Skip to main content

Showing 1–36 of 36 results for author: Couchot, J

.
  1. arXiv:2304.02886  [pdf, other

    cs.CL cs.AI

    Automatic ICD-10 Code Association: A Challenging Task on French Clinical Texts

    Authors: Yakini Tchouka, Jean-François Couchot, David Laiymani, Philippe Selles, Azzedine Rahmani

    Abstract: Automatically associating ICD codes with electronic health data is a well-known NLP task in medical research. NLP has evolved significantly in recent years with the emergence of pre-trained language models based on Transformers architecture, mainly in the English language. This paper adapts these models to automatically associate the ICD codes. Several neural network architectures have been experi… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  2. arXiv:2211.01147  [pdf, other

    cs.CR cs.AI

    An Easy-to-use and Robust Approach for the Differentially Private De-Identification of Clinical Textual Documents

    Authors: Yakini Tchouka, Jean-François Couchot, David Laiymani

    Abstract: Unstructured textual data is at the heart of healthcare systems. For obvious privacy reasons, these documents are not accessible to researchers as long as they contain personally identifiable information. One way to share this data while respecting the legislative framework (notably GDPR or HIPAA) is, within the medical structures, to de-identify it, i.e. to detect the personal information of a pe… ▽ More

    Submitted 2 November, 2022; originally announced November 2022.

  3. arXiv:2210.15630  [pdf, other

    cs.DS

    In-stream Probabilistic Cardinality Estimation for Bloom Filters

    Authors: Remy Scholler, Jean-Francois Couchot, Oumaima Alaoui-Ismaili, Denis Renaud, Eric Ballot

    Abstract: The amount of data coming from different sources such as IoT-sensors, social networks, cellular networks, has increased exponentially during the last few years. Probabilistic Data Structures (PDS) are efficient alternatives to deterministic data structures suitable for large data processing and streaming applications. They are mainly used for approximate membership queries, frequency count, cardin… ▽ More

    Submitted 1 November, 2022; v1 submitted 27 October, 2022; originally announced October 2022.

    Comments: 18 pages, 10 figures, 3 tables

  4. arXiv:2209.09631  [pdf, other

    cs.CR cs.LG

    De-Identification of French Unstructured Clinical Notes for Machine Learning Tasks

    Authors: Yakini Tchouka, Jean-François Couchot, Maxime Coulmeau, David Laiymani, Philippe Selles, Azzedine Rahmani

    Abstract: Unstructured textual data are at the heart of health systems: liaison letters between doctors, operating reports, coding of procedures according to the ICD-10 standard, etc. The details included in these documents make it possible to get to know the patient better, to better manage him or her, to better study the pathologies, to accurately remunerate the associated medical acts\ldots All this seem… ▽ More

    Submitted 6 October, 2023; v1 submitted 16 September, 2022; originally announced September 2022.

  5. On the Risks of Collecting Multidimensional Data Under Local Differential Privacy

    Authors: Héber H. Arcolezi, Sébastien Gambs, Jean-François Couchot, Catuscia Palamidessi

    Abstract: The private collection of multiple statistics from a population is a fundamental statistical problem. One possible approach to realize this is to rely on the local model of differential privacy (LDP). Numerous LDP protocols have been developed for the task of frequency estimation of single and multiple attributes. These studies mainly focused on improving the utility of the algorithms to ensure th… ▽ More

    Submitted 1 August, 2023; v1 submitted 4 September, 2022; originally announced September 2022.

    Comments: Accepted at VLDB 2023. Version of record at https://doi.org/10.14778/3579075.3579086

  6. Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python

    Authors: Héber H. Arcolezi, Jean-François Couchot, Sébastien Gambs, Catuscia Palamidessi, Majid Zolfaghari

    Abstract: This paper introduces the multi-freq-ldpy Python package for multiple frequency estimation under Local Differential Privacy (LDP) guarantees. LDP is a gold standard for achieving local privacy with several real-world implementations by big tech companies such as Google, Apple, and Microsoft. The primary application of LDP is frequency (or histogram) estimation, in which the aggregator estimates th… ▽ More

    Submitted 23 September, 2022; v1 submitted 5 May, 2022; originally announced May 2022.

    Comments: Paper published in the proceedings of ESORICS 2022

  7. Differentially Private Multivariate Time Series Forecasting of Aggregated Human Mobility With Deep Learning: Input or Gradient Perturbation?

    Authors: Héber H. Arcolezi, Jean-François Couchot, Denis Renaud, Bechara Al Bouna, Xiaokui Xiao

    Abstract: This paper investigates the problem of forecasting multivariate aggregated human mobility while preserving the privacy of the individuals concerned. Differential privacy, a state-of-the-art formal notion, has been used as the privacy guarantee in two different and independent steps when training deep learning models. On one hand, we considered \textit{gradient perturbation}, which uses the differe… ▽ More

    Submitted 3 June, 2022; v1 submitted 1 May, 2022; originally announced May 2022.

    Comments: Final version accepted in the journal Neural Computing and Applications

  8. Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates

    Authors: Héber H. Arcolezi, Jean-François Couchot, Bechara Al Bouna, Xiaokui Xiao

    Abstract: This paper investigates the problem of collecting multidimensional data throughout time (i.e., longitudinal studies) for the fundamental task of frequency estimation under Local Differential Privacy (LDP) guarantees. Contrary to frequency estimation of a single attribute, the multidimensional aspect demands particular attention to the privacy budget. Besides, when collecting user statistics longit… ▽ More

    Submitted 16 July, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: Final version accepted in the journal Digital Communications and Networks. Version of Record: https://doi.org/10.1016/j.dcan.2022.07.003

  9. Random Sampling Plus Fake Data: Multidimensional Frequency Estimates With Local Differential Privacy

    Authors: Héber H. Arcolezi, Jean-François Couchot, Bechara Al Bouna, Xiaokui Xiao

    Abstract: With local differential privacy (LDP), users can privatize their data and thus guarantee privacy properties before transmitting it to the server (a.k.a. the aggregator). One primary objective of LDP is frequency (or histogram) estimation, in which the aggregator estimates the number of users for each possible value. In practice, when a study with rich content on a population is desired, the intere… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

  10. arXiv:1904.03112  [pdf, other

    cs.DB

    Safe Disassociation of Set-Valued Datasets

    Authors: Nancy Awad, Bechara Al Bouna, Jean-Francois Couchot, Laurent Philippe

    Abstract: Disassociation introduced by Terrovitis et al. is a bucketization based anonimyzation technique that divides a set-valued dataset into several clusters to hide the link between individuals and their complete set of items. It increases the utility of the anonymized dataset, but on the other side, it raises many privacy concerns, one in particular, is when the items are tightly coupled to form what… ▽ More

    Submitted 5 April, 2019; originally announced April 2019.

  11. arXiv:1706.08923  [pdf, other

    cs.DS

    Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers

    Authors: Jean-François Couchot, Pierre-Cyrille Heam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi

    Abstract: This article presents a new class of Pseudorandom Number Generators. The generators are based on traversing a n-cube where a Balanced Hamiltonian Cycle has been removed. The construction of such generators is automatic for small number of bits, but remains an open problem when this number becomes large. A running example is used throughout the paper. Finally, first statistical experiments of these… ▽ More

    Submitted 26 June, 2017; originally announced June 2017.

  12. arXiv:1706.08764  [pdf, other

    cs.MM

    A Robust Data Hiding Process Contributing to the Development of a Semantic Web

    Authors: Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux

    Abstract: In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding framework, and focus more specifically on robust steganography. Steganographic algorithms can participate in the development of a semantic web: medias being on the Internet can be enriched by information related to their contents, authors, etc., leading t… ▽ More

    Submitted 27 June, 2017; originally announced June 2017.

  13. arXiv:1706.08514  [pdf, other

    q-bio.PE cs.AI q-bio.QM

    Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization

    Authors: Reem Alsrraj, Bassam AlKindy, Christophe Guyeux, Laurent Philippe, Jean-François Couchot

    Abstract: The number of complete chloroplastic genomes increases day after day, making it possible to rethink plants phylogeny at the biomolecular era. Given a set of close plants sharing in the order of one hundred of core chloroplastic genes, this article focuses on how to extract the largest subset of sequences in order to obtain the most supported species tree. Due to computational complexity, a discret… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

    Comments: arXiv admin note: substantial text overlap with arXiv:1608.08749

  14. arXiv:1706.08093  [pdf, ps, other

    cs.CR cs.DC

    One random jump and one permutation: sufficient conditions to chaotic, statistically faultless, and large throughput PRNG for FPGA

    Authors: Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux

    Abstract: Sub-categories of mathematical topology, like the mathematical theory of chaos, offer interesting applications devoted to information security. In this research work, we have introduced a new chaos-based pseudorandom number generator implemented in FPGA, which is mainly based on the deletion of a Hamilton cycle within the $n$-cube (or on the vectorial negation), plus one single permutation. By doi… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  15. arXiv:1705.00276  [pdf, other

    q-bio.GN

    On the ability to reconstruct ancestral genomes from Mycobacterium genus

    Authors: Christophe Guyeux, Bashar Al-Nuaimi, Bassam AlKindy, Jean-François Couchot, Michel Salomon

    Abstract: Technical signs of progress during the last decades has led to a situation in which the accumulation of genome sequence data is increasingly fast and cheap. The huge amount of molecular data available nowadays can help addressing new and essential questions in Evolution. However, reconstructing evolution of DNA sequences requires models, algorithms, statistical and computational methods of ever in… ▽ More

    Submitted 30 April, 2017; originally announced May 2017.

  16. Random Walk in a N-cube Without Hamiltonian Cycle to Chaotic Pseudorandom Number Generation: Theoretical and Practical Considerations

    Authors: Sylvain Contassot-Vivier, Jean-François Couchot, Christophe Guyeux, Pierre-Cyrille Heam

    Abstract: Designing a pseudorandom number generator (PRNG) is a difficult and complex task. Many recent works have considered chaotic functions as the basis of built PRNGs: the quality of the output would indeed be an obvious consequence of some chaos properties. However, there is no direct reasoning that goes from chaotic functions to uniform distribution of the output. Moreover, embedding such kind of fun… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: Published in International Journal of Bifurcation and Chaos

  17. arXiv:1612.08882  [pdf, other

    cs.MM

    Improving Blind Steganalysis in Spatial Domain using a Criterion to Choose the Appropriate Steganalyzer between CNN and SRM+EC

    Authors: Jean-Francois Couchot, Raphaël Couturier, Michel Salomon

    Abstract: Conventional state-of-the-art image steganalysis approaches usually consist of a classifier trained with features provided by rich image models. As both features extraction and classification steps are perfectly embodied in the deep learning architecture called Convolutional Neural Network (CNN), different studies have tried to design a CNN-based steganalyzer. The network designed by Xu et al. is… ▽ More

    Submitted 9 January, 2017; v1 submitted 28 December, 2016; originally announced December 2016.

  18. arXiv:1611.08410  [pdf, other

    cs.CR

    FPGA Implementation of $\mathbb{F}_2$-Linear Pseudorandom Number Generators Based on Zynq MPSoC: a Chaotic Iterations Post Processing Case Study

    Authors: Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux

    Abstract: Pseudorandom number generation (PRNG) is a key element in hardware security platforms like field-programmable gate array FPGA circuits. In this article, 18 PRNGs belonging in 4 families (xorshift, LFSR, TGFSR, and LCG) are physically implemented in a FPGA and compared in terms of area, throughput, and statistical tests. Two flows of conception are used for Register Transfer Level (RTL) and High-le… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to Secrypt16

  19. arXiv:1611.08397  [pdf, ps, other

    cs.MM

    A Second Order Derivatives based Approach for Steganography

    Authors: Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux

    Abstract: Steganography schemes are designed with the objective of minimizing a defined distortion function. In most existing state of the art approaches, this distortion function is based on image feature preservation. Since smooth regions or clean edges define image core, even a small modification in these areas largely modifies image features and is thus easily detectable. On the contrary, textures, nois… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to SECRYPT 2016

  20. arXiv:1609.06055  [pdf, other

    q-bio.GN

    Relation between Gene Content and Taxonomy in Chloroplasts

    Authors: Bashar Al-Nuaimi, Christophe Guyeux, Bassam AlKindy, Jean-François Couchot, Michel Salomon

    Abstract: The aim of this study is to investigate the relation that can be found between the phylogeny of a large set of complete chloroplast genomes, and the evolution of gene content inside these sequences. Core and pan genomes have been computed on \textit{de novo} annotation of these 845 genomes, the former being used for producing well-supported phylogenetic tree while the latter provides information r… ▽ More

    Submitted 20 September, 2016; originally announced September 2016.

    Comments: ICBSB 2016 conference

  21. arXiv:1608.08749  [pdf, other

    cs.AI q-bio.GN

    Binary Particle Swarm Optimization versus Hybrid Genetic Algorithm for Inferring Well Supported Phylogenetic Trees

    Authors: Bassam AlKindy, Bashar Al-Nuaimi, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Reem Alsrraj, Laurent Philippe

    Abstract: The amount of completely sequenced chloroplast genomes increases rapidly every day, leading to the possibility to build large-scale phylogenetic trees of plant species. Considering a subset of close plant species defined according to their chloroplasts, the phylogenetic tree that can be inferred by their core genes is not necessarily well supported, due to the possible occurrence of problematic ge… ▽ More

    Submitted 31 August, 2016; originally announced August 2016.

    Journal ref: Lecture Notes in Bioinformatics LNBI series, 9874, 165--179, 2016

  22. arXiv:1608.05928  [pdf, other

    cs.CR

    Quality Analysis of a Chaotic Proven Keyed Hash Function

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

    Abstract: Hash functions are cryptographic tools, which are notably involved in integrity checking and password storage. They are of primary importance to improve the security of exchanges through the Internet. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital data must be investigated. In this document an original keyed hash function i… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1112.1271

    Journal ref: International Journal On Advances in Internet Technology. 5(1), pp.26-33, 2012

  23. arXiv:1608.05916  [pdf, other

    cs.NE math.DS nlin.CD

    Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with Multilayer Feedforward Networks

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Michel Salomon

    Abstract: Many research works deal with chaotic neural networks for various fields of application. Unfortunately, up to now these networks are usually claimed to be chaotic without any mathematical proof. The purpose of this paper is to establish, based on a rigorous theoretical framework, an equivalence between chaotic iterations according to Devaney and a particular class of neural networks. On the one ha… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Journal ref: AIP Chaos, An Interdisciplinary Journal of Nonlinear Science. 22(1), 013122 (2012)

  24. arXiv:1608.05850  [pdf, other

    cs.MM cs.CR

    Steganalyzer performances in operational contexts

    Authors: Yousra A. Fadil, Jean-François Couchot, Raphaël Couturier, Christophe Guyeux

    Abstract: Steganography and steganalysis are two important branches of the information hiding field of research. Steganography methods consist in hiding information in such a way that the secret message is undetectable for the uninitiated. Steganalyzis encompasses all the techniques that attempt to detect the presence of such hidden information. This latter is usually designed by making classifiers able to… ▽ More

    Submitted 20 August, 2016; originally announced August 2016.

    Comments: Proceedings of IIH-MSP 2015, The Eleventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing

  25. arXiv:1605.07946  [pdf, other

    cs.MM

    Steganalysis via a Convolutional Neural Network using Large Convolution Filters for Embedding Process with Same Stego Key

    Authors: Jean-François Couchot, Raphaël Couturier, Christophe Guyeux, Michel Salomon

    Abstract: For the past few years, in the race between image steganography and steganalysis, deep learning has emerged as a very promising alternative to steganalyzer approaches based on rich image models combined with ensemble classifiers. A key knowledge of image steganalyzer, which combines relevant image features and innovative classification procedures, can be deduced by a deep learning approach called… ▽ More

    Submitted 30 July, 2016; v1 submitted 25 May, 2016; originally announced May 2016.

  26. Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species

    Authors: Bassam AlKindy, Huda Al-Nayyef, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi

    Abstract: The way to infer well-supported phylogenetic trees that precisely reflect the evolutionary process is a challenging task that completely depends on the way the related core genes have been found. In previous computational biology studies, many similarity based algorithms, mainly dependent on calculating sequence alignment matrices, have been proposed to find them. In these kinds of approaches, a s… ▽ More

    Submitted 23 April, 2015; originally announced April 2015.

    Comments: 12 pages, 7 figures, IWBBIO 2015 (3rd International Work-Conference on Bioinformatics and Biomedical Engineering)

    Journal ref: Springer LNBI 9043, 2015, 379--390

  27. arXiv:1504.05095  [pdf, other

    cs.AI cs.NE q-bio.PE q-bio.QM

    Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes

    Authors: Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Christian Parisod, Jacques M. Bahi

    Abstract: The amount of completely sequenced chloroplast genomes increases rapidly every day, leading to the possibility to build large scale phylogenetic trees of plant species. Considering a subset of close plant species defined according to their chloroplasts, the phylogenetic tree that can be inferred by their core genes is not necessarily well supported, due to the possible occurrence of "problematic"… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

    Comments: 15 pages, 7 figures, 2nd International Conference on Algorithms for Computational Biology, AlCoB 2015

  28. Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts

    Authors: Bassam AlKindy, Christophe Guyeux, Jean-François Couchot, Michel Salomon, Jacques M. Bahi

    Abstract: In computational biology and bioinformatics, the manner to understand evolution processes within various related organisms paid a lot of attention these last decades. However, accurate methodologies are still needed to discover genes content evolution. In a previous work, two novel approaches based on sequence similarities and genes features have been proposed. More precisely, we proposed to use g… ▽ More

    Submitted 17 December, 2014; originally announced December 2014.

    Comments: 4 pages, IEEE International Conference on Bioinformatics and Biomedicine (BIBM 2014)

  29. arXiv:1409.6369  [pdf, other

    cs.CE q-bio.PE

    Finding the Core-Genes of Chloroplasts

    Authors: Bassam AlKindy, Jean-François Couchot, Christophe Guyeux, Arnaud Mouly, Michel Salomon, Jacques M. Bahi

    Abstract: Due to the recent evolution of sequencing techniques, the number of available genomes is rising steadily, leading to the possibility to make large scale genomic comparison between sets of close species. An interesting question to answer is: what is the common functionality genes of a collection of species, or conversely, to determine what is specific to a given species when compared to other ones… ▽ More

    Submitted 22 September, 2014; originally announced September 2014.

    Journal ref: Journal of Bioscience, Biochemistry, and Bioinformatics, 4(5):357--364, 2014

  30. arXiv:1202.5302  [pdf, other

    cs.CR cs.IT

    Application of Steganography for Anonymity through the Internet

    Authors: Jacques M. Bahi, Jean-François Couchot, Nicolas Friot, Christophe Guyeux

    Abstract: In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve… ▽ More

    Submitted 23 February, 2012; originally announced February 2012.

    Comments: 14 pages

  31. arXiv:1112.1684  [pdf, ps, other

    cs.DM cs.CR

    On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems

    Authors: J. M. Bahi, J. -F. Couchot, C. Guyeux, A. Richard

    Abstract: Chaotic functions are characterized by sensitivity to initial conditions, transitivity, and regularity. Providing new functions with such properties is a real challenge. This work shows that one can associate with any Boolean network a continuous function, whose discrete-time iterations are chaotic if and only if the iteration graph of the Boolean network is strongly connected. Then, sufficient co… ▽ More

    Submitted 7 December, 2011; originally announced December 2011.

  32. arXiv:1112.1675  [pdf, ps, other

    cs.DM cs.CR

    Steganography: a Class of Algorithms having Secure Properties

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

    Abstract: Chaos-based approaches are frequently proposed in information hiding, but without obvious justification. Indeed, the reason why chaos is useful to tackle with discretion, robustness, or security, is rarely elucidated. This research work presents a new class of non-blind information hidingalgorithms based on some finite domains iterations that are Devaney's topologically chaotic. The approach is en… ▽ More

    Submitted 7 December, 2011; originally announced December 2011.

    Comments: 4 pages, published in Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 2011

  33. arXiv:1112.1271  [pdf, ps, other

    cs.CR

    Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

    Abstract: Security of information transmitted through the Internet is an international concern. This security is guaranteed by tools like hash functions. However, as security flaws have been recently identified in the current standard in this domain, new ways to hash digital media must be investigated. In this document an original keyed hash function is evaluated. It is based on chaotic iterations and thus… ▽ More

    Submitted 6 December, 2011; originally announced December 2011.

    Comments: Accepted the the Internet11 conference

  34. arXiv:1112.1260  [pdf, ps, other

    cs.CR

    Steganography: a class of secure and robust algorithms

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux

    Abstract: This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property. Thanks to a complete formalization of the approach we prove security against watermark-only attacks of a large class of steganographic algorithms. Finally a complete study of robustness… ▽ More

    Submitted 6 December, 2011; originally announced December 2011.

    Comments: Published in The Computer Journal special issue about steganography

  35. arXiv:1112.0950  [pdf, other

    cs.CR

    Class of Trustworthy Pseudo-Random Number Generators

    Authors: Jacques M. Bahi, Jean-François Couchot, Christophe Guyeux, Qianxue Wang

    Abstract: With the widespread use of communication technologies, cryptosystems are therefore critical to guarantee security over open networks as the Internet. Pseudo-random number generators (PRNGs) are fundamental in cryptosystems and information hiding schemes. One of the existing chaos-based PRNGs is using chaotic iterations schemes. In prior literature, the iterate function is just the vectorial boolea… ▽ More

    Submitted 5 December, 2011; originally announced December 2011.

    Comments: 6 pages, 3 figures, In INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet, Luxembourg, Luxembourg, pages 72--77, June 2011

  36. arXiv:0907.1357  [pdf, ps, other

    cs.LO

    Graph Based Reduction of Program Verification Conditions

    Authors: Jean-François Couchot, Alain Giorgetti, Nicolas Stouls

    Abstract: Increasing the automaticity of proofs in deductive verification of C programs is a challenging task. When applied to industrial C programs known heuristics to generate simpler verification conditions are not efficient enough. This is mainly due to their size and a high number of irrelevant hypotheses. This work presents a strategy to reduce program verification conditions by selecting their rele… ▽ More

    Submitted 8 July, 2009; originally announced July 2009.

    Journal ref: Automated Formal Methods (AFM'09), colocated with CAV'09 (2009) 40-47