A survey of error-correcting codes for channels with symbol synchronization errors H Mercier, VK Bhargava, V Tarokh IEEE Communications Surveys & Tutorials 12 (1), 87-96, 2010 | 166 | 2010 |
Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks M Khabbazian, H Mercier, VK Bhargava IEEE Transactions on Wireless Communications 8 (2), 736-745, 2009 | 145 | 2009 |
Confidentiality-preserving publish/subscribe: A survey E Onica, P Felber, H Mercier, E Rivière ACM computing surveys (CSUR) 49 (2), 1-43, 2016 | 78 | 2016 |
Fair and efficient gossip in hyperledger fabric N Berendea, H Mercier, E Onica, E Riviere 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 53 | 2020 |
Some research issues in cognitive radio networks G Bansal, MJ Hossain, P Kaligineedi, H Mercier, C Nicola, U Phuyal, ... AFRICON 2007, 1-7, 2007 | 45 | 2007 |
Thrifty privacy: efficient support for privacy-preserving publish/subscribe R Barazzutti, P Felber, H Mercier, E Onica, E Rivière Proceedings of the 6th ACM International Conference on Distributed Event …, 2012 | 38 | 2012 |
Safefs: A modular architecture for secure user-space file systems: One fuse to rule them all R Pontes, D Burihabwa, F Maia, J Paulo, V Schiavoni, P Felber, H Mercier, ... Proceedings of the 10th ACM International Systems and Storage Conference, 1-12, 2017 | 37 | 2017 |
Nis02-1: Wormhole attack in wireless ad hoc networks: Analysis and countermeasure M Khabbazian, H Mercier, VK Bhargava IEEE Globecom 2006, 1-6, 2006 | 32 | 2006 |
SGX-FS: hardening a file system in user-space with Intel SGX D Burihabwa, P Felber, H Mercier, V Schiavoni 2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018 | 29 | 2018 |
Bounds on the capacity of discrete memoryless channels corrupted by synchronization and substitution errors H Mercier, V Tarokh, F Labeau IEEE transactions on information theory 58 (7), 4306-4330, 2012 | 28 | 2012 |
Efficient and confidentiality-preserving content-based publish/subscribe with prefiltering R Barazzutti, P Felber, H Mercier, E Onica, E Riviere IEEE Transactions on Dependable and Secure Computing 14 (3), 308-325, 2015 | 24 | 2015 |
Judging the judges: evaluating the accuracy and national bias of international gymnastics judges S Heiniger, H Mercier Journal of Quantitative Analysis in Sports 17 (4), 289-305, 2021 | 23 | 2021 |
EpTO: An epidemic total order algorithm for large-scale distributed systems M Matos, H Mercier, P Felber, R Oliveira, J Pereira Proceedings of the 16th Annual Middleware Conference, 100-111, 2015 | 21 | 2015 |
Judging the judges: Evaluating the performance of international gymnastics judges H Mercier, S Heiniger arXiv preprint arXiv:1807.10021, 2018 | 20 | 2018 |
A Performance Evaluation of Erasure Coding Libraries for Cloud-Based Data Stores: (Practical Experience Report) D Burihabwa, P Felber, H Mercier, V Schiavoni Distributed Applications and Interoperable Systems: 16th IFIP WG 6.1 …, 2016 | 20 | 2016 |
Efficient key updates through subscription re-encryption for privacy-preserving publish/subscribe E Onica, P Felber, H Mercier, E Rivière Proceedings of the 16th Annual Middleware Conference, 25-36, 2015 | 18 | 2015 |
On the number of subsequences when deleting symbols from a string H Mercier, M Khabbazian, VK Bhargava IEEE transactions on information theory 54 (7), 3279-3285, 2008 | 17 | 2008 |
National Bias of international gymnastics judges during the 2013-2016 Olympic cycle S Heiniger, H Mercier arXiv preprint arXiv:1807.10033, 2018 | 13 | 2018 |
STeP-archival: Storage integrity and anti-tampering using data entanglement H Mercier, M Augier, AK Lenstra 2015 IEEE International Symposium on Information Theory (ISIT), 1590-1594, 2015 | 13 | 2015 |
Judging the judges: A general framework for evaluating the performance of international sports judges S Heiniger, H Mercier arXiv preprint arXiv:1807.10055, 2018 | 12 | 2018 |