Search Results - "Sauvage, Laurent"
-
1
Précarité, temporalités et conciliation travail-famille chez les musiciens baroques montréalais
Published in Interventions économiques (2017)“…S’est développé à Montréal, depuis la fin des années 1980, un « Monde de l’art » particulier articulé autour de l’interprétation de la musique dite ancienne…”
Get full text
Journal Article -
2
Les entreprises en économie sociale face aux défis de l’hybridation des ressources
Published in Interventions économiques (11-06-2021)“…This article analyzes the resources, market and non market and non-financial, which are used by Québec social economy firms. This diversification of resources…”
Get full text
Journal Article -
3
Culture de proximité et développement local : vers une grille de la vitalité culturelle des quartiers à Montréal
Published in Interventions économiques (01-03-2020)“…This article deals with the development of local communities, in relation with cultural and creative activities. Research has shown that arts and culture…”
Get full text
Journal Article -
4
Long-range transport of Saharan dust to northern Europe: The 11–16 October 2001 outbreak observed with EARLINET
Published in Journal of Geophysical Research - Atmospheres (27-12-2003)“…The spread of mineral particles over southwestern, western, and central Europe resulting from a strong Saharan dust outbreak in October 2001 was observed at 10…”
Get full text
Journal Article -
5
Cultural Initiatives and Local Development: A Basis for Inclusive Neighborhood Revitalization
Published in Urban planning (01-01-2019)“…This article focuses on cultural and creative activities and the development of local communities. Several studies on North America, Europe and Latin America…”
Get full text
Journal Article -
6
Aerosol/Cloud Measurements Using Coherent Wind Doppler Lidars
Published in EPJ Web of Conferences (01-01-2016)“…The accurate localization and characterization of aerosol and cloud layers is crucial for climate studies (aerosol indirect effect), meteorology (Planetary…”
Get full text
Journal Article Conference Proceeding -
7
Security Evaluation of WDDL and SecLib Countermeasures against Power Attacks
Published in IEEE transactions on computers (01-11-2008)“…Logic styles with constant power consumption are promising solutions to counteract side-channel attacks on sensitive cryptographic devices. Recently, one…”
Get full text
Journal Article -
8
Cloud heights from TOVS Path-B: Evaluation using LITE observations and distributions of highest cloud layers
Published in Journal of Geophysical Research - Atmospheres (16-10-2005)“…Cloud height from the TIROS‐N Operational Vertical Sounder (TOVS) Path‐B climate data set has been evaluated by using vertical profiles of the backscattered…”
Get full text
Journal Article -
9
An Assessment of Pseudo-Operational Ground-Based Light Detection and Ranging Sensors to Determine the Boundary-Layer Structure in the Coastal Atmosphere
Published in Advances in Meteorology (01-01-2012)“…Twenty-one cases of boundary-layer structure were retrieved by three co-located remote sensors, One LIDAR and two ceilometers at the coastal site of Mace Head,…”
Get full text
Journal Article -
10
Hardware Trojan Horses in Cryptographic IP Cores
Published in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (01-08-2013)“…Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic…”
Get full text
Conference Proceeding -
11
Communs culturels et revitalisation territoriale : le cas du quartier Saint-Michel à Montréal
Published in Revue Internationale Animation, Territoires et Pratiques Socioculturelles (2023)“…Cet article s’intéresse aux effets territoriaux du tournant participatif des politiques culturelles. Ce tournant se renforce à la faveur de l’évolution…”
Get full text
Journal Article -
12
Blind Cartography for Side Channel Attacks : Cross-Correlation Cartography
Published in International journal of reconfigurable computing (01-01-2012)“…Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved…”
Get full text
Journal Article -
13
Air mass modification over Europe: EARLINET aerosol observations from Wales to Belarus
Published in Journal of Geophysical Research - Atmospheres (27-12-2004)“…For the first time, the vertically resolved aerosol optical properties of western and central/eastern European haze are investigated as a function of air mass…”
Get full text
Journal Article -
14
Exploiting Dual-Output Programmable Blocks to Balance Secure Dual-Rail Logics
Published in International journal of reconfigurable computing (01-01-2010)“…FPGA design of side-channel analysis countermeasures using unmasked dual-rail with precharge logic appears to be a great challenge. Indeed, the robustness of…”
Get full text
Journal Article -
15
Aerosol content survey by mini N₂-Raman lidar: Application to local and long-range transport aerosols
Published in Atmospheric environment (1994) (01-12-2011)“…This study shows an aerosol content survey in the low and middle troposphere over Paris with a compact and light Nitrogen-Raman lidar which has been recently…”
Get full text
Journal Article -
16
Aerosol content survey by mini N 2-Raman lidar: Application to local and long-range transport aerosols
Published in Atmospheric environment (1994) (01-12-2011)“…This study shows an aerosol content survey in the low and middle troposphere over Paris with a compact and light Nitrogen-Raman lidar which has been recently…”
Get full text
Journal Article -
17
Characterization of Electromagnetic Fault Injection on a 32-bit Microcontroller Instruction Buffer
Published in 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (15-12-2020)“…Electromagnetic fault injection (EMFI) is an efficient technique to alter the behavior of microcontrollers in order to extract secret informations. Compared to…”
Get full text
Conference Proceeding -
18
Multi-level formal verification: A new approach against fault injection attack
Published in Journal of cryptographic engineering (01-04-2017)“…Fault injection attack is an extremely powerful technique to extract secrets from an embedded system. Since their introduction, a large number of…”
Get full text
Journal Article -
19
Highlighting Two EM Fault Models While Analyzing a Digital Sensor Limitations
Published in 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-04-2023)“…Fault injection attacks can be carried out against an operating circuit by exposing it to EM perturbations. These attacks can be detected using embedded…”
Get full text
Conference Proceeding -
20
Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures
Published in IEEE transactions on electromagnetic compatibility (01-06-2013)“…This paper presents a novel analysis of electromagnetic (EM) information leakage from cryptographic devices, based on the electromagnetic interference (EMI)…”
Get full text
Journal Article