialware for knowledge sharing
Villa A., Iglesias J., Ghernaouti-Hélie S., 2007/09. dans Proceedings of International Conference on Internet Technologies and Applications (ITA). Peer-reviewed.
 
Pourquoi bâtir la sécurité des Etats sur la terreur?, publié dans "Le Temps", Courrier des lecteurs, 25 septembre 2007
Ghernaouti-Hélie S., 2007/09..
 
Semi-Synchronous activation in scale-free boolean networks
Darabos C., Giacobini M., Tomassini M., 2007/09. pp. 976 - 985 dans Proceedings of Advances in Artificial Life, Ninth European Conference (ECAL '07 ), Lecture Notes in Artificial Intelligence. Peer-reviewed, Springer.
The Integrative Model of International Innovation Network and Performance
Fang G., Pigneur Y., 2007/09. pp. 167-174 dans Proceedings of the 3rd International Symposium on Global Manufacturing and China. Peer-reviewed.
 
ISO security standards as leverage on IT Security Management
Tashi I., Ghernaouti-Hélie S., 2007/08. dans Proceedings of 13th Americas Conference on Information Systems (AMCIS). Peer-reviewed.
An assessment of NFC for future mobile payment systems
Ondrus J., Pigneur Y., 2007/07. pp. 43-43 dans Proceedings of the 6th International Conference on the Management of Mobile Business (ICMB 2007). Peer-reviewed, IEEE Computer Society.
 
Cybercriminalité: réponse des institutions
Ghernaouti-Hélie S., 2007/07. Hakin9 Magazine.
 
Impact of Scale-free Topologies on Gossiping in Ad Hoc Networks
Garbinato B., Rochat D., Tomassini M., 2007/07. pp. 269-272 dans Proceedings of the 6th IEEE International Symposium on Network Computing and Applications (NCA'07). Peer-reviewed, IEEE Computer Society.
 
Quantum Cryptography: An innovation in the domain of secure information transmission
Tashi I., Ghernaouti-Hélie S., 2007/07. Business White Paper. Peer-reviewed.
 
Social dilemmas and cooperation in complex networks
Tomassini M., Pestelacci E., Luthi L., 2007/07. International Journal of Modern Physics C, 18 (7) pp. 1173-1185. Peer-reviewed.
 
The Open Lausanne Model: A reference model for Open Adaptive Learning Objects Systems
Madhour H., Wentland M., 2007/07. pp. 747-749 dans Proceedings of ICALT (International Conference on Advanced Learning Technologies), Niigata, Japan. Peer-reviewed.
 
The weight-watcher service and its lightweight implementation
Garbinato B., Guerraoui R., Hulaas J., Kounine A., Monod M., Spring J.H., 2007/07. pp. 118-127 dans Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modelling and Simulation (IC-SAMOS'07). Peer-reviewed, IEEE Computer Society.
 
Learning Object Lifecycle: From Conception to Reuse
Madhour H., Wentland M., 2007/06. dans Proceedings of EdMedia (World Conference on Educational Multimedia, Hypermedia & Telecommunications), Vancouver, Canada. Peer-reviewed.
 
Local-Knowledge Algorithms for Structured Message Diffusion in Unreliable Environments
Allani M., Garbinato B., Pedone F., Schmidt R., Stamenkovic M., 2007/06. (DOP-20070604) Technical Report, University of Lausanne.
 
OpenAdapt.net: a dynamic middleware for knowledge production and distribution
Villa A., Iglesias J., Ghernaouti-Hélie S., 2007/06. dans Proceedings of International conference - Towards a Knowledge Society: Is Knowledge a Public Good? Dynamics of Knowledge Production and Distribution (ESSHRA). Bern. Peer-reviewed.
 
Information security, Internet security or critical information infrastructure protection? ICT security challenges for citizens, organisations and states.
Ghernaouti-Hélie S., 2007/05. European CIIP Newsletter, 3 (2) pp. 27-28. Peer-reviewed.
 
L'informatique est une infrastructure critique au même titre que l'électricité, publié dans "Le Temps", Chronique Un temps d'avance, 11 mai 2007
Ghernaouti-Hélie S., 2007/05..
 
Pervasive Computing with Frugal Objects
Garbinato B., Guerraoui R., Hulaas J., Monod M., Spring J., 2007/05. pp. 13-18 dans Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07). Peer-reviewed, IEEE Computer Society.
 
Security metrics to improve information security management
Tashi I., Ghernaouti-Hélie S., 2007/04. dans Proceedings of 6th Annual Security Conference. Peer-reviewed.
 
Adaptive Navigation Support for an open-learning environment
Wentland M., 2007/03. dans Proceedings of WBE (Web-based Education), Chamonix, France. Peer-reviewed.
 
Open learning environment fostering transparency and mobility
Madhour H., Wentland M., 2007/03. dans Proceedings of WBE (Web-Based Education), Chamonix, France. Peer-reviewed.
 
Sharing information using quantum cryptography to reach the unconditional security
Ghernaouti-Hélie S., Sfaxi M.A., 2007/03. pp. 175-180 dans Proceedings of 5th Research, Innovation and Vision for the Future (RIVF). Peer-reviewed, IEEE.
 
A Playful Glance at Hierarchical Questions for Two-Way Alternating Automata
Duparc Jacques, Facchini Alessandro, 2007. pp. 46-55 dans Archibald Margaret, Brattka Vasco, Goranko Valentin, Löwe Benedikt (eds.) Infinity in Logic and Computation, International Conference, ILC 2007, Cape Town, South Africa, November 3-5, 2007, Revised Selected Papers. Peer-reviewed, Springer.
 
An infinite game on omega-semigroups
Cabessa J., Duparc J., 2007., Foundations of the Formal Sciences V. Infinite Games pp. 63-78 dans Bold S., Löwe B., Räsch T. , van Benthem J. (eds.) Infinite Games, Papers of the conference Foundations of the Formal Sciences V, held in Bonn, November 26-29, 2004, Studies in Logic. Peer-reviewed, College Publications, London.
 
An ω-power of a finite context-free language which is Borel above ∆0ω
Duparc J., Finkel O., 2007., Foundations of the Formal Sciences V. Infinite Games pp. 109-122 dans Bold S. , Löwe B., Räsch T. , van Benthem J. (eds.) Infinite Games, Papers of the conference Foundations of the Formal Sciences V, held in Bonn, November 26-29, 2004, Studies in Logic. Peer-reviewed, College Publications, London.
 
Computer Science Logic, 21st International Workshop, CSL 2007, 16th Annual Conference of the EACSL, Lausanne, Switzerland, September 11-15, 2007, Proceedings
Duparc Jacques, Henzinger Thomas A. (eds.), 2007., 4646, Springer.
 
Cross-industry Preferences for Development of Mobile Payments in Switzerland
Ondrus J., Pigneur Y., 2007. Electronic Markets - The International Journal, 17 (2) pp. 142-152. Peer-reviewed.
 
Cybercriminalité et sécurité intérieure : état des lieux et éléments de prévention
Ghernaouti-Hélie S., 2007. pp. 246-259 dans Cusson M., Dupont B., Lemieux F. (eds.) Traité de sécurité intérieure chap. 17, Centre International de Criminologie Comparée (CiCC), Université de Montréal.
 
Effects of culture and anonymity in electronic meetings
Limayem M., Hendaoui A., 2007. dans Khosrow-Pour Mehdi (eds.) Encyclopedia of Information Science and Technology, Second Edition, Idea Group Inc..
 
Empirical Analysis of the Evolution of a Scientific Collaboration Network
Tomassini M., Luthi L., 2007. Physica A-statistical Mechanics And Its Applications, 385 pp. 750 - 764. Peer-reviewed.
 
Ensemble Learning for Free in Evolutionary Algorithms
Gagné C., Sebag M., Schoenauer M., Tomassini M., 2007. pp. 17482 - 1789 dans D. Thierens et al. Editors (eds.) Proceedings of the genetic and evolutionary computation conference GECCO '07. Peer-reviewed, ACM Press.
 
Experimenting Advanced Spatio-Temporal Formalisms: an Application to Behavioural Ecology
Ceccarelli T., Centeno D., Giannotti F., Massolo A, Parent C., Raffaeta A., Renso C., Spaccapietra S., Turini F., 2007. GeoInformatica, to appear.
 
Fitness landscape of the Cellular Automata Majority Problem: View from the Olympus
Vérel S., Collard P., Tomassini M., Vanneschi L., 2007. Theoretical Computer Science, 378 pp. 54 - 77. Peer-reviewed.
 
Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment
Ghernaouti-Hélie S., Sfaxi M. A., 2007. pp. 139-149 dans Filipe J., Coelhas H., Saramago M. (eds.) E-business and Telecommunication Networks, Springer.
 
How Habit Limits the Predictive Power of Intentions: The Case of IS Continuance
Limayem M., Hirt S., Cheung C., 2007. MIS Quarterly, 31 (4) pp. 705-737. Peer-reviewed.
 
Impact of GDSS: Opening the Black Box
Limayem M., Banerjee P., Ma L., 2007. Decision Support Systems (forthcoming).
 
Neutrality and Difficulty of Genetic Programming Boolean Functions Landscapes
Vanneschi L., Tomassini M., Pirola Y., Collard P., Vérel S., Mauri G., 2007. pp. 241 - 250 dans Proceedings of 10th European Conference on Genetic Programming, EuroGP 2007, Lecture Notes in Computer Science. Peer-reviewed, Springer.
 
On the Topological Complexity of Weakly Recognizable Tree Languages
Duparc J., Murlak F., 2007. pp. 261-273 dans Fundamentals of Computation Theory : 16th International Symposium, FCT 2007, Budapest, Hungary, August 27-30, 2007. Proceedings, Lecture Notes on Computer Science. Peer-reviewed, Springer.
 
Past, present and future of mobile payments research: A literature review
Dahlberg Tomi, Mallat Niina, Ondrus Jan, Zmijewska Agnieszka, 2007. Electronic Commerce Research and Applications (forthcoming).
 
Performance and Robustness of Cellular Automata Computation on Irregular Networks
Darabos C., Giacobini M., Tomassini M., 2007. Advances in Complex Systems, 10 pp. 85 - 110. Peer-reviewed.
 
Pervasive Computing with Frugal Objects
Garbinato B., Guerraoui R., Hulaas J., Monod M., Spring Honig J.H., 2007. dans Proceedings of the 2nd IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC-07).
 
The Endogeneity of Knowledge Creation and Emergence of National Intellectual Property Rights Regimes
Müller Benjamin, 2007. dans 7. Annual Hawaii International conference on Business (HICOB 2007).
 
The Genetic Programming Collaboration Network and its Communities
Luthi L., Tomassini M., Giacobini M., Langdon W. B., 2007. pp. 1643 - 1650 dans D. Thierens et al. Editors (eds.) Proceedings of the genetic and evolutionary computation conference GECCO '07. Peer-reviewed, ACM Press.
 
Wadge games and sets of reals recognized by simple machines: An omega power of a finite context-free language which is Borel above Delta^ø_omega.
Duparc J., Finkel O., 2007. Studies in Logic, 11 pp. 109-122. Peer-reviewed.
 
A topological condition for solving fair exchange in byzantine environments
Garbinato B., Rickebusch I., 2006/12. Information and Communications Security, Lecture Notes in Computer Science (LNCS), 4307 pp. 30-49. Peer-reviewed.
 
La conformité des systèmes d'information, le défi de demain, publié dans "Le Temps", Chronique Un temps d'avance, 8 décembre 2006
Ghernaouti-Hélie S., 2006/12..
 
Open learning environment fostering transparency and mobility
Madhour H., Wentland M., 2006/11. dans Proceedings of KSCE (Knowledge Sharing and Collaborative Engineering) Conference, St. Thomas, US Virgin Islands. Peer-reviewed.
 
Orchestrating fair exchanges between mutually distrustful web services
Garbinato B., Rickebusch I., 2006/11. pp. 33-42 dans Proceedings of the 3rd ACM workshop on Secure web services (SWS'06). Peer-reviewed, ACM Press.
 
Adaptation de l'algorithme de colonies de fourmis pour la génération de parcours pédagogiques
Wentland M., Madhour H., Fernandes E., 2006/10. dans Proceedings of TICE (Technologies de l'Information et de la Communication pour l'Enseignement); Toulouse, France. Peer-reviewed.
 
OpenAdap.net: a collaborative sharing environment
Villa A.E.P., Iglesias J., Ghernaouti-Hélie S., 2006/10. dans Proceedings of E-Challenges 2006. Peer-reviewed.
Risque informationnel : de nouveaux risques, de nouveaux métiers ou simple évolution?, publié dans "Bulletin HEC" No 73
Ghernaouti-Hélie S., 2006/10..
 
802.11i Encryption Key Distribution Using Quantum Cryptography
Nguyen Thi M.T., Sfaxi M.A., Ghernaouti-Hélie S., 2006/09. Journal of Network, 1 (5) pp. 9-20. Peer-reviewed.
 
A New Fault-Tolerance Measure for Evolved Small-World Automata Networks
Darabos C., Giacobini M., Tomassini M., 2006/09. dans Proceedings of GSICE 2006.
 
Dinamica di Reti Booleane con Topologia Scale-Free
Darabos C., Giacobini M., Pestelacci E., Tomassini M., 2006/09. dans Proceedings of Wiva 3.
 
Lausanne model: Towards an AHAM-Based reference model for adaptive learning object systems
Madhour H., Wentland M., 2006/09. ALT journal (Association for Learning Technology). Peer-reviewed.
 
Achieving Unconditional Security in Existing Networks using Quantum Cryptography
Rass S., Sfaxi M.A., Ghernaouti-Hélie S., 2006/08. pp. 207-210 dans Proceedings of International Conference on Security and Cryptography (SECRYPT 2006). Peer-reviewed.
 
Applying QKD to reach unconditional security in telecommunications
Ghernaouti-Hélie S., Sfaxi M.A., 2006/08. dans Proceedings of 17th International Telecommunication Society Conference (ITS Europe 2006). Amsterdam, The Netherlands. Peer-reviewed.
 
Ownership Detection and Protection for Learning Objects
Madhour H., Sfaxi M.A., Wentland M., Ghernaouti-Hélie S., 2006/07. pp. 784-788 dans Proceedings of ICALT (International Conference on Advanced Learning Technologies). Peer-reviewed, IEEE.
 
Pervaho: A Development and Test Platform for Mobile Ad hoc Applications
Eugster P.Th., Garbinato B., Holzer A., 2006/07. dans Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networks and Services (Mobiquitous'06). Peer-reviewed, IEEE Computer Society.
 
Aspects légaux de la propriété intellectuelle dans le web, publié dans "Ib-com", No 376
Ghernaouti-Hélie S., Tashi I., 2006/06. 28-29.
 
Dynamics of Scale-Free Semi-Synchronous Boolean Networks
Giacobini M., Tomassini M., De Los Rios P., Pestelacci E., 2006/06. pp. 1-7 dans Rocha L.M. et al. (eds.) Proceedings of Artificial Life X, Tenth International Conference on the Simulation And Synthesis of Living Systems, ALIFE 2006. Peer-reviewed, MIT Press.
 
Idea Consolidation Process in Face-to-Face Meetings: A New Approach to Organize and Integrate Individuals Perspectives
Adel Hendaoui, Moez Limayem, 2006/06. dans Proceedings of the 14th European Conference on Information Systems (ECIS 2006).
 
La certification comme référentiel de classification de la sécurité
Tashi I., Ghernaouti-Hélie S., 2006/06. dans Proceedings of Colloque AFME, Montréal, Canada.
 
Learning Object Network: Towards a Semantic Navigation Support
Wentland M., Madhour H., Fernandes E., 2006/06. dans Proceedings of EdMedia (World Conference on Educational Multimedia, Hypermedia & Telecommunications), Orlando, FL, USA. Peer-reviewed.
 
Mobile Payment Market and Research Past, Present and Future
Tomi Dahlberg, Niina Mallat, Jan Ondrus, Agnieszka Zmijewska, 2006/06. dans Proc. Mobility Roundtable 2006.
 
OpenAdap.Net: a Community-Based Shared System
Villa A.E.P., Iglesias J., Ghernaouti-Hélie S., 2006/06. dans Proceedings of 6th International Workshop Innovative Internet Community Systems. Neuchâtel, Switzerland. Peer-reviewed.
 
Proceedings Workshop on Business/IT Alignment and Interoperability (Busital)
Pigneur Y., Woo C. (eds.), 2006/06., 237, CEUR.
 
Risques informatiques d'origine cybercriminelle et gestion de la sécurité
Ghernaouti-Hélie S., 2006/06. dans Proceedings of Colloque AFME. Montréal, Canada.
 
Viviers de connaissances : du partage et de la réutilisation
Wentland M., 2006/06. dans Colloque de l'AFME (Agence Francophone du Management Electronique), Montréal, Canada. Peer-reviewed.
 
OpenAdap.Net: a technical perspective
Villa A.E.P., Iglesias J., Ghernaouti-Hélie S., 2006/05. dans Proceedings Workshop IST_Africa - Supporting Research Engagement with Africa (IST-Africa 2006). Peer-reviewed.
 
Cybercriminalité, blanchiment d'argent et sécurité informatique, publié dans "Revue Banque et finance"
Ghernaouti-Hélie S., 2006/04..
 
Integration of quantum cryptography in 802.11 networks
Nguyen Thi M.T., Sfaxi M.A., Ghernaouti-Hélie S., 2006/04. dans Proceedings of The First International Conference on Availability, Reliability and Security (ARES 2006). Peer-reviewed.
 
Quelques aspects juridiques liés au spam, publié dans "Ib-com", No 374, pp. 24-25
Ghernaouti-Hélie S., Tashi I., 2006/04..
Cybercriminalité: Faire du risque un atout, published in "Revue Information et Systèmes"
Ghernaouti-Hélie S., 2006/02..
 
Un des aspects juridiques liés au commerce électronique : cas particulier du contrat, publié dans "Ib-com"
Ghernaouti-Hélie S., Tashi I., 2006/02..
 
A GDSS for Visualizing and Assessing a Technology Environment
Ondrus J., Monzani J.-S., Pigneur Y., 2006. pp. 1639-1648 dans Americas Conference on Information Systems Proceedings (AMCIS 2006). Peer-reviewed.
 
A minimal information prisoner's dilemma on evolving networks
Luth L., Giacobini M., Tomassini M., 2006. pp. 438 - 444 dans Rocha L.M. (eds.) Proceedings of AlifeX, tenth International Conference on the simulation and synthesis of leaving systems. Peer-reviewed, MIT Press.
 
A Multi-Stakeholder Multi-Criteria Assessment Framework of Mobile Payments: An Illustration with the Swiss Public Transportation Industry
Ondrus J., Pigneur Y., 2006. dans HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on System Sciences, 2006. Peer-reviewed, IEEE.
 
A Quantitative Study of Neutrality in GP Boolean Landscapes
Vanneschi L., Pirola L., Tomassini M., Collard P., Vérel S., 2006. pp. 895 - 902 dans Keijzer M. at al. (eds.) Proceedings of the genetic and evolutionary computation conference GECCO '06. Peer-reviewed, ACM Press.
 
A Systematic Approach to Explain the Delayed Deployment of Mobile Payments in Switzerland
Ondrus J., Pigneur Y., 2006. dans Fifth International Conference on Mobile Business. Peer-reviewed, IEEE.
 
Apport des théories de la décision et de la cognition au domaine des systèmes d'information
François Bodart, 2006. pp. 1294-1306 dans Jacky Akoka, Isabelle Comyn-Wattiau (eds.) Encyclopédie de l'informatique et des systèmes d'information, Vuibert.
 
chapitre du livre : L'intelligence juridique dans la gestion de la sécurité des systèmes d'information et des réseaux de télécommunication
Ghernaouti-Hélie S., 2006., Collection Neuchâtelois.
 
Concepts to understand the structure of your spatial or temporal data
Spaccapietra S., Parent C., Zimnyi E., 2006. MIA Journal, 1.
Partagez:
Unicentre - CH-1015 Lausanne
Suisse
Tél. +41 21 692 11 11
Swiss University