Vania Conan

According to our database1, Vania Conan authored at least 116 papers between 1997 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Group anomaly detection in mobile app usages: A spatiotemporal convex hull methodology.
Comput. Networks, 2022

ColorUAV: A genetic algorithm for dynamic drone path planning under multiple constraints.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
Offloading computing tasks beyond the edge: A data-driven analysis.
Proceedings of the 13th IFIP Wireless and Mobile Networking Conference, 2021

Optimized NDN Forwarding in Tactical Networks with Asymmetric Radio Links.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

2020
Botnet Fingerprinting: A Frequency Distributions Scheme for Lightweight Bot Detection.
IEEE Trans. Netw. Serv. Manag., 2020

COLiDeR: A cross-layer protocol for two-path relaying.
Comput. Commun., 2020

Detection of zero-day attacks: An unsupervised port-based approach.
Comput. Networks, 2020

Persistence of Vehicular-Augmented Mobile Edges.
Proceedings of the 31st IEEE Annual International Symposium on Personal, 2020

BotFP: FingerPrints Clustering for Bot Detection.
Proceedings of the NOMS 2020, 2020

2019
Change in Continuity: Chaining Services With an Augmented IGP.
IEEE Trans. Netw. Serv. Manag., 2019

A Framework for Evaluating Physical-Layer Network Coding Gains in Multi-Hop Wireless Networks.
IEEE Trans. Mob. Comput., 2019

When analog meets digital: Source-Encoded Physical-Layer Network Coding.
Pervasive Mob. Comput., 2019

DDoS protection with stateful software-defined networking.
Int. J. Netw. Manag., 2019

Core network function placement in self-deployable mobile networks.
Comput. Commun., 2019

Computing Realistic and Adaptive Capacity of D2D Contacts.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Distributed Function Chaining with Anycast Routing.
Proceedings of the 2019 ACM Symposium on SDN Research, 2019

Let there be Chaining: How to Augment your IGP to Chain your Services.
Proceedings of the 2019 IFIP Networking Conference, 2019

Modeling Realistic Bit Rates of D2D Communications between Android Devices.
Proceedings of the 22nd International ACM Conference on Modeling, 2019

Finding Next Service Hop with NFV-Routers.
Proceedings of the IEEE INFOCOM 2019, 2019

Relay Selection with Beamforming for Coverage Extension.
Proceedings of the IEEE INFOCOM 2019, 2019

Split and Merge: Detecting Unknown Botnets.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Mobile Edge Computing Resources Optimization: A Geo-Clustering Approach.
IEEE Trans. Netw. Serv. Manag., 2018

Centralized Defense Using Smart Routing Against Link-Flooding Attacks.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

Centrality Maps for Moving Nodes.
Proceedings of the Complex Networks and Their Applications VII, 2018

2017
On the Design of Automatic Link Establishment in High Frequency Networks.
Int. J. Netw. Comput., 2017

Overview of LTE Isolated E-UTRAN Operation for Public Safety.
IEEE Commun. Stand. Mag., 2017

Geo-partitioning of MEC Resources.
Proceedings of the Workshop on Mobile Edge Communications, 2017

Core network function placement in mobile networks.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Traffic monitoring and DDoS detection using stateful SDN.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

Statesec: Stateful monitoring for DDoS protection in software defined networks.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

A Physical-Layer Network Coding aware distributed scheduling policy.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
MUREN: delivering edge services in joint SDN-SDR multi-radio nodes.
CoRR, 2016

Bayesian Attack Model for Dynamic Risk Assessment.
CoRR, 2016

Circumventing plateaux in cellular data offloading using adaptive content reinjection.
Comput. Networks, 2016

Should I seed or should I not: On the remuneration of seeders in D2D offloading.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

A cooperative MAC protocol for lossy forwarding networks.
Proceedings of the 2016 Wireless Days, 2016

Elastic Network Service Provisioning with VNF Auctioning.
Proceedings of the 28th International Teletraffic Congress, 2016

Revisiting NFV orchestration with routing games.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Attacks against Network Functions Virtualization and Software-Defined Networking: State-of-the-art.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Bringing SDN to the edge of tactical networks.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Hybrid Risk Assessment Model Based on Bayesian Networks.
Proceedings of the Advances in Information and Computer Security, 2016

2015
Cost-based placement of vDPI functions in NFV infrastructures.
Int. J. Netw. Manag., 2015

Data Offloading Techniques in Cellular Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

A joint multicast/D2D learning-based approach to LTE traffic offloading.
Comput. Commun., 2015

Cost-based placement of vDPI functions in NFV infrastructures.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Demo: D2D Rescue of Overloaded Cellular Channels.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

Modeling Automatic Link Establishment in HF networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Burst size matters: when node degree helps accelerate opportunistic dissemination.
Proceedings of the 14th Annual Mediterranean Ad Hoc Networking Workshop, 2015

A full duplex MAC protocol for wireless networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Reliable streaming protocol for lossy networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Uncovering vicinity properties in disruption-tolerant networks.
Comput. Networks, 2014

Beyond contact predictions in mobile opportunistic networks.
Proceedings of the 11th Annual Conference on Wireless On-demand Network Systems and Services, 2014

DROid: Adapting to individual mobility pays off in mobile data offloading.
Proceedings of the 2014 IFIP Networking Conference, Trondheim, 2014

Flooding data in a cell: is cellular multicast better than device-to-device communications?
Proceedings of the 9th ACM MobiCom workshop on Challenged networks, 2014

Demo: opportunistic communications to alleviate cellular infrastructures: the FP7-moto approach.
Proceedings of the 9th ACM MobiCom workshop on Challenged networks, 2014

2013
Exploiting context information for V2X dissemination in vehicular networks.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Mobility trace breeding.
Proceedings of the IFIP Wireless Days, 2013

Validation of a point to multipoint cognitive radio transport protocol over GNU radio testbed.
Proceedings of the IFIP Wireless Days, 2013

Point to multipoint transport in multichannel wireless environments.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Examining vicinity dynamics in opportunistic networks.
Proceedings of the 8th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2013

Transparent IP Proxy for Tactical Ad Hoc Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Cost-Based Placement of Virtualized Deep Packet Inspection Functions in SDN.
Proceedings of the 32th IEEE Military Communications Conference, 2013

The strength of vicinity annexation in opportunistic networking.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

Differentiating link state advertizements to optimize control overhead in overlay networks.
Proceedings of IEEE International Conference on Communications, 2013

2012
Push-and-track: Saving infrastructure bandwidth through opportunistic forwarding.
Pervasive Mob. Comput., 2012

Part-whole dissemination of large multimedia contents in opportunistic networks.
Comput. Commun., 2012

Embedding cognition in wireless network management: an experimental perspective.
IEEE Commun. Mag., 2012

Lightweight tag-based forwarding among competing gateways in Wireless Mesh Networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Vehicular carriers for big data transfers (Poster).
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

Near optimal multicoloring for inter-cluster interference avoidance.
Proceedings of the Q2SWinet'12, 2012

Scaling end-to-end measurements in heterogeneous wireless mesh networks.
Proceedings of the Q2SWinet'12, 2012

Vicinity-based DTN characterization.
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks, 2012

Temporal reachability graphs.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

2011
Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case.
IEEE Trans. Mob. Comput., 2011

Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs.
IEEE Trans. Commun., 2011

From encounters to plausible mobility.
Pervasive Mob. Comput., 2011

Using Neighborhood Beyond One Hop in Disruption-Tolerant Networks
CoRR, 2011

Relieving the wireless infrastructure: When opportunistic networks meet guaranteed delays.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Using UHF connectivity to off-load VHF messaging in tactical MANETs.
Proceedings of the MILCOM 2011, 2011

Wardrop Equilibrium Formulation of Resource-Constrained DTN Routing in Public Safety Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Public Safety Situation Aware Services over Cognitive Radio Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Distributed Multi-Level Cooperative Scheme for QoS Support in Public Safety Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Fine-grained intercontact characterization in disruption-tolerant networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Dimensionnement des messages dans un reseau mobile opportuniste
CoRR, 2010

HYMAD: Hybrid DTN-MANET routing for dense and highly dynamic wireless networks.
Comput. Commun., 2010

Contact surround in opportunistic networks.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Plausible mobility: inferring movement from contacts.
Proceedings of the Second International Workshop on Mobile Opportunistic Networking, 2010

Critical analysis of encounter traces.
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010

CONEMAF: A Modular Multi Agent Framework for Autonomic Network Management.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 2, 2010

An experimental path towards Self-Management for Future Internet Environments.
Proceedings of the Towards the Future Internet - Emerging Trends from European Research, 2010

Dynamic frequency allocation in ad hoc networks.
Proceedings of the 2nd International Workshop on Cognitive Information Processing, 2010

2009
Intermittently-Connected Mobile Networks as Markovian Random Temporal Graphs
CoRR, 2009

Maximizing the number of accepted flows in TDMA-based wireless ad hoc networks is APX-complete
CoRR, 2009

Tuning message size in opportunistic mobile networks.
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009

Route Selection for Capacity Maximization in Multi-Rate TDMA-based Wireless Ad Hoc Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN Routing.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

2008
Fixed point opportunistic routing in delay tolerant networks.
IEEE J. Sel. Areas Commun., 2008

XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

A load dependent metric for balancing Internet traffic in Wireless Mesh Networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networks.
Proceedings of the LCN 2008, 2008

Service oriented architecture for heterogeneous and dynamic sensor networks.
Proceedings of the Second International Conference on Distributed Event-Based Systems, 2008

Interference and Congestion Aware Reservations in Wireless Multi-hop Networks.
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008

2007
Evaluating MobySpace-based routing strategies in delay-tolerant networks.
Wirel. Commun. Mob. Comput., 2007

Designing a Novel SOA Architecture for Security and Surveillance WSNs with COTS.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Characterizing pairwise inter-contact patterns in delay tolerant networks.
Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, 2007

2006
The heterogeneity of inter-contact time distributions: its importance for routing in delay tolerant networks
CoRR, 2006

Evaluating Mobility Pattern Space Routing for DTNs.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
DTN routing in a mobility pattern space.
Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005

WCAM: secured video surveillance with digital rights management.
Proceedings of the Electronic Imaging: Image and Video Communications and Processing 2005, 2005

2003
A proposal for supporting selective encryption in JPSEC.
IEEE Trans. Consumer Electron., 2003

2001
Encrypting Java Archives and Its Application to Mobile Agent Security.
Proceedings of the Agent Mediated Electronic Commerce, The European AgentLink Perspective., 2001

1999
Legal Issues for Personalised Advertising on Internet: The AIMedia Case Study.
Proceedings of the Agent Mediated Electronic Commerce II, 1999

1998
A generic model for Immersive Documentation Environments.
Virtual Real., 1998

1997
Virtually Documented Environments: A New Interface Paradigm for Task-oriented Access to Information.
Comput. Graph. Forum, 1997

Virtually Documented Environments.
Proceedings of the First International Symposium on Wearable Computers (ISWC 1997), 1997


  Loading...