Sylvain Martin

According to our database1, Sylvain Martin
  • authored at least 15 papers between 1990 and 2013.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2013
Outbound SPIT filter with optimal performance guarantees.
Computer Networks, 2013

2012
Outbound SPIT Filter with Optimal Performance Guarantees
CoRR, 2012

Contextual Multi-armed Bandits for the Prevention of Spam in VoIP Networks
CoRR, 2012

DISco: a Distributed Information Store for network Challenges and their Outcome
CoRR, 2012

DISco: A distributed information store for network challenges and their outcome.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Contextual multi-armed bandits for web server defense.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention.
Proceedings of the Dependable Networks and Services, 2012

2011
Using decision trees for generating adaptive SPIT signatures.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2009
A practical bytecode interpreter for programmable routers on IXP network processors.
Computer Networks, 2009

2005
Interpreted Active Packets for Ephemeral State Processing Routers.
Proceedings of the Active and Programmable Networks, 2005

An Active Platform as Middleware for Services and Communities Discovery.
Proceedings of the Computational Science, 2005

2003
A Dynamic Neighbourhood Discovery Protocol for Active Overlay Networks.
Proceedings of the Active Networks, IFIP TC6 5th International Workshop, 2003

2002
RADAR: Ring-Based Adaptive Discovery of Active Neighbour Routers.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

1992
SATEXPERT: A knowledge-based system for spacecraft control.
Future Generation Comp. Syst., 1992

1990
Methodology "Minerve Security" - Evaluation Process of Software Security.
Proceedings of the ESORICS 90, 1990


  Loading...