Skip to Main content Skip to Navigation

Search by documents

hal-01418390v1  Journal articles
Ziad IsmailChristophe KiennertJean LeneutreDavid BatemanLin Chen. Auditing a Cloud Provider's Compliance with Data Backup Requirements: A Game Theoretical Analysis
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2016, 11, pp.1685-1699. ⟨10.1109/tifs.2016.2549002⟩
hal-02133056v1  Conference papers
Stefano IellamoLin ChenMarceau Coupechoux. Imitation-based spectrum access policy for CSMA/CA-based cognitive radio networks
2012 IEEE Wireless Communications and Networking Conference (WCNC), Apr 2012, Paris, France. pp.2780-2785
hal-01131029v1  Journal articles
Stefano IellamoAlekseeva EkaterinaLin ChenMarceau CoupechouxYuri Kochetov. Competitive Location in Cognitive Radio Networks
4OR: A Quarterly Journal of Operations Research, Springer Verlag, 2014, 12 (3), pp.1-30
hal-02133059v1  Conference papers
Stefano IellamoLin ChenMarceau CoupechouxAthanasios Vasilakos. Imitation-based spectrum access policy for cognitive radio networks
2012 9th International Symposium on Wireless Communication Systems (ISWCS 2012), Aug 2012, Paris, France. pp.1019-1023