Results 381-400 of 407.
Bookmark and Share    
Full Text
Peer Reviewed
See detailBlackbone2, an Efficient Deterministic Algorithm for creating 2-Connected m-dominating Set-based Backbones in Ad Hoc Networks
Schleich, Julien UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in MOBIWAC - International Symposium on Mobility Management and Wireless Access (2009)

This paper introduces Blackbone2, a novel fully decentralized algorithm that aims at creating a robust backbone in ad hoc networks. Backbone robustness is supported by a 2-Connected $m$-dominating Set, $2 ... [more ▼]

This paper introduces Blackbone2, a novel fully decentralized algorithm that aims at creating a robust backbone in ad hoc networks. Backbone robustness is supported by a 2-Connected $m$-dominating Set, $2,m$-CDS, and decentralization relies on the usage of two rules that only require two-hop knowledge in order to reduce the use of bandwidth. Blackbone2 deterministic approach guarantees a density-independent valid solution and is proved correct. The algorithm is also characterized by its efficient theoretical computation time, $\mathcal{O}(\Delta^{2})$ with $\Delta$ the average number of neighbors, which outperforms known solutions. The domination parameter, $m$, can be increased without changing the theoretical computation time. Efficiency of the Blackbone2 algorithm compared to the equivalent literature solutions is illustrated through simulations of a large panel of networks with a wide density range. [less ▲]

Detailed reference viewed: 189 (16 UL)
Full Text
Peer Reviewed
See detailTowards Connectivity Improvement in VANETs using Bypass Links
Dorronsoro, Bernabé UL; Ruiz, Patricia UL; Danoy, Grégoire UL et al

in Abstract book of 2009 IEEE Congress on Evolutionary Computation (2009)

Detailed reference viewed: 280 (16 UL)
Full Text
Peer Reviewed
See detailUso de Redes Hibridas para la Mejora de la Conectividad en VANETs
Dorronsoro, Bernabé UL; Ruiz, Patricia UL; Danoy, Grégoire UL et al

in Proceedings of national Conference on Metaheuristicas, Algoritmos Evolutivos y Bioinspirados(MAEB'09) (2009)

Detailed reference viewed: 226 (9 UL)
Peer Reviewed
See detailOptimal Interconnection of Ad Hoc Injection Networks
Danoy, Grégoire UL; Alba, Enrique; Bouvry, Pascal UL

in Journal of Interconnection Networks (2008), 9(3), 277297

Detailed reference viewed: 137 (5 UL)
Peer Reviewed
See detailAn Approach to Intrusion Detection by Means of Idiotypic Networks Paradigm
Ostaszewski, Marek UL; Bouvry, Pascal UL; Seredynski, Franciszek

in IEEE World Congress on Computational Intelligence, WCCI 2008, Congress on Evolutionary Computation CEC 2008, Honk-Kong, June (2008)

In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like ... [more ▼]

In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS is evaluated on the MITpsila99 dataset and outperforms previous approaches for DoS detection applied to this set. [less ▲]

Detailed reference viewed: 143 (0 UL)
Full Text
Peer Reviewed
See detailAdaptive and Dynamic Intrusion Detection by Means of Idiotypic Networks Paradigm
Ostaszewski, Marek UL; Bouvry, Pascal UL; Seredynski, Franciszek

in The 21th IEEE International Parallel and Distributed Processing Symposium (IPDPS), NIDISC Workshop. (2008)

In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like ... [more ▼]

In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS is evaluated on the MIT'99 dataset and outperforms previous approaches for DoS detection applied to this set. [less ▲]

Detailed reference viewed: 165 (0 UL)
Peer Reviewed
See detailNature inspired Algorithm-Based Fault Tolerance on Global Computing Platforms. Application to Symbolic Regression
Varrette, Sébastien UL; Ostaszewski, Marek UL; Bouvry, Pascal UL

in International Conference on Metaheuristics and Nature Inspired Computing (META'08) (2008)

Detailed reference viewed: 101 (0 UL)
Peer Reviewed
See detailOn the Use of a Genetic Algorithm in High Performance Computer Benchmark Tuning
Dunlop, Dominic UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'08) (2008)

Detailed reference viewed: 136 (0 UL)
Peer Reviewed
See detailA Context-Aware Broadcast Protocol for Mobile Wireless Networks
Hogie, Luc UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in Second International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences (MCO 2008) (2008)

Detailed reference viewed: 130 (5 UL)
Peer Reviewed
See detailEvaluation of Different Optimization Techniques in the Design of Ad Hoc Injection Networks
Dorronsoro, Bernabé UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS008) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008). (2008)

Detailed reference viewed: 100 (5 UL)
Full Text
Peer Reviewed
See detailBODYF - A Parameterless Broadcasting Protocol over Dynamic Forests
Ruiz, Patricia UL; Khadraoui, Djamel; Andronache, Adrian UL et al

in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS'08) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008) (2008)

Detailed reference viewed: 314 (7 UL)
Full Text
Peer Reviewed
See detailCoevolutionary-based Mechanisms for Network Anomaly Detection
Ostaszewski, Marek UL; Seredynski, Franciszek; Bouvry, Pascal UL

in Journal of Mathematical Modelling and Algorithms (2007), 6(3), 411-431

The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a ... [more ▼]

The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a model of the network behavior based on the self-nonself space paradigm. Covering both self and nonself spaces by hyperrectangular structures is proposed. The structures corresponding to self-space are built using a training set from this space. The hyperrectangular detectors covering nonself space are created using a niching genetic algorithm. A coevolutionary algorithm is proposed to enhance this process. The results of experiments show a high quality of intrusion detection, which outperform the quality of the recently proposed approach based on a hypersphere representation of the self-space. [less ▲]

Detailed reference viewed: 160 (2 UL)
Peer Reviewed
See detailCoevolutionary Genetic Algorithms for Ad Hoc Injection Networks Design Optimization
Danoy, Grégoire UL; Bouvry, Pascal UL; Hogie, Luc UL

in Congress on Evolutionary Computation (CEC) (2007)

Detailed reference viewed: 131 (6 UL)
Peer Reviewed
See detailDistributed Coevolutionary Genetic Algorithm for Optimal Design of Ad Hoc Injection Networks
Danoy, Grégoire UL; Bouvry, Pascal UL; Alba, Enrique

in The 21st European Conference on Modeling and Simulation (ECMS 2007) (2007)

Detailed reference viewed: 74 (9 UL)
Peer Reviewed
See detailOptimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms
Danoy, Grégoire UL; Bouvry, Pascal UL; Brust, Matthias R. UL et al

in 9th annual conference on Genetic and evolutionary computation (GECCO '07) (2007)

Detailed reference viewed: 131 (3 UL)
Peer Reviewed
See detailchap "Cryptographie à clef secréte"
Bouvry, Pascal UL; Dumas, Jean-Guillaume; Gillard, Roland et al

in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006)

Detailed reference viewed: 108 (0 UL)
Peer Reviewed
See detailEvaluations of Strategies for Co-Evolutionary Genetic Algorithms: dLCGA Case Study
Danoy, Grégoire UL; Bouvry, Pascal UL; Seredynski, Franciszek

in ANNIE 2006: Proceedings of the 16th international conference on Artificial Neural Networks In Engineering (2006)

Detailed reference viewed: 102 (6 UL)
Peer Reviewed
See detailhLCGA: A Hybrid Competitive Coevolutionary Genetic Algorithm
Danoy, Grégoire UL; Bouvry, Pascal UL; Martins, Tomy

in HIS'06: Proceedings of the 6th international conference on Hybrid Intelligent Systems (2006)

Detailed reference viewed: 148 (6 UL)
See detailSécurité Réseau
Bernard, Nicolas UL; Bouvry, Pascal UL; Denneulin, Yves et al

in Leprévost, Franck; Ebrahimi, Touradj; Warusfel, Bertrand (Eds.) Cryptographie et sécurité de systèmes et réseaux (2006)

Detailed reference viewed: 130 (5 UL)
Peer Reviewed
See detailSimulating Realistic Mobility Models for Large Heterogeneous MANETs
Hogie, Luc UL; Bouvry, Pascal UL; Guinand, Frédéric et al

in 9th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'06) (2006)

Detailed reference viewed: 109 (3 UL)