• Aucun résultat trouvé

Revues classées

[321] A. Abdel-Razzak, S-E. Elayoubi, and B. El Hassan Tijani Chahed. Dimensioning and profit sharing in hybrid LTE/DVB systems to offer mobile TV services. Accepted for publication, IEEE Transactions on Wireless Communications, 2013.

[322] Hind Castel-Taleband Nihal Pekergin. Strong and weak stochastic bounds for multidimensional Markov chains. International journal of critical computer-based systems (IJCCBS), 2013.

[323] Pascal Bianchi and Jérémie Jakubowicz. Convergence of a multi-agent projected stochastic gradient algorithm for non-convex optimization. IEEE transactions on automatic control, 58(2) :391 – 405, february 2013.

[324] Pascal Bianchi andJakubowicz, Jérémie. Adaptive learning vector quantization for online parametric estimation. IEEE Transactions on Signal Processing, 99, 2013.

[325] Sidonie Lefebvre, Sidonie Allassonniere,Jérémie Jakubowicz, Eric Moulines, and Thomas Lasne. Aircraft classification with a low resolution infrared sensor.Machine vision and applications, 24(1) :175 – 186, january 2013.

[326] Anderson Morais andAna Rosa Cavalli. A distributed and collaborative intrusion detection architecture for wireless mesh networks. Mobile networks and applications, published online, 2013.

[327] Tijani ChahedEiten Altman A Ali, M Panda. Improving the Transport Performance in Delay Tolerant Networks by Random Linear Network Coding and Global Acknowledgments. Ad Hoc Networks Journal, published online, 2013.

[328] Walid Ben-Ameur,Makhlouf Hadji, and Adam Ouorou. Minimum-weight subgraphs with unicyclic components and a lower-bounded girth. Networks, 61(4) :335 – 355, july 2013.

[329] Felipe Lalanne andStephane Maag. A formal data-centric approach for passive testing of communication protocols. ACM/IEEE Transactions on Networking, 21(3) :788 – 801, 2013.

[330] Mateusz Zotkiewicz andWalid Ben-Ameur. Volume-oriented routing and its modifications. Telecom-munication systems, 52(2) :935 – 945, february 2013.

[331] Pramila Mouttappa,Stephane Maag, andAna Rosa Cavalli. Using Passive Testing based on Symbolic Execution and Slicing techniques : Application to the Validation of Communication Protocols. Computer Networks, published online, 2013.

[332] Mohamad Assad, Walid Ben-Ameur, and Faiz Hamid. An interval assignment problem for resource optimization in LTE networks.Electronic notes in discrete mathematics, (41) :237–244, may 2013. INOC’13 : International Network Optimization Conference.

[333] Pierre-Olivier Bauguion, Walid Ben-Ameur, and Eric Gourdin. A new model for multicommodity flow problems, and a strongly polynomial algorithm for single-source maximum concurrent flow. Electronic notes in discrete mathematics, (41) :311–316, may 2013. INOC’13 : International Network Optimization Conference.

[334] Walid Ben-Ameur and Mateusz Zotkiewicz. Multipolar routing : where dynamic and static routing meet. Electronic notes in discrete mathematics, (41) :61–68, may 2013. INOC’13 : International Network Optimization Conference.

[335] Abhik Banerjee,Rachit Agarwal,Vincent Gauthier,Hossam Afifi, Lee Bu Sung, and Yeo Chai Kiat.

A self-organization framework for wireless ad hoc networks as small worlds. IEEE transactions on vehicular technology, 61(6) :2659 – 2673, july 2012.

[336] Iksoon Hwang, Nina Yevtushenko, andAna Rosa Cavalli. Tight bound on the length of distinguishing sequences for non-observable nondeterministic finite-state machines with a polynomial number of inputs and outputs. Information processing letters, 112(7) :298 – 301, march 2012.

[337] Iksoon Hwang,Mounir Lallali,Ana Rosa Cavalli, and Dominique Verchère. Applying formal methods to PCEP : an industrial case study from modeling to test generation. Software testing, verification and reliability (STVR), 22(5) :343 – 361, august 2012.

[338] Franck Iutzeler, Philippe Ciblat, and Jérémie Jakubowicz. Analysis of max-consensus algorithms in wireless channels. IEEE transactions on signal processing, 60(11) :6103 – 6107, november 2012.

[339] Natalia Kushik,Amel Mammar,Ana Rosa Cavalli,Willy Ronald Jimenez Freitez, Edgardo Montes De Oca, and Nina Yevtushenko. A SPIN-based approach for detecting vulnerabilities in C programs.Automatic control and computer sciences, 46(7) :379 – 386, december 2012.

[340] Fatima Mattiello-Francisco, Eliane Martins,Ana Rosa Cavalli, and Edgard Toshiro Yano. InRob : an approach for testing interoperability and robustness of real-time embedded software. Journal of systems and software, 85(1) :3 – 15, january 2012.

[341] Laurent Oudre, Jérémie Jakubowicz, Pascal Bianchi, and Chantal Simon. Classification of periodic activities using the Wasserstein distance. IEEE transactions on biomedical engineering, 59(6) :1610 – 1619, june 2012.

[342] Nahid Shahmehri, Amel Mammar, Edgardo Montes De Oca, Ana Rosa Cavalli, Willy Ronald Ji-menez Freitez, Shanai Ardi, and David Byers. An advanced approach for modeling and detecting software vulnerabilities. Information and software technology, 54(9) :997 – 1013, september 2012.

[343] Amel Mammar,Wissam Mallouli, andAna Rosa Cavalli. A systematic approach to integrate com-mon timed security rules within a TEFSM-based system specification. Information and software technology, 54(1) :87 – 98, january 2012.

[344] Anis Jdidi and Tijani Chahed. Cooperative relaying in OFDMA networks based on the joint use of hierarchical modulation and link adaptation. EURASIP journal on wireless communications and networking, pages 1 – 12, march 2012.

[345] Anis Jdidi,Tijani Chahed, Salah-Eddine Elayoubi, and Hichem Besbes. Modeling the flow-level perfor-mance of hierarchical modulation in OFDMA-based networks. Telecommunication systems, 50(3) :169 – 180, july 2012.

[346] Chadi TarhiniandTijani Chahed. QoS-oriented resource allocation for streaming flows in IEEE802.16e Mobile WiMAX. Telecommunication systems, 51(1) :65 – 71, september 2012.

[347] Hind Castel-Taleb, Lynda Mokdad, and Nihal Pekergin. An algorithm approach to bounding aggrega-tions of multidimensional Markov chains. Theoretical computer science, 452 :12 – 20, september 2012.

[348] Hind Castel-Taleb, Idriss Ismael Aouled, and Nihal Pekergin. Bounding aggregations for transient and stationary performance analysis of subnetworks. The computer journal, 55(5) :564 – 576, may 2012.

[349] John Paul Gibson and Isabelle Perseil. Introduction to UML and formal methods. ACM SIGSOFT software engineering notes, 37(4) :32 – 33, july 2012.

[350] José Neto. A simple finite cutting plane algorithm for integer programs. Operations research letters, 40 :578 – 580, november 2012.

[351] Jérémie Jakubowicz, Sidonie Lefebvre,Florian Maire, and Eric Moulines. Detecting aircraft with a low-resolution infrared sensor. IEEE transactions on image processing, 21(6) :3034 – 3041, june 2012.

[352] Louai Saker, Salah-Eddine Elayoubi, Richard Combes, and Tijani Chahed. Optimal control of wake up mechanisms of femtocells in heterogeneous networks. IEEE journal on selected areas in communications, 30(3) :664 – 672, april 2012.

[353] Rachit Agarwal, Abhik Banerjee, Vincent Gauthier, Chai Kiat Yeo, Bu Sung Lee, and Monique Becker. Achieving small-world properties using bio-inspired techniques in wireless networks. The computer journal, 55(8) :909 – 931, august 2012.

[354] Walid Ben-Ameurand Mohamed Didi Biha. On the minimum cut separator problem.Networks, 59(1) :30 – 36, january 2012.

[355] Walid Ben-Ameur, Michal Pioro, and Mateusz Zotkiewicz. Fractional routing using pairs of failure-disjoint paths. Discrete applied mathematics, published online, 2012.

[356] Walid Ben-Ameur andJosé Neto. A gradient-based randomised heuristic for the maximum cut pro-blem. International journal of mathematics in operational research (IJMOR), 4(3) :276 – 293, 2012.

[357] Aline Carneiro Viana, Stephane Maag, and Fatiha Zaidi. One step forward : linking wireless self-organising networks validation techniques with formal testing approaches.ACM computing surveys, 43(2) :7 :1 – 7 :36, january 2011.

[358] Ines Houidi, Wajdi Louati,Walid Ben-Ameur, and Djamal Zeghlache. Virtual network provisioning across multiple substrate networks. Computer networks - The international journal of computer and telecom-munications networking, 55(4) :1011 – 1023, march 2011.

[359] Isabelle Perseil and John Paul Gibson. Introduction to special issue : papers from UML&FM’2011.

Innovations in systems and software engineering (ISSE), 7(4) :225 – 226, december 2011.

[360] Anis Jdidi andTijani Chahed. Flow-level performance of proportional fairness with hierarchical mo-dulation in OFDMA-based networks. Computer networks - The international journal of computer and tele-communications networking, 55(8) :1784 – 1793, june 2011.

[361] John Paul Gibson, Eric Lallet, and Jean-Luc Raffy. Formal object-oriented development of a voting system test oracle. Innovations in systems and software engineering (ISSE), 7(4) :237 – 245, december 2011.

[362] José Neto. From equipartition to uniform cut polytopes : extended polyhedral results. Discrete mathe-matics, 311(8 & 9) :705 – 714, may 2011.

[363] Walid Ben-Ameurand Mateusz Zotkiewicz. Robust routing and optimal partitioning of a traffic demand polytope. International transactions in operational research, 18(3) :307 – 333, may 2011.

[364] Walid Ben-Ameur and José Neto. A polynomial-time recursive algorithm for some unconstrained quadratic optimization problems. Discrete applied mathematics, 159(16) :1689 – 1698, september 2011.

[365] Walid Ben-Ameur and José Neto. Spectral bounds for unconstrained (-1,1)-quadratic optimization problems. European journal of operational research, 207(1) :15 – 24, november 2010.

[366] Muhammed Ali Aydin,Tülin Atmaca, Özgür Can Turna, Thaere Eido, and Abdul Halim Zaim. A performance comparison of OPS with variable-size packets and OBS.Optical switching and networking (OSN), 7(2) :85 – 94, april 2010.

[367] Rita Dorofeeva, Khaled El-Fakhi, Stephane Maag, Nina Yevtushenko, and Ana Rosa Cavalli. FSM-based conformance testing methods : a survey annotated with experimental evaluation. Information and software technology, 52(12) :1286 – 1297, december 2010.

[368] Iksoon Hwang andAna Rosa Cavalli. Testing a probabilistic FSM using interval estimation. Computer networks - The international journal of computer and telecommunications networking, 54(7) :1108 – 1125, may 2010.

[369] Mateusz Zotkiewicz,Walid Ben-Ameur, and Michal Pioro. Finding failure-disjoint paths for path diver-sity protection in communication networks. IEEE communications letters, 14(8) :776 – 778, august 2010.

[370] Hind Castel-Taleb, Mohamad Chaitou, and Gérard Hebuterne. Optical MAN ring performance with traffic aggregations. Computer communications, 33(Supplément 1) :S122 – S129, november 2010.

[371] Pierre Delannoy, Hai Dang Nguyen,Michel Marot,Monique Becker, and Nazim Agoulmine. WiMax quality-of-service estimations and measurement. Computer communications, 33(Supplément 1) :S71 – S77, november 2010.

[372] Viet Hung NguyenandTülin Atmaca. Metropolitan optical packet bus-based networks : packet burs-ting and emulation of TDM services . Computer communications, 33(Supplément 1) :S110 – S121, november 2010.

[373] Walid Ben-AmeurandMakhlouf Hadji. Designing Steiner networks with unicyclic connected compo-nents : an easy problem. SIAM journal on discrete mathematics, 24(4) :1541 – 1557, november 2010.

[374] Mateusz Zotkiewicz,Walid Ben-Ameur, and Michal Pioro. Failure disjoint paths. Electronic notes in discrete mathematics, 36(1) :1105 – 1112, august 2010. ISCO 2010 - International Symposium on Combinatorial Optimization.

[375] Walid Ben-Ameurand Mohamed Didi Biha. Algorithms and formulations for the minimum cut separator problem. Electronic notes in discrete mathematics, 36(1) :977 – 983, august 2010. ISCO 2010 - International Symposium on Combinatorial Optimization.

[376] Walid Ben-Ameurand Mateusz Zotkiewicz. Polynomial traffic demand polytope partitioning.Electronic notes in discrete mathematics, 36(1) :1113 – 1120, august 2010. ISCO 2010 - International Symposium on Combinatorial Optimization.

[377] Walid Ben-Ameur and Makhlouf Hadji. Steiner Networks with unicyclic connected components.

Electronic notes in discrete mathematics, 36(1) :969 – 976, august 2010. ISCO 2010 - International Symposium on Combinatorial Optimization.

[378] Walid Ben-Ameur, Makhlouf Hadji, and Adam Ouorou. Networks with unicyclic connected compo-nents and without short cycles.Electronic notes in discrete mathematics, 36(1) :961 – 968, august 2010. ISCO 2010 - International Symposium on Combinatorial Optimization.

[379] Amel Mammar. A systematic approach to generate B preconditions : application to the database domain.

Software and systems modeling, 8(3) :385 – 401, july 2009.

[380] John Paul Gibson. Software reuse and plagiarism : a code of practice. ACM SIGCSE bulletin, 41(3) :55 – 59, september 2009.

[381] Jalel Ben Othman, Hind Castel-Taleb, and Lynda Mokdad. A service MAC protocol in a multi-channel CSMA/CA for IEEE 802.11 networks. Journal of communications and networks, 10(3) :287 – 296, september 2008.

[382] Lynda Mokdad and Hind Castel-Taleb. Stochastic comparisons : a methodology for the performance evaluation of fixed and mobile networks . Computer communications, 31(17) :3894 – 3904, november 2008.

[383] Stephane Maag, Cyril Grepet, andAna Rosa Cavalli. A formal validation methodology for MANET routing protocols based on nodes’ self similarity. Computer communications, 31(4) :827 – 841, march 2008.

[384] Tijani Chahed, Eitan Altman, and Salah-Eddine Elayoubi. Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems.Performance evaluation, 65(11-12) :869 – 882, november 2008.

[385] Walid Ben-AmeurandJosé Neto. A geometric characterization of "optimality-equivalent" relaxations.

Journal of global optimization, 42(4) :533 – 547, december 2008.

[386] Walid Ben-AmeurandJosé Neto. Spectral bounds for the maximum cut problem. Networks, 52(1) :8 – 13, august 2008.

Revues non classées

[387] Anderson Morais, Iksoon Hwang, andAna Rosa Cavalli. Generating attack scenarios for the system security validation. Networking science, ON LINE FIRST SINCE DECEMBER 2012 :1 – 12, 2013.

[388] Anderson Morais, Ana Rosa Cavalli, and Eliane Martins. Génération de scripts d’attaque pour la validation de la sécurité.Génie logiciel, (94) :39 – 44, mai 2010. Congrès Inforsid. Atelier "Sécurité des Systèmes d’Information et des Environnements Collaboratifs (SEC-SY)", Marseille , FRANCE.

[389] Cherif Diallo, Michel Marot, and Monique Becker. Efficiency benefits through load-balancing with link reliability based routing in WSNs. International journal on advances in networks and services, 3(3 &

4) :430 – 446, 2010.

[390] Michel Marot and Vincent Gauthier. Reducing collision probability on a shared medium using a variational method. ACM SIGMETRICS performance evaluation review, 38(2) :42 – 44, september 2010.

[391] Jalel Ben Othman,Hind Castel-Taleb, and Lynda Mokdad. Performance evaluation of mobile networks based on stochastic ordering Markov chains. Studia informatica universalis, 6(3) :313 – 329, 2008.

[392] Damien Woods andJohn Paul Gibson. Lower bounds on the computational power of an optical model of computation. Natural computing, 7(1) :95 – 108, march 2008.

[393] Amel Mammarand Régine Laleau. Implémentation JAVA d’une spécification B : Application aux bases de données. Technique et science informatiques, 27(5) :537 – 570, mai 2008.

Conférences classées

[394] Farah Ait Salaht, Jean-Michel Fourneau,Hind Castel-Taleb, and Nihal Pekergin. A bounding histogram approach for network performance analysis. In IEEE Computer Society, editor, HPCC´13 : The 15th IEEE International Conference on High Performance Computing and Communications, 2013.

[395] Sanogo Cheick,Tijani Chahed, and Salah-Eddine Elayoubi. Modeling user impatience and its impact on impact on performance in mobile networks. In IEEE, editor, PIMRC´13 : 24th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2013.

[396] Glenda Gonzalez andTülin Atmaca. An integrated bandwidth allocation for energy saving in fixed-mobile networks. In IEEE, editor, CAMAD´13 : 18th IEEE International Workshop on Computer Aided Modeling Analysis and Design of Communication Links and Networks, 2013.

[397] Olga Kondratyeva, Natalia Kushik, Ana Rosa Cavalli, and Nina Yevtushenko. Finite state models for evaluating web service quality : a short study. In IEEE, editor,QSIC´13 : The 13th International Conference on Quality Software, 2013.

[398] Olga Kondratyeva, Natalia Kushik,Ana Rosa Cavalli, and Nina Yevtushenko. Evaluating Web service quality using finite state models. In IEEE Computer Society, editor, QSIC´13 : The 13th International Conference on Quality Software, 2013.

[399] Julio Cesar Louzada Pinto, Tijani Chahed, Eitan Altman, and Tamer Basar. Dissemination and com-petition between contents in lossy susceptible infected susceptible (SIS) social networks. InCDC´13 : 52nd IEEE Conference on Decision and Control, 2013.

[400] Julio Cesar Louzada Pinto,Tijani Chahed, andJérémie Jakubowicz. A stochastic opinion dynamics model with multiple contents. In CDC´13 : 52nd IEEE Conference on Decision and Control, 2013.

[401] Felipe Lalanne Rojasand Stephane Maag. DataMonitor : a formal approach for passively testing a MANET routing protocol. In IEEE, editor, IWCMC´13 : The 9th IEEE International Wireless Communica-tions & Mobile Computing Conference, pages 207 – 212, 2013.

[402] Pramila Mouttappa,Stephane Maag, andAna Rosa Cavalli. Monitoring based on IOSTS for testing functional and security properties : application to an automotive case study. In COMPSAC´13 : The 37th Annual International Computer Software & Applications Conference, 2013.

[403] Walid Ben-Ameur, Pascal Bianchi, and Jérémie Jakubowicz. A total variation based approach for robust consensus in distributed networks. InCDC´13 : 52nd IEEE Conference on Decision and Control, 2013.

[404] Xiaoping Che and Stephane Maag. A formal passive performance testing approach for distributed communication systems. In ScitePress, editor, ENASE´13 : 8th International Conference on Evaluation of Novel Approaches to Software Engineering, 2013. Held in conjunction with ICEIS ´13. Best Student Paper Award.

[405] Salah-Eddine Elayoubi,Saker, Louai, andChahed, Tijani. Optimal control for base station sleep mode in energy efficient radio access networks. In IEEE, editor,INFOCOM’11 : Mini-Conference, pages 106 – 110, 2011. Part of the 30th IEEE International Conference on Computer Communications.

[406] Chao Chen,Daqing Zhang, Zhi-Hua Zhou,Tülin Atmaca, Shijian Li, and Nan Li. B-Planner : night bus route planning using large-scale taxi GPS traces. In IEEE, editor, PerCom’13 : IEEE International Conference on Pervasive Computing and Communications, 2013.

[407] Amal Abdel-Razzak, Salah-Eddine Elayoubi,Tijani Chahed, and Bachar El Hassan. Impact of LTE and DVB-NGH cooperation on QoS of mobile TV users. In IEEE, editor,ICC’13 : IEEE International Conference on Communications, 2013.

[408] Stéphan Clemencon and Jérémie Jakubowicz. Scoring anomalies : a M-estimation formulation. In Microtome Publishing, editor,AISTATS’13 : Sixteenth international conference on Artificial Intelligence and Statistics, volume 31, pages 659 – 667, 2013. Journal of Machine Learning Research Workshop and Conference Proceedings (JMLR W&CP).

[409] Ahmed Soua,Walid Ben-Ameur, andHossam Afifi. Beamforming-based broadcast scheme for mul-tihop wireless networks with transmission range adjustment. In IEEE, editor,WONS’13 : The 10th Annual Conference on Wireless On-Demand Network Systems and Services, volume 1, pages 212 – 215, 2013.

[410] Jeevan Pokhrel, Bachar Wehbi, Morais Anderson, Eric Allilaire, and Ana Rosa Cavalli. Estimation of QoE of video traffic using a fuzzy expert system . In IEEE, editor, CCNC’13 : The 10th Annual IEEE Consumer Communications and Networking Conference, pages 224 – 229, 2013.

[411] Tülin Atmaca, Tadeusz Czachórski, Krzysztof Grochla, Ferhan Pekergin, and Tomasz Nycz. A model of boot-up storm dynamics. In Springer, editor, ISCIS’12 : 27th International Symposium on Computer and Information Sciences, pages 371 – 379, London ;Heidelberg ;New-York [etc.], 2013.

[412] Mouna Abdelmoumen, Ines Arfaoui, Mounir Frikha, andTijani Chahed. On the Performance of MANETs under different mobility patterns and routing protocols and its improvement based on fixed relay nodes. In IEEE, editor, NTMS’12 : 5th IFIP International Conference on New Technologies, Mobility and Security, pages 1 – 5, 2012.

[413] Andrés, César and Ana Rosa Cavalli. How to reduce the cost of passive testing. In IEEE, editor, HASE’12 : 14th IEEE International High-Assurance Systems Engineering symposium, pages 209 – 216, 2012.

[414] Mazen El Maarabani, César Andrés, andAna Rosa Cavalli. Testing interoperability security policies.

In Knowledge Systems Institute Graduate School, editor,SEKE’12 : The 24th International Conference on Software Engineering and Knowledge Engineering, pages 464 – 469, 2012.

[415] Marc Frappier andMammar, Amel. Proving non-interference on reachability properties : a refinement approach. In IEEE, editor,APSEC’11 : 18th Asia Pacific Software Engineering Conference, pages 25 – 32, 2011.

[416] Marc Frappier andAmel Mammar. An assertions-based approach to verifying the absence property pat-tern. In IEEE, editor,ISSRE’12 : 23rd IEEE International Symposium on Software Reliability Engineering, pages 361 – 370, 2012.

[417] Mohammad Gharaei, Mounia Lourdiane, and Hind Castel-Taleb. A robust buffer management and packet scheduling algorithm with QoS in an optical ingress node. In Photonics North 2012, pages 151 –, 2012.

[418] Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Frédéric Cuppens, Ana Rosa Cavalli, Amel Mammar, Gouenou Coatrieux, and Hanieh Azkia. Using requirements engineering in an automatic security policy derivation process. In Springer, editor,SETOP’11 : 4th International Workshop on Autonomous and Spontaneous Security, volume 7122/2012, pages 155 – 172, Heidelberg ;Dordrecht ;London [etc.], 2012. In conjunction with DPM ’11 : Data Privacy Management 6th International Workshop. Collection : Lecture Notes in Computer Science.

[419] Franck Iutzeler, Philippe Ciblat, Walid Hachem, andJérémie Jakubowicz. New broadcast based distri-buted averaging algorithm over wireless sensor networks. In IEEE, editor, ICASSP’12 : IEEE International Conference on Acoustics, Speech and Signal Processing, pages 3117 – 3120, 2012. Poster.

[420] Gemma Morral, Pascal Bianchi, Gersende Fort, and Jérémie Jakubowicz. Distributed stochastic ap-proximation : the price of non-double stochasticity. In IEEE, editor, ASILOMAR’12 : IEEE Fourthy Six Asilomar Conference on Signals, Systems, and Computers, pages 1473 – 1477, 2012.

[421] Gemma Morral, Pascal Bianchi, and Jérémie Jakubowicz. Asynchronous distributed principal com-ponent analysis using stochastic approximation. In IEEE, editor,CDC’12 : 51st IEEE Conference on Decision and Control, pages 1398 – 1403, 2012.

[422] Khalifa Toumi, César Andrés, andAna Rosa Cavalli. Trust-OrBAC : a trust access control model in multi-organization environments. In Springer, editor,ICISS’12 : 8th International Conference on Information Systems Security, volume 7671, pages 89 – 103, Heidelberg ;Dordrecht ;London [etc.], 2012. Collection : Lecture Notes in Computer Science.

[423] Khalifa Toumi, César Andrés, Ana Rosa Cavalli, and Mazen El Maarabani. A vector based model approach for defining trust in multi-organization environments. In IEEE, editor,CRiSIS’12 : 7th International Conference on Risks and Security of Internet and Systems, pages 1 – 8, 2012.

[424] Yang Yuan, Kejian Miao,Daqing Zhang,Chao Chen, andLin Sun. An OSGi-based smart taxi service platform. In IEEE, editor,APSCC’12 : The IEEE Asia-Pacific Services Computing Conference, pages 173 – 178, 2012.

[425] Ahmed Soua,Walid Ben-Ameur, andHossam Afifi. Analysis of information relay processing in Inter-vehicle communication : a novel visit . In IEEE, editor,WiMob’12 : The 8th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pages 157 – 164, 2012.

[426] Amel Mammar, Marc Frappier, and Raphael Chane-Yack-Fa. Proving the absence property pattern using the B method. In IEEE, editor, HASE’12 : 14th IEEE International High Assurance Systems Engineering Symposium, pages 167 – 170, 2012.

[427] Anderson MoraisandAna Rosa Cavalli. A distributed intrusion detection scheme for wireless ad hoc networks. In ACM, editor,SAC’12 : The 27th Annual ACM Symposium on Applied Computing, pages 556 – 562, New-York, 2012.

[428] Arshad Ali, Eitan Altman, Tijani Chahed, Manoj Panda, Lucile Sassatelli, and Dieter Fiems. Es-timating file-spread in delay tolerant networks under two-hop routing. In Springer, editor, NETWOR-KING’12 : 11th International IFIP TC 6 Networking Conference, volume 7290, pages 277 – 290, Heidel-berg ;Dordrecht ;London [etc.], 2012. Collection : Lecture Notes in Computer Science.

[429] Felipe Lalanne Rojas,Ana Rosa Cavalli, andStephane Maag. Quality of experience as a selection criterion for web services. In IEEE, editor, SITIS’12 : The 8th International Conference on Signal-Image Technology & Internet Systems, pages 519 – 526, 2012.

[430] Idriss Ismael AouledandHind Castel-Taleb. Combined CAC and forced handoff for mobile network performability. In Springer, editor,ASMTA’12 : 19th International Conference on Analytic and Stochastic Modelling Techniques and Applications, volume 7314, pages 76 – 90, Heidelberg ;Dordrecht ;London [etc.], 2012. Collection : Lecture Notes in Computer Science.

[431] John Paul Gibson. Teaching graph algorithms to children of all ages. In ACM, editor,ITiCSE’12 : 17th

[431] John Paul Gibson. Teaching graph algorithms to children of all ages. In ACM, editor,ITiCSE’12 : 17th