, Pfuel était un de ces théoriciens si férus de leur théorie qu'ils en oublient le but, à savoir l'application pratique : par amour de la théorie, il méprisait toute pratique. » La guerre et la paix, 1869.

N. Aaaaa, Y. Bbbbbb, P. Ssssssssaa, and P. Lllllll, Trust evaluation of a system for an activity with subjective logic, Proceedings of the 11th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus), pp.48-59, 2014.

N. Aaaaa, P. Lllllll, Y. Bbbbbb, P. Ssssssssaa, M. Bbbbbbbb et al., Proceedings of the 23rd International Conference on Database and Expert Systems Applications (DEXA), pp.497-505, 2012.

N. Aaaaa, P. Ssssssssaa, Y. Bbbbbb, and P. Lllllll, Trust evaluation of a system for an activity, Proceedings of the 10th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus), pp.24-36, 2013.

N. Aaaaa, P. Ssssssssaa, Y. Bbbbbb, and P. Lllllll, System modeling and trust evaluation of distributed systems, Transaction on Large-Scale Data-and Knowledge-Centered Systems, vol.22, pp.33-74, 2015.

E. Aaaaa and Y. , BBBBBB : An information divergence estimation over data streams, Proceedings of the 11th IEEE International Symposium on Network Computing and Applications (NCA), 2012.

E. Aaaaa and Y. Bbbbbb, Sketch *-metric : Comparing data streams via sketching, Proceedings of the 12th IEEE International Symposium on Network Computing and Applications (NCA), pp.25-32, 2013.

E. Aaaaa and Y. Bbbbbb, Deviation estimation between distributed data streams, Proceedings of the 10th European Dependable Computing Conference, pp.35-45, 2014.

E. Aaaaa and Y. Bbbbbb, A distributed information divergence estimation over data streams, IEEE Transaction on Parallel and Distributed System, vol.25, issue.2, pp.478-487, 2014.

E. Aaaaa, Y. Bbbbbb, and S. Ggggg, Uniform and Ergodic Sampling in Unstructured Peerto-Peer Systems with Malicious Nodes, Proceedings of the 14th International Conference on Principles of Distributed Systems (OPODIS), vol.6490, pp.64-78, 2010.

E. Aaaaa, Y. Bbbbbb, and S. Ggggg, Characterizing the adversarial power in uniform and ergodic node sampling, Proceedings of the 1st International Workshop on Algorithms and Models for Distributed Event Processing, 2011.

E. Aaaaa, Y. Bbbbbb, and S. Ggggg, Ankle : Detecting attacks in large scale systems via information divergence, Proceedings of the 9th European Dependable Computing Conference (EDCC), 2012.

E. Aaaaa, Y. Bbbbbb, and S. Ggggg, On the power of the adversary to solve the node sampling problem. Transaction on Large-Scale Data-and Knowledge-Centered Systems, vol.11, pp.102-126, 2013.

E. Aaaaa, Y. Bbbbbb, P. Lllllllmmmmmm, and G. Tttttt, Reputation for inter-domain qos routing, Proceedings of the 14th IEEE International Symposium on Network Computing and Applications (NCA), pp.142-146, 2015.

E. Aaaaa, Y. Bbbbbb, E. Le, M. , R. Llllllll et al., Anomaly characterization in large scale networks, Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.68-79, 2014.

E. Aaaaa, Y. Bbbbbb, and N. Rrrrrrr, Estimating the frequency of data items in massive distributed streams, Proceedings of the 4th IEEE Symposium on Network Cloud Computing and Applications (NCCA), pp.59-66, 2015.

E. Aaaaa, Y. Bbbbbb, and N. Rrrrrrr, SSSSSSSS : Identifying global icebergs in distributed streams, Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems (SRDS), pp.266-275, 2015.

E. Aaaaa, Y. Bbbbbb, E. Sssssggggg, and B. Ssssssss, Optimization results for a generalized coupon collector problem, Journal of Applied Probability, vol.53, issue.2, pp.1-7, 2016.

E. Aaaaa, Y. Bbbbbb, and B. Ssssssss, Uniform node sampling service robust against collusions of malicious nodes, Proceedings of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013.

E. Aaaaa, Y. Bbbbbb, and B. Ssssssss, New results on a generalized coupon collector problem using markov chains, Journal of Applied Probability, vol.52, issue.2, pp.405-418, 2015.

M. Bbbbbbb, Y. Bbbbbb, and A. Kkkkkkkkk, On Gossip and Populations, Proceedings of the 16th International Colloquium on Structural Information and Communication Complexity, 2009.

M. Bbbbbbb, Y. Bbbbbb, and A. Kkkkkkkkk, Dynamic computation of population protocols, Proceedings of the 17th International Conference on Telecommunications (ICT), pp.707-714, 2010.

S. Bbbbbb, Y. Bbbbbb, R. Bbbbbbb, and R. Ppppppp, FAROES : fairness and reliability using overlay expenseless set-out for duty-cycle optimization in WSN, Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems (PDCCS), pp.198-204, 2009.

Y. Bbbbbb, Nothing can compare with a population, besides agents, Proceedings of the 21st International Conference on Telecommunications (ICT), pp.421-425, 2014.

Y. Bbbbbb, R. Bbbbbbb, and R. Bbbbbbb, A formal characterization of uniform peer sampling based on view shuuing, Proceedings of the 2nd International Workshop on Reliability, Availability, and Security (WRAS), 2009.

Y. Bbbbbb, R. Bbbbbbb, and R. Bbbbbbb, On the uniformity of peer sampling based on view shufing, Journal of Parallel and Distributed Computing, vol.71, issue.8, pp.1165-1176, 2011.

Y. Bbbbbb, N. Cccc, D. Gggggg, A. Hhhhhh, and H. Mmmmmm, Reinventing mobile community computing and communication, Proceedings of the 12th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), pp.1450-1457, 2013.

Y. Bbbbbb, L. , R. Bbbbbbb, M. Bbbbbbb, and A. Kkkkkkkkk, On the deterministic tracking of moving objects with a binary sensor network, Proceedings of the 4th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp.46-59, 2008.

Y. Bbbbbb, L. , R. Bbbbbbb, M. Bbbbbbb, and A. Kkkkkkkkk, Analysis of deterministic tracking of multiple objects using a binary sensor network, ACM Transactions on Sensor Networks, vol.8, issue.1, 2011.

Y. Bbbbbb, P. Ssssssssaa, and P. Lllllll, Trust your social network according to satisfaction, reputation and privacy, Proceedings of the 3rd International Workshop on Reliability, Availability, and Security (WRAS), 2010.

Y. Mmmmmmm, E. Aaaaa, J. Aaaaaa, Y. Bbbbbb, and B. Ssssssss, Counting with population protocols, Proceedings of the 14th IEEE International Symposium on Network Computing and Applications (NCA), pp.35-42, 2015.

N. Rrrrrrr, E. Aaaaa, Y. Bbbbbb, and L. , SSSSSSSS : Proactive Online Scheduling for Shuue Grouping in Distributed Stream Processing Systems, Proceedings of the 13th ACM/IFIP/USENIX International Conference on Middleware (Middleware), 2016.

N. Rrrrrrr, Y. Bbbbbb, and A. Mmmmmm, EEciently summarizing data streams over sliding windows, Proceedings of the 14th IEEE International Symposium on Network Computing and Applications (NCA), pp.151-158, 2015.

N. Rrrrrrr, Y. Bbbbbb, and L. , Load-aware shedding in stream processing systems, Proceedings of the 10th ACM International Conference on Distributed Event-Based Systems (DEBS), 2016.

N. Rrrrrrr, L. , E. Aaaaa, and Y. Bbbbbb, SSSSSSSS : EEcient key grouping for near-optimal load balancing in stream processing systems, Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems (DEBS), pp.80-91, 2015.

A. Sssss, Y. Bbbbbb, A. Bbbbb, P. Ddddd, and G. Sssss, Throughput prediction in cellular networks : Experiments and preliminary results. In Actes de la 1ères Rencontres Francophones sur la Conception de Protocoles, l'Évaluation de Performance et l'Expérimentation des, 2016.

D. R. and Y. Bbbbbb, Proceedings of the 14th IEEE International Symposium on Network Computing and Applications (NCA), 2015.

Y. Bbbbbb, Auto-organisation et collaboration pour réseaux de capteurs. Editions Universitaires Européennes, pp.978-984, 2010.

Y. Bbbbbb, M. Bbbbbbb, E. Ffffff, and A. Kkkkkkkkk, GCP : gossip-based code propagation for large-scale mobile wireless sensor networks, Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems (Autonomics), p.11, 2007.

Y. Bbbbbb, M. Bbbbbbb, and A. , KKKKKKKKK : SOLIST or How To Look For a Needle in a Haystack ?, Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2008.

Y. Bbbbbb and I. Ggggg, éditeurs. EDCC 2015-Fast Abstracts & Student Forum Proceedings, volume abs/1602.06683 de CoRR, 2015.

Y. Bbbbbb and A. Kkkkkkkkk, PROXSEM : interest-based proximity measure to improve search eeciency in P2P systems, Proceedings of the 4th European Conference on Universal Multiservice Networks (ECUMN), pp.62-74, 2007.

H. Www, H. Mmmmmm, K. Ii, A. Gggggg, Y. Bbbbbb-;-travaux-connexes et al., Aurora : a new model and architecture for data stream management, The International Journal on Very Large Data Bases (VLDB), vol.41, pp.75-81, 2003.

M. Aaa and S. D. , SSS : General Class of Coeecients of Divergence of One Distribution from Another, Journal of the Royal Statistical Society. Series B (Methodological), vol.28, issue.1, pp.131-142, 1966.

N. Aaaa, P. B. Ggggggg, Y. Mm, and M. Ssssss, Tracking join and self-join sizes in limited storage, Proceedings of the 18th ACM Symposium on Principles of Database Systems (PODS), pp.10-20, 1999.

N. Aaaa, Y. Mm, and M. Ssssss, The space complexity of approximating the frequency moments, Proceedings of the 28th ACM Symposium on Theory of computing (STOC), pp.20-29, 1996.

L. Aaaaa, N. Jjjj, A. Ssssss, J. Ssssss, and O. Vvvvvvvvvv, Adaptive control of extreme-scale stream processing systems, Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS), 2006.

E. Aaaaa, R. Llllllll, B. Ssssssss, and F. Tttttt, Modeling and evaluating targeted attacks in large sacle dynamic systems, Proceedings of the 41rst IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2011.

C. Aaa, J. Bbbb, and A. Ccccccccccc, Functional monitoring without monotonicity, Proceedings of the 36th ACM International Colloquium on Automata, Languages and Programming, 2009.

A. Aaaaa and G. S. Mmmmm, Approximate counts and quantiles over sliding windows, Proceedings of the 23rd ACM Symposium on Principles of Database Systems (PODS), 2004.

R. H. Aaadddddd, E. Aaaaaaaa, N. Tttttttt, D. E. Cccccc, J. M. Hhhhhhhhhhh et al., Cluster i/o with river : Making the fast case common, Proceedings of the 6th Workshop on Input/Output in Parallel and Distributed Systems (IOPADS), 1999.

B. A. and C. Ssssssssss, Group Spreading : A Protocol for Provably Secure Distributed Name Service, Proceedings of the 31rst International Colloquium on Automata, Languages and Programming (ICALP), pp.183-195, 2004.

B. A. and C. , SSSSSSSSSS : Towards a Scalable and Robust Overlay Network, Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS), 2007.

B. Bbbbbbb, M. Dd, and R. Mm, Load shedding for aggregation queries over data streams, Proceedings of the 20th IEEE International Conference on Data Engineering (ICDE), 2004.

Z. Bbbby, T. S. Jj, R. K. , D. Sss, and L. Tttttttt, Counting distinct elements in a data stream, Proceedings of the 6th International Workshop on Randomization and Approximation Techniques (RANDOM), pp.1-10, 2002.

M. Bbbbbbbbbb and J. Ccccccc, On entropies, divergences, and mean values, Proceedings of the IEEE International Symposium on Information Theory (ISIT), 1995.

A. Bbbbbbbb and C. Ttttttta, Reproducing Kernel Hilbert Spaces in Probability and Statistics, 2004.

A. Bbb, On a measure of divergence between two statistical populations deened by their probability distributions, Bulletin of the Calcutta Mathematical Society, vol.35, pp.99-109, 1943.

E. Bbbbbbb, M. Gggggggg, I. Kkkk, G. Kkkk, and A. Ssssss, Brahms : Byzantine Resilient Random Membership Sampling, Computer Networks, vol.53, pp.2340-2359, 2009.

L. Bbbbbbb, The relaxation method of nding the common point of convex sets and its application to the solution of problems in convex programming, USSR Computational Mathematics and Mathematical Physics, vol.7, issue.3, pp.200-217, 1967.

C. Bbbbbbb and D. F. , Generation of pathloss and interference maps as son enabler in deployed umts networks, Proceedings of the 69th IEEE Vehicular Technology Conference, 2009.

V. Cccccccccc, E. Ccccccccccc, M. Ccccccccc, and P. S. , The state of the art in locally distributed web-server systems, ACM Computing Surveys, vol.34, issue.2, 2002.

J. L. Cccccc and M. N. Wwwwww, Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, pp.143-154, 1979.

M. Cccccc and B. Llll, Practical byzantine fault tolerance and proactive recovery, ACM Transaction on Computer System, vol.20, issue.4, pp.398-461, 2002.

A. Ccccccccccc, K. Do, S. Bb, and . Mmmmmmmmmmmmm, Estimating entropy and entropy norm on data streams, Proceedings of the 23rd International Symposium on Theoretical Aspects of Computer Science (STACS), 2006.

A. Ccccccccccc, G. Ccccccc, and A. Mmgggggg, A near-optimal algorithm for computing the entropy of a stream, Proceedings of the 18th ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.328-335, 2007.

H. Cccc, T. Lll, L. Lll, and H. , TTTT : Continuous monitoring of distributed data streams over a time-based sliding window, Algorithmica, vol.62, issue.3-4, pp.1088-1111, 2012.

V. Cccccccc, A. Bbbbbbbb, and V. , Anomaly detection : A survey, ACM Computing Surveys, vol.41, issue.3, pp.1-58, 2009.

D. Ccccccc and S. , Unreliable failure detectors for reliable distributed systems, Journal of ACM, vol.43, issue.2, pp.225-267, 1996.

M. Cccccccc and K. Cccc, FFFFCCC : Finding frequent items in data streams, vol.312, pp.3-15, 2004.

C. Guillaume, On a characterization of ordered pivotal sampling, Bernoulli, vol.18, issue.4, pp.1320-1340, 2012.

R. Cccc, J. Sss, Y. Cccc, and H. Cccc, Powerlyra : Diierentiated graph computation and partitioning on skewed graphs, Proceedings of the 10th European Conference on Computer Systems (EuroSys), vol.1, pp.1-1, 2015.

G. Ccccccc, Continuous distributed monitoring : A short survey, Proceedings of the 1st International Workshop on Algorithms and Models for Distributed Event Processing, 2011.

G. Ccccccc and S. Mmmmmmmmmmmmm, An improved data stream summary : the count-min sketch and its applications, Journal of Algorithms, vol.55, issue.1, pp.58-75, 2005.

G. Ccccccc, S. Mmmmmmmmmmmmm, and K. , Algorithms for distributed functional monitoring, Proceedings of the 19th ACM-SIAM Symposium On Discrete Algorithms (SODA), 2008.

G. Ccccccc, S. Mmmmmmmmmmmmm, and K. , Algorithms for distributed functional monitoring, ACM Transaction on Algorithms, vol.7, issue.2, 2011.

G. Ccccccc and K. , Tracking distributed aggregates over time-based sliding windows, Proceedings of the 24th International Conference on Scientiic and Statistical Database Management (SSDBM), 2012.

C. Graham and G. Minos, Sketching probabilistic data streams, Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (MOD), pp.281-292, 2007.

M. Cc and J. , TTTTTT : Elements of Information Theory, 1991.

C. Imre, Eine informationstheoretische ungleichung und ihre anwendung auf den beweis der ergodizitat von markooschen ketten, Magyar. Tud. Akad. Mat. Kutató Int. Közl, vol.8, pp.85-108, 1963.

M. Dd, A. Gggggg, P. Iii, and R. Mm, Maintaining stream statistics over sliding windows, SIAM Journal on Computing, vol.31, issue.6, pp.1794-1813, 2002.

J. Dddd and S. Ggggg, Mapreduce : Simpliied data processing on large clusters, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008.

E. D. Ddddddd, A. Llllllooooo, and J. , MMMMM : Frequent estimation of Internet packet streams with limited space, Proceedings of the 11th European Symposium on Algorithms (ESA), 2003.

X. Ddddddddddddd, M. Ss, P. Hhhhhh, and A. Kkkk, The eternal sunshine of the sketch data structure, Computer Networks, vol.52, issue.17, 2008.

D. Ddddd, E. N. Hhhh, and R. V. Rrrrrrr, Self-stabilizing and Byzantine-tolerant Overlay Network, Proceedings of the 11th International conference on Principles of Distributed Systems (OPODIS), pp.343-357, 2007.

J. Ddddddd, The Sybil Attack, Proceedings of the 1rst International Workshop on Peer-to-Peer Systems (IPTPS), pp.251-260, 2002.

P. Dddddddd and A. Rr, Past : A large-scale, persistent peer-to-peer storage utility, Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS), 2001.

M. Dddddd and P. Ffffffff, Log-log counting of large cardinalities, Proceedings of the 11th European Symposium on Algorithms (ESA), 2003.

C. Eee and G. , New directions in traac measurement and accounting : Focusing on the elephants, ignoring the mice, ACM Transactions on Computer Systems, vol.21, issue.3, pp.270-313, 2003.

S. Ffff and E. Ssssss, Self-organizing networks (son) in 3gpp long term evolution. Rapport technique, 2008.

P. Ffffffff, G. Nigel, and M. , Probabilistic counting algorithms for data base applications, Journal of Computer and System Sciences, vol.31, issue.2, pp.182-209, 1985.

D. Ffff and P. Sssssssssss, Dormant Malware Attacks-What's Next ?, RSA Conference, 2012.

M. R. Ggggg and D. S. Jjjjjjj, Computers and Intractability : A Guide to the Theory of NPCompleteness, vol.0716710447, 1979.

B. Ggggg, Partitioning functions for stateful data parallelism in stream processing, The International Journal on Very Large Data Bases (VLDB), vol.23, 2014.

P. B. Ggggggg and S. Tttttttttt, Estimating simple functions on the union of data streams, Proceedings of the 13th ACM Symposium on Parallel Algorithms and Architectures (SPAA), pp.281-291, 2001.

P. B. Ggggggg and S. Tttttttttt, Distributed streams algorithms for sliding windows. Theory of Computing Systems, vol.37, pp.457-478, 2004.

P. B. Ggggggg, S. Sssssss, and I. Ss, Minimizing churn in distributed systems, Proceedings of the 29th ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2006.

L. Ggggg, D. Ddhhhh, E. D. Ddddddd, A. Llllllooooo, and J. , MMMMM : Identifying frequent items in sliding windows over on-line packet streams, Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference (IMC), 2003.

D. M. Gggggg, Ant Encounters : Interaction Networks and Colony Behavior, vol.9781400835447, 2010.

S. Gggg, P. Iii, and A. Mmmmmmmm, Sketching information divergences, Machine Learning, vol.72, pp.5-19, 2008.

S. Gggg, A. Mmgggggg, and S. Vvvvv, Streaming and sublinear approximation of entropy and information distances, Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithms (SODA), pp.733-742, 2006.

V. Gggg, M. Hhhhhhhhhhh, K. Ssssss, and W. , Analysis of join-theshortest-queue routing for web server farms, Proceedings of the 25th IFIP WG 7.3 International Symposium on Computer Modeling, Measurement and Evaluation (PERFORMANCE), 2007.

Z. Hh, K. Y. , and Q. Zzzzz, Randomized algorithms for tracking distributed count, frequencies and ranks, Proceedings of the 31st ACM Symposium on Principles of Database Systems (PODS), 2012.

Y. Hh, S. Bbbbbb, and J. , NN : On load shedding in complex event processing, Proceedings of the 17th International Conference on Database Theory (ICDT), 2014.

M. Hhhhhh, R. Sssss, S. Sssssssss, G. Ggggg, and R. Ggggg, A catalog of stream processing optimizations, ACM Computing Surveys, vol.46, issue.4, 2014.

J. J. Jean, . Zéro-puissance-zéro, and . Quadrature, , vol.66, pp.34-36, 2007.

M. Jjjjjjjj, S. V. , R. Gggggg, A. Kkkkkkkkk, and M. Van-sssss, Gossip-based Peer Sampling, ACM Transaction on Computer System, vol.25, issue.3, 2007.

G. P. Jjjj, A. Mmmmmmmmm, and M. Van-sssss, Secure Peer Sampling, vol.54, pp.2086-2098, 2010.

S. Jjj and D. S. Yyyyy, A covariance analysis model for ddos attack detection, Proceedings of the 4th IEEE International Conference on Communications (ICC), pp.1882-1886, 2004.

D. M. Kkkk, J. Nnnnnn, and D. P. , W : An optimal algorithm for the distinct element problem, Proceedings of the 29th ACM Symposium on Principles of Database Systems (PODS), 2010.

V. Kkkkkkkkkk, D. Gggggg, Z. Kkkkk, and S. Mmmmmmmmmmmmmm, Detecting malicious network traac using inverse distribution of packet contents, Proceedings of the 1st Workshop on Mining Network Data (MineNet), 2005.

D. R. Kkkkkk and M. Rrrr, Simple EEcient Load Balancing Algorithms for Peer-to-Peer, Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004.

R. M. Kkkk, S. Sssssss, and C. H. , P : A simple algorithm for nding frequent elements in streams and bags, ACM Transactions on Database Systems (TODS), vol.28, issue.1, pp.51-55, 2003.

B. Kkkkkkkkkkkkk, S. Sss, Y. Zzzzz, and Y. Cccc, Sketch-based change detection : Methods, evaluation, and applications, Proceedings of the 3rd ACM SIGCOMM Internet Measurement Conference (IMC), pp.234-247, 2003.

S. K. and R. A. Lllllll, On information and suuciency, The Annals of Mathematical Statistics, vol.22, issue.1, pp.79-86, 1951.

A. Lllllll, M. Ccc, and C. Ddd, Mining anomalies using traac feature distributions, Proceedings of the 28th ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2005.

A. Llll, V. Sssss, M. Ooooooo, J. X. , and H. Zzzzz, Data streaming algorithms for estimating entropy of network traac, Proceedings of the 27th joint International conference on Measurement and modeling of computer systems (SIGMETRICS), 2006.

L. Lllllll, The part-time parliament, ACM Transaction on Computer System, vol.16, issue.2, pp.133-169, 1998.

D. Lll, P. Nnnn, and W. Dd, Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks, Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), 2005.

Z. Lll and B. Rrrrrr, V : Continuous distributed counting for non-monotonic streams, Proceedings of the 31st ACM Symposium on Principles of Database Systems (PODS), 2012.

Q. Ll, P. Cc, E. Ccccc, K. Ll, and S. Sssssss, Search and Replication in Unstructured Peer-toPeer Networks, Proceedings of the 15th International Conference on Supercomputing (ICS), pp.84-95, 2002.

C. Lllll, Big data : How do your data grow ?, LLLLL : Distributed Algorithms, vol.455, pp.28-29, 1996.

A. Mmmmmm, V. Ssssssssss, and K. Ddddddddd, OOOO : Finding (recently) frequent items in distributed data streams, Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE), 2005.

V. Mmsssssssssss and K. Cccccc, Big data : A revolution that will transform how we live, work, and think, 2013.

A. Mmmm, D. Et, and A. Ee-aaaaaa, EEcient computation of frequent and top-k elements in data streams, Proceedings of the 10th International Conference on Database Theory (ICDT), 2005.

J. Mmmmm and D. Ggggg, Finding repeated elements, Science of Computer Programming, vol.2, issue.2, pp.143-152, 1982.

M. Tetsuzo, Markov processes and the h-theorem, Journal of the Physical Society of Japan, vol.18, issue.3, pp.328-331, 1963.

S. Mmmmmmmmmmmmm, Data Streams : Algorithms and Applications, 2005.

M. A. Nnnnn, G. D. Francisci, M. , D. Garcia, S. et al., The Power of Both Choices : Practical Load Balancing for Distributed Stream Processing Engines, Proceedings of the 31st IEEE International Conference on Data Engineering (ICDE), 2015.

O. P. , M. N. Ggggg, and A. Ddddddddddddd, Sketch-based querying of distributed sliding-window data streams, VLDB Endowment-Proceedings of the 38st International Conference on Very Large Data Bases (VLDB), vol.5, pp.992-1003, 2012.

F. Ppppppp, L. , K. Dd, S. Kkkkkk, and G. Ii, HDRF : Stream-Based Partitioning for Power-Law Graphs, Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp.243-252, 2015.

P. Fabio, Mining at scale with latent factor models for matrix completion, 2015.

V. P. and Y. E. , II : Estimation of query-result distribution and its application in parallel-join load balancing, Proceedings of the 22th International Conference on Very Large Data Bases (VLDB), pp.448-459, 1996.

W. Rr and V. Rr, Big data analytics in healthcare : promise and potential. Health Information Science and Systems, vol.2, pp.1-10, 2014.

D. Rrrrrr, N. Ttttttt, and N. , A : Context-based design of mobile applications for museums : a survey of existing practices, Proceedings of the 7th ACM International Conference on Human Computer Interaction with Mobile Devices & Services (MobileHCI), pp.153-160, 2005.

S. Rr, P. Fffffff, M. Hhhhhhh, R. Kkkk, and S. Sssssss, A scalable content-addressable network, Proceedings of the 24th ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), 2001.

A. I. Rr and P. Dddddddd, Pastry : Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Proceedings of the 3rd IFIP/ACM International Conference on Distributed Systems Platforms, pp.329-350, 2001.

O. Sssss, S. V. , and A. Ggg, A scalable, eecient and informative approach for anomalybased intrusion detection systems : theory and practice, International Journal of Network Management, vol.20, issue.5, pp.271-293, 2010.

M. A. Ssssss, P. K. Ccccccccccc, A. Llllllllll, and K. Ppppp, Algorithms and metrics for processing multiple heterogeneous continuous queries, ACM Transactions on Database Systems, vol.33, issue.1, 2008.

A. Sssss, T. Nnnn, P. Dddddddd, and D. S. , Eclipse Attacks on Overlay Networks : Threats and Defenses, Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), 2006.

M. Ss, A. Bbbbbbbbbbb, and R. Pss, Modeling human dynamics of face-toface interaction networks, Physical Review Letters, vol.110, pp.168701-168705, 2013.

I. Ss, R. Mmmmmm, D. Llllllnn, D. R. Kkkkkk, M. F. Kkkkkkkk et al., Chord : a Scalable Peer-to-Peer Lookup Protocol for Internet Applications, IEEE/ACM Transaction on Networks, vol.11, issue.1, pp.17-32, 2003.

A. Ss and K. B. Ssssssss, On the estimation of join result sizes, Proceedings of the 4th International Conference on Extending Database Technology : Advances in Database Technology (EDBT), pp.287-300, 1994.

N. T. , U. Çççççççççç, and S. Zzzzzz, Staying t : EEcient load shedding techniques for distributed stream processing, Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB), 2007.

N. T. , U. Çççççççççç, S. Zzzzzz, M. Ccccccc, and M. Ss, Load shedding in a data stream manager, Proceedings of the 29th International Conference on Very Large Data Bases (VLDB), 2003.

L. T. and M. Cccccc, Big data and smart health strategies : ndings from the health information systems perspective, Yearbook of Medical Informatics, vol.9, issue.1, pp.125-127, 2014.

L. V. , F. Cc, D. Llll, and C. Mmmmmmmm, Adaptive partitioning for large-scale dynamic graphs, Proceedings of the 4th Annual Symposium on Cloud Computing (SOCC), vol.35, pp.1-35, 2013.

D. Vvvvvvv, A. C. Mmmmm, M. Zzzz, and S. P. Cccccccccc, Join size estimation subject to lter conditions, VLDB Endowment-Proceedings of the 41st International Conference on Very Large Data Bases (VLDB), vol.8, pp.1530-1541, 2015.

J. V. , M. Ll, and C. Mm, Revealing contact patterns among high-school students using maximal cliques in link streams, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp.1517-1522, 2015.

C. Xxx, L. Y. , W. Ll, and Z. Zzzzz, Distributed power-law graph computing : Theoretical and empirical analysis, Proceedings of the 27th Annual Conference on Neural Information Processing Systems (NIPS), pp.1673-1681, 2014.

N. X. , L. Cccc, and B. Ccc, LogGP : A Log-based Dynamic Graph Partitioning Method. VLDB Endowment-Proceedings of the 40th International Conference on Very Large Data Bases (VLDB), vol.7, pp.1917-1928, 2014.

K. Y. and Q. Zzzzz, Optimal tracking of distributed heavy hitters and quantiles. Algorithmica, vol.65, pp.206-223, 2013.

J. Y. and K. Mmmmm, Monitoring the macroscopic eeect of DDoS ooding attacks, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.4, 2005.

L. Zzzzz and Y. Gg, Variance estimation over sliding windows, Proceedings of the 26h ACM Symposium on Principles of Database Systems (PODS), 2007.

B. Y. Zzz, L. Hh, J. Sssssssss, S. C. Rrrr, A. D. Jjjjjj et al., K : Tapestry : a resilient global-scale overlay for service deployment, IEEE Journal on Selected Areas in Communications, vol.22, issue.1, pp.41-53, 2004.

Q. Zzz, A. Llll, M. Ooooooo, and J. , Global iceberg detection over distributed streams, Proceedings of the 26th IEEE International Conference on Data Engineering (ICDE), 2010.

Q. Zzz, M. Ooooooo, H. W. , and J. , Finding global icebergs over distributed data sets, Proceedings of the 25th ACM Symposium on Principles of Database Systems (PODS), 2006.

A. Sitographie and . Ccccccccc, The 7th ACM International Conference on Distributed Event-Based Systems (DEBS), 2013.

A. A. Ss, The Apache Software Foundation, 2014.

, BBBCCCC : BIG data analytics for unstructured CLINical data, 2016.

J. Accédé-en, DDSSSNN : Plug-based decentralized social network, 2016.

J. Accédé-en, , 2016.

G. Iii, Hype Cycles, 2015.

, INSHARE : Contribution pour l'intégration et le partage des données de santé pour une recherche collaborative, 2016.

I. Ttttttt-aaaaaaa, , 2008.

M. Aaaaa, , 2014.

M. Aaaaa-rrrrrrrr-a, Robust and eecient analytics of massive input streams, 2015.

J. Accédé-en, , 2016.

M. Aaaaa-rrrrrrrr-a, Robust and eecient analytics of large scale distributed streams, 2016.

N. N. Iiiiiiiiii-hhhh, Data Science at NIH : What is Big Data ?, 2015.

S. Nnnn-bbbbbbbbb, , 2015.

, SSSSSPPPP : Cloud social sur des réseaux de plugs, pour un accès à l'information symétrique et respectueux de la vie privée, 2013.

S. S. Sssssssss, , 2013.

T. Ttt, Cooperative Association for Internet Data Analysis, 2008.

T. Caida-ucsd-"ddds-a, Cooperative Association for Internet Data Analysis, 2007.

, En ligne, 2006.

. , Vecteurs de fréquence des jeux de données réelles et estimation de la KL-divergence par l'utilisation de AnKLe

, Courbes de niveaux représentant les matrices de codéviance sur des ux réels, p.60

. , Comparaison entre les métriques Sketch-et les valeurs exactes sur des traces réels

, Evolution de la distance des matrices de dispersion en fonction du temps logique, p.62

. , EEcacité et précision de notre solution

. , Architecture et phases de travail de l'algorithme DKG

, DKG : Consommation CPU (Hertz) pour 300 secondes d'éxécution, p.69

. , Architecture et phases de travail de l'algorithme OSG

, Temps d'exécution global de l'algorithme OSG sur un prototype fonctionnel, p.72

. .. , Performance de l'algorithme LAS sur un prototype fonctionnel

, Liste des tableaux

, Statistiques des 5 jeux de données réels de Internet Traac Archive, p.59, 2008.

. , Empreinte mémoire avec tampons et compteurs de 32 bits

. , Résultats sur des traces réelles avec ? = 0

, Liste des Algorithmes

. , Algorithme d'approximation de la codéviance agrégée

. .. , Algorithme d'approximation d'une métrique Sketch, p.27

. , AnKLe : estimateur de la KL-divergence

, Détection omnisciente d'icebergs avec mémoire bornée, sur un noeud i ? S, p.35

. Count-min, Sketch proposé par Cormode et Muthukrishnan, p.36, 2005.

, Détection non-omnisciente d'icebergs avec mémoire bornée, sur un noeud i ? S, p.37

, PPPPPPPPPPPPP pour l'estimation de fréquences en fenêtre glissante, p.44

. .. , DDDDDDDD pour l'estimation de fréquences en fenêtre glissante, vol.46

. .. Algorithme-d'échantillonnage-sur-un-noeud-correct-i-?-s, , p.52