The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pascal Bouvry: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marcin Seredynski, Pascal Bouvry
    Block Encryption Using Reversible Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ACRI, 2004, pp:785-792 [Conf]
  2. Pascal Bouvry, Farhad Arbab
    VISIFOLD: A Visual Environment for a Coordination Language. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 1996, pp:403-406 [Conf]
  3. Franciszek Seredynski, Pascal Bouvry, Farhad Arbab
    Parallel Evolutionary Computation: Multi Agents Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    Euro-PDS, 1997, pp:293-298 [Conf]
  4. Pascal Bouvry, Jacques Chassin de Kergommeaux, Denis Trystram
    Efficient Solutions for Mapping Parallel Programs. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 1995, pp:379-390 [Conf]
  5. Francisco Luna, Antonio J. Nebro, Bernabé Dorronsoro, Enrique Alba, Pascal Bouvry, Luc Hogie
    Optimal Broadcasting in Metropolitan MANETs Using Multiobjective Scatter Search. [Citation Graph (0, 0)][DBLP]
    EvoWorkshops, 2006, pp:255-266 [Conf]
  6. Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry
    Immune anomaly detection enhanced with evolutionary paradigms. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:119-126 [Conf]
  7. Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya
    Cellular Programming and Symmetric Key Cryptography Systems. [Citation Graph (0, 0)][DBLP]
    GECCO, 2003, pp:1369-1381 [Conf]
  8. Grégoire Danoy, Pascal Bouvry, Tomy Martins
    hLCGA: A Hybrid Competitive Coevolutionary Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    HIS, 2006, pp:48- [Conf]
  9. Luc Hogie, Pascal Bouvry, Marcin Seredynski, Frédéric Guinand
    A Bandwidth-Efficient Broadcasting Protocol for Mobile Multi-hop Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:71- [Conf]
  10. Franciszek Seredynski, Pascal Bouvry, Dawid R. Rutkowski
    Anomaly Detection System for Network Security: Immunitybased Approach. [Citation Graph (0, 0)][DBLP]
    Intelligent Information Systems, 2005, pp:486-490 [Conf]
  11. Franciszek Seredynski, Albert Y. Zomaya, Pascal Bouvry
    Function Optimization with Coevolutionary Algorithms. [Citation Graph (0, 0)][DBLP]
    IIS, 2003, pp:13-22 [Conf]
  12. Marek Pilski, Pascal Bouvry, Franciszek Seredynski
    Modern Metaheuristics for Function Optimization Problem. [Citation Graph (0, 0)][DBLP]
    Intelligent Information Systems, 2005, pp:466-470 [Conf]
  13. Aleksander Wawer, Franciszek Seredynski, Pascal Bouvry
    Application of evolutionary computing to conformational analysis. [Citation Graph (0, 0)][DBLP]
    Intelligent Information Systems, 2004, pp:161-168 [Conf]
  14. Grégoire Danoy, Pascal Bouvry, Franciszek Seredynski
    Agent-Based Optimization of Business Functions Using Coevolutionary Algorithms. [Citation Graph (0, 0)][DBLP]
    IKE, 2004, pp:109-112 [Conf]
  15. Enrique Alba, Bernabé Dorronsoro, Francisco Luna, Antonio J. Nebro, Pascal Bouvry
    A Cellular Multi-Objective Genetic Algorithm for Optimal Broadcasting Strategy in Metropolitan MANETs. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  16. Franciszek Seredynski, Pascal Bouvry
    Some Issues in Solving the Anomaly Detection Problem using Immunological Approach. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  17. Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya
    Secret Key Cryptography with Cellular Automata. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:149- [Conf]
  18. Aleksander Wawer, Franciszek Seredynski, Pascal Bouvry
    Evolutionary Algorithms for Conformational Analysis: Vitamine E Case Study. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  19. Marek Ostaszewski, Franciszek Seredynski, Pascal Bouvry
    A nonself space approach to network anomaly detection. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  20. Pascal Bouvry, Gilbert Klein, Franciszek Seredynski
    Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:910-915 [Conf]
  21. Grégoire Danoy, Pascal Bouvry, Olivier Boissier
    Dafo, a Multi-agent Framework for Decomposable Functions Optimization. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:626-632 [Conf]
  22. Luc Hogie, Frédéric Guinand, Pascal Bouvry
    A Heuristic for Efficient Broadcasting in the Metropolitan Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:727-733 [Conf]
  23. Marcin Seredynski, Krzysztof Pienkosz, Pascal Bouvry
    Reversible Cellular Automata Based Encryption. [Citation Graph (0, 0)][DBLP]
    NPC, 2004, pp:411-418 [Conf]
  24. Franciszek Seredynski, Pascal Bouvry, Farhad Arbab
    Parallel and Distributed Evolutionary Computation with MANIFOLD. [Citation Graph (0, 0)][DBLP]
    PaCT, 1997, pp:94-108 [Conf]
  25. Pascal Bouvry, Franciszek Seredynski, Albert Y. Zomaya
    Application of Cellular Automata for Cryptography. [Citation Graph (0, 0)][DBLP]
    PPAM, 2003, pp:447-454 [Conf]
  26. Luc Hogie, Pascal Bouvry, Frédéric Guinand
    An Overview of MANETs Simulation. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:150, n:1, pp:81-101 [Journal]
  27. Jacek Blazewicz, Pascal Bouvry, Frédéric Guinand, Denis Trystram
    Scheduling Complete Intrees on Two Uniform Processors with Communication Delays. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:58, n:5, pp:255-263 [Journal]
  28. Pascal Bouvry, Farhad Arbab, Franciszek Seredynski
    Distributed Evolutionary Optimization, in Manifold: Rosenbrock's Function Case Study. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2000, v:122, n:2-4, pp:141-159 [Journal]
  29. Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya
    Cellular automata computations and secret key cryptography. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 2004, v:30, n:5-6, pp:753-766 [Journal]
  30. Grégoire Danoy, Enrique Alba, Pascal Bouvry, Matthias R. Brust
    Optimal design of ad hoc injection networks by using genetic algorithms. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:2256- [Conf]
  31. Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Klopotek
    Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-8 [Conf]
  32. Enrique Alba, Bernabé Dorronsoro, Francisco Luna, Antonio J. Nebro, Pascal Bouvry, Luc Hogie
    A cellular multi-objective genetic algorithm for optimal broadcasting strategy in metropolitan MANETs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:685-697 [Journal]
  33. Franciszek Seredynski, Pascal Bouvry
    Anomaly detection in TCP/IP networks using immune systems paradigm. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:740-749 [Journal]
  34. Grégoire Danoy, Pascal Bouvry, Matthias R. Brust, Enrique Alba
    Optimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  35. Performance of a Strategy Based Packets Forwarding in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  36. Trusted Spanning Tree for Delay Tolerant MANETs. [Citation Graph (, )][DBLP]


  37. Denial of service detection and analysis using idiotypic networks paradigm. [Citation Graph (, )][DBLP]


  38. Overcoming partitioning in large ad hoc networks using genetic algorithms. [Citation Graph (, )][DBLP]


  39. Multiobjective classification with moGEP: an application in the network traffic domain. [Citation Graph (, )][DBLP]


  40. Interval island model initialization for permutation-based problems. [Citation Graph (, )][DBLP]


  41. Iterated Local Search for de Novo Genomic Sequencing. [Citation Graph (, )][DBLP]


  42. Recurrent Neural Networks Approach to The Detection of SQL Attacks. [Citation Graph (, )][DBLP]


  43. Decentralized Fault-tolerant Connected Dominating Set Algorithm for Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]


  44. Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm. [Citation Graph (, )][DBLP]


  45. Evolutionary game theoretical analysis of reputation-based packet forwarding in civilian mobile Ad Hoc networks. [Citation Graph (, )][DBLP]


  46. A parallel hybrid genetic algorithm-simulated annealing for solving Q3AP on computational grid. [Citation Graph (, )][DBLP]


  47. Analysis of Distributed Packet Forwarding Strategies in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  48. Tracing SQL Attacks Via Neural Networks. [Citation Graph (, )][DBLP]


  49. Probabilistic Packet Relaying in Wireless Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  50. Weakness Analysis of a Key Stream Generator Based on Cellular Automata. [Citation Graph (, )][DBLP]


  51. Deskilling HPL. [Citation Graph (, )][DBLP]


  52. Differential Evolution Algorithms with Cellular Populations. [Citation Graph (, )][DBLP]


  53. Preventing selfish behavior in Ad Hoc networks. [Citation Graph (, )][DBLP]


  54. Coevolutionary genetic algorithms for Ad hoc injection networks design optimization. [Citation Graph (, )][DBLP]


  55. An approach to intrusion detection by means of idiotypic networks paradigm. [Citation Graph (, )][DBLP]


  56. A self-adaptive cellular memetic algorithm for the DNA fragment assembly problem. [Citation Graph (, )][DBLP]


  57. Towards connectivity improvement in VANETs using bypass links. [Citation Graph (, )][DBLP]


  58. Evolution of cooperation in ad hoc networks under game theoretic model. [Citation Graph (, )][DBLP]


  59. Blackbone2, an efficient deterministic algorithm for creating 2-connected m-dominating set-based backbones in ad hoc networks. [Citation Graph (, )][DBLP]


  60. Transfer Graph Approach for Multimodal Transport Problems. [Citation Graph (, )][DBLP]


  61. A Context-Aware Broadcast Protocol for Mobile Wireless Networks. [Citation Graph (, )][DBLP]


  62. An Efficient Hybrid P2P Approach for Non-redundant Tree Exploration in B&B Algorithms. [Citation Graph (, )][DBLP]


  63. Soft Computing Techniques for Intrusion Detection of SQL-Based Attacks. [Citation Graph (, )][DBLP]


  64. Management challenges for emerging networks and services. [Citation Graph (, )][DBLP]


  65. A study of token traversal strategies on tree-based backbones for mobile ad hoc - delay tolerant networks. [Citation Graph (, )][DBLP]


  66. Enhanced distance based broadcasting protocol with reduced energy consumption. [Citation Graph (, )][DBLP]


  67. A Cellular Genetic Algorithm for scheduling applications and energy-aware communication optimization. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.457secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002