Follow
Romaric Ludinard
Title
Cited by
Cited by
Year
Peercube: A hypercube-based p2p overlay robust against collusion and churn
E Anceaume, R Ludinard, A Ravoaja, F Brasileiro
2008 Second IEEE International Conference on Self-Adaptive and Self …, 2008
722008
Safety analysis of Bitcoin improvement proposals
E Anceaume, T Lajoie-Mazenc, R Ludinard, B Sericola
2016 IEEE 15th international symposium on network computing and applications …, 2016
602016
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020)
P Nerurkar, D Patel, Y Busnel, R Ludinard, S Kumari, MK Khan
Journal of Network and Computer Applications 177, 102940, 2021
592021
Blockchain abstract data type
E Anceaume, A Del Pozzo, R Ludinard, M Potop-Butucaru, ...
The 31st ACM Symposium on Parallelism in Algorithms and Architectures, 349-358, 2019
522019
Supervised learning model for identifying illegal activities in Bitcoin
P Nerurkar, S Bhirud, D Patel, R Ludinard, Y Busnel, S Kumari
Applied Intelligence 51, 3824-3843, 2021
442021
Bitcoin a distributed shared register
E Anceaume, R Ludinard, M Potop-Butucaru, F Tronel
Stabilization, Safety, and Security of Distributed Systems: 19th …, 2017
332017
Detecting illicit entities in bitcoin using supervised learning of ensemble decision trees
P Nerurkar, Y Busnel, R Ludinard, K Shah, S Bhirud, D Patel
proceedings of the 10th international conference on information …, 2020
232020
Sycomore: A permissionless distributed ledger that self-adapts to transactions demand
E Anceaume, A Guellier, R Ludinard, B Sericola
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
232018
StakeCube: Combining Sharding and Proof-of-Stake to Build Fork-Free Secure Permissionless Distributed Ledgers
A Durand, E Anceaume, R Ludinard
Networked Systems: 7th International Conference, NETYS 2019, Marrakech …, 2019
152019
Detecting attacks against data in web applications
R Ludinard, E Totel, F Tronel, V Nicomette, M Kaâniche, E Alata, R Akrout, ...
2012 7th International Conference on Risks and Security of Internet and …, 2012
152012
Analytic study of the impact of churn in cluster-based structured P2P overlays
E Anceaume, R Ludinard, B Sericola
2010 IEEE International Conference on Communications, 1-5, 2010
112010
Anomaly characterization in large scale networks
E Anceaume, Y Busnel, E Le Merrer, R Ludinard, JL Marchand, ...
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
102014
Performance evaluation of large-scale dynamic systems
E Anceaume, R Ludinard, B Sericola
ACM SIGMETRICS Performance Evaluation Review 39 (4), 108-117, 2012
102012
Modeling and evaluating targeted attacks in large scale dynamic systems
E Anceaume, B Sericola, R Ludinard, F Tronel
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
102011
Markov chains competing for transitions: Application to large-scale distributed systems
E Anceaume, F Castella, R Ludinard, B Sericola
Methodology and Computing in Applied Probability 15, 305-332, 2013
92013
Fixme: A self-organizing isolated anomaly detection architecture for large scale distributed systems
E Anceaume, E Le Merrer, R Ludinard, B Sericola, G Straub
International Conference On Principles Of Distributed Systems, 1-15, 2012
92012
Analytical study of adversarial strategies in cluster-based overlays
E Anceaume, F Brasileiro, R Ludinard, B Sericola, F Tronel
2009 International Conference on Parallel and Distributed Computing …, 2009
92009
Performance evaluation of a peer-to-peer backup system using buffering at the edge
AM Kermarrec, E Le Merrer, N Le Scouarnec, R Ludinard, P Maillé, ...
Computer communications 52, 71-81, 2014
82014
Dependability evaluation of cluster-based distributed systems
E Anceaume, F Brasileiro, R Ludinard, B Sericola, F Tronel
International Journal of Foundations of Computer Science 22 (05), 1123-1142, 2011
72011
A geometric approach to noisy EDM resolution in FTM measurements
J Henry, N Montavont, Y Busnel, R Ludinard, I Hrasko
Computers 10 (3), 33, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20