Patrick Bellot

According to our database1, Patrick Bellot authored at least 40 papers between 1984 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Towards a Web-of-Things Approach for opc UA Field Device Discovery in the Industrial IoT.
Proceedings of the 18th IEEE International Conference on Factory Communication Systems, 2022

An OPC UA PubSub Implementation Approach for Memory-Constrained Sensor Devices.
Proceedings of the 31st IEEE International Symposium on Industrial Electronics, 2022

A Unified Method to Design Bridges for OPC UA PubSub Networks in the Industrial IoT.
Proceedings of the 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2022

2021
Stack of Services for Context-Aware Systems: An Internet-Of-Things System Design Approach.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021

2020
A configuration tool for MQTT based OPC UA PubSub.
Proceedings of the 2020 RIVF International Conference on Computing and Communication Technologies, 2020

2019
OPC UA PubSub Implementation and Configuration.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

2018
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT.
Comput. Secur., 2018

BCTrust: A decentralized authentication blockchain-based mechanism.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

2017
A lightweight IoT security protocol.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

2015
A Bird's Eye View on Wawacity: Characteristics on Contents and Files.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

2014
Exploring Video Sharing Websites Content with Machine Learning.
Int. J. Distributed Syst. Technol., 2014

Routing in OPC-UA with Rosa Overlay Network.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

2013
Video sharing websites study Content characteristic analysis.
Proceedings of the 2013 IEEE RIVF International Conference on Computing and Communication Technologies, 2013

Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
Advances in information and knowledge systems.
J. Ambient Intell. Humaniz. Comput., 2012

2011
A novel approach to build QKD relaying models.
Secur. Commun. Networks, 2011

2010
Securing a Critical Infrastructure.
Proceedings of the 2010 IEEE RIVF International Conference on Computing & Communication Technologies, 2010

A purpose adjustable overlay network.
Proceedings of the Next Generation Internet (NGI), 2010

2009
How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?.
Int. J. Netw. Secur., 2009

BB84 Implementation and Computer Reality.
Proceedings of the 2009 IEEE International Conference on Computing and Communication Technologies, 2009

ROSA: A step torwards a global virtual network.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
Robust overlay network with Self-Adaptive topology: Protocol description.
Proceedings of the 2008 IEEE International Conference on Research, 2008

Towards the World-Wide Quantum Network.
Proceedings of the Information Security Practice and Experience, 2008

A New Proposal for QKD Relaying Models.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
Towards Quantum Key Distribution System using Homodyne Detection with Differential Time-Multiplexed Reference.
Proceedings of the 2007 IEEE International Conference on Research, 2007

Stochastic routing in large grid-shaped quantum networks.
Proceedings of the 2007 IEEE International Conference on Research, 2007

2006
Enhancement of AGT telecommunication security using quantum cryptography.
Proceedings of the 4th International Confernce on Computer Sciences: Research, 2006

1999
Prolegomena of a Logic of Causality and Dynamism.
Stud Logica, 1999

1998
Logical Synthesis of Imperative O. O. Programs.
Proceedings of the Logic Programming Synthesis and Transformation, 1998

1995
An Overview of MILES and its constraint solving mechanism.
Proceedings of the JFPLC'95, 1995

Explicit Implementation of a Constraint Solving Mechanism in a Relational Programming System.
Proceedings of the 1995 Joint Conference on Declarative Programming, 1995

1988
Proposal for A Natural Formalization of Functional Programming Concepts.
RAIRO Theor. Informatics Appl., 1988

Functions and Relations: The GRAAL System.
Proceedings of the STACS 88, 1988

Unformly Applicative Structures, A Theory of Computability and Polyadic Functions.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1988

1987
A theory for natural modelisation and implementation of functions with variable arity.
Proceedings of the Functional Programming Languages and Computer Architecture, 1987

1986
GRAAL: A Functional Programming System with Uncurryfied Combinators and its Reduction Machine.
Proceedings of the ESOP 86, 1986

1985
A New Proof for Craig's Theorem.
J. Symb. Log., 1985

Streams are not Dreams.
Proceedings of the Combinators and Functional Programming Languages, 1985

High Order Programming in Extended FP.
Proceedings of the Functional Programming Languages and Computer Architecture, 1985

1984
Sémantiques comparées des systeèmes de programmation fonctioneele FP et FFP de J. W. Backus.
Proceedings of the International Symposium on Programming, 1984


  Loading...