The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michel Barbeau: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michel Barbeau, Evangelos Kranakis, Danny Krizanc, Pat Morin
    Improving Distance Based Geographic Location Techniques in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2004, pp:197-210 [Conf]
  2. Christine Laurendeau, Michel Barbeau
    Threats to Security in DSRC/WAVE. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2006, pp:266-279 [Conf]
  3. Michel Barbeau, Gregor von Bochmann
    A Subset of Lotos with the Computational Power of Place/Transition-Nets. [Citation Graph (0, 0)][DBLP]
    Application and Theory of Petri Nets, 1993, pp:49-68 [Conf]
  4. Mbi Makungu, Michel Barbeau
    The contract approach illustrated with a distributed routing protocol. [Citation Graph (0, 0)][DBLP]
    CASCON, 1994, pp:42- [Conf]
  5. Michel Barbeau, Gregor von Bochmann
    Extension of the Karp and Miller Procedure to Lotos Specifications. [Citation Graph (0, 0)][DBLP]
    CAV, 1990, pp:333-342 [Conf]
  6. Michel Barbeau, Gregor von Bochmann
    The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach. [Citation Graph (0, 0)][DBLP]
    CAV, 1991, pp:103-113 [Conf]
  7. Zheyin Li, Michel Barbeau
    Performance of Generative Programming Based Protocol Implementation. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:113-120 [Conf]
  8. Ramiro Liscano, Amir Ghavam, Michel Barbeau
    Integrating Service Discovery Protocols with Presence-Based Communications for Ad Hoc Collaborative Scenarios. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:357-361 [Conf]
  9. Honghui Luo, Michel Barbeau
    Performance Evaluation of Service Discovery Strategies in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:61-68 [Conf]
  10. Mbi Makungu, Richard St.-Denis, Michel Barbeau
    A Colored Petri Net-Based Format Method for the Design of Control Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:28-35 [Conf]
  11. L. Beaudoin, Michel Barbeau
    Object-Oriented Analysis and Design of Repositories of Network Management Systems. [Citation Graph (0, 0)][DBLP]
    COODBSE, 1994, pp:145-155 [Conf]
  12. Michel Barbeau, Francis Bordeleau
    A Protocol Stack Development Tool Using Generative Programming. [Citation Graph (0, 0)][DBLP]
    GPCE, 2002, pp:93-109 [Conf]
  13. Michel Barbeau
    Bandwidth Usage Analysis of Service Location Protocol. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2000, pp:51-56 [Conf]
  14. Michel Barbeau, Evangelos Kranakis
    Modeling and Performance Analysis of Service Discovery Strategies in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2003, pp:44-50 [Conf]
  15. Michel Barbeau, Froduald Kabanza, Richard St.-Denis
    Synthesizing Plant Controllers Using Real-time Goals. [Citation Graph (0, 0)][DBLP]
    IJCAI (1), 1995, pp:791-800 [Conf]
  16. Michel Barbeau, Behçet Sarikaya
    An approach to conformance testing of MIB implementations. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1995, pp:654-665 [Conf]
  17. Michel Barbeau, Behçet Sarikaya, Srinivas Eswara, Vassilios N. Koukoulidis
    FTAM Test Design Using an Automated Test Tool. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1989, pp:251-260 [Conf]
  18. Michel Barbeau
    Implementation of Two Approaches for the Reliable Multicast of Mobile Agents over Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1999, pp:414-419 [Conf]
  19. Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
    Detecting Impersonation Attacks in Future Wireless and Mobile Networks. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:80-95 [Conf]
  20. Mathieu Couture, Michel Barbeau, Prosenjit Bose, Evangelos Kranakis
    Incremental Construction of k-Dominating Sets in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    OPODIS, 2006, pp:202-214 [Conf]
  21. Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
    Detecting rogue devices in bluetooth networks using radio frequency fingerprinting. [Citation Graph (0, 0)][DBLP]
    Communications and Computer Networks, 2006, pp:108-113 [Conf]
  22. Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
    Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2004, pp:201-206 [Conf]
  23. Froduald Kabanza, Michel Barbeau, Richard St.-Denis
    Planning Control Rules for Reactive Agents. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1997, v:95, n:1, pp:67-11 [Journal]
  24. Michel Barbeau, Evangelos Kranakis, Honghui Luo
    Strategies for Service Discovery over Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Engineering Letters, 2006, v:13, n:1, pp:11-23 [Journal]
  25. Michel Barbeau, Froduald Kabanza, Richard St.-Denis
    An Efficient Algorithm for Controller Synthesis under Full Observation. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1997, v:25, n:1, pp:144-161 [Journal]
  26. Victor Azondekon, Michel Barbeau, Ramiro Liscano
    Indoor Ad Hoc Proximity-Location Sensing for Service Provider Selection. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2003, v:22, n:1-4, pp:95-108 [Journal]
  27. Olaf Henniger, Michel Barbeau, Behçet Sarikaya
    Specification and testing of the behavior of network management agents using SDL-92. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1996, v:4, n:6, pp:951-962 [Journal]
  28. Mathieu Couture, Michel Barbeau, Prosenjit Bose, Paz Carmi, Evangelos Kranakis
    Location Oblivious Distributed Unit Disk Graph Coloring. [Citation Graph (0, 0)][DBLP]
    SIROCCO, 2007, pp:222-233 [Conf]

  29. Analysis of Threats to the Security of EPC Networks. [Citation Graph (, )][DBLP]


  30. Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks. [Citation Graph (, )][DBLP]


  31. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers. [Citation Graph (, )][DBLP]


  32. Security Threat Mitigation Trends in Low-Cost RFID Systems. [Citation Graph (, )][DBLP]


  33. Security Threats on EPC Based RFID Systems. [Citation Graph (, )][DBLP]


  34. Secure Anonymous Broadcasting in Vehicular Networks. [Citation Graph (, )][DBLP]


  35. Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks. [Citation Graph (, )][DBLP]


  36. WiMax/802.16 threat analysis. [Citation Graph (, )][DBLP]


  37. Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks. [Citation Graph (, )][DBLP]


  38. Evaluation of Anonymized ONS Queries [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.020secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002