Table of Content

You can find the latest version of the BibTeX file biblio-varrette.bib used to generate this page on Github.

PhD Thesis

  1. S. Varrette, “Sécurité des Architectures de Calcul Distribué: Authentification et Certification de Résultats,” PhD thesis, INP Grenoble and Université du Luxembourg, 2007. In French
    URL

Books

  1. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 3rd ed. Dunod, 2018. 384 pages, in French
    URL
  2. J.-G. Dumas, P. Lafourcade, A. Tichit, and S. Varrette, Les blockchains en 50 questions: comprendre le fonctionnement et les enjeux de cette technologie innovante, 1er ed. Dunod, 2018. 224 pages, in French
  3. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Foundations of Coding: Compression, Encryption, Error-Correction. Wiley & Sons, 2015. 376 pages
    URL
  4. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 2nde ed. Dunod, 2014. 384 pages, in French
    URL
  5. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 1st ed. Dunod, 2007. 352 pages, in French. Corrected version published in 2009
    URL
  6. S. Varrette and N. Bernard, Programmation avancée en C (avec exercices et corrigés). Hermès, 2007. 416 pages, in French
    URL

Books Chapters

  1. P. Bouvry, G. L. T. Chetsa, G. D. Costa, E. Jeannot, L. Lefèvre, J.-M. Pierson, F. Pinel, P. Stolf, and S. Varrette, “Large-scale Distributed Systems and Energy Efficiency: A Holistic View,” vol. 94, J.-M. Pierson, Ed. John Wiley & Sons, 2015, pp. 197–224.
  2. S. Varrette, P. Bouvry, M. Jarus, and A. Oleksiak, “Handbook on Data Centers,” Springer, 2015.
  3. B. Bertholon, C. Cérin, C. Coti, J.-C. Dubacq, and S. Varrette, “Distributed Systems (volume 1); Design and Algorithms,” vol. 1, Wiley, 2011, pp. 237–300.
  4. C. Cérin, J.-C. Dubacq, T. Hérault, R. Keryell, J.-L. Pazat, J.-L. Roch, and S. Varrette, “Systèmes répartis en action : de l’embarqué aux systèmes à large échelle,” Hermès, 2008, pp. 153–180. 184 pages, in French
    URL
  5. P. Bouvry, J.-G. Dumas, R. Gillard, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 23–101. In French
    URL
  6. J.-G. Dumas, F. Leprevost, J.-L. Roch, V. Savin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 103–196. In French
    URL
  7. J.-G. Dumas, F. Leprevost, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 187–210. In French
    URL
  8. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 211–245. In French
    URL
  9. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 247–298. In French
    URL

Magazines

  1. S. Varrette and S. Gautier, “Cryptographie et Signatures Eléctoniques,” in I-mag – Magazine de l’AAE ENSIMAG, no. 37, Association des anciens élèves de l’ENSIMAG, 2006, pp. 12–19.
    URL

Book Chapters

  1. P. Bouvry, G. L. T. Chetsa, G. D. Costa, E. Jeannot, L. Lefèvre, J.-M. Pierson, F. Pinel, P. Stolf, and S. Varrette, “Large-scale Distributed Systems and Energy Efficiency: A Holistic View,” vol. 94, J.-M. Pierson, Ed. John Wiley & Sons, 2015, pp. 197–224.
  2. S. Varrette, P. Bouvry, M. Jarus, and A. Oleksiak, “Handbook on Data Centers,” Springer, 2015.
  3. B. Bertholon, C. Cérin, C. Coti, J.-C. Dubacq, and S. Varrette, “Distributed Systems (volume 1); Design and Algorithms,” vol. 1, Wiley, 2011, pp. 237–300.
  4. C. Cérin, J.-C. Dubacq, T. Hérault, R. Keryell, J.-L. Pazat, J.-L. Roch, and S. Varrette, “Systèmes répartis en action : de l’embarqué aux systèmes à large échelle,” Hermès, 2008, pp. 153–180. 184 pages, in French
    URL
  5. P. Bouvry, J.-G. Dumas, R. Gillard, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 23–101. In French
    URL
  6. J.-G. Dumas, F. Leprevost, J.-L. Roch, V. Savin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 103–196. In French
    URL
  7. J.-G. Dumas, F. Leprevost, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 187–210. In French
    URL
  8. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 211–245. In French
    URL
  9. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 247–298. In French
    URL

Journal Articles

  1. M. Bagein, J. Barbosa, V. Blanco, I. Brandic, S. Cremer, S. Fremal, H. Karatza, L. Lefevre, T. Mastelic, A. Oleksiak, A.-C. Orgerie, G. L. Stavrinides, and S. Varrette, “Energy Efficiency for Ultrascale Systems: Challenges and Trends from Nesus Project,” Intl. J. on Supercomputing Frontiers and Innovations, vol. 2, no. 2, pp. 105–131, 2015. See \url[http://superfri.org/superfri/article/view/48](http://superfri.org/superfri/article/view/48)
    doi
  2. P. Bouvry, R. Mayer, J. Muszyński, D. Petcu, A. Rauber, G. Tempesti, T. Trinh, and S. Varrette, “Resilience within Ultrascale Computing System: Challenges and Opportunities from Nesus Project,” Intl. J. on Supercomputing Frontiers and Innovations, vol. 2, no. 2, pp. 46–63, 2015. See \url[http://superfri.org/superfri/article/view/46](http://superfri.org/superfri/article/view/46)
    doi
  3. M. Guzek, S. Varrette, V. Plugaru, J. E. Pecero, and P. Bouvry, “A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment,” Intl. J. on Concurrency and Computation: Practice and Experience (CCPE), vol. 26, no. 15, pp. 2569–2590, Oct. 2014.
    doi
  4. F. Caldeira, T. Schaberreiter, S. Varrette, E. Monteiro, P. Sim\tilde\textoes, D. Khadraoui, and P. Bouvry, “Trust Based Interdependency Weighting for On-line Risk Monitoring in Interdependent Critical Infrastructures,” Intl. J. of Secure Software Engineering (IJSSE), vol. 4, no. 4, pp. 47–69, Oct. 2013.
    doi
  5. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: une plate-forme Cloud IaaS sécurisée,” Technique et Science informatiques (2012), vol. 31(8-10), no. 2592, pp. 1121–1152, Dec. 2012.
  6. J. Muszyński, S. Varrette, P. Bouvry, F. Seredyński, and S. U. Khan, “Convergence Analysis of Evolutionary Algorithms in the Presence of Crash-Faults and Cheaters,” Intl. Journal. of Computers and Mathematics with Applications (CAMWA), vol. 64, no. 12, pp. 3805–3819, Dec. 2012.
    doi
  7. F. Leprevost, J. Monnerat, S. Varrette, and S. Vaudenay, “Generating Anomalous Elliptic Curves,” Information Processing Letters, vol. 93, no. 5, pp. 225–230, Mar. 2005.
    URL

Conference Articles

  1. A. A. Z. A. Ibrahim, U. Wasim, S. Varrette, and P. Bouvry, “PRESENCE: Performance Metrics Models for Cloud SaaS Web Services,” in Proc. of the 11th IEEE Intl. Conf. on Cloud Computing (CLOUD 2018), San Francisco, USA, 2018.
  2. A. A. Z. A. Ibrahim, S. Varrette, and P. Bouvry, “PRESENCE: Toward a Novel Approach for Performance Evaluation of Mobile Cloud SaaS Web Services ,” in Proc. of the 32nd IEEE Intl. Conf. on Information Networking (ICOIN 2018), Chiang Mai, Thailand, 2018. \textbfBest Paper Award
  3. A. Rousset, A. W. M. Chekaraou, Y. Liao, X. Besseron, S. Varrette, and B. Peters, “Comparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM Applications,” in Proc.of the 15th Intl. Conf. of Numerical Analysis and Applied Mathematics (ICNAAM’17), Thessaloniki, Greece, 2017.
  4. J. Emeras, S. Varrette, and P. Bouvry, “Amazon Elastic Compute Cloud (EC2) vs. in-House HPC Platform: a Cost Analysis,” in Proc. of the 9th IEEE Intl. Conf. on Cloud Computing (CLOUD 2016), San Francisco, USA, 2016.
  5. J. Emeras, X. Besseron, S. Varrette, P. Bouvry, and B. Peters, “HPC or the Cloud: a cost study over an XDEM Simulation,” in Proc. of the 7th International Supercomputing Conference in Mexico (ISUM 2016), Puebla, México, 2016.
    URL
  6. J. Muszyński, S. Varrette, and P. Bouvry, “Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip,” in Proc. of the 19th European Event on Bio-Inspired Computation, EvoCOMNET 2016 , Porto, Portugal, 2016.
    URL
  7. J. Muszyński, S. Varrette, B. Dorronsorro, and P. Bouvry, “Distributed Cellular Evolutionary Algorithms in a Byzantine Environment,” in Proc. of the 18th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2015), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015), Hyderabad, India, 2015.
    URL
  8. J. Emeras, S. Varrette, M. Guzek, and P. Bouvry, “Evalix: Classification and Prediction of Job Resource Consumption on HPC Platforms,” in Proc. of the 19th Intl. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP’15), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015), Hyderabad, India, 2015.
    URL
  9. X. Besseron, V. Plugaru, A. H. Mahmoudi, S. Varrette, B. Peters, and P. Bouvry, “Performance Evaluation of the XDEM framework on the OpenStack Cloud Computing Middleware,” in Proc. of the 4th Intl. Conf. on Parallel, Distributed and Grid Computing for Engineering (PARENG 2015), Dubrovnik, Croatia, 2015.
    URL
  10. V. Plugaru, S. Varrette, and P. Bouvry, “Performance Analysis of Cloud Environments on Top of Energy-Efficient Platforms Featuring Low Power Processors,” in Proc. of the 6th IEEE Intl. Conf. on Cloud Computing Technology and Science (CloudCom’14), Singapore, 2014.
  11. M. Guzek, X. Besseron, S. Varrette, G. Danoy, and P. Bouvry, “ParaMASK: a Multi-Agent System for the Efficient and Dynamic Adaptation of HPC Workloads,” in Proc. of the 14th IEEE Intl. Symp. on Signal Processing and Information Technology (ISSPIT’14), Noida, India, 2014.
    URL
  12. V. Plugaru, S. Varrette, and P. Bouvry, “Performance tuning of applications in HPC environments employing Simulated Annealing,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’14), Sousse, Tunisia, 2014.
    URL
  13. J. Muszyński, S. Varrette, J. L. J. Laredo, and P. Bouvry, “Exploiting the Hard-wired Vulnerabilities of Newscast via Connectivity-splitting Attack,” in Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2014), Xi’an, China, 2014, vol. 8792, pp. 152–165. \textbfBest Student Paper Award
  14. S. Varrette, V. Plugaru, M. Guzek, X. Besseron, and P. Bouvry, “HPC Performance and Energy-Efficiency of the OpenStack Cloud Middleware,” in Proc. of the 43rd Intl. Conf. on Parallel Processing (ICPP-2014), Heterogeneous and Unconventional Cluster Architectures and Applications Workshop (HUCAA’14), Minneapolis, MN, US, 2014.
  15. J. Muszyński, S. Varrette, J. L. J. Laredo, and P. Bouvry, “Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities,” in Proc. of Intl. Conf. on Cryptography and Security System (CSS’14), Lublin, Poland, 2014, vol. 448, pp. 89–99.
  16. S. Varrette, P. Bouvry, H. Cartiaux, and F. Georgatos, “Management of an Academic HPC Cluster: The UL Experience,” in Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014), Bologna, Italy, 2014, pp. 959–967.
  17. B. Bertholon, S. Varrette, and P. Bouvry, “Comparison of Multi-objective Optimization Algorithms for the JShadObf JavaScript Obfuscator,” in Proc. of the 17th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2014), part of the 28th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2014), Phoenix, Arizona, USA, 2014.
    URL
  18. M. Muszyński, S. Varrette, and P. Bouvry, “On the Resilience of the Newscast Protocol in the Presence of Cheaters,” in 2014 Grande Region Security and Reliability Day (GRSRD 2014), Saarbrücken, Germany, 2014.
    URL
  19. S. Varrette, M. Guzek, V. Plugaru, X. Besseron, and P. Bouvry, “HPC Performance and Energy-Efficiency of Xen, KVM and VMware Hypervisors,” in Proc. of the 25th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2013), Porto de Galinhas, Brazil, 2013, pp. 89–96.
  20. V. Delplace, P. Manneback, F. Pinel, S. Varrette, and P. Bouvry, “Comparing the Performance and Power Usage of GPU and ARM Clusters for Map-Reduce,” in Proc. of the 3rd Intl. Conf. on Cloud and Green Computing (CGC’13), 2013, pp. 199–200.
    URL
  21. T. Schaberreiter, S. Varrette, P. Bouvry, J. Röning, and D. Khadraoui, “Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project,” in Proc. of the 3th IFIP Intl. SeCIHD’2013 Workshop, part of the 8th Intl. Conf. on Availability, Reliability and Security (ARES’13), Regensburg, Germany, 2013, vol. 8128, pp. 269–287.
  22. S. Varrette, G. Danoy, M. Guzek, X. Besseron, and P. Bouvry, “Using Data-flow analysis in MAS for power-aware HPC runs,” in Proc. of the IEEE Intl. Conf. on High Performance Computing and Simulation (HPCS’13), 2013, pp. 158–160.
  23. J. Muszynski, S. Varrette, and P. Bouvry, “Expected Running Time of Parallel Evolutionary Algorithms on Unimodal Pseudo-Boolean Functions over Small-World Networks,” in Proc. of the IEEE Congress on Evolutionary Computation (CEC’2013), Cancún, Mexico, 2013, pp. 2588–2594.
  24. B. Bertholon, S. Varrette, and P. Bouvry, “JShadObf: A JavaScript Obfuscator based on Multi-objective Optimization Algorithms,” in Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2013), Madrid, Spain, 2013, vol. 7873, pp. 336–349.
  25. B. Bertholon, S. Varrette, and S. Martinez, “ShadObf: A C-source Obfuscator based on Multi-objective Optimization Algorithms,” in Proc. of the 16th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2013), part of the 27th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2013), Boston (Massachusetts), USA, 2013, pp. 435–444.
    URL
  26. M. Guzek, S. Varrette, V. Plugaru, J. E. Sanchez, and P. Bouvry, “A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment,” in Proc. of the Intl. Conf. on Energy Efficiency in Large Scale Distributed Systems (EE-LSDS’13), Vienna, Austria, 2013, vol. 8046, pp. 133–152.
    doi
  27. M. Jarus, S. Varrette, A. Oleksiak, and P. Bouvry, “Performance Evaluation and Energy Efficiency of High-Density HPC Platforms Based on Intel, AMD and ARM Processors,” in Proc. of the Intl. Conf. on Energy Efficiency in Large Scale Distributed Systems (EE-LSDS’13), Vienna, Austria, 2013, vol. 8046, pp. 182–200.
    doi
  28. J. Muszyński, S. Varrette, J. L. J. Laredo, B. Dorronsoro, and P. Bouvry, “Convergence of Distributed Cellular Evolutionary Algorithms in Presence of Crash Faults and Cheaters,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’12), Sousse, Tunisia, 2012.
    URL
  29. S. Varrette, J. Muszyński, and P. Bouvry, “Hash function generation by means of Gene Expression Programming,” in Proc. of Intl. Conf. on Cryptography and Security System (CSS’12), Kazimierz Dolny, Poland, 2012.
    URL
  30. C. J. B. Hernandez, D. A. Sierra, S. Varrette, and D. L. Pacheco, “Energy Efficiency on Scalable Computing Architectures,” in 11th IEEE Intl. Conf. on Computer and Information Technology (CIT’11), Paphos, Cyprus, 2011, pp. 635–640.
    doi
  31. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: a Novel TPM-based Approach to Ensure Cloud IaaS Security,” in Proc. of the 4th IEEE Intl. Conf. on Cloud Computing (CLOUD 2011), Washington DC, USA, 2011, pp. 121–130.
    URL
  32. B. Bertholon, S. Varrette, and P. Bouvry, “A Signature Scheme for Distributed Executions based on Control flow Analysis.,” in Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011), Warsaw, Poland, 2011, vol. 7053, pp. 85–102.
    URL
  33. S. Varrette, M. Muszyński, and P. Bouvry, “Cheating impact on distributed Evolutionary Algorithms over BOINC computations.,” in Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011), Warsaw, Poland, 2011. Extended Abstract
    URL
  34. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: une plate-forme Cloud IaaS sécurisée,” in Proc. des 20ème rencontres francophones du parallélisme (RenPar’20), St Malo, France, 2011.
    URL
  35. S. Varrette, E. Tantar, and P. Bouvry, “On the Resilience of [distributed] Evolutionary Algorithms against Cheaters in Global Computing Platforms,” in Proc. of the 14th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2011), part of the 25th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2011), Anchorage (Alaska), USA, 2011.
    URL
  36. B. Bertholon, S. Varrette, and P. Bouvry, “TPM-based Approaches to Improve Cloud Security,” in 2011 Grande Region Security and Reliability Day (SecDay 2011), Trier, Germany, 2011.
    URL
  37. J. Pecero, S. Varrette, and P. Bouvry, “Scheduling DAG Applications on Multi-core Processor Packages Architectures,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’10), 2010.
    URL
  38. S. Varrette, B. Bertholon, and P. Bouvry, “A Signature Scheme for Distributed Executions based on Macro-Dataflow Analysis,” in 2nd Intl. Workshop on Remote Entrusting (Re-Trust 2009), Riva del Garda, Italy, 2009.
    URL
  39. D. Dunlop, S. Varrette, and P. Bouvry, “Deskilling HPL - Using an Evolutionary Algorithm to Automate Cluster Benchmarking,” in Proc. of 8th Intl. Conf. on Parallel Processing and Applied Mathematics - Part II (PPAM 2009), Wroclaw, Poland, 2009, vol. 6068, pp. 102–114. Publication appeared in 2010
    doi
  40. S. Guelton and S. Varrette, “Une approche génétique et source à source de l’optimisation de code,” in Proc. des 19ème rencontres francophones du parallélisme (RenPar’19), Toulouse, France, 2009.
    URL
  41. G. Berhe, B. Peters, S. Varrette, and P. Bouvry, “Parallel Implementation of Domain Decomposition Algorithm for Molecular Dynamics,” in Proc. of the 1st Intl. Conf. on Parallel, Distributed and Grid Computing for Engineering (PARENG 2009), Pécs, Hungary, 2009, vol. CCP.90-8.
    doi
  42. S. Guelton, T. Gautier, J.-L. Pazat, and S. Varrette, “Dynamic Adaptation Applied to Sabotage Tolerance,” in Proc. of the IEEE 17th Euromicro Intl. Conf. on Parallel, Distributed, and Network-Based Processing (PDP 2009), Weimar, Germany, 2009, pp. 237–244.
    doi
  43. S. Varrette, M. Ostaszewski, and P. Bouvry, “Nature inspired Algorithm-Based Fault Tolerance on Global Computing Platforms. Application to Symbolic Regression,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’08), Hammamet, Tunisia, 2008.
    URL
  44. S. Varrette, J.-L. Roch, and A. Krings, “Result Certification Against Massive Attacks in Distributed Computations,” in 1th Int. Workshop on Remote Entrusting (Re-Trust 2008), Trento, Italy, 2008.
    URL
  45. S. Varrette, J.-L. Roch, G. Duc, and R. Keryell, “Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments,” in Proc. of Euro-Par 2008, Workshop on Secure, Trusted, Manageable and Controllable Grid Services (SGS’08), Las Palmas de Gran Canaria, Spain, 2008, vol. 5415, pp. 211–222.
    doi
  46. D. Dunlop, S. Varrette, and P. Bouvry., “On the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning,” in Proc. of the IEEE Intl. Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’08), Edinburgh, UK, 2008, pp. 105–113.
    doi
  47. J.-L. Roch and S. Varrette, “Probabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product,” in Proc. of the ACM Intl. Workshop on Parallel Symbolic Computation’07 (PASCO’07), London, Ontario, Canada, 2007, pp. 88–92.
    doi
  48. S. Varrette, “Security of Global Computing Platforms: Authentication and Computed Results Integrity,” in Conference on Cryptology and Digital Content Security (CRM 07), Barcelona, Spain, 2007.
    URL
  49. S. Varrette, J.-L. Roch, J. Montagnat, L. Seitz, J.-M. Pierson, and F. Leprévost, “Safe Distributed Architecture for Image-based Computer Assisted Diagnosis,” in Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS’06), Lyon, France, 2006.
    doi
  50. S. Varrette, J.-L. Roch, and F. Leprévost, “Applicative Solutions for Safe Computations in Distributed Environments,” in Workshop "Trustworthy Software", Saarbrücken, Germany, 2006. Version electronique uniquement
    URL
  51. S. Varrette, S. Georget, J. Montagnat, J.-L. Roch, and F. Leprevost, “Distributed Authentication in GRID5000,” in Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA’05), Agia Napa, Cyprus, 2005, vol. 3762, pp. 314–326.
    doi
  52. N. Dagorn, N. Bernard, and S. Varrette, “Practical Authentication in Distributed Environments,” in Proc. of the IEEE Intl. Computer Systems and Information Technology Conference (ICSIT’05), Alger, Algeria, 2005, vol. 1.
    URL
  53. S. Varrette, S. Georget, J.-L. Roch, and F. Leprevost, “Authentification Distribuée sur Grille de Grappes basée sur LDAP,” in Proc. des 16èmes rencontres francophones du parallélisme (RenPar’16), Le Croisic, France, 2005.
    URL
  54. A.Krings, J.-L. Roch, S. Jafar, and S. Varrette, “A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments,” in Proc. of the European Grid Conference (EGC2005), Amsterdam, Netherlands, 2005, vol. 3470, pp. 323–333.
    doi
  55. S. Varrette, J.-L. Roch, and F. Leprevost, “FlowCert : Probabilistic Certification for Peer-to-Peer Computations,” in Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004), Foz do Iguaçu, Brazil, 2004, pp. 108–115.
    doi
  56. S. Varrette, J.-L. Roch, Y. Denneulin, and F. Leprevost, “Secure Architecture for Clusters and Grids,” in Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004), Grenoble, France, 2004.
    URL
  57. S. Jafar, S. Varrette, and J.-L. Roch, “Using Data-Flow Analysis for Resilence and Result Checking in Peer to Peer Computations,” in Proc. of the 1th Intl. Workshop on Grid and Peer-to-Peer Computing Impacts on Large Scale Heterogeneous Distributed Database Systems (GLOBE’04), Zaragoza, Spain, 2004, pp. 512–516.
    doi
  58. S. Varrette and J.-L. Roch, “Certification logicielle de Calcul Global avec dépendances sur grille,” in Proc. des 15èmes rencontres francophones du parallélisme (RenPar’15), La-Colle-Sur-Loup, France, 2003, pp. 169–176.
    URL

Masters Thesis

  1. S. Varrette, “Sécurisation de calculs pairs à pairs sur une grille de grappes,” Rapport de Projet de Fin d’Etude, ENSIMAG, Laboratoire ID-IMAG UMR CNRS/INPG/INRIA/UJF 5132, 2003. In french

Technical Reports

  1. P. Bouvry, S. Varrette, V. Plugaru, S. Peter, H. Cartiaux, and C. Parisot, “Large-scale research data management: Road to GDPR compliance,” University opf Luxembourg, Apr. 2018. See \url[https://varrette.gforge.uni.lu/blog/2018/04/26/data-conversation-gdpr/](https://varrette.gforge.uni.lu/blog/2018/04/26/data-conversation-gdpr/)
  2. S. Varrette, “Next-Generation Computing and Storage at Scale,” EU COST cHipSet, Workshop: Accelerating Modelling and Simulation in the Data Deluge Era, Fontainebleau, France, Invited speaker, Mar. 2018.
  3. S. Varrette, “Tutorial Big Data Analytics: Overview and Practical Examples,” EU COST NESUS, 3rd NESUS Winter School and PhD Symposium on Data Science and Heterogeneous Computing, Zagreb, croatia, Jan. 2018. See \url[http://nesusws-tutorials-bd-dl.readthedocs.io/](http://nesusws-tutorials-bd-dl.readthedocs.io/)
  4. S. Varrette, “Tutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges,” Cloudcom Association, Tutorial, IEEE CloudCom 2016, Luxembourg, Dec. 2016. See \url[http://rr-tutorials.readthedocs.io/](http://rr-tutorials.readthedocs.io/)
  5. S. Varrette, “IT/Dev[op]s Army Knives Tools for the researcher: a journey from SSH to Git,” University of Luxembourg, Luxembourg, Jul. 2016. See \url[https://varrette.gforge.uni.lu//tutorials/devops-tools-overview.html](https://varrette.gforge.uni.lu//tutorials/devops-tools-overview.html)
  6. S. Varrette, “Introduction to Git and Vagrant,” University of Luxembourg, Luxembourg, Jun. 2015. See \url[https://varrette.gforge.uni.lu/blog/2015/06/25/introduction-to-git-and-vagrant/](https://varrette.gforge.uni.lu/blog/2015/06/25/introduction-to-git-and-vagrant/)
  7. S. Varrette, “HPC Performance and Energy Efficiency: Overview and Trends,” SMAI Congress, Les Karellis, Savoie, Invited Speaker, Jun. 2015. See \url[https://varrette.gforge.uni.lu/blog/2015/06/09/smai-2015-congress-keynote-slides/](https://varrette.gforge.uni.lu/blog/2015/06/09/smai-2015-congress-keynote-slides/)
  8. V. Plugaru, F. Georgatos, S. Varrette, and P.Bouvry, “Performance tuning of applications for HPC systems employing Simulated Annealing optimization,” Univ. of Luxembourg, 2014.
    URL
  9. S. Varrette, “Tutorial d’installation de la distribution Debian,” Laboratoire ID-IMAG, Sep. 2005. Extrait d’un TP proposé en Master 2 CSCI
  10. S. Varrette, “Tutorial OpenLDAP: Installation et configuration, Migration NIS →LDAP dans GRID5000, Sécurisation par SSL et optimisations,” Laboratoire ID-IMAG, Sep. 2005.
  11. S. Varrette, “Introduction aux réseaux de tri tolérants aux fautes,” Laboratoire ID-IMAG, Aug. 2005. Draft version
  12. S. Varrette, “Tutorial d’installation d’un lecteur de cartes à puce USB sous Linux,” Laboratoire ID-IMAG/Université du Luxembourg, 2005. Version 0.1 - a compléter
  13. S. Varrette, “Tutorial LaTeX - Comprendre et écrire un document en LaTeX,” Laboratoire ID-IMAG, 2005. Version 0.3
  14. S. Varrette, “Programmation de l’algorithme D.E.S. (Data Encryption Standard),” University of Luxembourg, 2005.
  15. S. Varrette, “Programmation de l’algorithme A.E.S. (Advanced Encryption Standard),” University of Luxembourg, 2005.

Miscellaneous

  1. S. Martinez, S. Varrette, and B. Bertholon, “Optimisation d’obfuscation de code source au moyen d’algorithmes évolutionnaires multi-objectifs.” [Poster] - ComPAS’13, Jan-2013.