PhD Thesis

  1. S. Varrette, “Sécurité des Architectures de Calcul Distribué: Authentification et Certification de Résultats,” PhD thesis, INP Grenoble and Université du Luxembourg, 2007. In French
    URL

Books

  1. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Foundations of Coding: Compression, Encryption, Error-Correction. Wiley & Sons, 2015. 376 pages
    URL
  2. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 2nde ed. Dunod, 2014. 384 pages, in French
    URL
  3. J.-G. Dumas, J.-L. Roch, E. Tannier, and S. Varrette, Théorie des Codes : Compression, Cryptage et Correction, 1st ed. Dunod, 2007. 352 pages, in French. Corrected version published in 2009
    URL
  4. S. Varrette and N. Bernard, Programmation avancée en C (avec exercices et corrigés). Hermès, 2007. 416 pages, in French
    URL

Books Chapters

  1. P. Bouvry, G. L. T. Chetsa, G. D. Costa, E. Jeannot, L. Lefèvre, J.-M. Pierson, F. Pinel, P. Stolf, and S. Varrette, “Large-scale Distributed Systems and Energy Efficiency: A Holistic View,” vol. 94, J.-M. Pierson, Ed. John Wiley & Sons, 2015, pp. 197–224.
  2. S. Varrette, P. Bouvry, M. Jarus, and A. Oleksiak, “Handbook on Data Centers,” Springer, 2015.
  3. B. Bertholon, C. Cérin, C. Coti, J.-C. Dubacq, and S. Varrette, “Distributed Systems (volume 1); Design and Algorithms,” vol. 1, Wiley, 2011, pp. 237–300.
  4. C. Cérin, J.-C. Dubacq, T. Hérault, R. Keryell, J.-L. Pazat, J.-L. Roch, and S. Varrette, “Systèmes répartis en action : de l’embarqué aux systèmes à large échelle,” Hermès, 2008, pp. 153–180. 184 pages, in French
    URL
  5. P. Bouvry, J.-G. Dumas, R. Gillard, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 23–101. In French
    URL
  6. J.-G. Dumas, F. Leprevost, J.-L. Roch, V. Savin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 103–196. In French
    URL
  7. J.-G. Dumas, F. Leprevost, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 187–210. In French
    URL
  8. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 211–245. In French
    URL
  9. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 247–298. In French
    URL

Magazines

  1. S. Varrette and S. Gautier, “Cryptographie et Signatures Eléctoniques,” in I-mag – Magazine de l’AAE ENSIMAG, no. 37, Association des anciens élèves de l’ENSIMAG, 2006, pp. 12–19.
    URL

Book Chapters

  1. P. Bouvry, G. L. T. Chetsa, G. D. Costa, E. Jeannot, L. Lefèvre, J.-M. Pierson, F. Pinel, P. Stolf, and S. Varrette, “Large-scale Distributed Systems and Energy Efficiency: A Holistic View,” vol. 94, J.-M. Pierson, Ed. John Wiley & Sons, 2015, pp. 197–224.
  2. S. Varrette, P. Bouvry, M. Jarus, and A. Oleksiak, “Handbook on Data Centers,” Springer, 2015.
  3. B. Bertholon, C. Cérin, C. Coti, J.-C. Dubacq, and S. Varrette, “Distributed Systems (volume 1); Design and Algorithms,” vol. 1, Wiley, 2011, pp. 237–300.
  4. C. Cérin, J.-C. Dubacq, T. Hérault, R. Keryell, J.-L. Pazat, J.-L. Roch, and S. Varrette, “Systèmes répartis en action : de l’embarqué aux systèmes à large échelle,” Hermès, 2008, pp. 153–180. 184 pages, in French
    URL
  5. P. Bouvry, J.-G. Dumas, R. Gillard, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 23–101. In French
    URL
  6. J.-G. Dumas, F. Leprevost, J.-L. Roch, V. Savin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 103–196. In French
    URL
  7. J.-G. Dumas, F. Leprevost, J.-L. Roch, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 187–210. In French
    URL
  8. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 211–245. In French
    URL
  9. N. Bernard, Y. Denneulin, and S. Varrette, “Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux,” vol. 2, Hermès, 2006, pp. 247–298. In French
    URL

Journal Articles

  1. M. Bagein, J. Barbosa, V. Blanco, I. Brandic, S. Cremer, S. Fremal, H. Karatza, L. Lefevre, T. Mastelic, A. Oleksiak, A.-C. Orgerie, G. L. Stavrinides, and S. Varrette, “Energy Efficiency for Ultrascale Systems: Challenges and Trends from Nesus Project,” Intl. J. on Supercomputing Frontiers and Innovations, vol. 2, no. 2, p. 105–, 2015.
    doi
  2. P. Bouvry, R. Mayer, J. Muszyński, D. Petcu, A. Rauber, G. Tempesti, T. Trinh, and S. Varrette, “Resilience within Ultrascale Computing System: Challenges and Opportunities from Nesus Project,” Intl. J. on Supercomputing Frontiers and Innovations, vol. 2, no. 2, pp. 46–63, 2015.
    doi
  3. M. Guzek, S. Varrette, V. Plugaru, J. E. Pecero, and P. Bouvry, “A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment,” Intl. J. on Concurrency and Computation: Practice and Experience (CCPE), vol. 26, no. 15, pp. 2569–2590, Oct. 2014.
    doi
  4. F. Caldeira, T. Schaberreiter, S. Varrette, E. Monteiro, P. Sim\tilde\textoes, D. Khadraoui, and P. Bouvry, “Trust Based Interdependency Weighting for On-line Risk Monitoring in Interdependent Critical Infrastructures,” Intl. J. of Secure Software Engineering (IJSSE), vol. 4, no. 4, pp. 47–69, Oct. 2013.
    doi
  5. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: une plate-forme Cloud IaaS sécurisée,” Technique et Science informatiques (2012), vol. 31(8-10), no. 2592, pp. 1121–1152, Dec. 2012.
  6. J. Muszyński, S. Varrette, P. Bouvry, F. Seredyński, and S. U. Khan, “Convergence Analysis of Evolutionary Algorithms in the Presence of Crash-Faults and Cheaters,” Intl. Journal. of Computers and Mathematics with Applications (CAMWA), vol. 64, no. 12, pp. 3805–3819, Dec. 2012.
    doi
  7. F. Leprevost, J. Monnerat, S. Varrette, and S. Vaudenay, “Generating Anomalous Elliptic Curves,” Information Processing Letters, vol. 93, no. 5, pp. 225–230, Mar. 2005.
    URL

Conference Articles

  1. J. Emeras, S. Varrette, and P. Bouvry, “Amazon Elastic Compute Cloud (EC2) vs. in-House HPC Platform: a Cost Analysis,” in Proc. of the 9th IEEE Intl. Conf. on Cloud Computing (CLOUD 2016), San Francisco, USA, 2016.
  2. J. Emeras, X. Besseron, S. Varrette, P. Bouvry, and B. Peters, “HPC or the Cloud: a cost study over an XDEM Simulation,” in Proc. of the 7th International Supercomputing Conference in Mexico (ISUM 2016), Puebla, México, 2016.
    URL
  3. J. Muszyński, S. Varrette, and P. Bouvry, “Reducing Efficiency of Connectivity-Splitting Attack on Newscast via Limited Gossip,” in Proc. of the 19th European Event on Bio-Inspired Computation, EvoCOMNET 2016 , Porto, Portugal, 2016.
    URL
  4. J. Emeras, S. Varrette, M. Guzek, and P. Bouvry, “Evalix: Classification and Prediction of Job Resource Consumption on HPC Platforms,” in Proc. of the 19th Intl. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP’15), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015), Hyderabad, India, 2015.
    URL
  5. J. Muszyński, S. Varrette, B. Dorronsorro, and P. Bouvry, “Distributed Cellular Evolutionary Algorithms in a Byzantine Environment,” in Proc. of the 18th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2015), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015), Hyderabad, India, 2015.
    URL
  6. X. Besseron, V. Plugaru, A. H. Mahmoudi, S. Varrette, B. Peters, and P. Bouvry, “Performance Evaluation of the XDEM framework on the OpenStack Cloud Computing Middleware,” in Proc. of the 4th Intl. Conf. on Parallel, Distributed and Grid Computing for Engineering (PARENG 2015), Dubrovnik, Croatia, 2015.
    URL
  7. V. Plugaru, S. Varrette, and P. Bouvry, “Performance Analysis of Cloud Environments on Top of Energy-Efficient Platforms Featuring Low Power Processors,” in Proc. of the 6th IEEE Intl. Conf. on Cloud Computing Technology and Science (CloudCom’14), Singapore, 2014.
  8. M. Guzek, X. Besseron, S. Varrette, G. Danoy, and P. Bouvry, “ParaMASK: a Multi-Agent System for the Efficient and Dynamic Adaptation of HPC Workloads,” in Proc. of the 14th IEEE Intl. Symp. on Signal Processing and Information Technology (ISSPIT’14), Noida, India, 2014.
    URL
  9. V. Plugaru, S. Varrette, and P. Bouvry, “Performance tuning of applications in HPC environments employing Simulated Annealing,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’14), Sousse, Tunisia, 2014.
    URL
  10. J. Muszyński, S. Varrette, J. L. J. Laredo, and P. Bouvry, “Exploiting the Hard-wired Vulnerabilities of Newscast via Connectivity-splitting Attack,” in Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2014), Xi’an, China, 2014, vol. 8792, pp. 152–165. \textbfBest Student Paper Award
  11. J. Muszyński, S. Varrette, J. L. J. Laredo, and P. Bouvry, “Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities,” in Proc. of Intl. Conf. on Cryptography and Security System (CSS’14), Lublin, Poland, 2014, vol. 448, pp. 89–99.
  12. S. Varrette, V. Plugaru, M. Guzek, X. Besseron, and P. Bouvry, “HPC Performance and Energy-Efficiency of the OpenStack Cloud Middleware,” in Proc. of the 43rd Intl. Conf. on Parallel Processing (ICPP-2014), Heterogeneous and Unconventional Cluster Architectures and Applications Workshop (HUCAA’14), Minneapolis, MN, US, 2014.
  13. S. Varrette, P. Bouvry, H. Cartiaux, and F. Georgatos, “Management of an Academic HPC Cluster: The UL Experience,” in Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014), Bologna, Italy, 2014, pp. 959–967.
  14. B. Bertholon, S. Varrette, and P. Bouvry, “Comparison of Multi-objective Optimization Algorithms for the JShadObf JavaScript Obfuscator,” in Proc. of the 17th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2014), part of the 28th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2014), Phoenix, Arizona, USA, 2014.
    URL
  15. M. Muszyński, S. Varrette, and P. Bouvry, “On the Resilience of the Newscast Protocol in the Presence of Cheaters,” in 2014 Grande Region Security and Reliability Day (GRSRD 2014), Saarbrücken, Germany, 2014.
    URL
  16. S. Varrette, M. Guzek, V. Plugaru, X. Besseron, and P. Bouvry, “HPC Performance and Energy-Efficiency of Xen, KVM and VMware Hypervisors,” in Proc. of the 25th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2013), Porto de Galinhas, Brazil, 2013, pp. 89–96.
  17. V. Delplace, P. Manneback, F. Pinel, S. Varrette, and P. Bouvry, “Comparing the Performance and Power Usage of GPU and ARM Clusters for Map-Reduce,” in Proc. of the 3rd Intl. Conf. on Cloud and Green Computing (CGC’13), 2013, pp. 199–200.
    URL
  18. T. Schaberreiter, S. Varrette, P. Bouvry, J. Röning, and D. Khadraoui, “Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project,” in Proc. of the 3th IFIP Intl. SeCIHD’2013 Workshop, part of the 8th Intl. Conf. on Availability, Reliability and Security (ARES’13), Regensburg, Germany, 2013, vol. 8128, pp. 269–287.
  19. S. Varrette, G. Danoy, M. Guzek, X. Besseron, and P. Bouvry, “Using Data-flow analysis in MAS for power-aware HPC runs,” in Proc. of the IEEE Intl. Conf. on High Performance Computing and Simulation (HPCS’13), 2013, pp. 158–160.
  20. B. Bertholon, S. Varrette, and P. Bouvry, “JShadObf: A JavaScript Obfuscator based on Multi-objective Optimization Algorithms,” in Proc. of the IEEE Intl. Conf. on Network and System Security (NSS 2013), Madrid, Spain, 2013, vol. 7873, pp. 336–349.
  21. J. Muszynski, S. Varrette, and P. Bouvry, “Expected Running Time of Parallel Evolutionary Algorithms on Unimodal Pseudo-Boolean Functions over Small-World Networks,” in Proc. of the IEEE Congress on Evolutionary Computation (CEC’2013), Cancún, Mexico, 2013, pp. 2588–2594.
  22. B. Bertholon, S. Varrette, and S. Martinez, “ShadObf: A C-source Obfuscator based on Multi-objective Optimization Algorithms,” in Proc. of the 16th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2013), part of the 27th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2013), Boston (Massachusetts), USA, 2013, pp. 435–444.
    URL
  23. M. Jarus, S. Varrette, A. Oleksiak, and P. Bouvry, “Performance Evaluation and Energy Efficiency of High-Density HPC Platforms Based on Intel, AMD and ARM Processors,” in Proc. of the Intl. Conf. on Energy Efficiency in Large Scale Distributed Systems (EE-LSDS’13), Vienna, Austria, 2013, vol. 8046, pp. 182–200.
    doi
  24. M. Guzek, S. Varrette, V. Plugaru, J. E. Sanchez, and P. Bouvry, “A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment,” in Proc. of the Intl. Conf. on Energy Efficiency in Large Scale Distributed Systems (EE-LSDS’13), Vienna, Austria, 2013, vol. 8046, pp. 133–152.
    doi
  25. J. Muszyński, S. Varrette, J. L. J. Laredo, B. Dorronsoro, and P. Bouvry, “Convergence of Distributed Cellular Evolutionary Algorithms in Presence of Crash Faults and Cheaters,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’12), Sousse, Tunisia, 2012.
    URL
  26. S. Varrette, J. Muszyński, and P. Bouvry, “Hash function generation by means of Gene Expression Programming,” in Proc. of Intl. Conf. on Cryptography and Security System (CSS’12), Kazimierz Dolny, Poland, 2012.
    URL
  27. C. J. B. Hernandez, D. A. Sierra, S. Varrette, and D. L. Pacheco, “Energy Efficiency on Scalable Computing Architectures,” in 11th IEEE Intl. Conf. on Computer and Information Technology (CIT’11), Paphos, Cyprus, 2011, pp. 635–640.
    doi
  28. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: a Novel TPM-based Approach to Ensure Cloud IaaS Security,” in Proc. of the 4th IEEE Intl. Conf. on Cloud Computing (CLOUD 2011), Washington DC, USA, 2011, pp. 121–130.
    URL
  29. B. Bertholon, S. Varrette, and P. Bouvry, “A Signature Scheme for Distributed Executions based on Control flow Analysis.,” in Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011), Warsaw, Poland, 2011, vol. 7053, pp. 85–102.
    URL
  30. S. Varrette, M. Muszyński, and P. Bouvry, “Cheating impact on distributed Evolutionary Algorithms over BOINC computations.,” in Proc. of the 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011), Warsaw, Poland, 2011. Extended Abstract
    URL
  31. B. Bertholon, S. Varrette, and P. Bouvry, “CertiCloud: une plate-forme Cloud IaaS sécurisée,” in Proc. des 20ème rencontres francophones du parallélisme (RenPar’20), St Malo, France, 2011.
    URL
  32. S. Varrette, E. Tantar, and P. Bouvry, “On the Resilience of [distributed] Evolutionary Algorithms against Cheaters in Global Computing Platforms,” in Proc. of the 14th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2011), part of the 25th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2011), Anchorage (Alaska), USA, 2011.
    URL
  33. B. Bertholon, S. Varrette, and P. Bouvry, “TPM-based Approaches to Improve Cloud Security,” in 2011 Grande Region Security and Reliability Day (SecDay 2011), Trier, Germany, 2011.
    URL
  34. J. Pecero, S. Varrette, and P. Bouvry, “Scheduling DAG Applications on Multi-core Processor Packages Architectures,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’10), 2010.
    URL
  35. S. Varrette, B. Bertholon, and P. Bouvry, “A Signature Scheme for Distributed Executions based on Macro-Dataflow Analysis,” in 2nd Intl. Workshop on Remote Entrusting (Re-Trust 2009), Riva del Garda, Italy, 2009.
    URL
  36. D. Dunlop, S. Varrette, and P. Bouvry, “Deskilling HPL - Using an Evolutionary Algorithm to Automate Cluster Benchmarking,” in Proc. of 8th Intl. Conf. on Parallel Processing and Applied Mathematics - Part II (PPAM 2009), Wroclaw, Poland, 2009, vol. 6068, pp. 102–114. Publication appeared in 2010
    doi
  37. S. Guelton and S. Varrette, “Une approche génétique et source à source de l’optimisation de code,” in Proc. des 19ème rencontres francophones du parallélisme (RenPar’19), Toulouse, France, 2009.
    URL
  38. G. Berhe, B. Peters, S. Varrette, and P. Bouvry, “Parallel Implementation of Domain Decomposition Algorithm for Molecular Dynamics,” in Proc. of the 1st Intl. Conf. on Parallel, Distributed and Grid Computing for Engineering (PARENG 2009), Pécs, Hungary, 2009, vol. CCP.90-8.
    doi
  39. S. Guelton, T. Gautier, J.-L. Pazat, and S. Varrette, “Dynamic Adaptation Applied to Sabotage Tolerance,” in Proc. of the IEEE 17th Euromicro Intl. Conf. on Parallel, Distributed, and Network-Based Processing (PDP 2009), Weimar, Germany, 2009, pp. 237–244.
    doi
  40. S. Varrette, M. Ostaszewski, and P. Bouvry, “Nature inspired Algorithm-Based Fault Tolerance on Global Computing Platforms. Application to Symbolic Regression,” in Proc. of the Intl. Conf. on Metaheuristics and Nature Inspired Computing (META’08), Hammamet, Tunisia, 2008.
    URL
  41. S. Varrette, J.-L. Roch, and A. Krings, “Result Certification Against Massive Attacks in Distributed Computations,” in 1th Int. Workshop on Remote Entrusting (Re-Trust 2008), Trento, Italy, 2008.
    URL
  42. S. Varrette, J.-L. Roch, G. Duc, and R. Keryell, “Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments,” in Proc. of Euro-Par 2008, Workshop on Secure, Trusted, Manageable and Controllable Grid Services (SGS’08), Las Palmas de Gran Canaria, Spain, 2008, vol. 5415, pp. 211–222.
    doi
  43. D. Dunlop, S. Varrette, and P. Bouvry., “On the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning,” in Proc. of the IEEE Intl. Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’08), Edinburgh, UK, 2008, pp. 105–113.
    doi
  44. J.-L. Roch and S. Varrette, “Probabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product,” in Proc. of the ACM Intl. Workshop on Parallel Symbolic Computation’07 (PASCO’07), London, Ontario, Canada, 2007, pp. 88–92.
    doi
  45. S. Varrette, “Security of Global Computing Platforms: Authentication and Computed Results Integrity,” in Conference on Cryptology and Digital Content Security (CRM 07), Barcelona, Spain, 2007.
    URL
  46. S. Varrette, J.-L. Roch, J. Montagnat, L. Seitz, J.-M. Pierson, and F. Leprévost, “Safe Distributed Architecture for Image-based Computer Assisted Diagnosis,” in Proc. of the IEEE Intl. Conf. on Pervasive Services, Workshop on Health Pervasive Systems (HPS’06), Lyon, France, 2006.
    doi
  47. S. Varrette, J.-L. Roch, and F. Leprévost, “Applicative Solutions for Safe Computations in Distributed Environments,” in Workshop "Trustworthy Software", Saarbrücken, Germany, 2006. Version electronique uniquement
    URL
  48. S. Varrette, S. Georget, J. Montagnat, J.-L. Roch, and F. Leprevost, “Distributed Authentication in GRID5000,” in Proc. of OTM Confederated Int. Workshops on Grid Computing and its Application to Data Analysis (GADA’05), Agia Napa, Cyprus, 2005, vol. 3762, pp. 314–326.
    doi
  49. N. Dagorn, N. Bernard, and S. Varrette, “Practical Authentication in Distributed Environments,” in Proc. of the IEEE Intl. Computer Systems and Information Technology Conference (ICSIT’05), Alger, Algeria, 2005, vol. 1.
    URL
  50. S. Varrette, S. Georget, J.-L. Roch, and F. Leprevost, “Authentification Distribuée sur Grille de Grappes basée sur LDAP,” in Proc. des 16èmes rencontres francophones du parallélisme (RenPar’16), Le Croisic, France, 2005.
    URL
  51. A.Krings, J.-L. Roch, S. Jafar, and S. Varrette, “A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments,” in Proc. of the European Grid Conference (EGC2005), Amsterdam, Netherlands, 2005, vol. 3470, pp. 323–333.
    doi
  52. S. Varrette, J.-L. Roch, and F. Leprevost, “FlowCert : Probabilistic Certification for Peer-to-Peer Computations,” in Proc. of the 16th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2004), Foz do Iguaçu, Brazil, 2004, pp. 108–115.
    doi
  53. S. Varrette, J.-L. Roch, Y. Denneulin, and F. Leprevost, “Secure Architecture for Clusters and Grids,” in Proc. of the 2nd Int. Conf. on Critical Infrastructures (CRIS 2004), Grenoble, France, 2004.
    URL
  54. S. Jafar, S. Varrette, and J.-L. Roch, “Using Data-Flow Analysis for Resilence and Result Checking in Peer to Peer Computations,” in Proc. of the 1th Intl. Workshop on Grid and Peer-to-Peer Computing Impacts on Large Scale Heterogeneous Distributed Database Systems (GLOBE’04), Zaragoza, Spain, 2004, pp. 512–516.
    doi
  55. S. Varrette and J.-L. Roch, “Certification logicielle de Calcul Global avec dépendances sur grille,” in Proc. des 15èmes rencontres francophones du parallélisme (RenPar’15), La-Colle-Sur-Loup, France, 2003, pp. 169–176.
    URL

Masters Thesis

  1. S. Varrette, “Sécurisation de calculs pairs à pairs sur une grille de grappes,” Rapport de Projet de Fin d’Etude, ENSIMAG, Laboratoire ID-IMAG UMR CNRS/INPG/INRIA/UJF 5132, 2003. In french

Technical Reports

  1. V. Plugaru, F. Georgatos, S. Varrette, and P.Bouvry, “Performance tuning of applications for HPC systems employing Simulated Annealing optimization,” Univ. of Luxembourg, 2014.
    URL
  2. S. Varrette, “Tutorial d’installation de la distribution Debian,” Laboratoire ID-IMAG, Sep. 2005. Extrait d’un TP proposé en Master 2 CSCI
  3. S. Varrette, “Tutorial OpenLDAP: Installation et configuration, Migration NIS →LDAP dans GRID5000, Sécurisation par SSL et optimisations,” Laboratoire ID-IMAG, Sep. 2005.
  4. S. Varrette, “Introduction aux réseaux de tri tolérants aux fautes,” Laboratoire ID-IMAG, Aug. 2005. Draft version
  5. S. Varrette, “Tutorial LaTeX - Comprendre et écrire un document en LaTeX,” Laboratoire ID-IMAG, 2005. Version 0.3
  6. S. Varrette, “Programmation de l’algorithme D.E.S. (Data Encryption Standard),” University of Luxembourg, 2005.
  7. S. Varrette, “Programmation de l’algorithme A.E.S. (Advanced Encryption Standard),” University of Luxembourg, 2005.
  8. S. Varrette, “Tutorial d’installation d’un lecteur de cartes à puce USB sous Linux,” Laboratoire ID-IMAG/Université du Luxembourg, 2005. Version 0.1 - a compléter

Miscellaneous

  1. S. Martinez, S. Varrette, and B. Bertholon, “Optimisation d’obfuscation de code source au moyen d’algorithmes évolutionnaires multi-objectifs.” [Poster] - ComPAS’13, Jan-2013.