Thierry, Jean
241  results:
Search for persons X
?
1

A semi-persistent scheduling scheme for videotelephony traf..:

, In: Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems,
 
?
2

Boost.SIMD : generic programming for portable SIMDizatio:

, In: Proceedings of the 2014 Workshop on Programming models for SIMD/Vector processing,
 
?
3

Boost.SIMD : generic programming for portable SIMDizatio:

, In: Proceedings of the 21st international conference on Parallel architectures and compilation techniques,
Estérie, Pierre ; Gaunard, Mathias ; Falcou, Joel.. - p. 431-432 , 2012
 
?
4

Charges, poids et mesures de Levy dans les espaces vectorie..:

, In: Lecture Notes in Mathematics; Séminaire de Probabilités XIII,
Lapreste, Jean-Thierry - p. 41-71 , 1979
 
?
 
?
6

Quantifying and Leveraging Uncertain and Imprecise Answers ..:

, In: Proceedings of the 35th Conference on l'Interaction Humain-Machine,
 
?
7

Datasets with Rich Labels for Machine Learning:

, In: 2023 IEEE International Conference on Fuzzy Systems (FUZZ),
 
?
8

Specification and Verification of Communication Paradigms f..:

, In: 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS),
Thierry, Loic ; Jaskolka, Jason ; Hamid, Brahim. - p. 157-166 , 2023
 
?
10

Real Bird Dataset with Imprecise and Uncertain Values:

, In: Belief Functions: Theory and Applications; Lecture Notes in Computer Science,
 
?
11

Contributors:

, In: Mechanical and Electro-Chemical Interactions Under Tribocorrosion,
Celis, Jean-Pierre ; Drees, D. ; Economou, S.... - p. xv-xvi , 2021
 
?
12

Validation of Smets' Hypothesis in the Crowdsourcing Enviro..:

, In: Belief Functions: Theory and Applications; Lecture Notes in Computer Science,
 
?
13

Modeling Uncertainty and Inaccuracy on Data from Crowdsourc..:

, In: 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI),
 
?
 
?
15

CoDisasm : Medium Scale Concatic Disassembly of Self-Mod..:

, In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,
 
1-15