scispace - formally typeset
Search or ask a question
Institution

École normale supérieure de Cachan

EducationCachan, Île-de-France, France
About: École normale supérieure de Cachan is a education organization based out in Cachan, Île-de-France, France. It is known for research contribution in the topics: Decidability & Finite element method. The organization has 2717 authors who have published 5585 publications receiving 175925 citations.


Papers
More filters
Book ChapterDOI
07 Oct 2012
TL;DR: A combined line segment and elliptical arc detector, which formally guarantees the control of the number of false positives and requires no parameter tuning, is proposed.
Abstract: We propose a combined line segment and elliptical arc detector, which formally guarantees the control of the number of false positives and requires no parameter tuning. The accuracy of the detected elliptical features is improved by using a novel non-iterative ellipse fitting technique, which merges the algebraic distance with the gradient orientation. The performance of the detector is evaluated on computer-generated images and on natural images.

110 citations

Journal ArticleDOI
TL;DR: In this article, local minimizers of the two-dimensional Ginzburg-Landau functionals were found depending on a large parameter κ, which describes the behavior of a superconductor in a prescribed exterior magnetic field hex.
Abstract: We find local minimizers of the two-dimensional Ginzburg–Landau functionals depending on a large parameter κ, which describe the behavior of a superconductor in a prescribed exterior magnetic field hex. We prove an estimate on the critical value Hc1 of hex(κ), corresponding to the first phase-transition in which vortices appear in the superconductor; and we locate these vortices.

109 citations

Journal ArticleDOI
TL;DR: In this paper, the authors study different possible scanning strategies and indicate those that lead to homogeneous heating of the part until its melting point, and compare the results to numerical simulations.
Abstract: In the selective laser melting process, one has to strike a balance between power and scan speed. When a small scan speed is used, thermal gradients are important and local solidification can lead to cracks. On the other hand, when high speed is used, the power has to be huge and phenomena due to heat transfer, like delamination or balling, arise. In this paper, we study different possible scanning strategies and we indicate those that lead to homogeneous heating of the part until its melting point. The results are compared to numerical simulations.

109 citations

Journal ArticleDOI
TL;DR: Group differences may be better characterized by a different speed of maturation rather than shape differences at a given age, and this method is applied to analyze the differences in the growth of the hippocampus in children diagnosed with autism, developmental delays and in controls.
Abstract: This paper proposes an original approach for the statistical analysis of longitudinal shape data. The proposed method allows the characterization of typical growth patterns and subject-specific shape changes in repeated time-series observations of several subjects. This can be seen as the extension of usual longitudinal statistics of scalar measurements to high-dimensional shape or image data. The method is based on the estimation of continuous subject-specific growth trajectories and the comparison of such temporal shape changes across subjects. Differences between growth trajectories are decomposed into morphological deformations, which account for shape changes independent of the time, and time warps, which account for different rates of shape changes over time. Given a longitudinal shape data set, we estimate a mean growth scenario representative of the population, and the variations of this scenario both in terms of shape changes and in terms of change in growth speed. Then, intrinsic statistics are derived in the space of spatiotemporal deformations, which characterize the typical variations in shape and in growth speed within the studied population. They can be used to detect systematic developmental delays across subjects. In the context of neuroscience, we apply this method to analyze the differences in the growth of the hippocampus in children diagnosed with autism, developmental delays and in controls. Result suggest that group differences may be better characterized by a different speed of maturation rather than shape differences at a given age. In the context of anthropology, we assess the differences in the typical growth of the endocranium between chimpanzees and bonobos. We take advantage of this study to show the robustness of the method with respect to change of parameters and perturbation of the age estimates.

109 citations

Journal ArticleDOI
TL;DR: The goal is to provide a rather complete summary that could act as a quick reference for researchers who want to contribute to the field, want to make use of existing results, or just want to get a better picture of what results already exist.
Abstract: Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. However, the guarantees that it offers with respect to the more detailed computational models have been quite unclear. For more than 20 years the two approaches have coexisted but evolved mostly independently. Recently, significant research efforts attempt to develop paradigms for cryptographic systems analysis that combines the best of both worlds. There are two broad directions that have been followed. Computational soundness aims to establish sufficient conditions under which results obtained using symbolic models imply security under computational models. The direct approach aims to apply the principles and the techniques developed in the context of symbolic models directly to computational ones. In this paper we survey existing results along both of these directions. Our goal is to provide a rather complete summary that could act as a quick reference for researchers who want to contribute to the field, want to make use of existing results, or just want to get a better picture of what results already exist.

109 citations


Authors

Showing all 2722 results

NameH-indexPapersCitations
Shi Xue Dou122202874031
Olivier Hermine111102643779
John R. Reynolds10560750027
Shaul Mukamel95103040478
Tomás Torres8862528223
Ifor D. W. Samuel7460523151
Serge Abiteboul7327824576
Stéphane Roux6862719123
Zeger Debyser6740416531
Louis Nadjo6426412596
Praveen K. Thallapally6419012110
Andrew Travers6319313537
Shoji Takeuchi6369214704
Bineta Keita6327412053
Yves Mély6236813478
Network Information
Related Institutions (5)
École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

92% related

École Normale Supérieure
99.4K papers, 3M citations

91% related

Georgia Institute of Technology
119K papers, 4.6M citations

91% related

University of Paris-Sud
52.7K papers, 2.1M citations

90% related

University of Paris
174.1K papers, 5M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20233
202222
202121
202029
201958
201879