Cédric Bonhomme
Cédric Bonhomme
Unknown affiliation
Verified email at cedricbonhomme.org - Homepage
Cited by
Cited by
Fusion in multimodal interactive systems: an HMM-based algorithm for user-induced adaptation
B Dumas, B Signer, D Lalanne
Proceedings of the 4th ACM SIGCHI symposium on Engineering interactive …, 2012
Programming electronic institutions with utopia
P Schmitt, C Bonhomme, J Aubert, B Gâteau
International Conference on Advanced Information Systems Engineering, 122-135, 2010
Reputation based dynamic responsibility to agent assignement for critical infrastructure
G Guemkam, C Feltus, P Schmitt, C Bonhomme, D Khadraoui, ...
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011
A multi-agent based decision mechanism for incident reaction in telecommunication network
C Bonhomme, C Feltus, D Khadraoui
ACS/IEEE International Conference on Computer Systems and Applications …, 2010
Dynamic carpooling mobility services based on secure multi-agent platform
C Bonhomme, G Arnould, D Khadraoui
2012 Global Information Infrastructure and Networking Symposium (GIIS), 1-6, 2012
Support tool development for real-time risk prediction in interdependent critical infrastructures
T Schaberreiter, C Bonhomme, J Aubert, C Incoul, D Khadraoui
IEEE Int’l Symposium on Sofware Reliability Engineering, 2009
Easy programming of agent based electronic institution with utopia
P Schmitt, C Bonhomme, B Gâteau
2010 10th Annual International Conference on New Technologies of Distributed …, 2010
Electric blackout prevention: Toward a computer-mediated weather alert broadcasting solution
C Feltus, D Khadraoui, C Bonhomme
International Conference on Society and Information Technologies (ICSIT 2010 …, 2010
Dynamic responsibilities assignment in critical electronic institutions-A context-aware solution for in crisis access right management
C Bonhomme, C Feltus, M Petit
2011 Sixth International Conference on Availability, Reliability and …, 2011
Financial Critical Infrastructure: A MAS Trusted Architecture for Alert Detection and Authenticated Transactions
G Guemkam, C Feltus, C Bonhomme, Z Guessoum, P Schmitt, B Gateau, ...
2011 Conference on Network and Information Systems Security, 1-8, 2011
A new approach to evaluating security assurance
M Ouedraogo, H Mouratidis, A Hecker, C Bonhomme, D Khadraoui, ...
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
researchportal. unamur. be
G Guemkam, C Feltus, C Bonhomme, P Schmitt, D Khadraoui, ...
researchportal. unamur. be
C Bonhomme, C Feltus, M Petit
The system can't perform the operation now. Try again later.
Articles 1–13