Keywords:Automated Reasoning, Algebraic specifications, Rewriting, Network Security, Cryptography, and
Validation of cryptographic protocols.
Biography Adel Bouhoula obtained his undergraduate degree in computer engineering with distinction from the University of Tunis in Tunisia. He also holds a Master’s, PhD and Habilitation from Henri Poincare University in Nancy, France. Adel Bouhoula is currently an Associate Professor at the Higher School of Communication of Tunis (SUP'COM). He is also the founder and Director of the Research Unit on Digital Security and the President of the Tunisian Association of Digital Security.
Publications
Biography Adel Bouhoula obtained his undergraduate degree in computer engineering with distinction from the University of Tunis in Tunisia. He also holds a Master’s, PhD and Habilitation from Henri Poincare University in Nancy, France. Adel Bouhoula is currently an Associate Professor at the Higher School of Communication of Tunis (SUP'COM). He is also the founder and Director of the Research Unit on Digital Security and the President of the Tunisian Association of Digital Security.
Publications
Author | Title | Year | Journal/Proceedings | Reftype | DOI/URL |
---|---|---|---|---|---|
Abbes, T., Bouhoula, A. & Rusinowitch, M. | An inference system for detecting firewall filtering rules anomalies
[BibTeX]
|
2008 | SAC, pp. 2122-2128 | inproceedings | |
BibTeX:
@inproceedings{Abbes2008, author = {Tarek Abbes and Adel Bouhoula and Michaël Rusinowitch}, title = {An inference system for detecting firewall filtering rules anomalies}, booktitle = {SAC}, year = {2008}, pages = {2122-2128} } |
|||||
Abbes, T., Bouhoula, A. & Rusinowitch, M. | A Traffic Classification Algorithm for Intrusion Detection
[BibTeX]
|
2007 | AINA Workshops (1), pp. 188-193 | inproceedings | |
BibTeX:
@inproceedings{Abbes2007, author = {Tarek Abbes and Adel Bouhoula and Michaël Rusinowitch}, title = {A Traffic Classification Algorithm for Intrusion Detection}, booktitle = {AINA Workshops (1)}, year = {2007}, pages = {188-193} } |
|||||
Abbes, T., Bouhoula, A. & Rusinowitch, M. | Protocol Analysis in Intrusion Detection Using Decision Tree
[BibTeX]
|
2004 | ITCC (1), pp. 404-408 | inproceedings | |
BibTeX:
@inproceedings{Abbes2004, author = {Tarek Abbes and Adel Bouhoula and Michaël Rusinowitch}, title = {Protocol Analysis in Intrusion Detection Using Decision Tree}, booktitle = {ITCC (1)}, year = {2004}, pages = {404-408} } |
|||||
Ayachi, M.A., Bidan, C., Abbes, T. & Bouhoula, A. | Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol
[BibTeX]
|
2009 | CSE (2), pp. 802-808 | inproceedings | |
BibTeX:
@inproceedings{Ayachi2009, author = {Mohamed Ali Ayachi and Christophe Bidan and Tarek Abbes and Adel Bouhoula}, title = {Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol}, booktitle = {CSE (2)}, year = {2009}, pages = {802-808} } |
|||||
Benelbahri, M.A. & Bouhoula, A. | Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules
[BibTeX]
|
2007 | ISCC, pp. 63-70 | inproceedings | |
BibTeX:
@inproceedings{Benelbahri2007, author = {Mohammed Anis Benelbahri and Adel Bouhoula}, title = {Tuple Based Approach for Anomalies Detection within Firewall Filtering Rules}, booktitle = {ISCC}, year = {2007}, pages = {63-70} } |
|||||
Berregeb, N., Bouhoula, A. & Rusinowitch, M. | SPIKE-AC: A System for Proofs by Induction in Associative-Commutative Theories
[BibTeX]
|
1996 | RTA, pp. 428-431 | inproceedings | |
BibTeX:
@inproceedings{Berregeb1996, author = {Narjes Berregeb and Adel Bouhoula and Michaël Rusinowitch}, title = {SPIKE-AC: A System for Proofs by Induction in Associative-Commutative Theories}, booktitle = {RTA}, year = {1996}, pages = {428-431} } |
|||||
Berregeb, N., Bouhoula, A. & Rusinowitch, M. | Automated Verification by Induction with Associative-Commutative Operators
[BibTeX]
|
1996 | CAV, pp. 220-231 | inproceedings | |
BibTeX:
@inproceedings{Berregeb1996a, author = {Narjes Berregeb and Adel Bouhoula and Michaël Rusinowitch}, title = {Automated Verification by Induction with Associative-Commutative Operators}, booktitle = {CAV}, year = {1996}, pages = {220-231} } |
|||||
Bouchahda, A., Thanh, N.L., Bouhoula, A. & Labbene, F. | Enforcing Access Control to Web Databases
[BibTeX]
|
2010 | CIT, pp. 612-619 | inproceedings | |
BibTeX:
@inproceedings{Bouchahda2010, author = {Ahlem Bouchahda and Nhan Le Thanh and Adel Bouhoula and Faten Labbene}, title = {Enforcing Access Control to Web Databases}, booktitle = {CIT}, year = {2010}, pages = {612-619} } |
|||||
Bouhoula, A. | General Framework for Mechanizing Induction using Test Set
[BibTeX]
|
1996 | PRICAI, pp. 1-12 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula1996, author = {Adel Bouhoula}, title = {General Framework for Mechanizing Induction using Test Set}, booktitle = {PRICAI}, year = {1996}, pages = {1-12} } |
|||||
Bouhoula, A. | SPIKE: a System for Sufficient Completeness and Parameterized Inductive Proofs
[BibTeX]
|
1994 | CADE, pp. 836-840 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula1994, author = {Adel Bouhoula}, title = {SPIKE: a System for Sufficient Completeness and Parameterized Inductive Proofs}, booktitle = {CADE}, year = {1994}, pages = {836-840} } |
|||||
Bouhoula, A. | Sufficient Completeness and Parameterized Proofs by Induction
[BibTeX]
|
1994 | ALP, pp. 23-40 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula1994a, author = {Adel Bouhoula}, title = {Sufficient Completeness and Parameterized Proofs by Induction}, booktitle = {ALP}, year = {1994}, pages = {23-40} } |
|||||
Bouhoula, A. & Jacquemard, F. | Automated Induction with Constrained Tree Automata
[BibTeX]
|
2008 | IJCAR, pp. 539-554 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula2008, author = {Adel Bouhoula and Florent Jacquemard}, title = {Automated Induction with Constrained Tree Automata}, booktitle = {IJCAR}, year = {2008}, pages = {539-554} } |
|||||
Bouhoula, A., Jouannaud, J.-P. & Meseguer, J. | Specification and Proof in Membership Equational Logic
[BibTeX]
|
1997 | TAPSOFT, pp. 67-92 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula1997, author = {Adel Bouhoula and Jean-Pierre Jouannaud and José Meseguer}, title = {Specification and Proof in Membership Equational Logic}, booktitle = {TAPSOFT}, year = {1997}, pages = {67-92} } |
|||||
Bouhoula, A., Kounalis, E. & Rusinowitch, M. | SPIKE, an Automatic Theorem Prover
[BibTeX]
|
1992 | LPAR, pp. 460-462 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula1992, author = {Adel Bouhoula and Emmanuel Kounalis and Michaël Rusinowitch}, title = {SPIKE, an Automatic Theorem Prover}, booktitle = {LPAR}, year = {1992}, pages = {460-462} } |
|||||
Bouhoula, A. & Rusinowitch, M. | SPIKE: A System for Automatic Inductive Proofs
[BibTeX]
|
1995 | AMAST, pp. 576-577 | inproceedings | |
BibTeX:
@inproceedings{Bouhoula1995, author = {Adel Bouhoula and Michaël Rusinowitch}, title = {SPIKE: A System for Automatic Inductive Proofs}, booktitle = {AMAST}, year = {1995}, pages = {576-577} } |
|||||
Ghorbel-Talbi, M.B., Cuppens, F., Cuppens-Boulahia, N. & Bouhoula, A. | An Extended Role-Based Access Control Model for Delegating Obligations
[BibTeX]
|
2009 | TrustBus, pp. 127-137 | inproceedings | |
BibTeX:
@inproceedings{Ghorbel-Talbi2009, author = {Meriam Ben-Ghorbel-Talbi and Frédéric Cuppens and Nora Cuppens-Boulahia and Adel Bouhoula}, title = {An Extended Role-Based Access Control Model for Delegating Obligations}, booktitle = {TrustBus}, year = {2009}, pages = {127-137} } |
|||||
Ghorbel-Talbi, M.B., Cuppens, F., Cuppens-Boulahia, N. & Bouhoula, A. | Revocation Schemes for Delegation Licences
[BibTeX]
|
2008 | ICICS, pp. 190-205 | inproceedings | |
BibTeX:
@inproceedings{Ghorbel-Talbi2008, author = {Meriam Ben-Ghorbel-Talbi and Frédéric Cuppens and Nora Cuppens-Boulahia and Adel Bouhoula}, title = {Revocation Schemes for Delegation Licences}, booktitle = {ICICS}, year = {2008}, pages = {190-205} } |
|||||
Ghourabi, A., Abbes, T. & Bouhoula, A. | Honeypot router for routing protocols protection
[BibTeX]
|
2009 | CRiSIS, pp. 127-130 | inproceedings | |
BibTeX:
@inproceedings{Ghourabi2009, author = {Abdallah Ghourabi and Tarek Abbes and Adel Bouhoula}, title = {Honeypot router for routing protocols protection}, booktitle = {CRiSIS}, year = {2009}, pages = {127-130} } |
|||||
Hamdi, Hé., Bouhoula, A. & Mosbah, M. | A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems
[BibTeX]
|
2007 | SECURWARE, pp. 187-192 | inproceedings | |
BibTeX:
@inproceedings{Hamdi2007a, author = {Hédi Hamdi and Adel Bouhoula and Mohamed Mosbah}, title = {A Software Architecture for Automatic Security Policy Enforcement in Distributed Systems}, booktitle = {SECURWARE}, year = {2007}, pages = {187-192} } |
|||||
Hamdi, Hé., Mosbah, M. & Bouhoula, A. | A Domain Specific Language for Securing Distributed Systems
[BibTeX]
|
2007 | ICSNC, pp. 76 | inproceedings | |
BibTeX:
@inproceedings{Hamdi2007, author = {Hédi Hamdi and Mohamed Mosbah and Adel Bouhoula}, title = {A Domain Specific Language for Securing Distributed Systems}, booktitle = {ICSNC}, year = {2007}, pages = {76} } |
|||||
Meharouech, S., Bouhoula, A. & Abbes, T. | Collaboration between Security Devices toward improving Network Defense
[BibTeX]
|
2008 | ACIS-ICIS, pp. 13-18 | inproceedings | |
BibTeX:
@inproceedings{Meharouech2008, author = {Sourour Meharouech and Adel Bouhoula and Tarek Abbes}, title = {Collaboration between Security Devices toward improving Network Defense}, booktitle = {ACIS-ICIS}, year = {2008}, pages = {13-18} } |
|||||
Meharouech, S., Bouhoula, A. & Abbes, T. | A Stateful Real Time Intrusion Detection System for high-speed network
[BibTeX]
|
2007 | AINA, pp. 404-411 | inproceedings | |
BibTeX:
@inproceedings{Meharouech2007, author = {Sourour Meharouech and Adel Bouhoula and Tarek Abbes}, title = {A Stateful Real Time Intrusion Detection System for high-speed network}, booktitle = {AINA}, year = {2007}, pages = {404-411} } |
|||||
Neji, N.B. & Bouhoula, A. | Self-adjusting scheme for high speed routers
[BibTeX]
|
2008 | LCN, pp. 542-543 | inproceedings | |
BibTeX:
@inproceedings{Neji2008, author = {Nizar Ben Neji and Adel Bouhoula}, title = {Self-adjusting scheme for high speed routers}, booktitle = {LCN}, year = {2008}, pages = {542-543} } |
|||||
Talbi, M., Morin, B., Tong, V.V.T., Bouhoula, A. & Mejri, M. | Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study
[BibTeX]
|
2008 | ICICS, pp. 403-418 | inproceedings | |
BibTeX:
@inproceedings{Talbi2008, author = {Mehdi Talbi and Benjamin Morin and Valérie Viet Triem Tong and Adel Bouhoula and Mohamed Mejri}, title = {Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study}, booktitle = {ICICS}, year = {2008}, pages = {403-418} } |
|||||
Talbi, M., Tong, V.V.T. & Bouhoula, A. | Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols
[BibTeX]
|
2009 | ARES, pp. 281-288 | inproceedings | |
BibTeX:
@inproceedings{Talbi2009, author = {Mehdi Talbi and Valérie Viet Triem Tong and Adel Bouhoula}, title = {Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols}, booktitle = {ARES}, year = {2009}, pages = {281-288} } |
|||||
Tekaya, A.B.-B., Thanh, N.L., Bouhoula, A. & Labbene-Ayachi, F. | An Access Control Model for Web Databases
[BibTeX]
|
2010 | DBSec, pp. 287-294 | inproceedings | |
BibTeX:
@inproceedings{Tekaya2010, author = {Ahlem Bouchahda-Ben Tekaya and Nhan Le Thanh and Adel Bouhoula and Faten Labbene-Ayachi}, title = {An Access Control Model for Web Databases}, booktitle = {DBSec}, year = {2010}, pages = {287-294} } |
|||||
Youssef, N.B., Bouhoula, A. & Jacquemard, F. | Automatic verification of conformance of firewall configurations to security policies
[BibTeX]
|
2009 | ISCC, pp. 526-531 | inproceedings | |
BibTeX:
@inproceedings{Youssef2009, author = {Nihel Ben Youssef and Adel Bouhoula and Florent Jacquemard}, title = {Automatic verification of conformance of firewall configurations to security policies}, booktitle = {ISCC}, year = {2009}, pages = {526-531} } |
|||||
Algebraic Methodology and Software Technology, 4th International Conference, AMAST '95, Montreal, Canada, July 3-7, 1995, Proceedings
[BibTeX]
|
1995 | Vol. 936AMAST |
proceedings | ||
BibTeX:
@proceedings{Alagar1995,, title = {Algebraic Methodology and Software Technology, 4th International Conference, AMAST '95, Montreal, Canada, July 3-7, 1995, Proceedings}, booktitle = {AMAST}, publisher = {Springer}, year = {1995}, volume = {936} } |
|||||
Computer Aided Verification, 8th International Conference, CAV '96, New Brunswick, NJ, USA, July 31 - August 3, 1996, Proceedings
[BibTeX]
|
1996 | Vol. 1102CAV |
proceedings | ||
BibTeX:
@proceedings{Alur1996,, title = {Computer Aided Verification, 8th International Conference, CAV '96, New Brunswick, NJ, USA, July 31 - August 3, 1996, Proceedings}, booktitle = {CAV}, publisher = {Springer}, year = {1996}, volume = {1102} } |
|||||
Automated Reasoning, 4th International Joint Conference, IJCAR 2008, Sydney, Australia, August 12-15, 2008, Proceedings
[BibTeX]
|
2008 | Vol. 5195IJCAR |
proceedings | ||
BibTeX:
@proceedings{Armando2008,, title = {Automated Reasoning, 4th International Joint Conference, IJCAR 2008, Sydney, Australia, August 12-15, 2008, Proceedings}, booktitle = {IJCAR}, publisher = {Springer}, year = {2008}, volume = {5195} } |
|||||
TAPSOFT'97: Theory and Practice of Software Development, 7th International Joint Conference CAAP/FASE, Lille, France, April 14-18, 1997, Proceedings
[BibTeX]
|
1997 | Vol. 1214TAPSOFT |
proceedings | ||
BibTeX:
@proceedings{Bidoit1997,, title = {TAPSOFT'97: Theory and Practice of Software Development, 7th International Joint Conference CAAP/FASE, Lille, France, April 14-18, 1997, Proceedings}, booktitle = {TAPSOFT}, publisher = {Springer}, year = {1997}, volume = {1214} } |
|||||
Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26 - July 1, 1994, Proceedings
[BibTeX]
|
1994 | Vol. 814CADE |
proceedings | ||
BibTeX:
@proceedings{Bundy1994,, title = {Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26 - July 1, 1994, Proceedings}, booktitle = {CADE}, publisher = {Springer}, year = {1994}, volume = {814} } |
|||||
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings
[BibTeX]
|
2008 | Vol. 5308ICICS |
proceedings | ||
BibTeX:
@proceedings{Chen2008,, title = {Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, booktitle = {ICICS}, publisher = {Springer}, year = {2008}, volume = {5308} } |
|||||
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings
[BibTeX]
|
2008 | Vol. 5308ICICS |
proceedings | ||
BibTeX:
@proceedings{Chen2008a,, title = {Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, booktitle = {ICICS}, publisher = {Springer}, year = {2008}, volume = {5308} } |
|||||
Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings
[BibTeX]
|
2009 | Vol. 5695TrustBus |
proceedings | ||
BibTeX:
@proceedings{Fischer-Hubner2009,, title = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, booktitle = {TrustBus}, publisher = {Springer}, year = {2009}, volume = {5695} } |
|||||
PRICAI'96: Topics in Artificial Intelligence, 4th Pacific Rim International Conference on Artificial Intelligence, Cairns, Australia, August 26-30, 1996, Proceedings
[BibTeX]
|
1996 | Vol. 1114PRICAI |
proceedings | ||
BibTeX:
@proceedings{Foo1996,, title = {PRICAI'96: Topics in Artificial Intelligence, 4th Pacific Rim International Conference on Artificial Intelligence, Cairns, Australia, August 26-30, 1996, Proceedings}, booktitle = {PRICAI}, publisher = {Springer}, year = {1996}, volume = {1114} } |
|||||
Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings
[BibTeX]
|
2010 | Vol. 6166DBSec |
proceedings | ||
BibTeX:
@proceedings{Foresti2010,, title = {Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, booktitle = {DBSec}, publisher = {Springer}, year = {2010}, volume = {6166} } |
|||||
Rewriting Techniques and Applications, 7th International Conference, RTA-96, New Brunswick, NJ, USA, July 27-30, 1996, Proceedings
[BibTeX]
|
1996 | Vol. 1103RTA |
proceedings | ||
BibTeX:
@proceedings{Ganzinger1996,, title = {Rewriting Techniques and Applications, 7th International Conference, RTA-96, New Brunswick, NJ, USA, July 27-30, 1996, Proceedings}, booktitle = {RTA}, publisher = {Springer}, year = {1996}, volume = {1103} } |
|||||
CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009
[BibTeX]
|
2009 | CRiSIS | proceedings | ||
BibTeX:
@proceedings{Kalam2009,, title = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009}, booktitle = {CRiSIS}, publisher = {IEEE}, year = {2009} } |
|||||
7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA
[BibTeX]
|
2008 | ACIS-ICIS | proceedings | ||
BibTeX:
@proceedings{Lee2008,, title = {7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA}, booktitle = {ACIS-ICIS}, publisher = {IEEE Computer Society}, year = {2008} } |
|||||
Algebraic and Logic Programming, 4th International Conference, ALP'94, Madid, Spain, September 14-16, 1994, Proceedings
[BibTeX]
|
1994 | Vol. 850ALP |
proceedings | ||
BibTeX:
@proceedings{Levi1994,, title = {Algebraic and Logic Programming, 4th International Conference, ALP'94, Madid, Spain, September 14-16, 1994, Proceedings}, booktitle = {ALP}, publisher = {Springer}, year = {1994}, volume = {850} } |
|||||
Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain
[BibTeX]
|
2007 | SECURWARE | proceedings | ||
BibTeX:
@proceedings{Penalver2007,, title = {Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain}, booktitle = {SECURWARE}, publisher = {IEEE}, year = {2007} } |
|||||
Logic Programming and Automated Reasoning,International Conference LPAR'92, St. Petersburg, Russia, July 15-20, 1992, Proceedings
[BibTeX]
|
1992 | Vol. 624LPAR |
proceedings | ||
BibTeX:
@proceedings{Voronkov1992,, title = {Logic Programming and Automated Reasoning,International Conference LPAR'92, St. Petersburg, Russia, July 15-20, 1992, Proceedings}, booktitle = {LPAR}, publisher = {Springer}, year = {1992}, volume = {624} } |
|||||
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008
[BibTeX]
|
2008 | SAC | proceedings | ||
BibTeX:
@proceedings{Wainwright2008,, title = {Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008}, booktitle = {SAC}, publisher = {ACM}, year = {2008} } |
|||||
10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010
[BibTeX]
|
2010 | CIT | proceedings | ||
BibTeX:
@proceedings{2010,, title = {10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, booktitle = {CIT}, publisher = {IEEE Computer Society}, year = {2010} } |
|||||
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia
[BibTeX]
|
2009 | ISCC | proceedings | ||
BibTeX:
@proceedings{2009,, title = {Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia}, booktitle = {ISCC}, publisher = {IEEE}, year = {2009} } |
|||||
Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan
[BibTeX]
|
2009 | ARES | proceedings | ||
BibTeX:
@proceedings{2009a,, title = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan}, booktitle = {ARES}, publisher = {IEEE Computer Society}, year = {2009} } |
|||||
Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada
[BibTeX]
|
2009 | CSE | proceedings | ||
BibTeX:
@proceedings{2009b,, title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada}, booktitle = {CSE}, publisher = {IEEE Computer Society}, year = {2009} } |
|||||
LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings
[BibTeX]
|
2008 | LCN | proceedings | ||
BibTeX:
@proceedings{2008,, title = {LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings}, booktitle = {LCN}, publisher = {IEEE}, year = {2008} } |
|||||
21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada
[BibTeX]
|
2007 | AINA Workshops (1) | proceedings | ||
BibTeX:
@proceedings{2007,, title = {21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, booktitle = {AINA Workshops (1)}, publisher = {IEEE Computer Society}, year = {2007} } |
|||||
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal
[BibTeX]
|
2007 | ISCC | proceedings | ||
BibTeX:
@proceedings{2007a,, title = {Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal}, booktitle = {ISCC}, publisher = {IEEE}, year = {2007} } |
|||||
21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada
[BibTeX]
|
2007 | AINA | proceedings | ||
BibTeX:
@proceedings{2007b,, title = {21st International Conference on Advanced Information Networking and Applications (AINA 2007), May 21-23, 2007, Niagara Falls, Canada}, booktitle = {AINA}, publisher = {IEEE Computer Society}, year = {2007} } |
|||||
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France
[BibTeX]
|
2007 | ICSNC | proceedings | ||
BibTeX:
@proceedings{2007c,, title = {Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France}, booktitle = {ICSNC}, publisher = {IEEE Computer Society}, year = {2007} } |
|||||
International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA
[BibTeX]
|
2004 | ITCC (1) | proceedings | ||
BibTeX:
@proceedings{2004,, title = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA}, booktitle = {ITCC (1)}, publisher = {IEEE Computer Society}, year = {2004} } |