References of "Varrette, Sébastien 50003258"
     in
Bookmark and Share    
Peer Reviewed
See detailPractical Security in Distributed Systems
Bertholon, Benoit UL; Cérin, Christophe; Coti, Camille et al

in Haddad, S.; Kordon, F.; Pautet, L. (Eds.) et al Distributed Systems; Design and Algorithms, 1 (2011)

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailUne approche génétique et source à source de l'optimisation de code
Guelton, S.; Varrette, Sébastien UL

Scientific Conference (2009, September)

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailDeskilling HPL - Using an Evolutionary Algorithm to Automate Cluster Benchmarking
Dunlop, Dominic UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in Proc. of 8th Intl. conf. on Parallel Processing and Applied Mathematics (PPAM 2009) (2009, September), 6068(LNCS), 102--114

The High-Performance Linpack (HPL) benchmark is the ac- cepted standard for measuring the capacity of the world’s most powerful computers, which are ranked twice yearly in the Top 500 List. Since just a ... [more ▼]

The High-Performance Linpack (HPL) benchmark is the ac- cepted standard for measuring the capacity of the world’s most powerful computers, which are ranked twice yearly in the Top 500 List. Since just a small deficit in performance can cost a computer several places, it is impor- tant to tune the benchmark to obtain the best possible result. However, the adjustment of HPL’s seventeen configuration parameters to obtain maximum performance is a time-consuming task that must be performed by hand. In a previous paper, we provided a preliminary study that proposed the tuning of HPL parameters by means of an Evolutionary Algorithm. The approach was validated on a small cluster hosted at the University of Luxembourg. In this article, we extend this initial work by describing Acbea, a fully-automatic benchmark tuning tool that performs both the configuration and installation of HPL followed by an automatic search for optimized parameters that will lead to the best benchmark results. Experiments have been conducted to validate this tool on several clusters, exploiting in particular the Grid’5000 infrastructure. [less ▲]

Detailed reference viewed: 92 (1 UL)
Full Text
Peer Reviewed
See detailDynamic Adaptation Applied to Sabotage Tolerance
Guelton, S.; Gautier, T.; Pazat, J.-L. et al

in Proc. of the IEEE 17th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2009) (2009)

Detailed reference viewed: 77 (0 UL)
Full Text
Peer Reviewed
See detailParallel implementation of domain decomposition algorithm for molecular dynamics
Berhe, Girma UL; Peters, Bernhard UL; Varrette, Sébastien UL et al

in PARENG 2007 (2009)

The objective of this study is to apply a domain decomposition algorithm to the La- grangian based Discrete Particle Method (DPM). The latter deals with the thermal decomposition of solid e.g. biomass ... [more ▼]

The objective of this study is to apply a domain decomposition algorithm to the La- grangian based Discrete Particle Method (DPM). The latter deals with the thermal decomposition of solid e.g. biomass fuel particles. It considers each particle as an individual entity that is represented by an instantiation of a class. Modelizing thermal conversion of biomass in real systems involves a large number of particles. This can be achieved in a reasonable computing time only through a parallel implementation able to distribute the particles e.g. objects onto the participating processors. This pa- per present such an implementation based on Orthogonal Recursive Bisection (ORB) method. Due to the fact that the particles may take arbitrary positions within the do- main, a particular issue addressed by the domain decomposition technic used in this work is to generate a load balance for each processors as uniform as possible. Fur- thermore, the particles are coupled via heat transfer. One challenge for the designed algorithm is then to identify the nearest neighbours of each particle so that the nec- essary information can be communicated between them. Since the positions of all particles are subject to change and may migrate from one processor to another, the communication links together with the number of neighbors are highly dynamic. The implementation is carried out using the KAAPI API, a C++ library for parallel pro- gramming that allows to execute ?ne/medium grain multithreaded computation with dynamic data ?ow synchronizations. First results are very promising since they indi- cate that our algorithm creates sub domains with an average imbalance ranging from 2.5% to 6.3% for uniformly distributed particles. [less ▲]

Detailed reference viewed: 187 (3 UL)
Peer Reviewed
See detailSécurité dans les grilles de calcul
Cérin, Christophe; Dubacq, Jean-Christophe; Hérault, Thomas et al

in Kordon, F.; Pautet, L.; Petrucci, L. (Eds.) Systèmes répartis en action: de l'embarqué aux systèmes à large échelle (2008)

Detailed reference viewed: 57 (1 UL)
Peer Reviewed
See detailResult Certification Against Massive Attacks in Distributed Computations
Varrette, Sébastien UL; Roch, Jean-Louis; Krings, Axel

Scientific Conference (2008)

Detailed reference viewed: 33 (0 UL)
Peer Reviewed
See detailchapt. Sécurité dans les grilles de calcul,
Cérin, C.; Dubacq, J.-C.; Hérault, T. et al

in Systèmes répartis en action : de l'embarqué aux systèmes à large échelle (2008)

Detailed reference viewed: 40 (1 UL)
Peer Reviewed
See detailOn the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning
Dunlop, Dominic UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'08) (2008)

Detailed reference viewed: 84 (0 UL)
Peer Reviewed
See detailBuilding Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
Varrette, Sébastien UL; Roch, Jean-Louis; Duc, Guillaume et al

in Euro-Par 2008, Workshop on Secure, Trusted, Manageable and Controllable Grid Services (SGS'08) (2008)

Detailed reference viewed: 75 (0 UL)
Peer Reviewed
See detailNature inspired Algorithm-Based Fault Tolerance on Global Computing Platforms. Application to Symbolic Regression
Varrette, Sébastien UL; Ostaszewski, Marek UL; Bouvry, Pascal UL

in International Conference on Metaheuristics and Nature Inspired Computing (META'08) (2008)

Detailed reference viewed: 64 (0 UL)
Peer Reviewed
See detailProbabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product
Roch, Jean-Louis; Varrette, Sébastien UL

in Proc. of the ACM Intl. Workshop on Parallel Symbolic Computation’07 (PASCO’07) (2007, July)

Detailed reference viewed: 65 (0 UL)
Full Text
See detailProgrammation avancée en C (avec exercices et corrigés)
Varrette, Sébastien UL; Bernard, Nicolas UL

Book published by Lavoisier-Hermès (2007)

Destiné aux professionnels comme aux étudiants possédant de bonnes bases de programmation dans un langage impératif, Programmation avancée en C décrit le langage C tel qu'il est défini dans la norme C99 ... [more ▼]

Destiné aux professionnels comme aux étudiants possédant de bonnes bases de programmation dans un langage impératif, Programmation avancée en C décrit le langage C tel qu'il est défini dans la norme C99. L'atout majeur de ce livre est d'associer dans un unique ouvrage, en français : * une description du langage C plus précise et plus complète que dans les ouvrages introductifs; * des chapitres spécifiques qui couvrent des sujets connexes aussi divers que la programmation modulaire, la traque des bugs, les questions d'optimisation et de sécurité, mais aussi l'utilisation de code C avec d'autres langages; * une introduction à la programmation système et réseau en environnement POSIX qui décrit les utilisations les plus fréquentes et s'avère indispensable pour profiter pleinement des manuels de ces systèmes * enfin, plus de 75 exercices corrigés qui permettent au lecteur d'assimiler les notions abordées et d'acquérir ainsi une connaissance approfondie de C. Public: Étudiants des bachelor et masters d'informatique; Élèves ingénieurs; Enseignants-chercheurs; Professionnels développeurs [less ▲]

Detailed reference viewed: 2005 (8 UL)
Peer Reviewed
See detailCryptographie à Clef Publique
Dumas, J.-G.; Leprévost, Franck UL; Roch, Jean-Louis et al

in Ebrahimi, Touradj; Leprévost, Franck; Warusfel, Bertrand (Eds.) Cryptographie et sécurité des systèmes et réseaux, 2 (2007)

Les briques de construction des systèmes sécurisés d'information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosystèmes) et la cryptanalyse (la recherche ... [more ▼]

Les briques de construction des systèmes sécurisés d'information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosystèmes) et la cryptanalyse (la recherche de failles dans les cryptosystèmes). Les cryptosystèmes reposent sur le principe de Kerckhoff, qui affirme que la sécurité d'un cryptosystème ne doit pas reposer sur l'ignorance de l'algorithme pour sa mise en œuvre, mais sur l'ignorance que l'attaquant a d'une information secrète. Ce volume, organisé en chapitres indépendants, traite de la cryptographie à clef secrète, en particulier de l'AES, et des méthodes de cryptanalyse linéaire et différentielle , de la cryptographie à clef publique, en particulier de RSA, du protocole d'échange de clefs de Diffie-Hellman, et des signatures électroniques. Il assemble ces briques de construction dans le cadre des architectures à clef publique (X.509, PGP, DNSSEC) et traite de la sécurité des systèmes (essentiellement Unix), et des réseaux. [less ▲]

Detailed reference viewed: 89 (0 UL)
See detailThéorie des Codes : Compression, Cryptage et Correction
Dumas, Jean-Guillaume; Roch, Jean-Louis; Tannier, Eric et al

Book published by Dunod (2007)

Detailed reference viewed: 62 (1 UL)
Peer Reviewed
See detailSecurity of Global Computing Platforms: Authentication and Computed Results Integrity
Varrette, Sébastien UL

in Conference on Cryptology and Digital Content Security (CRM 07) (2007)

Detailed reference viewed: 19 (0 UL)