Stéphane Ubéda

According to our database1, Stéphane Ubéda authored at least 49 papers between 1991 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
UBIQUEST, for rapid prototyping of networking applications.
Proceedings of the 16th International Database Engineering & Applications Symposium, 2012

A Data-Centric Approach for Networking Applications.
Proceedings of the DATA 2012, 2012

Messages with implicit destinations as mobile agents.
Proceedings of the 2nd edition on Programming systems, 2012

2010
Performance Analysis of an Efficient MAC Protocol With Multiple-Step Distributed In-Band Channel Reservation.
IEEE Trans. Veh. Technol., 2010

2009
Comprehensive Security Framework for Global Threads Analysis
CoRR, 2009

Centroid virtual coordinates - A novel near-shortest path routing paradigm.
Comput. Networks, 2009

Hierarchical node replication attacks detection in wireless sensors networks.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

2008
Mono- and multiobjective formulations for the indoor wireless LAN planning problem.
Comput. Oper. Res., 2008

Collaborative Approach to Automatic Classification of Heterogeneous Information Security.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Behavioral Intrusion Detection Indicators.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Modeling of information system correlated events time dependencies.
Proceedings of the 8th international conference on New technologies in distributed systems, 2008

Automatic classification of security messages based on text categorization.
Proceedings of the 8th international conference on New technologies in distributed systems, 2008

2007
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection System.
Proceedings of the First International Conference on Emerging Security Information, 2007

Identity-Based Cryptosystems for Enhanced Deployment of OSGi Bundles.
Proceedings of the First International Conference on Emerging Security Information, 2007

A trust protocol for community collaboration.
Proceedings of the Trust Management, 2007

An Ontology for the Management of Heteregenous Alerts of Information System.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
QoS constrained wireless LAN optimization within a multiobjective framework.
IEEE Wirel. Commun., 2006

The KAA project: a trust policy point of view
CoRR, 2006

Multiobjective QoS-Oriented Planning for Indoor Wireless LANs.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

A History-Based Framework to Build Trust Management Systems.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Dual-mode real-time MAC protocol for wireless sensor networks: a validation/simulation approach.
Proceedings of the First International Conference in Integrated Internet Ad Hoc and Sensor Networks, 2006

Cryptographic Protocol to Establish Trusted History of Interactions.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Environnement ad hoc et mobilité IP. Un état de l'art.
Tech. Sci. Informatiques, 2005

2002
A polynomial algorithm for the strong Helly property.
Inf. Process. Lett., 2002

2001
An efficient algorithm for Helly property recognition in a linear hypergraph.
Proceedings of the 8th International Workshop on Combinatorial Image Analysis, 2001

Propagation simulation with the ParFlow method: fast computation using a multi-resolution scheme.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

1999
Computing the Medial Axis Transform in Parallel With Eight Scan Operations.
IEEE Trans. Pattern Anal. Mach. Intell., 1999

Scalable 2D Convex Hull and Triangulation Algorithms for Coarse Grained Multicomputers.
J. Parallel Distributed Comput., 1999

Technology transfer within the ProHPC TTN at ENS Lyon.
Future Gener. Comput. Syst., 1999

<i>d</i>-Dimensional Range Search on Multicomputers.
Algorithmica, 1999

1998
Technology Transfer within the ProHPC TTN at ENS Lyon.
Proceedings of the High-Performance Computing and Networking, 1998

1997
Parallel Tools for Colored Image Progressing.
Int. J. Pattern Recognit. Artif. Intell., 1997

d-Dimensional Range Search on Multicomputers.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

1996
Hypergraph model of digital topology for grey level images.
Proceedings of the Discrete Geometry for Computer Imagery, 1996

1995
Pyramidal thinning algorithm for SIMD parallel machines.
Pattern Recognit., 1995

Scalable 2d convex hull and triangulation algorithms for coarse grained multicomputers.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

Parallel Filter Estimation Maximisation Algorithm for Segmentation on a Lan of Workstation.
Proceedings of the Seventh SIAM Conference on Parallel Processing for Scientific Computing, 1995

Parallel complexity of the medial axis computation.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

1994
Ultra-fast parallel contour tracking, with applications to thinning.
Pattern Recognit., 1994

An efficient algorithm for solving the token distribution problem on k-ary d-cube networks.
Proceedings of the International Symposium on Parallel Architectures, 1994

Comparing two Probabilistic Models of the Computational Complexity of the Branch and Bound Algorithm.
Proceedings of the Parallel Processing: CONPAR 94, 1994

Work-Optimal Thinning Algorithm On SIMD Machines.
Proceedings of the Parallel and Distributed Computing, 1994

1993
A Parallel Thinning Algorithm Using the Bounding Boxes Techniques.
Int. J. Pattern Recognit. Artif. Intell., 1993

A Parallel Thinning Algorithm Using K x K Masks.
Int. J. Pattern Recognit. Artif. Intell., 1993

Ultra-Fast Parallel Contour Tracking and Thinning.
Proceedings of the Parallel Computing: Trends and Applications, 1993

1992
A Multiscale Parallel Thinning Algorithm.
Proceedings of the Parallel Processing: CONPAR 92, 1992

1991
A parallel thinning algorithm using the bounding boxes technique.
Proceedings of the Algorithms and Parallel VLSI Architectures II, 1991


  Loading...