Laurent D. Michel

Orcid: 0000-0001-7230-7130

Affiliations:
  • University of Connecticut, USA


According to our database1, Laurent D. Michel authored at least 112 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Constraint Propagation on GPU: A Case Study for the Bin Packing Constraint.
CoRR, 2024

2023
Constraint propagation on GPU: A case study for the AllDifferent constraint.
J. Log. Comput., December, 2023

FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks.
IEEE Trans. Dependable Secur. Comput., 2023

ML and Network Traces to M.A.R.S.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Constraint Propagation on GPU: A Case Study for the Cumulative Constraint.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2023

Optimization Bounds from Decision Diagrams in Haddock.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2023

2022
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming.
J. Cryptogr. Eng., 2022

Heuristics for MDD Propagation in HADDOCK.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022

DUELMIPs: Optimizing SDN Functionality and Security.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022

Constraints propagation on GPU: A case study for AllDifferent.
Proceedings of the 37th Italian Conference on Computational Logic, Bologna, Italy, June 29, 2022

2021
MiniCP: a lightweight solver for constraint programming.
Math. Program. Comput., 2021

2020
Bringing freedom in variable choice when searching counter-examples in floating point programs.
CoRR, 2020

An efficient constraint based framework forhandling floating point SMT problems.
CoRR, 2020

HADDOCK: A Language and Architecture for Decision Diagram Compilation.
Proceedings of the Principles and Practice of Constraint Programming, 2020

2019
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks.
CoRR, 2019

A Counting-Based Approach to Scalable Micro-service Deployment.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2019

DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Constraint-Based Local Search.
Proceedings of the Handbook of Heuristics., 2018

A Semiclassical Approach to the Kramers-Smoluchowski Equation.
SIAM J. Math. Anal., 2018

A Complete Tolerant Algebraic Side-Channel Attack for AES with CP.
Proceedings of the Principles and Practice of Constraint Programming, 2018

Securely and Automatically Deploying Micro-services in an Hybrid Cloud Infrastructure.
Proceedings of the Principles and Practice of Constraint Programming, 2018

2017
A microkernel architecture for constraint programming.
Constraints An Int. J., 2017

A design flow with integrated verification of requirements and faults in safety-critical systems.
Proceedings of the 12th System of Systems Engineering Conference, 2017

Search Strategies for Floating Point Constraint Systems.
Proceedings of the Principles and Practice of Constraint Programming, 2017

A Tolerant Algebraic Side-Channel Attack on AES Using CP.
Proceedings of the Principles and Practice of Constraint Programming, 2017

Influence of Error on Hamming Weights for ASCA.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

What's Hot in Constraint Programming.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Model Combinators in the Scheduling Domain.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2016

Parallel Composition of Scheduling Solvers.
Proceedings of the Integration of AI and OR Techniques in Constraint Programming, 2016

2015
Introduction to the fast track issue for CPAIOR 2015.
Constraints An Int. J., 2015

2014
Estimating the ice thickness of shallow glaciers from surface topography and mass-balance data with a shape optimization algorithm.
Comput. Geosci., 2014

The Table Access Protocol: Providing standard access to astronomical data.
Astron. Comput., 2014

Building an archive with Saada.
Astron. Comput., 2014

A Systematic Approach to Analyzing Voting Terminal Event Logs.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Domain Views for Constraint Programming.
Proceedings of the Principles and Practice of Constraint Programming, 2014

Constraint-Based Lagrangian Relaxation.
Proceedings of the Principles and Practice of Constraint Programming, 2014

2013
Malicious takeover of voting systems: arbitrary code execution on optical scan voting terminals.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

The Objective-CP Optimization System.
Proceedings of the Principles and Practice of Constraint Programming, 2013

Model Combinators for Hybrid Optimization.
Proceedings of the Principles and Practice of Constraint Programming, 2013

Energy-efficient management of eco-communities.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
The Time Complexity of A* with Approximate Heuristics on Multiple-Solution Search Spaces.
J. Artif. Intell. Res., 2012

Integrity of electronic voting systems: fallacious use of cryptography.
Proceedings of the ACM Symposium on Applied Computing, 2012

Activity-Based Search for Black-Box Constraint Programming Solvers.
Proceedings of the Integration of AI and OR Techniques in Contraint Programming for Combinatorial Optimzation Problems, 2012

A High Level Language for Solver Independent Model Manipulation and Generation of Hybrid Solvers.
Proceedings of the Integration of AI and OR Techniques in Contraint Programming for Combinatorial Optimzation Problems, 2012

Constraint Satisfaction over Bit-Vectors.
Proceedings of the Principles and Practice of Constraint Programming, 2012

Constraint Programming and a Usability Quest.
Proceedings of the Principles and Practice of Constraint Programming, 2012

2011
Activity-Based Search for Black-Box Contraint-Programming Solvers
CoRR, 2011

Solving Steel Mill Slab Problems with constraint-based techniques: CP, LNS, and CBLS.
Constraints An Int. J., 2011

Optimal deployment of eventually-serializable data services.
Ann. Oper. Res., 2011

Synthesis of Search Algorithms from High-Level CP Models.
Proceedings of the Principles and Practice of Constraint Programming - CP 2011, 2011

2010
Integrating Access Control into UML for Secure Software Modeling and Analysis.
Int. J. Secur. Softw. Eng., 2010

A framework for security assurance of access control enforcement code.
Comput. Secur., 2010

A framework of composable access control features: Preserving separation of access control concerns from models to code.
Comput. Secur., 2010

Parallelizing constraint programs.
Proceedings of the POPL 2010 Workshop on Declarative Aspects of Multicore Programming, 2010

Load Balancing and Almost Symmetries for RAMBO Quorum Hosting.
Proceedings of the Principles and Practice of Constraint Programming - CP 2010, 2010

2009
State-wide elections, optical scan voting systems, and the pursuit of integrity.
IEEE Trans. Inf. Forensics Secur., 2009

Transparent Parallelization of Constraint Programming.
INFORMS J. Comput., 2009

Parallel and distributed local search in COMET.
Comput. Oper. Res., 2009

Model-driven visualizations of constraint-based local search.
Constraints An Int. J., 2009

Automating Voting Terminal Event Log Analysis.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Optimizing Network Deployment of Formally-Specified Distributed Systems.
Proceedings of the 18th International Conference on Software Engineering and Data Engineering (SEDE-2009), 2009

Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Bandwidth-Limited Optimal Deployment of Eventually-Serializable Data Services.
Proceedings of the Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, 2009

Online Selection of Quorum Systems for RAMBO Reconfiguration.
Proceedings of the Principles and Practice of Constraint Programming, 2009

2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

A Framework of Composable Access Control Definition, Enforcement and Assurance.
Proceedings of the XXVII International Conference of the Chilean Computer Science Society (SCCC 2008), 2008

The Steel Mill Slab Design Problem Revisited.
Proceedings of the Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, 2008

2007
An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

Parallelizing Constraint Programs Transparently.
Proceedings of the Principles and Practice of Constraint Programming, 2007

Coherent Modeling and Effective Coordination for Building Emergency Evacuation.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2007

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Synthesis of Constraint-Based Local Search Algorithms from High-Level Models.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Constraints in Procedural and Concurrent Languages.
Proceedings of the Handbook of Constraint Programming, 2006

A simulated annealing approach to the traveling tournament problem.
J. Sched., 2006

Nondeterministic Control for Hybrid Search.
Constraints An Int. J., 2006

High-Level Nondeterministic Abstractions in.
Proceedings of the Principles and Practice of Constraint Programming, 2006

Distributed Constraint-Based Local Search.
Proceedings of the Principles and Practice of Constraint Programming, 2006

Differentiable Invariants.
Proceedings of the Principles and Practice of Constraint Programming, 2006

Transportation and HVAC Systems for Building Emergency Evacuation.
Proceedings of the 2006 IEEE International Conference on Automation Science and Engineering, 2006

2005
A Modeling Layer for Constraint-Programming Libraries.
INFORMS J. Comput., 2005

Maintaining Longest Paths Incrementally.
Constraints An Int. J., 2005

Contraint-Based Combinators for Local Search.
Constraints An Int. J., 2005

Control Abstractions for Local Search.
Constraints An Int. J., 2005

A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming.
Proceedings of the Model Driven Engineering Languages and Systems, 2005

A Framework for Composable Security Definition, Assurance, and Enforcement.
Proceedings of the Satellite Events at the MoDELS 2005 Conference, 2005

Stateful Design for Secure Information Systems.
Proceedings of the Security in Information Systems, 2005

Role Slices: A Notation for RBAC Permission Assignment and Enforcement.
Proceedings of the Data and Applications Security XIX, 2005

The Comet Programming Language and System.
Proceedings of the Principles and Practice of Constraint Programming, 2005

Parallel Local Search in Comet.
Proceedings of the Principles and Practice of Constraint Programming, 2005

Coherent configuration and operation of building transportation systems.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2005

Constraint-based local search.
MIT Press, ISBN: 978-0-262-22077-4, 2005

2004
A decomposition-based implementation of search strategies.
ACM Trans. Comput. Log., 2004

A simple tabu search for warehouse location.
Eur. J. Oper. Res., 2004

Scheduling Abstractions for Local Search.
Proceedings of the Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, 2004

Constraint-Based Combinators for Local Search.
Proceedings of the Principles and Practice of Constraint Programming, 2004

Iterative Relaxations for Iterative Flattening in Cumulative Scheduling.
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004

2003
A Simulated Annealing Approach to the Travelling Tournament Problem.
Proceedings of the IJCAI-03, 2003

Maintaining Longest Paths Incrementally.
Proceedings of the Principles and Practice of Constraint Programming, 2003

Comet in Context.
Proceedings of the PCK50, 2003

2002
A constraint-based architecture for local search.
Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 2002

2000
Localizer.
Constraints An Int. J., 2000

1999
LOCALIZER A Modeling Language for Local Search.
PhD thesis, 1999

Localizer: A Modeling Language for Local Search.
INFORMS J. Comput., 1999

Constraint Programming in OPL.
Proceedings of the Principles and Practice of Declarative Programming, International Conference PPDP'99, Paris, France, September 29, 1999

Combinatorial Optimization in OPL Studio.
Proceedings of the Progress in Artificial Intelligence, 1999

OPL Script: Composing and Controlling Models.
Proceedings of the New Trends in Contraints, 1999

1998
Newton - Constraint Programming over Nonlinear Constraints.
Sci. Comput. Program., 1998

1997
Helios: A Modeling Language for Global Optimization and its Implementation in Newton.
Theor. Comput. Sci., 1997

Interval Methods for Non-linear Constraints.
Proceedings of the Principles and Practice of Constraint Programming - CP97, Third International Conference, Linz, Austria, October 29, 1997

Numerica - A Modeling Language for Global Optimization.
MIT Press, ISBN: 978-0-262-72027-4, 1997

1993
The Impact of Granularity in Abstract Interpretation of Prolog.
Proceedings of the Static Analysis, Third International Workshop, 1993

Optimization Techniques for General Purpose Fixpoint Algorithms - Practical Efficiency for the Abstract Interpretation of Prolog.
Proceedings of the Static Analysis, Third International Workshop, 1993


  Loading...