The SCEAS System
Navigation Menu

Search the dblp DataBase


Olivier Camp: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Patrick Bellot, Olivier Camp, Christophe Matiachoff
    Explicit Implementation of a Constraint Solving Mechanism in a Relational Programming System. [Citation Graph (0, 0)][DBLP]
    GULP-PRODE, 1995, pp:401-408 [Conf]
  2. Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas, L. Javier García-Villalba
    A Modular Architecture for Distributed IDS in MANET. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2003, pp:91-113 [Conf]
  3. Patrick Bellot, Olivier Camp, Christophe Matiachoff
    An Overview of MILES and its constraint solving mechanism. [Citation Graph (0, 0)][DBLP]
    JFPLC, 1995, pp:387-390 [Conf]
  4. Patrick Albers, Olivier Camp, Jean-Marc Percher, Bernard Jouga, Ludovic Mé, Ricardo Staciarini Puttini
    Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2002, pp:1-12 [Conf]
  5. Chung Tien Nguyen, Olivier Camp
    Trust: An Approach for Securing Mobile ad hoc Network. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2005, pp:92-103 [Conf]
  6. Jean-Marc Percher, Ricardo Staciarini Puttini, Ludovic Mé, Olivier Camp, Bernard Jouga, Patrick Albers
    Un système de détection d'intrusions distribué pour réseaux ad hoc. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:391-420 [Journal]

  7. What Can Context Do for Trust in Manets? [Citation Graph (, )][DBLP]

  8. Model Driven Development of Context-aware Mobile Applications - An Architecture and a Metamodel. [Citation Graph (, )][DBLP]

  9. Improving the efficiency of intrusion detection in ad hoc networks with mobile code. [Citation Graph (, )][DBLP]

  10. A Bayesian network based trust model for improving collaboration in mobile ad hoc networks. [Citation Graph (, )][DBLP]

  11. Using Context Information to Improve Computation of Trust in Ad Hoc Networks. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002