Остановите войну!
for scientists:
default search action
Stéphane Ubéda
- > Home > Persons > Stéphane Ubéda
Publications
- 2013
- [j16]Wassim Znaidi, Marine Minier, Stéphane Ubéda:
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c31]Ahmad Ahmad-Kassem, Stéphane Grumbach, Stéphane Ubéda:
Messages with implicit destinations as mobile agents. AGERE!@SPLASH 2012: 107-118 - [c30]Ahmad Ahmad-Kassem, Christophe Bobineau, Christine Collet, Etienne Dublé, Stéphane Grumbach, Fuda Ma, Lourdes Martínez, Stéphane Ubéda:
A Data-Centric Approach for Networking Applications. DATA 2012: 147-152 - [c29]Ahmad Ahmad-Kassem, Christophe Bobineau, Christine Collet, Etienne Dublé, Stéphane Grumbach, Fuda Ma, Lourdes Martínez, Stéphane Ubéda:
UBIQUEST, for rapid prototyping of networking applications. IDEAS 2012: 187-192 - 2010
- [j15]Bo Li, Wei Li, Fabrice Valois, Stéphane Ubéda, Hu Zhou, Yi Chen:
Performance Analysis of an Efficient MAC Protocol With Multiple-Step Distributed In-Band Channel Reservation. IEEE Trans. Veh. Technol. 59(1): 368-382 (2010) - 2009
- [j14]Thomas Watteyne, Isabelle Augé-Blum, Mischa Dohler, Stéphane Ubéda, Dominique Barthel:
Centroid virtual coordinates - A novel near-shortest path routing paradigm. Comput. Networks 53(10): 1697-1711 (2009) - [c28]Wassim Znaidi, Marine Minier, Stéphane Ubéda:
Hierarchical node replication attacks detection in wireless sensors networks. PIMRC 2009: 82-86 - [i2]Jacques Saraydaryan, Fatiha Benali, Stéphane Ubéda:
Comprehensive Security Framework for Global Threads Analysis. CoRR abs/0909.2370 (2009) - 2008
- [j13]Katia Jaffrès-Runser, Jean-Marie Gorce, Stéphane Ubéda:
Mono- and multiobjective formulations for the indoor wireless LAN planning problem. Comput. Oper. Res. 35(12): 3885-3901 (2008) - [c27]Fatiha Benali, Stéphane Ubéda, Véronique Legrand:
Automatic classification of security messages based on text categorization. NOTERE 2008: 9:1-9:7 - [c26]Jacques Saraydaryan, Véronique Legrand, Stéphane Ubéda:
Modeling of information system correlated events time dependencies. NOTERE 2008: 37:1-37:6 - [c25]Jacques Saraydaryan, Luc Paffumi, Véronique Legrand, Stéphane Ubéda:
Behavioral Intrusion Detection Indicators. SEC 2008: 317-331 - [c24]Fatiha Benali, Stéphane Ubéda, Véronique Legrand:
Collaborative Approach to Automatic Classification of Heterogeneous Information Security. SECURWARE 2008: 294-299 - 2007
- [c23]Fatiha Benali, Véronique Legrand, Stéphane Ubéda:
An Ontology for the Management of Heteregenous Alerts of Information System. Security and Management 2007: 374-380 - [c22]Samuel Galice, Marine Minier, Stéphane Ubéda:
A trust protocol for community collaboration. IFIPTM 2007: 169-184 - [c21]Jacques Saraydaryan, Véronique Legrand, Stéphane Ubéda:
Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System. SECURWARE 2007: 115-121 - [c20]Pierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda:
Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles. SECURWARE 2007: 193-200 - [c19]Nicolas Fournel, Marine Minier, Stéphane Ubéda:
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. WISTP 2007: 202-214 - 2006
- [j12]Katia Jaffrès-Runser, Jean-Marie Gorce, Stéphane Ubéda:
QoS constrained wireless LAN optimization within a multiobjective framework. IEEE Wirel. Commun. 13(6): 26-33 (2006) - [c18]Samuel Galice, Marine Minier, John Mullins, Stéphane Ubéda:
Cryptographic Protocol to Establish Trusted History of Interactions. ESAS 2006: 136-149 - [c17]Thomas Watteyne, Isabelle Augé-Blum, Stéphane Ubéda:
Dual-mode real-time MAC protocol for wireless sensor networks: a validation/simulation approach. InterSense 2006: 2 - [c16]Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda:
A History-Based Framework to Build Trust Management Systems. SecureComm 2006: 1-7 - [c15]Katia Jaffrès-Runser, Jean-Marie Gorce, Stéphane Ubéda:
Multiobjective QoS-Oriented Planning for Indoor Wireless LANs. VTC Fall 2006: 1-5 - [i1]Samuel Galice, Véronique Legrand, Marine Minier, John Mullins, Stéphane Ubéda:
The KAA project: a trust policy point of view. CoRR abs/cs/0606005 (2006) - 2005
- [j11]Guillaume Chelius, Eric Fleury, Stéphane Ubéda:
Environnement ad hoc et mobilité IP. Un état de l'art. Tech. Sci. Informatiques 24(1): 39-64 (2005) - 2002
- [j10]Alain Bretto, Stéphane Ubéda, Janez Zerovnik:
A polynomial algorithm for the strong Helly property. Inf. Process. Lett. 81(1): 55-57 (2002) - 2001
- [c14]Jean-Marie Gorce, Stéphane Ubéda:
Propagation simulation with the ParFlow method: fast computation using a multi-resolution scheme. VTC Fall 2001: 1603-1607 - [c13]Alain Bretto, Hocine Cherifi, Stéphane Ubéda:
An efficient algorithm for Helly property recognition in a linear hypergraph. IWCIA 2001: 177-187 - 1999
- [j8]Christophe Barberet, Lionel Brunie, Frederic Desprez, Gilles Lebourgeois, Raymond Namyst, Yves Robert, Stéphane Ubéda, Karine Van Heumen:
Technology transfer within the ProHPC TTN at ENS Lyon. Future Gener. Comput. Syst. 15(3): 309-321 (1999) - 1998
- [c12]Christophe Barberet, Lionel Brunie, Frederic Desprez, Gilles Lebourgeois, Yves Robert, Stéphane Ubéda, Karine Van Heumen:
Technology Transfer within the ProHPC TTN at ENS Lyon. HPCN Europe 1998: 3-12 - 1996
- [c10]Alain Bretto, Stéphane Ubéda:
Hypergraph model of digital topology for grey level images. DGCI 1996: 217-226 - [e1]Serge Miguet, Annick Montanvert, Stéphane Ubéda:
Discrete Geometry for Computer Imagery, 6th International Workshop, DCGI'96, Lyon, France, November 13-15, 1996, Proceedings. Lecture Notes in Computer Science 1176, Springer 1996, ISBN 3-540-62005-2 [contents] - 1995
- [c8]Blaise Chamaret, Hocine Cherifi, Stéphane Ubéda:
Parallel Filter Estimation Maximisation Algorithm for Segmentation on a Lan of Workstation. PPSC 1995: 68-69 - 1994
- [c5]Michèle Dion, Marc Gengler, Stéphane Ubéda:
Comparing two Probabilistic Models of the Computational Complexity of the Branch and Bound Algorithm. CONPAR 1994: 359-370 - [c4]Claude G. Diderich, Marc Gengler, Stéphane Ubéda:
An efficient algorithm for solving the token distribution problem on k-ary d-cube networks. ISPAN 1994: 175-182 - 1993
- [j1]Virginie Poty, Stéphane Ubéda:
A Parallel Thinning Algorithm Using K x K Masks. Int. J. Pattern Recognit. Artif. Intell. 7(5): 1183-1202 (1993)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint