.NET: THE PROGRAMER'S PERSPECTIVE: ECOOP WORKSHOP 2003 A Charfi, D Emsellem, M Riveill | | |
‘Reusable synchronized objects M Riveill, X Rousset ECOOP Workshop on Concurrent Object Programming, Ultrech, The Nederlands, 1992 | 3 | 1992 |
A Case-based Reasoning Model for Intrusion Detection N Nobelis, K Boudaoud, M Riveill | | |
A component-based approach to security protocol design N Nobelis, K Boudaoud, C Delettre, M Riveill 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 2 | 2011 |
A delta-oriented approach to support the safe reuse of black-box code rewriters B Benni, S Mosser, N Moha, M Riveill International Conference on Software Reuse, 164-180, 2018 | 3 | 2018 |
A delta‐oriented approach to support the safe reuse of black‐box code rewriters B Benni, S Mosser, N Moha, M Riveill Journal of Software: Evolution and Process 31 (8), e2208, 2019 | 3 | 2019 |
A Dynamic mechanism for solving Interfering Adaptations in Ubiquitous Computing Environment SFB Abdenneji, S Lavirotte, JY Tigli, G Rey, M Riveill DYNAM: 1st International Workshop on Dynamicity 1 (1), 8, 2011 | | 2011 |
A flexible, policy driven, architecture for electronic documents exchange N Nobelis, K Boudaoud, M Riveill, S Antipolis | | |
a framework for mobile users' adaptable and secured applications MC Pellegrini, O Potonniee, R Marvie, S Jean, M Riveill CALCULATEURS PARALLELES RESEAUX ET SYSTEMES REPARTIS 12 (1), 113-120, 2000 | | 2000 |
A framework for trust assessment of sensor data L Gomez, X Gentile, M Riveill 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011), 1-7, 2011 | 2 | 2011 |
A low-energy consuming and component-based security management architecture for mobile devices M Kamel, K Boudaoud, M Riveill SAM 2010: proceedings of the 2010 international conference on security …, 2010 | 2 | 2010 |
A low-energy consuming and user-centric security management architecture adapted to mobile environments M Kamel, K Boudaoud, S Resondry, M Riveill 12th IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2011 | 8 | 2011 |
A middleware for securing mobile mashups F Batard, K Boudaoud, M Riveill Proceedings of the 20th international conference companion on World wide web …, 2011 | 2 | 2011 |
A middleware for ubiquitous computing: Wcomp JY TIGLI, M RIVEILL, G REY, S LAVIROTTE, V HOURDIN, ... Projet RAINBOW, Rapport de recherché, ISRN I3S/RR–2008-01–FR, 2008 | 3 | 2008 |
A model to reduce complexity and maintain coherence between Access Control and Transmission Control policies Y Bertrand, M Blay-Fornarino, K Boudaoud, M Riveill I3S, 2016 | | 2016 |
A multi-layer architecture for high available Enterprise JavaBeans M Pasin, TS Weber, M Riveill Anais do III Workshop de Testes e Tolerância a Falhas, 49-56, 2002 | | 2002 |
A new urban segregation-growth coupled model using a belief-desire-intention possibilistic framework M Vanegas-Hernandez, C da Costa Pereira, D Moreno, G Fusco, ... Proceedings of the International Conference on Web Intelligence, 340-347, 2017 | | 2017 |
A runtime model for monitoring software adaptation safety and its concretisation as a service A Occello, A Dery-Pinna, M Riveill Models@ runtime 8, 67-76, 2008 | 20 | 2008 |
A security-property-based approach for lowering power consumption of secure mobile web access C Pita, K Boudaoud, M Riveill 2011 7th International Wireless Communications and Mobile Computing …, 2011 | 1 | 2011 |
A service-context model allowing dynamical adaptation M Cremene, M Riveill, C Martel International Journal of Computers, Communications and Control (IJCCC) 1 …, 2006 | 1 | 2006 |