dbaelde.bib

@comment{{This file has been generated by bib2bib 1.98}}
@comment{{Command line: /usr/bin/bib2bib -q -oc dbaelde.cite -ob dbaelde.bib -c 'author : "Baelde"' ../../biblio/abbrevs.bib ../../biblio/demons.bib ../../biblio/demons2.bib ../../biblio/demons3.bib ../../biblio/team.bib ../../biblio/crossrefs.bib}}
@inproceedings{baelde11sofsem,
  author = {David Baelde and
               Romain Beauxis and
               Samuel Mimram},
  title = {Liquidsoap: A High-Level Programming Language for Multimedia
               Streaming},
  crossref = {sofsem11},
  topics = {team, lri},
  type_publi = {colcomlec},
  x-type = {article},
  x-support = {actes},
  x-cle-support = {SOFSEM},
  x-equipes = {demons PROVAL ext},
  year = 2011
}
@inproceedings{baelde12itp,
  title = {{Towards Provably Robust Watermarking}},
  author = {David Baelde and Pierre Courtieu and David Gross-Amblard and Christine Paulin-Mohring},
  abstract = {{Watermarking techniques are used to help identifying copies of publicly released information. They consist in applying a slight and secret modification to the data before its release, in a way that should be robust, ie., remain recognizable even in (reasonably) modified copies of the data. In this paper, we present new results about the robustness of watermarking schemes against arbitrary attackers, and the formalization of those results in Coq. We used the ALEA library, which formalizes probability theory and models probabilistic programs using a simple monadic translation. This work illustrates the strengths and particularities of the induced style of reasoning about probabilistic programs. Our technique for proving robustness is adapted from methods commonly used for cryptographic protocols, and we discuss its relevance to the field of watermarking.}},
  keywords = {watermarking, probabilistic algorithms, formal proofs, security, interactive theorem proving},
  year = 2012,
  topics = {team},
  x-equipes = {demons PROVAL ext},
  month = aug,
  x-international-audience = {yes},
  x-proceedings = {yes},
  x-support = {article},
  x-cle-support = {ITProving},
  x-type = {article},
  series = {Lecture Notes in Computer Science},
  volume = {7406},
  pdf = {http://hal.inria.fr/hal-00682398/PDF/techreport.pdf},
  hal = {http://hal.inria.fr/hal-00682398},
  booktitle = {ITP 2012}
}
@proceedings{sofsem11,
  editor = {Ivana Cern{\'a} and
               Tibor Gyim{\'o}thy and
               Juraj Hromkovic and
               Keith G. Jeffery and
               Rastislav Kr{\'a}lovic and
               Marko Vukolic and
               Stefan Wolf},
  booktitle = {37th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM'11)},
  address = {Nov{\'y} Smokovec, Slovakia},
  title = {SOFSEM 2011: Theory and Practice of Computer Science - 37th
               Conference on Current Trends in Theory and Practice of Computer
               Science},
  publisher = {Springer},
  month = jan,
  series = {Lecture Notes in Computer Science},
  volume = {6543},
  year = {2011},
  isbn = {978-3-642-18380-5},
  x-international-audience = {yes},
  x-proceedings = {yes},
  x-editorial-board = {yes},
  x-support = {actes},
  x-pays = {SK}
}