callback( { "result":{ "query":":facetid:toc:\"db/journals/tsi/tsi35.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.52" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"29", "@dc":"29", "@oc":"29", "@id":"43489088", "text":":facetid:toc:db/journals/tsi/tsi35.bht" } }, "hits":{ "@total":"29", "@computed":"29", "@sent":"29", "@first":"0", "hit":[{ "@score":"1", "@id":"3191616", "info":{"authors":{"author":[{"@pid":"60/6002","text":"Eric Alata"},{"@pid":"23/3426","text":"Vincent Nicomette"},{"@pid":"200/0814","text":"Julien Duchêne"},{"@pid":"61/918","text":"Colas Le Guernic"},{"@pid":"k/MohamedKaaniche","text":"Mohamed Kaâniche"}]},"title":"Outils pour la rétro-conception de protocoles. Analyse et classification.","venue":"Tech. Sci. Informatiques","volume":"35","number":"6","pages":"609-640","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/AlataNDGK16","doi":"10.3166/TSI.35.609-640","ee":"https://doi.org/10.3166/tsi.35.609-640","url":"https://dblp.org/rec/journals/tsi/AlataNDGK16"}, "url":"URL#3191616" }, { "@score":"1", "@id":"3191617", "info":{"authors":{"author":{"@pid":"182/9610","text":"Nefissa Annabi-Elkadri"}},"title":"Classification du signal vocal basée sur le spectre à multirésolution.","venue":"Tech. Sci. Informatiques","volume":"35","number":"3","pages":"289-334","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Annabi-Elkadri16","doi":"10.3166/TSI.35.289-334","ee":"https://doi.org/10.3166/tsi.35.289-334","url":"https://dblp.org/rec/journals/tsi/Annabi-Elkadri16"}, "url":"URL#3191617" }, { "@score":"1", "@id":"3191618", "info":{"authors":{"author":[{"@pid":"119/3784","text":"David Bihanic"},{"@pid":"d/SophieDupuyChessa","text":"Sophie Dupuy-Chessa"},{"@pid":"50/6119","text":"Xavier Le Pallec"},{"@pid":"51/448","text":"Thomas Polacsek"}]},"title":"Introduction.","venue":"Tech. Sci. Informatiques","volume":"35","number":"2","pages":"141-144","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/BihanicDPP16","ee":"http://tsi.revuesonline.com/article.jsp?articleId=36164","url":"https://dblp.org/rec/journals/tsi/BihanicDPP16"}, "url":"URL#3191618" }, { "@score":"1", "@id":"3191619", "info":{"authors":{"author":[{"@pid":"119/3784","text":"David Bihanic"},{"@pid":"51/448","text":"Thomas Polacsek"}]},"title":"StrataVis : une technique de visualisation graphique orientée modèle.","venue":"Tech. Sci. Informatiques","volume":"35","number":"2","pages":"145-174","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/BihanicP16","doi":"10.3166/TSI.35.145-174","ee":"https://doi.org/10.3166/tsi.35.145-174","url":"https://dblp.org/rec/journals/tsi/BihanicP16"}, "url":"URL#3191619" }, { "@score":"1", "@id":"3191620", "info":{"authors":{"author":[{"@pid":"57/6483","text":"Paul-Antoine Bisgambiglia"},{"@pid":"21/3659","text":"Eric Innocenti"}]},"title":"Simulation dirigée par l'activité floue dans les modèles cellulaires. Comparaison entre règles d'activité floues et stochastiques.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"435-462","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/BisgambigliaI16","ee":"http://tsi.revuesonline.com/article.jsp?articleId=36946","url":"https://dblp.org/rec/journals/tsi/BisgambigliaI16"}, "url":"URL#3191620" }, { "@score":"1", "@id":"3191621", "info":{"authors":{"author":{"@pid":"50/5491","text":"Patrice Bonhomme"}},"title":"Estimation du marquage d'un réseau de Petri p-temporel sous observation partielle.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"499-524","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Bonhomme16","doi":"10.3166/TSI.35.499-524","ee":"https://doi.org/10.3166/tsi.35.499-524","url":"https://dblp.org/rec/journals/tsi/Bonhomme16"}, "url":"URL#3191621" }, { "@score":"1", "@id":"3191622", "info":{"authors":{"author":[{"@pid":"142/2988","text":"Samy Chambi"},{"@pid":"l/DanielLemire","text":"Daniel Lemire"},{"@pid":"49/6980","text":"Robert Godin"}]},"title":"Vers de meilleures performances avec des Roaring bitmaps.","venue":"Tech. Sci. Informatiques","volume":"35","number":"3","pages":"335-355","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/ChambiLG16","doi":"10.3166/TSI.35.335-355","ee":"https://doi.org/10.3166/tsi.35.335-355","url":"https://dblp.org/rec/journals/tsi/ChambiLG16"}, "url":"URL#3191622" }, { "@score":"1", "@id":"3191623", "info":{"authors":{"author":[{"@pid":"79/4387","text":"Olivier Champalle"},{"@pid":"s/KarimSehaba","text":"Karim Sehaba"},{"@pid":"m/AlainMille","text":"Alain Mille"}]},"title":"Observation et analyse de comportements des utilisateurs à base de traces. Analyse des activités sur simulateurs pleine échelle de conduite de centrale nucléaire.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"463-498","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/ChampalleSM16","doi":"10.3166/TSI.35.463-498","ee":"https://doi.org/10.3166/TSI.35.463-498","url":"https://dblp.org/rec/journals/tsi/ChampalleSM16"}, "url":"URL#3191623" }, { "@score":"1", "@id":"3191624", "info":{"authors":{"author":[{"@pid":"137/2814","text":"Orélie Desfriches Doria"},{"@pid":"79/6355","text":"Christophe Fagot"},{"@pid":"181/0890","text":"Claire Lavenir"}]},"title":"Vers un environnement d'interaction symbolique avec les modèles. Des cartographies sémantiques à la prise de décision.","venue":"Tech. Sci. Informatiques","volume":"35","number":"2","pages":"203-236","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/DoriaFL16","doi":"10.3166/TSI.35.203-236","ee":"https://doi.org/10.3166/tsi.35.203-236","url":"https://dblp.org/rec/journals/tsi/DoriaFL16"}, "url":"URL#3191624" }, { "@score":"1", "@id":"3191625", "info":{"authors":{"author":{"@pid":"03/18","text":"Faïez Gargouri"}},"title":"Introduction.","venue":"Tech. Sci. Informatiques","volume":"35","number":"1","pages":"7-8","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Gargouri16","ee":"http://tsi.revuesonline.com/article.jsp?articleId=36007","url":"https://dblp.org/rec/journals/tsi/Gargouri16"}, "url":"URL#3191625" }, { "@score":"1", "@id":"3191626", "info":{"authors":{"author":[{"@pid":"129/9397","text":"Soguy Mak Karé Gueye"},{"@pid":"58/3793","text":"Noël De Palma"},{"@pid":"97/1236","text":"Éric Rutten"},{"@pid":"77/2224","text":"Alain Tchana"},{"@pid":"65/9419","text":"Nicolas Berthier"}]},"title":"Gestion autonome de la réparation et du dimensionnement d'un système multiniveau par contrôle discret.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"525-555","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/GueyePRTB16","doi":"10.3166/TSI.35.525-555","ee":"https://doi.org/10.3166/TSI.35.525-555","url":"https://dblp.org/rec/journals/tsi/GueyePRTB16"}, "url":"URL#3191626" }, { "@score":"1", "@id":"3191627", "info":{"authors":{"author":[{"@pid":"73/6850","text":"Gilles Kassel"},{"@pid":"96/237","text":"Frédéric Fürst"},{"@pid":"q/CelineQuenuJoiron","text":"Céline Joiron"}]},"title":"Ontologie des entités fictives et virtuelles. Préliminaires.","venue":"Tech. Sci. Informatiques","volume":"35","number":"1","pages":"9-30","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/KasselFJ16","doi":"10.3166/TSI.35.9-30","ee":"https://doi.org/10.3166/tsi.35.9-30","url":"https://dblp.org/rec/journals/tsi/KasselFJ16"}, "url":"URL#3191627" }, { "@score":"1", "@id":"3191628", "info":{"authors":{"author":[{"@pid":"165/0179","text":"Mufida Mir'atul Khusna"},{"@pid":"d/SophieDupuyChessa","text":"Sophie Dupuy-Chessa"},{"@pid":"c/GCalvary","text":"Gaëlle Calvary"}]},"title":"Mastering Model Driven Engineering complexity by interactive visualization.","venue":"Tech. Sci. Informatiques","volume":"35","number":"2","pages":"175-202","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/KhusnaDC16","doi":"10.3166/TSI.35.175-202","ee":"https://doi.org/10.3166/tsi.35.175-202","url":"https://dblp.org/rec/journals/tsi/KhusnaDC16"}, "url":"URL#3191628" }, { "@score":"1", "@id":"3191629", "info":{"authors":{"author":[{"@pid":"148/1369","text":"Amaury L'Huillier"},{"@pid":"02/43","text":"Sylvain Castagnos"},{"@pid":"19/4358","text":"Anne Boyer"}]},"title":"Modéliser la diversité au cours du temps pour détecter le contexte dans un service de musique en ligne.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"397-433","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/LHuillierCB16","doi":"10.3166/TSI.35.397-433","ee":"https://doi.org/10.3166/tsi.35.397-433","url":"https://dblp.org/rec/journals/tsi/LHuillierCB16"}, "url":"URL#3191629" }, { "@score":"1", "@id":"3191630", "info":{"authors":{"author":[{"@pid":"131/9558","text":"Mariem Mahfoudh"},{"@pid":"83/2426","text":"Germain Forestier"},{"@pid":"67/1841","text":"Laurent Thiry"},{"@pid":"46/4134","text":"Michel Hassenforder"}]},"title":"Comment fusionner des ontologies avec la réécriture de graphes ?","venue":"Tech. Sci. Informatiques","volume":"35","number":"1","pages":"31-53","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/MahfoudhFTH16","doi":"10.3166/TSI.35.31-53","ee":"https://doi.org/10.3166/tsi.35.31-53","url":"https://dblp.org/rec/journals/tsi/MahfoudhFTH16"}, "url":"URL#3191630" }, { "@score":"1", "@id":"3191631", "info":{"authors":{"author":[{"@pid":"71/10490","text":"Amine Mahiddine"},{"@pid":"06/1108","text":"Djamal Merad"},{"@pid":"77/3490","text":"Pierre Drap"}]},"title":"Recalage hétérogène de nuages de points 3D. Application à l'imagerie sous-marine.","venue":"Tech. Sci. Informatiques","volume":"35","number":"1","pages":"115-132","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/MahiddineMD16","doi":"10.3166/TSI.35.115-132","ee":"https://doi.org/10.3166/tsi.35.115-132","url":"https://dblp.org/rec/journals/tsi/MahiddineMD16"}, "url":"URL#3191631" }, { "@score":"1", "@id":"3191632", "info":{"authors":{"author":{"@pid":"181/0892","text":"Baptiste Mélès"}},"title":"Approche philologique des langages de programmation.","venue":"Tech. Sci. Informatiques","volume":"35","number":"2","pages":"237-254","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Meles16","doi":"10.3166/TSI.35.237-254","ee":"https://doi.org/10.3166/tsi.35.237-254","url":"https://dblp.org/rec/journals/tsi/Meles16"}, "url":"URL#3191632" }, { "@score":"1", "@id":"3191633", "info":{"authors":{"author":{"@pid":"43/4583","text":"Jean-Arcady Meyer"}},"title":"La préhistoire de l'IA. Visite guidée des automates et proto-robots conçus depuis l'Antiquité jusqu'au milieu du XXe siècle.","venue":"Tech. Sci. Informatiques","volume":"35","number":"1","pages":"75-113","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Meyer16","doi":"10.3166/TSI.35.75-113","ee":"https://doi.org/10.3166/tsi.35.75-113","url":"https://dblp.org/rec/journals/tsi/Meyer16"}, "url":"URL#3191633" }, { "@score":"1", "@id":"3191634", "info":{"authors":{"author":{"@pid":"01/1099","text":"Thierry Millan"}},"title":"Utilisation des bases de données orientées graphe comme référentiels de modèles.","venue":"Tech. Sci. Informatiques","volume":"35","number":"6","pages":"695-719","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Millan16","doi":"10.3166/TSI.35.695-719","ee":"https://doi.org/10.3166/tsi.35.695-719","url":"https://dblp.org/rec/journals/tsi/Millan16"}, "url":"URL#3191634" }, { "@score":"1", "@id":"3191635", "info":{"authors":{"author":[{"@pid":"24/1162","text":"Mohamed Mkaouar"},{"@pid":"49/3001","text":"Rafik Bouaziz"}]},"title":"UML-TF, un profil pour la spécification des bases de données temporelles.","venue":"Tech. Sci. Informatiques","volume":"35","number":"3","pages":"357-388","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/MkaouarB16","doi":"10.3166/TSI.35.357-388","ee":"https://doi.org/10.3166/tsi.35.357-388","url":"https://dblp.org/rec/journals/tsi/MkaouarB16"}, "url":"URL#3191635" }, { "@score":"1", "@id":"3191636", "info":{"authors":{"author":[{"@pid":"191/6794","text":"Cédric Neumann"},{"@pid":"191/6792","text":"Camille Paloque-Berges"},{"@pid":"99/9099","text":"Loïc Petitgirard"}]},"title":"Histoire de l'informatique - Entretien avec Claude Kaiser.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"557-570","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/NeumannPP16","ee":"http://tsi.revuesonline.com/article.jsp?articleId=36950","url":"https://dblp.org/rec/journals/tsi/NeumannPP16"}, "url":"URL#3191636" }, { "@score":"1", "@id":"3191637", "info":{"authors":{"author":[{"@pid":"191/6794","text":"Cédric Neumann"},{"@pid":"191/6792","text":"Camille Paloque-Berges"},{"@pid":"99/9099","text":"Loïc Petitgirard"}]},"title":"Cnam. Un lieu d'accueil, de débat et d'institutionnalisation pour les sciences et techniques de l'informatique.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"584-600","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/NeumannPP16a","ee":"http://tsi.revuesonline.com/article.jsp?articleId=36952","url":"https://dblp.org/rec/journals/tsi/NeumannPP16a"}, "url":"URL#3191637" }, { "@score":"1", "@id":"3191638", "info":{"authors":{"author":[{"@pid":"166/6846","text":"Franck Petitdemange"},{"@pid":"26/4122","text":"Jérémy Buisson"},{"@pid":"91/325","text":"Isabelle Borne"}]},"title":"Une approche orientée patron pour la reconfiguration de système de systèmes.","venue":"Tech. Sci. Informatiques","volume":"35","number":"6","pages":"665-674","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/PetitdemangeBB16","doi":"10.3166/TSI.35.665-674","ee":"https://doi.org/10.3166/tsi.35.665-674","url":"https://dblp.org/rec/journals/tsi/PetitdemangeBB16"}, "url":"URL#3191638" }, { "@score":"1", "@id":"3191639", "info":{"authors":{"author":[{"@pid":"199/9664","text":"Loukmen Regainia"},{"@pid":"52/6989","text":"Sébastien Salva"},{"@pid":"69/6296","text":"Cédric Bouhours"}]},"title":"Une démarche pour l'assistance à l'utilisation des patrons de sécurité.","venue":"Tech. Sci. Informatiques","volume":"35","number":"6","pages":"641-663","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/RegainiaSB16","doi":"10.3166/TSI.35.641-663","ee":"https://doi.org/10.3166/tsi.35.641-663","url":"https://dblp.org/rec/journals/tsi/RegainiaSB16"}, "url":"URL#3191639" }, { "@score":"1", "@id":"3191640", "info":{"authors":{"author":[{"@pid":"168/7296","text":"Mahamadi Savadogo"},{"@pid":"233/8710","text":"Borlli Michel Jonas Some"},{"@pid":"27/2487","text":"Gayo Diallo"}]},"title":"Alignement interactif d'ontologies avec ServOMap.","venue":"Tech. Sci. Informatiques","volume":"35","number":"1","pages":"55-74","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/SavadogoSD16","doi":"10.3166/TSI.35.55-74","ee":"https://doi.org/10.3166/tsi.35.55-74","url":"https://dblp.org/rec/journals/tsi/SavadogoSD16"}, "url":"URL#3191640" }, { "@score":"1", "@id":"3191641", "info":{"authors":{"author":{"@pid":"135/0722","text":"Valérie Schafer"}},"title":"Histoire de l'informatique - Entretien avec Sacha Krakowiak.","venue":"Tech. Sci. Informatiques","volume":"35","number":"4-5","pages":"571-582","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Schafer16","ee":"http://tsi.revuesonline.com/article.jsp?articleId=36951","url":"https://dblp.org/rec/journals/tsi/Schafer16"}, "url":"URL#3191641" }, { "@score":"1", "@id":"3191642", "info":{"authors":{"author":{"@pid":"135/0722","text":"Valérie Schafer"}},"title":"Entretien avec Roberto di Cosmo.","venue":"Tech. Sci. Informatiques","volume":"35","number":"6","pages":"721-734","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/Schafer16a","ee":"http://tsi.revuesonline.com/article.jsp?articleId=37921","url":"https://dblp.org/rec/journals/tsi/Schafer16a"}, "url":"URL#3191642" }, { "@score":"1", "@id":"3191643", "info":{"authors":{"author":[{"@pid":"18/818","text":"Salma Jamoussi"},{"@pid":"44/3444","text":"Yassine Ben Ayed"}]},"title":"PCF-SVM : une nouvelle méthode de sélection d'attributs pour la classification supervisée.","venue":"Tech. Sci. Informatiques","volume":"35","number":"3","pages":"263-288","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/X16","doi":"10.3166/TSI.35.263-288","ee":"https://doi.org/10.3166/tsi.35.263-288","url":"https://dblp.org/rec/journals/tsi/X16"}, "url":"URL#3191643" }, { "@score":"1", "@id":"3191644", "info":{"authors":{"author":[{"@pid":"95/1555","text":"Mahdi Zargayouna"},{"@pid":"168/7235","text":"Matthieu Mastio"},{"@pid":"85/1573","text":"Gérard Scémama"},{"@pid":"r/OmerFRana","text":"Omer F. Rana"}]},"title":"Modèles de distribution des simulations multi-agents de mobilité des voyageurs.","venue":"Tech. Sci. Informatiques","volume":"35","number":"6","pages":"675-694","year":"2016","type":"Journal Articles","access":"closed","key":"journals/tsi/ZargayounaMSR16","doi":"10.3166/TSI.35.675-694","ee":"https://doi.org/10.3166/tsi.35.675-694","url":"https://dblp.org/rec/journals/tsi/ZargayounaMSR16"}, "url":"URL#3191644" } ] } } } )