Julien Vayssière

According to our database1, Julien Vayssière authored at least 20 papers between 1998 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2010
A State of the Art Survey of Fraud Detection Technology.
Proceedings of the Insider Threats in Cyber Security, 2010

2009
Rapid development of spreadsheet-based web mashups.
Proceedings of the 18th International Conference on World Wide Web, 2009

An Incremental Knowledge Acquisition Method for Improving Duplicate Invoices Detection.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Privacy-preserving data analytics as an outsourced service.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Data services in your spreadsheet!
Proceedings of the EDBT 2008, 2008

The Service Adaptation Machine.
Proceedings of the ECOWS 2008, 2008

Fraud Detection from a Business Perspective: Future Directions and Challenges.
Proceedings of the Countering Insider Threats, 20.07. - 25.07.2008, 2008

2007
A process-based methodology for designing event-based mobile composite applications.
Data Knowl. Eng., 2007

Privacy-preserving logical vector clocks using secure computation techniques.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

2006
A Model Driven Approach to Agent-Based Service-Oriented Architectures.
Proceedings of the Multiagent System Technologies, 4th German Conference, 2006

2005
Event-Based Coordination of Process-Oriented Composite Applications.
Proceedings of the Business Process Management, 3rd International Conference, 2005

2003
A security framework for reflective Java applications.
Softw. Pract. Exp., 2003

2002
Objets actifs mobiles et communicants.
Tech. Sci. Informatiques, 2002

Interactive and Descriptor-Based Deployment of Object-Oriented Grid Applications.
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC-11 2002), 2002

2001
A Simple Security-Aware MOP for Java.
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001

IC2D: Interactive Control and Debugging of Distribution.
Proceedings of the Large-Scale Scientific Computing, Third International Conference, 2001

Reflections on MOPs, Components, and Java Security.
Proceedings of the ECOOP 2001, 2001

Transparent Dissemination of Adapters in Jini.
Proceedings of the 3rd International Symposium on Distributed Objects and Applications, 2001

2000
Communicating Mobile Active Objects in Java.
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000

1998
Towards Seamless Computing and Metacomputing in Java.
Concurr. Pract. Exp., 1998


  Loading...