


default search action
CFIP/NOTERE 2015: Paris, France
- International Conference on Protocol Engineering, ICPE 2015, and International Conference on New Technologies of Distributed Systems, NTDS 2015 [CFIP (Colloque francophone sur l'ingénierie des protocoles) / NOTERE (Nouvelles Technologies de la Répartition)], Paris, France, July 22-24, 2015. IEEE 2015, ISBN 978-1-4673-9265-5

Communication protocols and services engineering
- Dramane Ouattara, Mohamed Aymen Chalouf, Martin Peres, Francine Krief:

Signaling and QoS control in resilient cognitive radio networks. 1-6 - Titouan Coladon, Malisa Vucinic

, Bernard Tourancheau:
Improving trickle fairness: Locally-calculated redundancy constants. 1-6 - Nabil Mesbahi, Hamza Dahmouni

:
An efficient algorithm for traffic flow optimization in MPLS networks. 1-6
Privacy, trust and security of distributed systems
- Katarzyna Kapusta, Gérard Memmi:

Data protection by means of fragmentation in distributed storage systems. 1-8 - Bacem Mbarek

, Aref Meddeb
, Wafa Ben Jaballah, Mohamed Mosbah
:
Enhanced LEAP authentication delay for higher immunity against DoS attack. 1-6 - Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens:

Dynamic deployment of access and usage control policies using aspects. 1-6
SDN and security
- Armel Francklin Simo Tegueu, Pascal Berthou

, Slim Abdellatif, Thierry Villemur, Faten Mkacher:
DDSa and SDNb in symbiosis for dynamic applications. 1-6 - Zakarya Drias, Ahmed Serhrouchni, Olivier Vogel:

Taxonomy of attacks on industrial control protocols. 1-6 - Olivier Flauzac, Carlos Gonzalez, Florent Nolot

:
Original secure architecture for IoT based on SDN. 1-6 - Emad Abd-Elrahman

, Hatem Ibn-Khedher, Hossam Afifi:
D2D group communications security. 1-6
Service-oriented architectures, web services, peer to peer
- Imane Mnie-Filali, Soufiane Rouibia, Dino Lopez Pacheco, Guillaume Urvoy-Keller:

Toward a collaborative management of a P2P distribution protocol: Local vision vs. global vision. 1-7 - Gérôme Bovet, Antonio Ridi, Jean Hennebert:

Machine learning with the internet of virtual things. 1-8 - Soufiane Rouibia, Benoît Parrein

:
P2PWeb-Live: A client/server and P2P hybrid protocol for IPTV delivery. 1-6
Distributed system and security
- Michel Simatic, Arthur Foltz, Damien Graux

, Nicolas Hascoët, Stephanie Ouillon, Nathan Reboud, Tiezhen Wang:
TRAINS: A throughput-efficient uniform total order broadcast algorithm. 1-8 - Sahar Smaali

, Aicha Choutri, Faiza Belala:
K-based definition of Real Time Distributed Systems: from a meta-model to maude modules. 1-6 - Bouchra Aadil, Abderrahim Ait Wakrime

, Larbi Kzaz, Abderrahim Sekkaki:
Ontological approach for Data WareHouse design. 1-7 - Shuopeng Li, Mohand Yazid Saidi, Ken Chen:

Survivable Virtual Network Embedding with resource sharing and optimization. 1-6
Mobile networks, routing, web services
- Vincent Autefage

, Serge Chaumette, Damien Magoni
:
Distributed collaborative system for heterogeneous swarms of autonomous mobile robots. 1-7 - Boubakeur Moussaoui, Soufiene Djahel

, Hakima Khelifi
, Salah Merniz:
Towards enhanced reactive routing in urban Vehicular Ad hoc Networks. 1-6 - Zohra Saoud, Noura Faci, Zakaria Maamar

, Djamal Benslimane:
Impact of Sybil attacks on Web services trust assessment. 1-6
Sensor networks, ad hoc networks, the Internet of Things
- Roudy Dagher, Nathalie Mitton:

ASAP: A passive single-anchor localization technique for wireless sensor networks. 1-6 - Mohammadmajid Hormati, Fatna Belqasmi

, Ferhat Khendek
, Roch H. Glitho
:
Overlay interconnection for end-user applications and wireless sensor networks in MANETs. 1-6 - Mohamad Jaafar Ali

, Hassine Moungla, Ahmed Mehaoua:
Dynamic channel access scheme for interference mitigation in relay-assisted intra-WBANs. 1-6
Vehicular Networks, ICN, Peer to Peer, Resource Sharing
- Mourad Amad

, Ahmed Meddahi, Gilles Vanwormhoudt:
A self-adaptive ALM architecture for P2P media streaming. 1-6 - Lilia Idir, Stefano Paris, Farid Naït-Abdesselam:

Optimal data placement to improve data dissemination in vehicular networks. 1-6 - Junaid Ahmed Khan

, Yacine Ghamri-Doudane, Ali El Masri:
Towards the ranking of important smart vehicles in VANETs - An information-centric approach. 1-6 - Safa Hamdoun, Abderrezak Rachedi

, Yacine Ghamri-Doudane:
Radio resource sharing for MTC in LTE-A: An approach based on the bipartite graph. 1-6
Posters session
- Rachida Boucebsi, Faïza Belala:

Towards BRS based model for Wireless Mesh Networks. 1-6 - Nezo Ibrahim Fofana, Adrien van den Bossche, Rejane Dalce, Thierry Val:

Prototyping and performance analysis of a ranging system for localization by UWB. 1-6 - Mayssa Jemel, Ahmed Serhrouchni:

Toward user's devices collaboration to distribute securely the client side storage. 1-6 - Samih Souissi:

A novel response-oriented attack classification. 1-6 - Pascal Urso, Jordi Martori:

Probabilistic latency for partial ordering. 1-8 - Hichem Sedjelmaci, Tarek Bouali, Mohamed Ayoub Messous

, Sidi Mohammed Senouci
:
How to prevent cyber-attacks in inter-vehicle communication network? 1-6 - Hajer Bargaoui, Nader Mbarek, Olivier Togni, Mounir Frikha

:
IMRR and IMPR routing protocols for inter and intra wireless mesh Communications. 1-6 - Rim Ben Messaoud, Yacine Ghamri-Doudane:

QEMSS: A selection scheme for participatory sensing tasks. 1-6 - Awatef Hicheur Cairns, Billel Gueni, Hind Hafdi, Christian Joubert, Nasser Khelifa:

Towards a distributed computation platform tailored for educational process discovery and analysis. 1-8 - Benoit Charroux

, Layth Sliman
, Yvan Stroppa, Nistor Grozavu:
Compose: A Domain Specific Language for scientific code computation. 1-4 - Chiraz Trabelsi, Nicolas Gouvy, Kahina Hassam:

Collaborative computing in heterogeneous wireless sensor networks. 1-6 - Samira Chouikhi, Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane:

Connectivity Restoration in Multi-Channel Wireless Sensor Networks. 1-6 - Medina Hadjem, Farid Naït-Abdesselam:

A comparative study of supervised learning techniques for ECG T-wave anomalies detection in a WBS context. 1-6 - Salaheddine Hamadi, Khalil Blaiech, Omar Cherkaoui:

Semantic-based forwarding model for network devices. 1-7 - Mohamed Amine Madani, Mohammed Erradi:

How to secure a collaborative session in a single tenant environment. 1-6 - Ilyass El Kassmi

, Zahi Jarir
:
An approach to weave seamlessly non-functional requirements with functional requirements in Web Service composition. 1-6 - Manel Khelifi

, Ilham Benyahia, Samira Moussaoui, Farid Naït-Abdesselam:
An overview of localization algorithms in mobile wireless sensor networks. 1-6 - Laaziz Lahlou, Amira Meharouech, Jocelyne Elias, Ahmed Mehaoua:

MAC-network cross-layer energy optimization model for Wireless Body Area Networks. 1-5 - Antoine Feghali, Rima Kilany

, Maroun Chamoun:
SDN security problems and solutions analysis. 1-5 - Marion Vasseur, Rida Khatoun, Ahmed Serhrouchni:

Survey on packet marking fields and information for IP traceback. 1-8 - Fouad Amine Guenane:

Network security management using a novel firewall Cloud-based service. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














