hosted by
publicationslist.org
    

GSEM Group


mlpriv@gsem.fr

Books

2009
1993

Journal articles

2009
2008
A Roxin, M Wack (2008)  Location Models for Pervasive Road Networks   Journal of International Transactions on Systems Science and Applications 4: 2. 162-166 May  
Abstract: Context-aware mobile computing aims at designing applications that automatically adapt their behaviors to the available location information and the available nearby sensors and devices. This is done in order to fulfill tasks in a way that suits users' current context best. To achieve this, context representation and manipulation are important issues, so as to establish formal context models. In this paper, basic elements of context-aware systems are described with an emphasis on location information representations. Space models for location-based applications are presented. Considered realistic applications concern intelligent vehicles and pervasive road networks.
Notes:
2006
A Haddad, R Bouyekf, A Elmoudni, M Wack (2006)  Non-linear dynamic modelling of proton exchange membrane fuel cell   Journal of Power Sources 163: 1. 420-432  
Abstract: his paper proposes a non-linear state-space dynamic model for planar proton exchange membrane fuel cell (PEMFC). Our objective is the realization of a model that evokes a more realistic approach of dynamic behavior of the fuel cell by considering most of elements that influence the system evolution. For instance, pressure, temperature and humidification rate effects on the cell resistance are taken into account. The model is based on both thermodynamic and electrical aspects, proposing a realistic equivalent circuit which integrates most of the fuel cell components. Simulation results show that our proposed model is in agreement with fuel cell real operating principles.
Notes:
Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous, Nathanael Cottin (2006)  Meaningful electronic signatures based on an automatic indexing method   Journal of Artificial Intelligence and Law 14: 3. 161-175  
Abstract: Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution of these technologies may be necessary to achieve full text researches within hundreds or thousands of electronically signed documents. This article aims at describing a possible model along with associated processes to create and make use of these new electronic signatures called "meaningful electronic signatures" as opposed to traditional electronic signatures based on bit per bit computation.
Notes:
2005
2003
2002
Maxime Wack, Nathanael Cottin, Bernard Mignot, Abdellah Elmoudni (2002)  Certification et archivage légal de dossiers numériques   Document numérique 6: 1–2. 145-158  
Abstract: The certification and legal data storage, bound to data electronic signature open new perspectives to data security. Like this, these technologies offer capabilities such as: identification, authentification, certification, aiming to the global capacity of secured data storage. However, it appears that certification and electronic signature does not completely answer to enterprise needs concerning authentification and secured data storage. The purpose of this paper is a solution proposal to these problems.
Notes:

Book chapters

2009
A Roxin (2009)  L'information Géographique   In: Géopositionnement et Mobilités Edited by:PRUR-UTBM. To be published in June 2009  
Abstract: This book chapter presents and defines geographic information. Techniques used for acquiring geographic information are presented as well.
Notes:
A Roxin (2009)  Communications inter-véhicules   In: Géopositionnement et Mobilités Edited by:PRUR-UTBM. To be published in June 2009  
Abstract: This chapter presents main existing standards used for inter-vehicle communication. Thechniques such as DSRC, WAV or CALM are presented. The chapter also lists some of the most important european projects that have adressed the issue of vehicle-to-vehicle communication, such as FleetNET or WILLWARN.
Notes:
2002
Maxime Wack, Nathanael Cottin, Rachid Bouyekhf (2002)  Cooperative Navigation in Multimedia Systems   In: EDBT’02 : Proceedings of the Workshops XMLDM, MDDE, and YRWS on XML-Based Data Management and Multimedia Engineering – Revised Papers Edited by:Springer Berlin / Heidelberg. 847-851 Springer Verlag  
Abstract: The emergence of the New Technologies of Information and Communication (NTIC), and the development of new tools open some perspectives for multimedia application design. In this paper we propose a graphical model of cooperative navigation of the multimedia applications. The model is based on the distinction between public and private areas. We use Petri nets to model several patterns which allow to build a complete navigation process. An example is worked out to illustrate the proposed approach.
Notes:

Conference papers

2010
Christophe Dumez, Mohamed Bakhouya, Jaafar Gaber, Maxime Wack (2010)  Formal Specification and Verification of Service Composition using LOTOS   In: ICPS 2010: The 7th International Conference on Pervasive Services Edited by:ACM.  
Abstract: Despite the fact that several languages have been proposed for Web service composition (BPEL, WSCI, BPMN to name a few), their lack of well-defined formal semantics does not support formal analysis. The verification of Web service composition is thus a complicated task that can benefit from the use of formal methods. In this paper, an approach to specify, verify and validate the service composition using the LOTOS formal specification language is proposed. To achieve this task, we provide a translation into LOTOS for each workflow control-flow pattern. A working example is then presented to show how a service composition workflow can be specified using these patterns and validated using CADP toolkit.
Notes:
2009
A Nait-Sidi-Moh, W Ait-Cheik-Bihi, M Wack (2009)  Modeling and Performance Analysis of a Bus Network Using Petri Nets and Dioid Algebra   In: 39th International Conference on Computers & Industrial Engineering (CIE39) Accepted, to appear, 2009  
Abstract: Modelling, performance analysis and control play a major role in the design of discrete event systems (DES). An adequate formal method to describe the behaviour of such systems is necessary. This paper deals with the modelling and the performance evaluation of a public transportation system. The behaviour of such system is studied in the framework of DES. Specifically, the study focuses on modelling of transportation system using the two complementary tools Petri nets (PN) and dioid algebra. In this study, we model the behaviour of the systems without taking into account the constraints related to synchronization phenomena (bus waiting in the connection stops in order to exchange the passengers). The performance analysis of the considered network is made by solving and analysing the (max, +) state model which describes the analytical behaviour of the network. Journey times of passengers and calculation of shortest path from an origin to a destination will be considered in the stage of performance evaluation. An example of application illustrates the results and the techniques proposed will be carried out.
Notes:
A Roxin, C Dumez, N Cottin, J Gaber, M Wack (2009)  Intelligent Location-Based Services for emergency Management   In: 10th IEEE International Symposium on a "World of Wireless, Mobile and Multimedia Networks" (WOWMOM 2009)  
Abstract: The ASSET Road EU FP7 research project aims at promoting new embedded location-based services. The Work Package our research team is responsible for will address the inter-service interaction issue. GNSS will be used to deliver location information. The interoperability between services relies on Semantic Web technologies and approaches. Well-defined scenarios will be tested and implemented for the ASSET Road project.
Notes: In this paper, we present a distributed locationbased services platform using mobile and embedded communications means, integrating GNSS positioning. This work is a part of the ASSET Road EU FP7 research project.
2008
A Roxin, C Dumez, J Gaber, M Wack (2008)  Middleware Models for Location-Based Services: A Survey   In: ICPS Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing (AUPC) 35-40  
Abstract: Embedded computing systems, sensor networks, LBS pervasive deployment environments, and worldwide computing systems have common characteristics. They are large scale, decentralized and dynamic networks, and needing context-awarness to automatically adapt their behaviour and continue their execution despite network dynamics. Identifying innovative software engineering approaches that take into account all the above mentionned characteristics is a real challenge. This paper focuses on LBS applications and the middleware models required for supporting their operation and characteristics.
Notes:
2007
A Roxin, J Gaber, M Wack, A Nait-Sidi-Moh (2007)  Survey of Wireless Geolocation Techniques   In: 2007 IEEE Globecom Workshops 1-9  
Abstract: Ubiquitous and pervasive networks and applications include a growing number of research themes. In most use cases, applications require location information to interpret their environment and behave accordingly. Locating mobile devices has always been a critical problem. Today, wireless communication progress rapidly. A multitude of portable devices are available. In order to provide more value-added applications, one must acquire the location information of a mobile device, on any given network. GPS technology is widely available in the civilian market for personal navigation applications. Althought GPS-based location is reliable and accurate for outdoor situations, it does not provide satisfactory performance in indoor and urban areas, with extensive multipath conditions. Other technologies have been developed in order to implement the specificities of ubiquitous and pervasive environments. This report presents main algorithms and positioning techniques used for wireless geolocation.
Notes:
A Nait-Sidi-Moh, D Assossou, A Roxin, M Wack (2007)  Modeling of Cooperative Navigation in Pervasive E-learning Applications Using (max, plus) Algebra   In: 2007 IEEE Globecom Workshops 1-7  
Abstract: This paper presents a new approach based on (max, plus) algebra to model cooperative navigation in pervasive e- learning applications. This modeling approach is appropriate for modeling these systems that are governed, on the one hand, by events occurrence in a discrete state space, and on the other hand, by synchronization and parallelism phenomena. In addition, this approach enables to verify in a formal way the model consistency.
Notes:
A Roxin, M Wack (2007)  Location based models for pervasive road networks   In: IEEE International Conference on Pervasive Services (ICPS'07) 443-447  
Abstract: Context-aware mobile computing aims at designing applications that automatically adapt their behaviors to the available location information and the available nearby sensors and devices. This is done in order to fulfill tasks in a way that suits users' current context best. To achieve this, context representation and manipulation are important issues, so as to establish formal context models. In this paper, basic elements of context-aware systems are described with an emphasis on location information representations. Space models for location-based applications are presented. Considered realistic applications concern intelligent vehicles and pervasive road networks.
Notes:
2006
2003
Nathanael Cottin, Maxime Wack, Abdelaziz Sehili (2003)  Contribution à  la validation des signatures électroniques dans le temps   In: SAR’03 : 2nd rencontre francophone sur Sécurité et Architectures Réseaux  
Abstract: Les infrastructures à clé publique supportant la signature électronique proposent des services de gestion des certificats associés aux signataires. L'octroi du label "environnement sécurisé de signature" fait non seulement appel au système physique de stockage des informations de signature (clés, certificats) mais également aux applications faisant usage de ces informations ainsi qu'aux éventuelles connexions avec l'extérieur (LAN, WAN, Internet). Les applicatifs proposés aux clients doivent utiliser correctement les services de ces infrastructures afin d'authentifier et valider ces signatures. Nous nous intéressons à l'étude des principaux moyens de validation automatique des signatures électroniques et particulièrement la liste de révocation, le protocole OCSP, la signature à long terme ETSI et la notarisation électronique via le certificat de validité.
Notes:
Nathanael Cottin, Maxime Wack, Abdelaziz Sehili (2003)  Time-stamping electronic documents and signatures   In: AICCSA’03 : ACS/IEEE International Conference on Computer Systems and applications  
Abstract: Time-stamping becomes a vital component of the emerging electronic business infrastructures. The main goal is to provide users with time management and possibly signed electronic content protection. We address the purpose and usage of time-stamps on electronic documents and electronic signatures. A discussion is opened on the effective need of time-stamping electronic signatures through the study of two time-stamping technologies.
Notes:
2002
2001
Nathanael Cottin, Jaafar Gaber, Oumaya Baala, Maxime Wack (2001)  Distributed Object-Oriented Applications Supervision.   In: IPDPS’01 : Proceedings of the 15th IEEE International Parallel & Distributed Processing Symposium 109-113 Washington, DC, USA: IEEE Computer Society  
Abstract: Distributed object-oriented computing allows efficient use of the Network Of Workstations (NOW) paradigm. However, the underlying middlewares used to develop and deploy such applications do not provide developers with any standard supervision mechanism so that they know exactly what happens during their applications execution. This paper analyzes distributed CORBA and JAVA-based applications to point out functional and management supervision information which has to be gathered from the objects. Developers will use this information to improve the Quality of Service (QoS) of their distributed object-oriented applications (DOA). Our framework is based on a CORBA service which uses our supervision API. This supervision service is composed of agents running on supervised computers. They interact with managed objects to perform local supervision measurements. These measurements may then be used to determine supervision indicators such as objects membership and computers exclusion degrees.
Notes:
Nathanael Cottin, Bernard Mignot, Maxime Wack (2001)  Authentication and entreprise secured data storage   In: ETFA’01 : 8th IEEE International Conference on Emerging Technologies on Factory Automation 245-252  
Abstract: Data certification and digital signature are a new area of interest and many standards have emerged. Indeed, these technologies offer identification, authentication and non-repudiation capabilities during Internet transactions (emails and e-commerce). However, it appears that both certification and digital signature do not completely answer enterprise data authentication and secured data storage needs. We submit a proposition of an authorities-based architecture to answer these issues. This architecture relies on most of the available standards
Notes: Invited paper
2000
Nathanael Cottin, Oumaya Baala, Jaafar Gaber, Maxime Wack (2000)  Management and QoS in Distributed Systems   In: PDPTA’00 : IEEE International Conference on Parallel and Distributed Processing Techniques and Applications Edited by:Hamid R Arabnia. 1585-1588 CSREA Press  
Abstract: Recent emerging of advanced networking technologies (IPv6, ATM, FastEthernet) together with the development of Internet technologies and distributed computing such as World Wide Web, Java and CORBA have the goal of offerig heterogeneous services to users across various geographical and network boundaries. Consequently, many innovations in developing and adopting such emerged technlogies are needed to guarantee the Quality of Service (QoS) in real-time distributed applications. An environment called Distributed Objects Management Protocol (DOMP) is defined to supervise and manage real-time distributed applications in order to mporve their QoS.
Notes:

PhD theses

2010
Christophe Dumez (2010)  Approche dirigée par les modèles pour la spécification, la vérification formelle et la mise en oeuvre de services Web composés   University of Technologie of Belfort-Montbeliard Rue Thierry Mieg, 90000, Belfort, FRANCE:  
Abstract: In this work, an approach is proposed to specify, formally verify and implement composite Web services. This model-driven approach embraces the principles of the Model-Driven Architecture (MDA) as promoted by the OMG. It allows for the developer to work at a high level of abstraction by handling graphical models that are independent from programming concepts and implementation technologies. These models are described using the UML modeling language. Specifically, an extension to UML called UML-S is proposed to adapt the language to the specific needs of the Web service composition domain. UML-S models are expressive and precise enough to support direct transformation into low-level execution code while being easily readable. These models can also be transformed into formal descriptions in LOTOS to support the formal verification of the composition. The approach proposed contributes to reducing development time and costs while contributing to the robustness of the service composition.
Notes:
2009
A Roxin (2009)  Context-aware semantic web service discovery protocol   UTBM (Université de Technologie de Belfort-Montbéliard) Technopole - 90010 BELFORT Cedex:  
Abstract: The Web of today represents a broad space where users research, discover and share information. In this context, the process of Web service discovery plays a significant role. Indeed, such process allows linking the information published by service providers and the requests of users, looking for information. Generally, such process involves text or keyword-based techniques. Still, this kind of discovery fails in retrieving only relevant information. Our approach is to design a more « intelligent » system that allows using a knowledge base during the service discovery process, as it is done in the Semantic Web vision. This thesis presents a framework for semantic Web service discovery using non-functional service characteristics. The framework relies on the Web Ontology Language for Services (OWL-S) to design a template for describing non-functional service parameters in a way that facilitates service discovery. Our model is designed to facilitate the discovery of semantic Web services. This service description model is used as a core for designing the interfaces and the querries. Two interfaces are developped : one for the service providers, and one for the final users. The search algorithm presented in this thesis is designed to maximize precision and completeness of service discovery.
Notes:
2003
Nathanael Cottin (2003)  Contribution à la sécurisation des échanges électroniques en environnement réparti objet   Université deTechnologie de Belfort-Montbéliard  
Abstract: Nowadays information systems benefit from multiple autonomous and complementary processes that cooperate to provide end-users with elaborated services. Distributed object-oriented systems integrate the object concept in terms of services implementation. Although most of them make use of security protocols to achieve message transmission confidentiality, access control is reserved to a minority. We suggest a UML model of a distributed object-oriented system, based on the CORBA standard main principles such as interface and implementation abstraction, using an Interface Description Language (IDL), environments and programming languages heterogeneity handling, and common services usage. This model allows distributed objects strong authentication and access control. It also offers confidentiality, supervision and audit mechanisms. The proposed control scheme makes use of a new secure IDL contract (S-IDL) grammar. S-IDL extends common IDL definitions to express security requirements. Electronic signature takes an important part of the proposed model as it testifies messages integrity and provides means for non repudiation. This model comes along with a new signature structure proposal derived from existing standards, which takes into account legal recommendations. This format is integrated into an inter-object communication protocol described using Abstract Syntax Notation One (ASN.1) and UML languages. A prototype which contributes to a large-scaled âÂÂtrust chainâ implementation is designed according to the model. This chain is composed of a set of distributed third parties that interact with each other. Beyond distributed computing, our ultimate goal is to contribute to make electronic signature accessible to the general public, providing tools that connect with the proposed distributed trust chain.
Notes:

Masters theses

2008
2000
Nathanael Cottin (2000)  DOMS : une architecture de suivi de la Qualité de Service dans les Systèmes Répartis Objet   Université de Technologie de Belfort-Montbéliard  
Abstract: L'objectif de ce travail est l'étude dâun moyen permettant d'améliorer la Qualité de Service (QoS), en termes de performance et fiabilité, des applications réparties basées sur lâobjet respectant la norme CORBA de lâOMG. Nous proposons un système de surveillance des applications réparties objet baptisé Distributed Objects Management System (DOMS). Ce dernier est basé sur lâanalyse des relations interâobjets ainsi que sur lâévolution de la charge des machines utilisées. Il fournit au développeur un environnement de mesure de la QoS de ses applications. Les mesures effectuées lui permettent de modifier dynamiquement la répartition des objets sur les machines du réseau en appliquant des algorithmes de répartition de la charge des machines et de répartition des appels entre les objets.
Notes:
1999

Patents

2006
2001

Technical reports

2006
2002

Workshops

2009
2005
2003
2002
Powered by PublicationsList.org.