Search the dblp DataBase
Michel Barbeau :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michel Barbeau , Evangelos Kranakis , Danny Krizanc , Pat Morin Improving Distance Based Geographic Location Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2004, pp:197-210 [Conf ] Christine Laurendeau , Michel Barbeau Threats to Security in DSRC/WAVE. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2006, pp:266-279 [Conf ] Michel Barbeau , Gregor von Bochmann A Subset of Lotos with the Computational Power of Place/Transition-Nets. [Citation Graph (0, 0)][DBLP ] Application and Theory of Petri Nets, 1993, pp:49-68 [Conf ] Mbi Makungu , Michel Barbeau The contract approach illustrated with a distributed routing protocol. [Citation Graph (0, 0)][DBLP ] CASCON, 1994, pp:42- [Conf ] Michel Barbeau , Gregor von Bochmann Extension of the Karp and Miller Procedure to Lotos Specifications. [Citation Graph (0, 0)][DBLP ] CAV, 1990, pp:333-342 [Conf ] Michel Barbeau , Gregor von Bochmann The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach. [Citation Graph (0, 0)][DBLP ] CAV, 1991, pp:103-113 [Conf ] Zheyin Li , Michel Barbeau Performance of Generative Programming Based Protocol Implementation. [Citation Graph (0, 0)][DBLP ] CNSR, 2004, pp:113-120 [Conf ] Ramiro Liscano , Amir Ghavam , Michel Barbeau Integrating Service Discovery Protocols with Presence-Based Communications for Ad Hoc Collaborative Scenarios. [Citation Graph (0, 0)][DBLP ] CNSR, 2004, pp:357-361 [Conf ] Honghui Luo , Michel Barbeau Performance Evaluation of Service Discovery Strategies in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] CNSR, 2004, pp:61-68 [Conf ] Mbi Makungu , Richard St.-Denis , Michel Barbeau A Colored Petri Net-Based Format Method for the Design of Control Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1996, pp:28-35 [Conf ] L. Beaudoin , Michel Barbeau Object-Oriented Analysis and Design of Repositories of Network Management Systems. [Citation Graph (0, 0)][DBLP ] COODBSE, 1994, pp:145-155 [Conf ] Michel Barbeau , Francis Bordeleau A Protocol Stack Development Tool Using Generative Programming. [Citation Graph (0, 0)][DBLP ] GPCE, 2002, pp:93-109 [Conf ] Michel Barbeau Bandwidth Usage Analysis of Service Location Protocol. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2000, pp:51-56 [Conf ] Michel Barbeau , Evangelos Kranakis Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2003, pp:44-50 [Conf ] Michel Barbeau , Froduald Kabanza , Richard St.-Denis Synthesizing Plant Controllers Using Real-time Goals. [Citation Graph (0, 0)][DBLP ] IJCAI (1), 1995, pp:791-800 [Conf ] Michel Barbeau , Behçet Sarikaya An approach to conformance testing of MIB implementations. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1995, pp:654-665 [Conf ] Michel Barbeau , Behçet Sarikaya , Srinivas Eswara , Vassilios N. Koukoulidis FTAM Test Design Using an Automated Test Tool. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1989, pp:251-260 [Conf ] Michel Barbeau Implementation of Two Approaches for the Reliable Multicast of Mobile Agents over Wireless Networks. [Citation Graph (0, 0)][DBLP ] ISPAN, 1999, pp:414-419 [Conf ] Michel Barbeau , Jeyanthi Hall , Evangelos Kranakis Detecting Impersonation Attacks in Future Wireless and Mobile Networks. [Citation Graph (0, 0)][DBLP ] MADNES, 2005, pp:80-95 [Conf ] Mathieu Couture , Michel Barbeau , Prosenjit Bose , Evangelos Kranakis Incremental Construction of k -Dominating Sets in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] OPODIS, 2006, pp:202-214 [Conf ] Jeyanthi Hall , Michel Barbeau , Evangelos Kranakis Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. [Citation Graph (0, 0)][DBLP ] Communications and Computer Networks, 2006, pp:108-113 [Conf ] Jeyanthi Hall , Michel Barbeau , Evangelos Kranakis Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. [Citation Graph (0, 0)][DBLP ] Communications, Internet, and Information Technology, 2004, pp:201-206 [Conf ] Froduald Kabanza , Michel Barbeau , Richard St.-Denis Planning Control Rules for Reactive Agents. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 1997, v:95, n:1, pp:67-11 [Journal ] Michel Barbeau , Evangelos Kranakis , Honghui Luo Strategies for Service Discovery over Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Engineering Letters, 2006, v:13, n:1, pp:11-23 [Journal ] Michel Barbeau , Froduald Kabanza , Richard St.-Denis An Efficient Algorithm for Controller Synthesis under Full Observation. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 1997, v:25, n:1, pp:144-161 [Journal ] Victor Azondekon , Michel Barbeau , Ramiro Liscano Indoor Ad Hoc Proximity-Location Sensing for Service Provider Selection. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2003, v:22, n:1-4, pp:95-108 [Journal ] Olaf Henniger , Michel Barbeau , Behçet Sarikaya Specification and testing of the behavior of network management agents using SDL-92. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1996, v:4, n:6, pp:951-962 [Journal ] Mathieu Couture , Michel Barbeau , Prosenjit Bose , Paz Carmi , Evangelos Kranakis Location Oblivious Distributed Unit Disk Graph Coloring. [Citation Graph (0, 0)][DBLP ] SIROCCO, 2007, pp:222-233 [Conf ] Analysis of Threats to the Security of EPC Networks. [Citation Graph (, )][DBLP ] Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks. [Citation Graph (, )][DBLP ] Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. [Citation Graph (, )][DBLP ] Security Threat Mitigation Trends in Low-Cost RFID Systems. [Citation Graph (, )][DBLP ] Security Threats on EPC Based RFID Systems. [Citation Graph (, )][DBLP ] Secure Anonymous Broadcasting in Vehicular Networks. [Citation Graph (, )][DBLP ] Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks. [Citation Graph (, )][DBLP ] WiMax/802.16 threat analysis. [Citation Graph (, )][DBLP ] Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks. [Citation Graph (, )][DBLP ] Evaluation of Anonymized ONS Queries [Citation Graph (, )][DBLP ] Search in 0.017secs, Finished in 0.020secs