Table of Content

You can find the latest version of the BibTeX file biblio-varrette.bib used to generate this page on Github.

PhD Thesis

  1. S. Varrette, “Sécurité des Architectures de Calcul Distribué: Authentification et Certification de Résultats,” PhD thesis, INP Grenoble and Université du Luxembourg, 2007. In French
    URL

Books

  1. J.-G. Dumas, P. Lafourcade, A. Tichit, and S. Varrette, Les blockchains en 50 questions: comprendre le fonctionnement et les enjeux de cette technologie innovante, 1er ed. Dunod, 2018. 296 pages, in French
    URL
  2. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 3rd ed. Dunod, 2018. 384 pages, in French
    URL
  3. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Foundations of Coding: Compression, Encryption, Error-Correction. Wiley & Sons, 2015. 376 pages
    URL
  4. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 2nde ed. Dunod, 2014. 384 pages, in French
    URL
  5. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 1st ed. Dunod, 2007. 352 pages, in French.
    URL
  6. S. Varrette and N. Bernard, Programmation avancée en C (avec exercices et corrigés). Hermès, 2007. 416 pages, in French
    URL

Books Chapters

  1. P. Bouvry, S. Varrette, M. U. Wasim, A. A. Z. A. Ibrahim, X. Besseron, and T. A. Trinh, “Ultrascale Computing Systems,” J. Carretero and E. Jeannot, Eds. IET, 2018. accepted, pending publication details
  2. A.-C. Orgerie and S. Varrette, “Ultrascale Computing Systems,” J. Carretero and E. Jeannot, Eds. IET, 2018. accepted, pending publication details
  3. P. Bouvry, G. L. T. Chetsa, G. D. Costa, E. Jeannot, L. Lefèvre, J.-M. Pierson, F. Pinel, P. Stolf, and S. Varrette, “Large-scale Distributed Systems and Energy Efficiency: A Holistic View,” vol. 94, J.-M. Pierson, Ed. John Wiley & Sons, 2015, pp. 197–224.
  4. S. Varrette, P. Bouvry, M. Jarus, and A. Oleksiak, “Handbook on Data Centers,” Springer, 2015.
  5. B. Bertholon, C. Cérin, C. Coti, J.-C. Dubacq, and S. Varrette, “Distributed Systems (volume 1); Design and Algorithms,” vol. 1, Wiley, 2011, pp. 237–300.
  6. C. Cérin, J.-C. Dubacq, T. Hérault, R. Keryell, J.-L. Pazat, J.-L. Roch, and S. Varrette, “Systèmes répartis en action : de l’embarqué aux systèmes à large échelle,” Hermès, 2008, pp. 153–180. 184 pages, in French
    URL
  7. P. Bouvry, J.-G. Dumas, R. Gillard, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 23–101. In French
    URL
  8. J.-G. Dumas, F. Leprevost, J.-L. Roch, V. Savin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 103–196. In French
    URL
  9. J.-G. Dumas, F. Leprevost, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 187–210. In French
    URL
  10. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 211–245. In French
    URL
  11. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 247–298. In French
    URL

Magazines

  1. S. Varrette and S. Gautier, “Cryptographie et Signatures Eléctoniques,” in I-mag – Magazine de l’AAE ENSIMAG, no. 37, Association des anciens élèves de l’ENSIMAG, 2006, pp. 12–19.
    URL

Journal Articles

  1. A. A. Z. A. Ibrahim, M. U. Wasim, S. Varrette, and P. Bouvry, “PRESENCE: Monitoring and Modelling the Performance Metrics of Mobile Cloud SaaS Web Services,” J. Mobile Information Systems, vol. 2018, no. 1351386, Aug. 2018. Extended journal version of our IEEE ICoin 2018 paper
    doi
  2. M. Bagein, J. Barbosa, V. Blanco, I. Brandic, S. Cremer, S. Fremal, H. Karatza, L. Lefevre, T. Mastelic, A. Oleksiak, A.-C. Orgerie, G. L. Stavrinides, and S. Varrette, “Energy Efficiency for Ultrascale Systems: Challenges and Trends from Nesus Project,” Intl. J. on Supercomputing Frontiers and Innovations, vol. 2, no. 2, pp. 105–131, 2015. See \url[http://superfri.org/superfri/article/view/48](http://superfri.org/superfri/article/view/48)
    doi
  3. P. Bouvry, R. Mayer, J. Muszyński, D. Petcu, A. Rauber, G. Tempesti, T. Trinh, and S. Varrette, “Resilience within Ultrascale Computing System: Challenges and Opportunities from Nesus Project,” Intl. J. on Supercomputing Frontiers and Innovations, vol. 2, no. 2, pp. 46–63, 2015. See \url[http://superfri.org/superfri/article/view/46](http://superfri.org/superfri/article/view/46)
    doi
  4. M. Guzek, S. Varrette, V. Plugaru, J. E. Pecero, and P. Bouvry, “A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment,” Intl. J. on Concurrency and Computation: Practice and Experience (CCPE), vol. 26, no. 15, pp. 2569–2590, Oct. 2014.
    doi
  5. F. Caldeira, T. Schaberreiter, S. Varrette, E. Monteiro, P. Sim\tilde\textoes, D. Khadraoui, and P. Bouvry, “Trust Based Interdependency Weighting for On-line Risk Monitoring in Interdependent Critical Infrastructures,” Intl. J. of Secure Software Engineering (IJSSE), vol. 4, no. 4, pp. 47–69, Oct. 2013.
    doi
  6. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: une plate-forme Cloud IaaS sécurisée,” Technique et Science informatiques (2012), vol. 31(8-10), no. 2592, pp. 1121–1152, Dec. 2012.
  7. J. Muszyński, S. Varrette, P. Bouvry, F. Seredyński, and S. U. Khan, “Convergence Analysis of Evolutionary Algorithms in the Presence of Crash-Faults and Cheaters,” Intl. Journal. of Computers and Mathematics with Applications (CAMWA), vol. 64, no. 12, pp. 3805–3819, Dec. 2012.
    doi
  8. F. Leprevost, J. Monnerat, S. Varrette, and S. Vaudenay, “Generating Anomalous Elliptic Curves,” Information Processing Letters, vol. 93, no. 5, pp. 225–230, Mar. 2005.
    URL

Conference Articles

  1. A. W. M. Checkaraou, A. Rousset, X. Besseron, S. Varrette, and B. Peters, “Hybrid MPI+OpenMP Implementation of eXtended Discrete Element Method,” in Proc. of the 9th Workshop on Applications for Multi-Core Architectures (WAMCA’18), part of 30th Intl. Symp. on Computer Architecture and High Performance Computing (SBAC-PAD 2018), Lyon, France, 2018.
    URL
  2. A. A. Z. A. Ibrahim, U. Wasim, S. Varrette, and P. Bouvry, “PRESENCE: Performance Metrics Models for Cloud SaaS Web Services,” in Proc. of the 11th IEEE Intl. Conf. on Cloud Computing (CLOUD 2018), San Francisco, USA, 2018.
    URL
  3. A. A. Z. A. Ibrahim, S. Varrette, and P. Bouvry, “On Verifying and Assuring the Cloud SLA by Evaluating the Performance of SaaS Web Services Across Multi-cloud Providers,” in 48th Annual IEEE/IFIP Intl. Conf. on Dependable Systems and Networks Workshops (DNS’18), Luxembourg, 2018, pp. 69–70. Extended Abstract
    doi
  4. A. A. Z. A. Ibrahim, S. Varrette, and P. Bouvry, “PRESENCE: Toward a Novel Approach for Performance Evaluation of Mobile Cloud SaaS Web Services ,” in Proc. of the 32nd IEEE Intl. Conf. on Information Networking (ICOIN 2018), Chiang Mai, Thailand, 2018. \textbfBest Paper Award
  5. A. Rousset, A. W. M. Chekaraou, Y. Liao, X. Besseron, S. Varrette, and B. Peters, “Comparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM Applications,” in Proc.of the 15th Intl. Conf. of Numerical Analysis and Applied Mathematics (ICNAAM’17), Thessaloniki, Greece, 2017.
  6. J. Emeras, S. Varrette, and P. Bouvry, “Amazon Elastic Compute Cloud (EC2) vs. in-House HPC Platform: a Cost Analysis,” in Proc. of the 9th IEEE Intl. Conf. on Cloud Computing (CLOUD 2016), San Francisco, USA, 2016.
  7. J. Emeras, X. Besseron, S. Varrette, P. Bouvry, and B. Peters, “HPC or the Cloud: a cost study over an XDEM Simulation,” in Proc. of the 7th International Supercomputing Conference in Mexico (ISUM 2016), Puebla, México, 2016.
    URL
  8. J. Muszyński, S. Varrette, and P. Bouvry, “Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip,” in Proc. of the 19th European Event on Bio-Inspired Computation, EvoCOMNET 2016 , Porto, Portugal, 2016.
    URL
  9. J. Muszyński, S. Varrette, B. Dorronsorro, and P. Bouvry, “Distributed Cellular Evolutionary Algorithms in a Byzantine Environment,” in Proc. of the 18th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2015), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015), Hyderabad, India, 2015.
    URL
  10. J. Emeras, S. Varrette, M. Guzek, and P. Bouvry, “Evalix: Classification and Prediction of Job Resource Consumption on HPC Platforms,” in Proc. of the 19th Intl. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP’15), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015), Hyderabad, India, 2015.
    URL
  11. X. Besseron, V. Plugaru, A. H. Mahmoudi, S. Varrette, B. Peters, and P. Bouvry, “Performance Evaluation of the XDEM framework on the OpenStack Cloud Computing Middleware,” in Proc. of the 4th Intl. Conf. on Parallel, Distributed and Grid Computing for Engineering (PARENG 2015), Dubrovnik, Croatia, 2015.
    URL
  12. V. Plugaru, S. Varrette, and P. Bouvry, “Performance Analysis of Cloud Environments on Top of Energy-Efficient Platforms Featuring Low Power Processors,” in Proc. of the 6th IEEE Intl. Conf. on Cloud Computing Technology and Science (CloudCom’14), Singapore, 2014.
  13. M. Guzek, X. Besseron, S. Varrette, G. Danoy, and P. Bouvry, “ParaMASK: a Multi-Agent System for the Efficient and Dynamic Adaptation of HPC Workloads,” in Proc. of the 14th IEEE Intl. Symp. on Signal Processing and Information Technology (ISSPIT’14), Noida, India, 2014.
    URL
  14. V. Plugaru, S. Varrette, and P. Bouvry, “Performance tuning of applications in HPC environments employing Simulated Annealing,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’14), Sousse, Tunisia, 2014.
    URL
  15. J. Muszyński, S. Varrette, J. L. J. Laredo, and P. Bouvry, “Exploiting the Hard-wired Vulnerabilities of Newscast via Connectivity-splitting Attack,” in Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2014), Xi’an, China, 2014, vol. 8792, pp. 152–165. \textbfBest Student Paper Award
  16. J. Muszyński, S. Varrette, J. L. J. Laredo, and P. Bouvry, “Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities,” in Proc. of Intl. Conf. on Cryptography and Security System (CSS’14), Lublin, Poland, 2014, vol. 448, pp. 89–99.
  17. S. Varrette, V. Plugaru, M. Guzek, X. Besseron, and P. Bouvry, “HPC Performance and Energy-Efficiency of the OpenStack Cloud Middleware,” in Proc. of the 43rd Intl. Conf. on Parallel Processing (ICPP-2014), Heterogeneous and Unconventional Cluster Architectures and Applications Workshop (HUCAA’14), Minneapolis, MN, US, 2014.
  18. S. Varrette, P. Bouvry, H. Cartiaux, and F. Georgatos, “Management of an Academic HPC Cluster: The UL Experience,” in Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014), Bologna, Italy, 2014, pp. 959–967.
  19. B. Bertholon, S. Varrette, and P. Bouvry, “Comparison of Multi-objective Optimization Algorithms for the JShadObf JavaScript Obfuscator,” in Proc. of the 17th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2014), part of the 28th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2014), Phoenix, Arizona, USA, 2014.
    URL
  20. M. Muszyński, S. Varrette, and P. Bouvry, “On the Resilience of the Newscast Protocol in the Presence of Cheaters,” in 2014 Grande Region Security and Reliability Day (GRSRD 2014), Saarbrücken, Germany, 2014.
    URL
  21. S. Varrette, M. Guzek, V. Plugaru, X. Besseron, and P. Bouvry, “HPC Performance and Energy-Efficiency of Xen, KVM and VMware Hypervisors,” in Proc. of the 25th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2013), Porto de Galinhas, Brazil, 2013, pp. 89–96.
  22. V. Delplace, P. Manneback, F. Pinel, S. Varrette, and P. Bouvry, “Comparing the Performance and Power Usage of GPU and ARM Clusters for Map-Reduce,” in Proc. of the 3rd Intl. Conf. on Cloud and Green Computing (CGC’13), 2013, pp. 199–200.
    URL
  23. T. Schaberreiter, S. Varrette, P. Bouvry, J. Röning, and D. Khadraoui, “Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project,” in Proc. of the 3th IFIP Intl. SeCIHD’2013 Workshop, part of the 8th Intl. Conf. on Availability, Reliability and Security (ARES’13), Regensburg, Germany, 2013, vol. 8128, pp. 269–287.
  24. S. Varrette, G. Danoy, M. Guzek, X. Besseron, and P. Bouvry, “Using Data-flow analysis in MAS for power-aware HPC runs,” in Proc. of the IEEE Intl. Conf. on High Performance Computing and Simulation (HPCS’13), 2013, pp. 158–160.
  25. J. Muszynski, S. Varrette, and P. Bouvry, “Expected Running Time of Parallel Evolutionary Algorithms on Unimodal Pseudo-Boolean Functions over Small-World Networks,” in Proc. of the IEEE Congress on Evolutionary Computation (CEC’2013), Cancún, Mexico, 2013, pp. 2588–2594.
  26. B. Bertholon, S. Varrette, and P. Bouvry, “JShadObf: A JavaScript Obfuscator based on Multi-objective Optimization Algorithms,” in Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2013), Madrid, Spain, 2013, vol. 7873, pp. 336–349.
  27. B. Bertholon, S. Varrette, and S. Martinez, “ShadObf: A C-source Obfuscator based on Multi-objective Optimization Algorithms,” in Proc. of the 16th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2013), part of the 27th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2013), Boston (Massachusetts), USA, 2013, pp. 435–444.
    URL
  28. M. Guzek, S. Varrette, V. Plugaru, J. E. Sanchez, and P. Bouvry, “A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment,” in Proc. of the Intl. Conf. on Energy Efficiency in Large Scale Distributed Systems (EE-LSDS’13), Vienna, Austria, 2013, vol. 8046, pp. 133–152.
    doi
  29. M. Jarus, S. Varrette, A. Oleksiak, and P. Bouvry, “Performance Evaluation and Energy Efficiency of High-Density HPC Platforms Based on Intel, AMD and ARM Processors,” in Proc. of the Intl. Conf. on Energy Efficiency in Large Scale Distributed Systems (EE-LSDS’13), Vienna, Austria, 2013, vol. 8046, pp. 182–200.
    doi
  30. J. Muszyński, S. Varrette, J. L. J. Laredo, B. Dorronsoro, and P. Bouvry, “Convergence of Distributed Cellular Evolutionary Algorithms in Presence of Crash Faults and Cheaters,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’12), Sousse, Tunisia, 2012.
    URL
  31. S. Varrette, J. Muszyński, and P. Bouvry, “Hash function generation by means of Gene Expression Programming,” in Proc. of Intl. Conf. on Cryptography and Security System (CSS’12), Kazimierz Dolny, Poland, 2012.
    URL
  32. C. J. B. Hernandez, D. A. Sierra, S. Varrette, and D. L. Pacheco, “Energy Efficiency on Scalable Computing Architectures,” in 11th IEEE Intl. Conf. on Computer and Information Technology (CIT’11), Paphos, Cyprus, 2011, pp. 635–640.
    doi
  33. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: a Novel TPM-based Approach to Ensure Cloud IaaS Security,” in Proc. of the 4th IEEE Intl. Conf. on Cloud Computing (CLOUD 2011), Washington DC, USA, 2011, pp. 121–130.
    URL
  34. B. Bertholon, S. Varrette, and P. Bouvry, “A Signature Scheme for Distributed Executions based on Control flow Analysis.,” in Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011), Warsaw, Poland, 2011, vol. 7053, pp. 85–102.
    URL
  35. S. Varrette, M. Muszyński, and P. Bouvry, “Cheating impact on distributed Evolutionary Algorithms over BOINC computations.,” in Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011), Warsaw, Poland, 2011. Extended Abstract
    URL
  36. S. Varrette, E. Tantar, and P. Bouvry, “On the Resilience of [distributed] Evolutionary Algorithms against Cheaters in Global Computing Platforms,” in Proc. of the 14th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2011), part of the 25th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2011), Anchorage (Alaska), USA, 2011.
    URL
  37. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: une plate-forme Cloud IaaS sécurisée,” in Proc. des 20ème rencontres francophones du parallélisme (RenPar’20), St Malo, France, 2011.
    URL
  38. B. Bertholon, S. Varrette, and P. Bouvry, “TPM-based Approaches to Improve Cloud Security,” in 2011 Grande Region Security and Reliability Day (SecDay 2011), Trier, Germany, 2011.
    URL
  39. J. Pecero, S. Varrette, and P. Bouvry, “Scheduling DAG Applications on Multi-core Processor Packages Architectures,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’10), 2010.
    URL
  40. S. Guelton and S. Varrette, “Une approche génétique et source à source de l’optimisation de code,” in Proc. des 19ème rencontres francophones du parallélisme (RenPar’19), Toulouse, France, 2009.
    URL
  41. S. Varrette, B. Bertholon, and P. Bouvry, “A Signature Scheme for Distributed Executions based on Macro-Dataflow Analysis,” in 2nd Intl. Workshop on Remote Entrusting (Re-Trust 2009), Riva del Garda, Italy, 2009.
    URL
  42. D. Dunlop, S. Varrette, and P. Bouvry, “Deskilling HPL - Using an Evolutionary Algorithm to Automate Cluster Benchmarking,” in Proc. of 8th Intl. Conf. on Parallel Processing and Applied Mathematics - Part II (PPAM 2009), Wroclaw, Poland, 2009, vol. 6068, pp. 102–114. Publication appeared in 2010
    doi
  43. G. Berhe, B. Peters, S. Varrette, and P. Bouvry, “Parallel Implementation of Domain Decomposition Algorithm for Molecular Dynamics,” in Proc. of the 1st Intl. Conf. on Parallel, Distributed and Grid Computing for Engineering (PARENG 2009), Pécs, Hungary, 2009, vol. CCP.90-8.
    doi
  44. S. Guelton, T. Gautier, J.-L. Pazat, and S. Varrette, “Dynamic Adaptation Applied to Sabotage Tolerance,” in Proc. of the IEEE 17th Euromicro Intl. Conf. on Parallel, Distributed, and Network-Based Processing (PDP 2009), Weimar, Germany, 2009, pp. 237–244.
    doi
  45. S. Varrette, J.-L. Roch, and A. Krings, “Result Certification Against Massive Attacks in Distributed Computations,” in 1th Int. Workshop on Remote Entrusting (Re-Trust 2008), Trento, Italy, 2008.
    URL
  46. S. Varrette, M. Ostaszewski, and P. Bouvry, “Nature inspired Algorithm-Based Fault Tolerance on Global Computing Platforms. Application to Symbolic Regression,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’08), Hammamet, Tunisia, 2008.
    URL
  47. S. Varrette, J.-L. Roch, G. Duc, and R. Keryell, “Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments,” in Proc. of Euro-Par 2008, Workshop on Secure, Trusted, Manageable and Controllable Grid Services (SGS’08), Las Palmas de Gran Canaria, Spain, 2008, vol. 5415, pp. 211–222.
    doi
  48. D. Dunlop, S. Varrette, and P. Bouvry., “On the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning,” in Proc. of the IEEE Intl. Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’08), Edinburgh, UK, 2008, pp. 105–113.
    doi
  49. J.-L. Roch and S. Varrette, “Probabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product,” in Proc. of the ACM Intl. Workshop on Parallel Symbolic Computation’07 (PASCO’07), London, Ontario, Canada, 2007, pp. 88–92.
    doi
  50. S. Varrette, “Security of Global Computing Platforms: Authentication and Computed Results Integrity,” in Conference on Cryptology and Digital Content Security (CRM 07), Barcelona, Spain, 2007.
    URL
  51. S. Varrette, J.-L. Roch, J. Montagnat, L. Seitz, J.-M. Pierson, and F. Leprévost, “Safe Distributed Architecture for Image-based Computer Assisted Diagnosis,” in Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS’06), Lyon, France, 2006.
    doi
  52. S. Varrette, J.-L. Roch, and F. Leprévost, “Applicative Solutions for Safe Computations in Distributed Environments,” in Workshop "Trustworthy Software", Saarbrücken, Germany, 2006. Version electronique uniquement
    URL
  53. S. Varrette, S. Georget, J. Montagnat, J.-L. Roch, and F. Leprevost, “Distributed Authentication in GRID5000,” in Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA’05), Agia Napa, Cyprus, 2005, vol. 3762, pp. 314–326.
    doi
  54. N. Dagorn, N. Bernard, and S. Varrette, “Practical Authentication in Distributed Environments,” in Proc. of the IEEE Intl. Computer Systems and Information Technology Conference (ICSIT’05), Alger, Algeria, 2005, vol. 1.
    URL
  55. S. Varrette, S. Georget, J.-L. Roch, and F. Leprevost, “Authentification Distribuée sur Grille de Grappes basée sur LDAP,” in Proc. des 16èmes rencontres francophones du parallélisme (RenPar’16), Le Croisic, France, 2005.
    URL
  56. A.Krings, J.-L. Roch, S. Jafar, and S. Varrette, “A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments,” in Proc. of the European Grid Conference (EGC2005), Amsterdam, Netherlands, 2005, vol. 3470, pp. 323–333.
    doi
  57. S. Varrette, J.-L. Roch, Y. Denneulin, and F. Leprevost, “Secure Architecture for Clusters and Grids,” in Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004), Grenoble, France, 2004.
    URL
  58. S. Varrette, J.-L. Roch, and F. Leprevost, “FlowCert : Probabilistic Certification for Peer-to-Peer Computations,” in Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004), Foz do Iguaçu, Brazil, 2004, pp. 108–115.
    doi
  59. S. Jafar, S. Varrette, and J.-L. Roch, “Using Data-Flow Analysis for Resilence and Result Checking in Peer to Peer Computations,” in Proc. of the 1th Intl. Workshop on Grid and Peer-to-Peer Computing Impacts on Large Scale Heterogeneous Distributed Database Systems (GLOBE’04), Zaragoza, Spain, 2004, pp. 512–516.
    doi
  60. S. Varrette and J.-L. Roch, “Certification logicielle de Calcul Global avec dépendances sur grille,” in Proc. des 15èmes rencontres francophones du parallélisme (RenPar’15), La-Colle-Sur-Loup, France, 2003, pp. 169–176.
    URL

Masters Thesis

  1. S. Varrette, “Sécurisation de calculs pairs à pairs sur une grille de grappes,” Rapport de Projet de Fin d’Etude, ENSIMAG, Laboratoire ID-IMAG UMR CNRS/INPG/INRIA/UJF 5132, 2003. In french

Technical Reports and Presentations

  1. X. Besseron and S. Varrette, “High Performance Computing and Big Data analytics in Luxembourg: Overview and Challenges in the EuroHPC horizon,” 6th MVAPICH User Group (MUG’18) Meeting, Invited speakers, Aug. 2018. See \url[https://varrette.gforge.uni.lu/blog/2018/08/08/mug18/](https://varrette.gforge.uni.lu/blog/2018/08/08/mug18/)
  2. S. Varrette, “Luxembourg Proposals for Large Scale Architectures for Data Science,” 2nd Workshop on HPC Collaboration between Europe and Latin America (WHPCEuroLatam), part of ISC High Performance conference (ISC’18), Invited speaker, Jun. 2018. See \url[https://varrette.gforge.uni.lu/blog/2018/06/18/isc-workshop/](https://varrette.gforge.uni.lu/blog/2018/06/18/isc-workshop/)
  3. P. Bouvry, S. Varrette, V. Plugaru, S. Peter, H. Cartiaux, and C. Parisot, “Large-scale research data management: Road to GDPR compliance,” University of Luxembourg, Invited speaker, Apr. 2018. See \url[https://varrette.gforge.uni.lu/blog/2018/04/26/data-conversation-gdpr/](https://varrette.gforge.uni.lu/blog/2018/04/26/data-conversation-gdpr/)
  4. S. Varrette, “Next-Generation Computing and Storage at Scale,” EU COST action cHipSet, Workshop: Accelerating Modelling and Simulation in the Data Deluge Era, Fontainebleau, France, Invited speaker, Mar. 2018. See \url[https://varrette.gforge.uni.lu/blog/2018/03/19/chipset-workshop/](https://varrette.gforge.uni.lu/blog/2018/03/19/chipset-workshop/)
  5. S. Varrette, “Tutorial Big Data Analytics: Overview and Practical Examples,” EU COST NESUS, 3rd NESUS Winter School and PhD Symposium on Data Science and Heterogeneous Computing, Zagreb, croatia, Jan. 2018. See \url[http://nesusws-tutorials-bd-dl.readthedocs.io/](http://nesusws-tutorials-bd-dl.readthedocs.io/)
  6. S. Varrette, “Tutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challenges,” Cloudcom Association, Tutorial, IEEE CloudCom 2016, Luxembourg, Dec. 2016. See \url[http://rr-tutorials.readthedocs.io/](http://rr-tutorials.readthedocs.io/)
  7. S. Varrette, “IT/Dev[op]s Army Knives Tools for the researcher: a journey from SSH to Git,” University of Luxembourg, Luxembourg, Jul. 2016. See \url[https://varrette.gforge.uni.lu//tutorials/devops-tools-overview.html](https://varrette.gforge.uni.lu//tutorials/devops-tools-overview.html)
  8. S. Varrette, “HPC Performance and Energy Efficiency: Overview and Trends,” SMAI Congress, Les Karellis, Savoie, Invited Speaker, Jun. 2015. See \url[https://varrette.gforge.uni.lu/blog/2015/06/09/smai-2015-congress-keynote-slides/](https://varrette.gforge.uni.lu/blog/2015/06/09/smai-2015-congress-keynote-slides/)
  9. S. Varrette, “Introduction to Git and Vagrant,” University of Luxembourg, Luxembourg, Jun. 2015. See \url[https://varrette.gforge.uni.lu/blog/2015/06/25/introduction-to-git-and-vagrant/](https://varrette.gforge.uni.lu/blog/2015/06/25/introduction-to-git-and-vagrant/)
  10. V. Plugaru, F. Georgatos, S. Varrette, and P.Bouvry, “Performance tuning of applications for HPC systems employing Simulated Annealing optimization,” Univ. of Luxembourg, 2014.
    URL
  11. S. Varrette, “Tutorial OpenLDAP: Installation et configuration, Migration NIS →LDAP dans GRID5000, Sécurisation par SSL et optimisations,” Laboratoire ID-IMAG, Sep. 2005.
  12. S. Varrette, “Tutorial d’installation de la distribution Debian,” Laboratoire ID-IMAG, Sep. 2005. Extrait d’un TP proposé en Master 2 CSCI
  13. S. Varrette, “Introduction aux réseaux de tri tolérants aux fautes,” Laboratoire ID-IMAG, Aug. 2005. Draft version
  14. S. Varrette, “Programmation de l’algorithme D.E.S. (Data Encryption Standard),” University of Luxembourg, 2005.
  15. S. Varrette, “Tutorial d’installation d’un lecteur de cartes à puce USB sous Linux,” Laboratoire ID-IMAG/Université du Luxembourg, 2005. Version 0.1 - a compléter
  16. S. Varrette, “Programmation de l’algorithme A.E.S. (Advanced Encryption Standard),” University of Luxembourg, 2005.
  17. S. Varrette, “Tutorial LaTeX - Comprendre et écrire un document en LaTeX,” Laboratoire ID-IMAG, 2005. Version 0.3

Miscellaneous

  1. S. Martinez, S. Varrette, and B. Bertholon, “Optimisation d’obfuscation de code source au moyen d’algorithmes évolutionnaires multi-objectifs.” [Poster] - ComPAS’13, Jan-2013.