Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

WComp middleware for ubiquitous computing: Aspects and composite event-based Web services., , , , , , and . Annales des Télécommunications, 64 (3-4): 197-214 (2009)Réparation de modèles par transformations idempotentes., , , and . Ingénierie des Systèmes d'Information, 16 (5): 73-108 (2011)Synchronizing shared objects.. Distributed Systems Engineering, 2 (2): 112- (1995)Programmation par composition et déploiement d'applications réparties.. L'OBJET, 8 (3): 91-107 (2002)A Component-Based Approach to Security Protocol Design., , , and . AINA Workshops, page 279-284. IEEE Computer Society, (2011)Designing Security Protocols Adapted to the Constraints of Mobile Environments., , , and . EUC, page 624-629. IEEE Computer Society, (2010)A low-energy consuming and user-centric security management architecture adapted to mobile environments., , , and . Integrated Network Management, page 722-725. IEEE, (2011)Distributed Application Configuration., , , and . ICDCS, page 579-585. IEEE Computer Society, (1996)Optimized contextual discovery of Web Services for Devices., , , , , and . ICDIM, page 707-712. IEEE, (2007)CONKER : un modèle de répartition pour processus communicants. Application à OCCAM. (CONKER : a model for distributed communicating processes. Application to OCCAM).. Grenoble Institute of Technology, France, (1987)