@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'year>=1998 & year <= 2013' -c 'author: "beauxis"' papers.bib}}

@INPROCEEDINGS{baelde:2011:inria-00585728:1,
  AUTHOR = {Baelde, David and Beauxis, Romain and Mimram, Samuel},
  TITLE = {{Liquidsoap: a High-Level Programming Language for Multimedia Streaming}},
  BOOKTITLE = {{SOFSEM 2011: Theory and Practice of Computer Science}},
  YEAR = {2011},
  SERIES = {Lecture Notes in Computer Science},
  EDITOR = {Cern{\'a}, Ivana and Gyim{\'o}thy, Tibor and Hromkovic, Juraj and Jefferey, Keith and Kr{\'a}lovic, Rastislav and Vukolic, Marko and Wolf, Stefan},
  DOI = {10.1007/978-3-642-18381-2\_8},
  PUBLISHER = {Springer Berlin / Heidelberg},
  VOLUME = {6543},
  PAGES = {99-110},
  ADDRESS = {Nov{\'y} Smokovec, Slovakia},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  URL = {http://hal.inria.fr/inria-00585728/en},
  X-ID-HAL = {inria-00585728}
}

@INPROCEEDINGS{beauxis:2011:inria-00616968:1,
  AUTHOR = {Beauxis, Romain and Mimram, Samuel},
  TITLE = {{A Non-Standard Semantics for Kahn Networks in Continuous Time}},
  BOOKTITLE = {{Computer Science Logic (CSL'11) - 25th International Workshop/20th Annual Conference of the EACSL}},
  YEAR = {2011},
  SERIES = {Leibniz International Proceedings in Informatics (LIPIcs)},
  URL2 = {http://drops.dagstuhl.de/opus/volltexte/2011/3221},
  EDITOR = {Marc Bezem},
  DOI = {10.4230/LIPIcs.CSL.2011.35},
  PUBLISHER = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  VOLUME = {12},
  PAGES = {35--50},
  ADDRESS = {Bergen, Norway},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  URL = {http://hal.inria.fr/inria-00616968/en},
  X-ID-HAL = {inria-00616968}
}

@ARTICLE{Beauxis:09:TCS,
  AUTHOR = {Romain Beauxis and Catuscia Palamidessi},
  BIBDATE = {2009-09-03},
  BIBSOURCE = {DBLP, http://dblp.uni-trier.de/db/journals/tcs/tcs410.html#BeauxisP09},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  DOI = {http://dx.doi.org/10.1016/j.tcs.2009.06.008},
  JOURNAL = {Theoretical Computer Science},
  NUMBER = {41},
  PAGES = {4006--4025},
  TITLE = {Probabilistic and nondeterministic aspects of anonymity},
  URL = {http://hal.archives-ouvertes.fr/inria-00424855/en/},
  VOLUME = {410},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2009},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.tcs.2009.06.008},
  BDSK-URL-2 = {http://hal.archives-ouvertes.fr/inria-00424855/en/}
}

@PHDTHESIS{Beauxis:09:Thesis,
  AUTHOR = {Romain Beauxis},
  DATE-ADDED = {2010-12-30 03:55:02 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:02 +0100},
  LIXEQUIPE = {comete},
  SCHOOL = {LIX, Ecole Polytechnique, France},
  TITLE = {Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols},
  YEAR = 2009
}

@INPROCEEDINGS{Beauxis:08:BOOK,
  AUTHOR = {Romain Beauxis and Catuscia Palamidessi and Frank D. Valencia},
  BOOKTITLE = {Concurrency, Graphs and Models},
  DATE-ADDED = {2008-12-30 06:11:03 +0100},
  DATE-MODIFIED = {2008-12-30 06:11:03 +0100},
  DOI = {10.1007/978-3-540-68679-8_29},
  EDITOR = {Pierpaolo Degano and Rocco {De Nicola} and Jos\'e Meseguer},
  PAGES = {473-492},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf},
  PUBLISHER = {Springer},
  READ = {Yes},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {On the Asynchronous Nature of the Asynchronous pi-Calculus},
  URL = {http://hal.inria.fr/inria-00349226/en/},
  VOLUME = {5065},
  YEAR = {2008},
  BDSK-URL-1 = {http://hal.inria.fr/inria-00349226/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-540-68679-8_29},
  BDSK-URL-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf}
}

@INPROCEEDINGS{Beauxis:08:TGC,
  AUTHOR = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden},
  BOOKTITLE = {Proceedings of the Third Symposium on Trustworthy Global Computing (TGC 2007)},
  DATE-ADDED = {2008-12-30 06:10:45 +0100},
  DATE-MODIFIED = {2008-12-30 06:10:45 +0100},
  DOI = {10.1007/978-3-540-78663-4_23},
  EDITOR = {Gilles Barthe and C{\'e}dric Fournet},
  PAGES = {347-362},
  PDF = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels-TGC07/tgc.pdf},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Formal Approaches to Information-Hiding (Tutorial)},
  URL = {http://hal.inria.fr/inria-00261827/en/},
  VOLUME = {4912},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23},
  BDSK-URL-2 = {http://hal.inria.fr/inria-00261827/en/}
}

@INPROCEEDINGS{Beauxis:08:ICLP,
  AUTHOR = {Romain Beauxis},
  BOOKTITLE = {24th International Conference on Logic Programming},
  DATE-ADDED = {2008-12-24 16:47:59 +0100},
  DATE-MODIFIED = {2008-12-24 16:50:26 +0100},
  DOI = {10.1007/978-3-540-89982-2_80},
  EDITOR = {Maria Garcia de la Banda and Enrico Pontelli},
  PAGES = {801-802},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probabilistic and Concurrent Models for Security},
  VOLUME = {5366},
  YEAR = {2008},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2_80}
}


This file has been generated by bibtex2html 1.74