BOUVRY, P., VARRETTE, S., WASIM, M. U., IBRAHIM, A. A. Z. A., BESSERON, X., & Trinh, T. A. (2019). Security, reliability and regulation compliance in Ultrascale Computing System. In A. Y. Zomaya, J. Carretero (Ed.), ... E. Jeannot (Ed.), Ultrascale Computing Systems (pp. 65-83). IET. doi:10.1049/pbpc024e_ch3
Peer reviewed
Oleksiak, A., Lefèvre, L., Alonso, P., Da Costa, G., De Maio, V., Frasheri, N., Garcia, V. M., Guerrero, J., Lafond, S., Lastovetsky, A. L., Manumachu, R. R., Muite, B., Orgerie, A.-C., Piatek, W., Pierson, J.-M., Prodan, R., Stolf, P., Sheme, E., & VARRETTE, S. (2019). Energy aware ultrascale systems. In J. Carretero, E. Jeannot, ... A. Y. Zomaya (Eds.), Ultrascale Computing Systems (pp. 127-188). IET. doi:10.1049/PBPC024E_ch5
Peer reviewed
Orgerie, A.-C., & VARRETTE, S. (2019). A Full-Cost Model for Estimating the Energy Consumption of Computing Infrastructures. In A. Y. Zomaya, J. Carretero (Ed.), ... E. Jeannot (Ed.), Ultrascale Computing Systems (pp. 161-176). IET. doi:10.1049/pbpc024e_ch5
Peer reviewed
BOUVRY, P., Chetsa, G. L. T., Costa, G. D., Jeannot, E., Lefèvre, L., Pierson, J.-M., Pinel, F., Stolf, P., & VARRETTE, S. (2015). Energy Efficiency and High-Performance Computing. In J.-M. Pierson (Ed.), Large-scale Distributed Systems and Energy Efficiency: A Holistic View (pp. 197--224). John Wiley Sons. doi:10.1002/9781118981122.ch7
Peer reviewed
VARRETTE, S., BOUVRY, P., Jarus, M., & Oleksiak, A. (2015). Energy efficiency in HPC Data Centers: Latest Advances to Build the Path to Exascale. In Handbook on Data Centers. Springer. doi:10.1007/978-1-4939-2092-1_3
Peer reviewed
KLIAZOVICH, D., BOUVRY, P., Granelli, F., & Fonseca, N. L. S. (2015). Energy Consumption Optimization in Cloud Data Centers. In Cloud Services, Networking and Management. Wiley. doi:10.1002/9781119042655.ch8
Peer reviewed
Castro, H., Villamizar, M., Sotelo, G., DIAZ, C., PECERO, J., BOUVRY, P., & Khan, S. (2013). GFOG: Green and Flexible Opportunistic Grids. In S. Khan, A. Zomaya, ... W. Lizhe (Eds.), Scalable Computing and Communications. Theory and Practice (pp. 365-386). Hoboken, United States - New Jersey: Wiley&Sons.
Peer reviewed
Dorronsoro, B., Burguillo, J. C., Peleteiro, A., & BOUVRY, P. (2013). Evolutionary algorithms based on game theory and cellular automata with coalitions. In I. Zelinka, V. Snasel, ... A. Abraham (Eds.), Handbook of Optimization (pp. 481-503). Springer.
Peer reviewed
DORRONSORO, B., Burguillo, J. C., Peleteiro, A., & BOUVRY, P. (2013). Evolutionary algorithms based on game theory and cellular automata with coalitions. In I. Zelinka, V. Snasel, ... A. Abraham (Eds.), Handbook of Optimization (pp. 481-503). Springer.
Peer reviewed
KLIAZOVICH, D., BOUVRY, P., & Khan, S. (2013). Simulation and Performance Analysis of Data Intensive and Workload Intensive Cloud Computing Data Centers. In C. Kachris, K. Bergman, ... I. Tomkos (Eds.), Optical Interconnects for Future Data Center Networks (pp. 47-63). Springer New York. doi:10.1007/978-1-4614-4630-9_4
Peer reviewed
KLIAZOVICH, D., Granelli, F., Fonseca, N. L. S., & BOUVRY, P. (2013). Architectures and Information Signaling Techniques for Cognitive Networks. In Architectures and Information Signaling Techniques for Cognitive Networks. IGI Global.
Peer reviewed
PECERO, J., DORRONSORO, B., GUZEK, M., & BOUVRY, P. (2012). Memetic Algorithms for Energy-Aware Computation and Communications Optimization in Computing Clusters. In I. Ahmad & S. Ranka (Eds.), Handbook energy-aware and green computing (pp. 443 - 473). Chapman and Hall/CRC Press.
BERTHOLON, B., Cérin, C., Coti, C., Dubacq, J.-C., & VARRETTE, S. (2011). chap. "Practical Security in Distributed Systems". In Distributed Systems (volume 1); Design and Algorithms (pp. 237--300). Whiley.
Peer reviewed
BERTHOLON, B., Cérin, C., Coti, C., Dubacq, J.-C., & VARRETTE, S. (2011). Practical Security in Distributed Systems. In S. Haddad, F. Kordon, L. Pautet, ... L. Petrucci (Eds.), Distributed Systems; Design and Algorithms, 1 (pp. 243--306). Whiley and Son.
Peer reviewed
DORRONSORO, B., DANOY, G., BOUVRY, P., & Nebro, A. J. (2011). Multi-objective Cooperative Coevolutionary Evolutionary Algorithms for Continuous and Combinatorial Optimization. In Intelligent Decision Systems in Large-Scale Distributed Environments (pp. 49-74). Springer.
Peer reviewed
PECERO, J., PINEL, F., DORRONSORO, B., DANOY, G., BOUVRY, P., & Zomaya, A. (2011). Efficient Hierarchical Task Scheduling on GRIDS Accounting for Computation and Communications. In P. BOUVRY, H. González-Vélez, ... J. Kolodziej (Eds.), Intelligent Decision Systems in Large-Scale Distributed Environments, 362. Springer.
Peer reviewed
TANTAR, A.-A., DANOY, G., BOUVRY, P., & Khan, S. (2011). Energy-Efficient Computing using Agent-Based Multi-Objective Dynamic Optimization. In J. H. Kim and M. J. Lee (Ed.), Green IT: Technologies and Applications (pp. 267-287). New York, NY, USA, Unknown/unspecified: Springer.
Peer reviewed
Cérin, C., Dubacq, J.-C., Hérault, T., Keryell, R., Pazat, J.-L., Roch, J.-L., & VARRETTE, S. (2008). chapt. Sécurité dans les grilles de calcul. In Systèmes répartis en action : de l'embarqué aux systèmes à large échelle (pp. 153--180). Hermès.
Peer reviewed
Cérin, C., Dubacq, J.-C., Hérault, T., Keryell, R., Pazat, J.-L., Roch, J.-L., & VARRETTE, S. (2008). Sécurité dans les grilles de calcul. In F. Kordon, L. Pautet, ... L. Petrucci (Eds.), Systèmes répartis en action: de l'embarqué aux systèmes à large échelle (pp. 153--180). Hermès.
Peer reviewed
Dumas, J.-G., LEPRÉVOST, F., Roch, J.-L., Savin, V., & VARRETTE, S. (2007). Cryptographie à Clef Publique. In T. Ebrahimi, F. LEPRÉVOST, ... B. Warusfel (Eds.), Cryptographie et sécurité des systèmes et réseaux, 2 (pp. 103-182). Cachan, Unknown/unspecified: Lavoisier.
Peer reviewed
BOUVRY, P., Dumas, J.-G., Gillard, R., Roch, J.-L., & VARRETTE, S. (2006). chap "Cryptographie à clef secréte". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux. Lavoisier-Hermes.
Peer reviewed
LEPRÉVOST, F., VARRETTE, S., Roch, J.-L., & Dumas, J.-G. (2006). chap "Architectures PKI". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux. Lavoisier-Hermes.
Peer reviewed
BERNARD, N., BOUVRY, P., Denneulin, Y., & VARRETTE, S. (2006). Sécurité Réseau. In F. LEPRÉVOST, T. Ebrahimi, ... B. Warusfel (Eds.), Cryptographie et sécurité de systèmes et réseaux (pp. 343–391). Lavoisier-Hermes.
BERNARD, N., Denneulin, Y., & VARRETTE, S. (2006). chap. "Sécurite UNIX". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (pp. 211--245). Hermès.
Peer reviewed
BERNARD, N., Denneulin, Y., & VARRETTE, S. (2006). Sécurite UNIX. In T. Ebrahimi, F. LEPRÉVOST, ... B. Warusfel (Eds.), Cryptographie et sécurité de systèmes et réseaux (pp. 211-245). Lavoisier-Hermes.
BOUVRY, P., Dumas, J.-G., Gillard, R., Roch, J.-L., & VARRETTE, S. (2006). chapter "Cryptographie à Clé Secrète". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (pp. 23--101). Hermès.
Peer reviewed
Dumas, J.-G., LEPRÉVOST, F., Roch, J.-L., Savin, V., & VARRETTE, S. (2006). chap. "Cryptographie à Clé Publique". In Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (pp. 103--196). Hermès.
Peer reviewed