Guevara Noubir

▬ Publications

  1. S. Narain, T. Vo-Huu, K. Block, G. Noubir, “The Perils of User Tracking Using Zero-Permission Mobile Apps”, IEEE Security and Privacy Magazine, 2017, [Full Paper PDF].
  2. K. Block, S. Narain, G. Noubir, “An Autonomic and Permissionless Android Covert Channel”, in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017, [Full Paper PDF].
  3. E.-O. Blass, G. Noubir, “Secure Logging with Crash Tolerance”, IEEE Conference on Communications and Networks Security (CNS), 2017,  [Full Paper PDF].
  4. E.-O. Blass, T. Mayberry, G. Noubir, “Multi-Client Oblivious RAM Secure Against Malicious Servers”,  International Conference on Applied Cryptography and Network Security (ACNS), 2017, [Full Paper PDF].
  5. S. Narain, T. Vo-Huu, K. Block, G. Noubir, “Inferring Location and Traffic Patterns without Permissions using Side-Channels”, in Proceedings of IEEE Symposium on Security and Privacy, 2016, [Full Paper PDF].
  6. T. Vo-Huu, T. Vo-Huu, G. Noubir, “Fingerprinting Wi-Fi Devices using Software Defined Radio”, in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2016, [Full Paper PDF].
  7. T. Vo-Huu, T. Vo-Huu, G. Noubir, “Interleaving Jamming in Wi-Fi Networks”, in Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2016, [Full Paper PDF].
  8. A. Sanatinia, G. Noubir, “Honey Onions: a Framework for Characterizing and Identifying Misbehaving Tor HSDirs”, in Proceedings of IEEE Conference on Communication Networks Security, 2016, [Full Paper PDF].
  9. A. Sanatinia, G. Noubir, “HOnions: Towards Detection and Identification of Misbehaving Tor HSDirs”, Hot PETS (part of the PETS Symposium), 2016, [Full Paper PDF].
  10. Liangxiao Xin, D. Starobinski, G. Noubir, “Cascading Denial of Service Attacks on Wi-Fi Networks”, in Proceedings of IEEE Conference on Communication Networks Security, 2016, [Full Paper PDF], Best Paper Award.
  11. G. Noubir, A. Sanatinia, “Trusted Code Execution on Untrusted Platforms using Intel SGX”, Virus Bulletin, VB, 2016.
  12. A. Cassola, E.-O. Blass, G. Noubir, “Authenticating Privately over Public Wi-Fi Hotspots”, in Proceedings of the ACM Conference on Computer and Communications Security (CCS’15), [Full Paper PDF].
  13. A. Sanatinia, G. Noubir, “OnionBots: Subverting Privacy Infrastructure for Cyber Attacks”, in Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’15), 2015, [Full Paper PDF].
  14. T. Vo-Huu, G. Noubir “Mitigating Rate Attacks through Crypto-Coded Modulation”, in Proceedings of ACM MobiHoc, 2015, [Full Paper PDF].
  15. T. Moataz, E.-O. Blass, G. Noubir, "Recursive Trees for Practical ORAM", in Proceedings of Privacy Enhancing Technologies Symposium (PETS'15), 2015, [Full Paper PDF].
  16. T. Mayberry, E.-O. Blass, G. Noubir, "Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists", in Proceedings of Privacy Enhancing Technologies Symposium (PETS'15), 2015, [Full Paper PDF].
  17. K. Block, G. Noubir, “Return of the Covert Channel, Data Center Style”, in Proceedings of ACM Cloud Computing Security Workshop, 2015, [Full Paper PDF]
  18. T. D. Vo-Huu, E.-O. Blass, and G. Noubir, "EPiC: Efficient Privacy-preserving Counting with MapReduce", in Proceedings of Networked Systems, NETYS'15, Lecture Notes in Computer Science, 2015, [Full Paper PDF].
  19. T. Jin, T. D. Vo-Huu, E.-O. Blass, and G. Noubir, "BaPu: Efficient and Practical Bunching of Access Point Uplinks", in Proceedings of Networked Systems, NETYS'15, Lecture Notes in Computer Science, 2015, [Full Paper PDF].
  20. E.-O Blass, 1.E.-O. Blass, T. Mayberry, G. Noubir, K. Onarlioglu (2014). “Toward Robust Hidden Volumes using Write-Only Oblivious RAM”, in Proceedings of the ACM Conference on Computer and Communications Security (CCS’14), [Full Paper PDF].
  21. S. Narain, A. Sanatinia and G. Noubir, (2014). "Single-stroke Language-Agnostic Keylogging using Stereo-Microphones and Domain Specific Machine Learning", in Proceedings of ACM Conference on Wireless Network Security (WiSec'14), 2014 [Full Paper PDF].
  22. K. Firouzbakht, G. Noubir, M. Salehi (2014). “On the Capacity of Adaptive Packetized Wireless Communication Links under Jamming”,  in IEEE Transactions on Wireless Communications, [Full Paper PDF].
  23. T. Vo-Huu, E.-O. Blass, G. Noubir (2013). “Counter-Jamming using Mixed Mechanical and Software Interference Cancellation”, in Proceedings of ACM Conference on Wireless Network Security, WiSec'13, Runner-up Best Paper Award, [Full Paper PDF].
  24. Z. A. Qazi, JK. Lee, T. Jin, G. Bellala, M. Arndt, G. Noubir (2013). “Application-awareness in SDN”, in Proceedings of ACM SIGCOMM’13, (Demo) [PDF].
  25. T. Jin, T. Vo-Huu, E.-O. Blass, G. Noubir (2013), "BaPu: Efficient and Practical Bunching of Access Point Uplinks", CoRR abs/1301.5928 (2013).
  26. Amirali Sanatinia, Sashank Narain, Guevara Noubir (2013). "Wireless Spreading of WiFi APs Infections using WPS Flaws: an Epidemiological and Experimental Study", in Proceedings of the Symposium on Security Analytics and Automation, 2013, [Full Paper PDF].
  27. A. Cassola, W. Robertson, E. Kirda, G. Noubir (2013). “A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication”, in the Proceedings of the Network & Distributed System Security Symposium, NDSS, 2013, [Full Paper PDF].
  28. A. Cassola, T. Jin, G. Noubir, B. Thapa (2013). “Efficient Spread Spectrum Communication without Pre-shared Secrets”, IEEE Transactions on Mobile Computing, TMC, 2013, [Full Paper PDF].
  29. H. Javaheri, B. Barbiellini, G. Noubir (2012). “Energy Transfer Performance of Mechanical Nanoresonators Coupled with Electromagnetic Fields”, Nanoscale Research Letters 2012 7:572. [Provisional PDF].
  30. E.-O. Blass, G. Noubir, T. Vo-Huu, “EPiC: Efficient Privacy-Preserving Counting for MapReduce”, Cryptology ePrint Archive: Report 2012/452, 2012, http://eprint.iacr.org/2012/452.
  31. K. Firouzbakht, G. Noubir, M. Salehi (2012). “On the Capacity of Rate-Adaptive Packetized Wireless Communication Links under Jamming”,  in Proceedings of ACM Conference on Wireless Network Security, Wisec'12, [Full Paper PDF].
  32. Y. Wang, G. Noubir (2013). “Distributed Cooperation and Diversity for Hybrid Wireless Networks”, IEEE Transactions on Mobile Computing, 2013, [Full Paper PDF].
  33. T. Jin, G. Noubir, (2012). “WiZi-Cloud: Application-transparent Dual ZigBee-WiFi for Mobile Internet”, Technical Report, [Full Paper PDF].
  34. Koorosh Firouzbakht, Guevara Noubir, Masoud Salehi. (2012) “Jamming games against multi-rate superposition coding transmitters”, in the Proceedings of Conference on Information Sciences and Systems, CISS, 2012.
  35. E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman and B. Thapa. “Performance of IEEE 802.11 under Jamming”, in Mobile Networks and Applications (MONET), Springer, to appear, [Full Paper PDF].
  36. T. Jin, G. Noubir, B. Sheng (2011). “WiZi-Cloud: Application-transparent Dual ZigBee-WiFi Radios for Low Power Internet Access”, in Proceedings of IEEE Infocom'11, [Full Paper PDF].
  37. G. Noubir, R. Rajaraman, B. Sheng, B. Thapa (2011). “On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming”, in Proceedings of ACM Conference on Wireless Network Security, Wisec'11, Best Paper Award, [Full Paper PDF].
  38. E. O. Blass, A. Kurmus, R. Molva, G. Noubir, A. Shikfa (2011). “The Ff-Family of Protocols for RFID-Privacy and Authentication”, in IEEE Transactions on Dependable and Secure Computing, 2011, [Full Paper PDF].
  39. H. Javaheri, G. Noubir (2010). “ iPoint: A Platform-independent Passive Information Kiosk for Cell Phones”, in Proceedings of the 7th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networksi, SECON'10, [Full Paper PDF].
  40. H. Javaheri, G. Noubir, Y. Wang (2010). “Distributed Link Bonding for Hybrid Wireless Networks”, Technical Report [Full Paper PDF]
  41. Y. Wang, G. Noubir, H. Javaheri (2010). “Distributed Cooperation and Diversity for Hybrid Wireless Networks”, in Proceedings of International Conference of Wired/Wireless Internet Communications (WWIC), 2010, [Full Paper PDF].
  42. G. Noubir, W. Qian, B. Thapa, Y. Wang (2009). “Experimentation-Oriented Platform for Development and Evaluation of MANET Cross-Layer Protocols”, in Ad Hoc Networks Journal, Elsevier, 2009, [Abstract, Full Paper PDF].
  43. H. Javaheri, G. Noubir, S. Noubir (2009). “RF Control of Biological Systems: Applications to Wireless Sensor Networks”, in Proceedings of the Fourth International Conference on Nano-Networks, NanoNet'09, [Full Paper PDF].
  44. T. Jin, G. Noubir, B. Thapa (2009). “Zero Pre-Shared Secret Key Establishment in the Presence of Jammers”, in Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc'2009, [Full Paper PDF].
  45. E.-O. Blass, A. Kurmus, R. Molva, G. Noubir, A. Shikfa (2009). "The Ff-family of protocols for RFID-privacy and authentication", in Proceedings of the 5th Workshop on RFID Security, RFIDSec'09, [Full Paper PDF].
  46. E. Bayrataroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa (2008). "On the Performance of IEEE 802.11 under Jamming", in Proceedings of IEEE Infocom'08 , [Full Paper PDF].
  47. P. Tague, D. Slater, G. Noubir, R. Poovendran (2008). “Linear Programming Models for Jamming Attacks on Network Traffic Flows”, 6th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'08), April 2008, [Full Paper PDF].
  48. Agnes Chan, Xin Liu, Guevara Noubir, and Bishal Thapa (2007), “Control Channel Jamming: Resilience and Identification of Traitors”, IEEE International Symposium on Information Theory ISIT'07, [Full Paper PDF].
  49. H. Javaheri, G. Noubir, Y. Wang (2007). “ Cross-Layer distributed diversity for heterogeneous wireless networks”, in Proceedings of the Fifth International Conference on Wired/Wireless Internet Communication, WWIC'07 , LNCS, Springer-Verlag, [Full Paper PDF].
  50. Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan (2007). “ SPREAD: Foiling Smart Jammers using Multi-layer Agility ”, IEEE Infocom'07 Mini-Symposium, [Full Paper PDF].
  51. G. Noubir (2006). “ SWARM: Secure Wireless Ad hoc Robots on Mission - A Course Where Wireless Security Meets Robotics ”, in the Proceedings of The Colloquium for Information Systems Security Education, CISSE'06, [Full Paper PDF].
  52. L. Jia, G. Noubir, R. Rajaraman, and R. Sundaram (2006). “Group-independent Spanning Tree for Data Aggregation in Dense Sensor Networks,” in Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems DCOSS'06.
  53. Ch. Ravi Chandra, A. Kumarasubramaniam, R. Manokaran, G. Noubir and C. Pandu Rangan, and R. Sundaram (2006). “Steganographic Communication in Ordered Channels”, in Proceedings of Information Hiding IH'06, [Full Paper PDF].
  54. F. Depienne, G. Noubir and Y. Wang (2006). “A Platform for Heterogeneous Vehicular Communications and Applications”, IEEE workshop on Automotive Networking and Applications (AUTONET), 2006, [Full Paper PDF].
  55. L. Jia, G. Lin, G. Noubir, R. Rajaraman and R. Sundaram(2005), "Universal Approximations for TSP, Steiner Tree and Set Cover", in the Proceedings of ACM STOC'05, [Full Paper PDF].
  56. J. Chen, L. Jia, X. Liu, G. Noubir, R. Sundaram (2005). “Minimum Energy Accumulative Routing in Wireless Networks”, in the Proceedings of IEEE Infocom [Abstract, Full Paper PDF].
  57. T. Kaya, P. Lin, G. Noubir, and W. Qian (2005). “Efficient Multicast Trees with Local Knowledge on Wireless Ad hoc Networks ”, in the Proceedings of the International Conference on Wired/Wireless Internet Communications, Lecture Notes in Computer Science, Springer-Verlag, 2005.
  58. L. Jia, X. Liu, G. Noubir, R. Rajaraman (2005). "Transmission Power Control for Ad Hoc Wireless Networks: Throughput, Energy and Fairness", in Proceedings of IEEE Wireless Communications on Networking Conference, WCNC'05.
  59. G. Lin, G. Noubir (2004) “On Link Layer Denial of Service in DATA Wireless LANs”, in the Wiley Journal on Wireless Communications and Mobile Computing, Wiley, August, 2004, [Abstract, Full Paper PDF].
  60. G. Lin, G. Noubir, R. Rajaraman (2004). “Mobility Models for Ad hoc Network Simulation”, in Proceedings of IEEE Infocom [Abstract, Full Paper PDF].
  61. S. Ci, H. Sharif, and G. Noubir. "Improving Goodput of the IEEE 802.11 MAC Protocol by Using Congestion Control Methods", in the International Journal on Wireless and Optical Communications (IJWOC), Vol. 1, No.2 (2004) 1-9, World Scientific Publishing [Abstract, Full Paper PDF].
  62. G. Noubir (2004). “On Connectivity in Ad Hoc Network under Jamming Using Directional Antennas and Mobility”, in International Conference on Wired /Wireless Internet Communications, Lecture Notes in Computer Science, Springer-Verlag [Abstract, Full Paper PDF].
  63. T. Kaya, G. Lin, G. Noubir, A. Yilmaz (2003). “Secure Multicast Groups on Ad Hoc Networks ”, in Proceedings of ACM Workshop on Security of Ad hoc and Sensor Networks [Abstract, Full Paper PDF].
  64. G. Noubir, G. Lin, M. Golitsine, N. Plante (2003). “Secure Sharing of Location Information over Ad Hoc Networks: An Application of Secure Multicast ”, Poster, ACM Mobihoc, 2003 [Abstract, Full Paper PDF].
  65. G. Noubir, G. Lin (2003). “Low Power DoS Attacks in Data Wireless LANs and Countermeasures”, Poster, ACM Mobihoc [Abstract, Full Paper PDF].
  66. G. Noubir, G. Lin, M. Golitsine, N. Plante (2003). “Secure Sharing of Location Information over Ad Hoc Networks: An Application of Secure Multicast ”, in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), volume 7, Issue 3 [Abstract].
  67. G. Noubir, G. Lin (2003). “Low Power DoS Attacks in Data Wireless LANs and Countermeasures”, in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), volume 7, Issue 3 [Abstract].
  68. G. Lin, G. Noubir (2003). “Secure Multicast over Multihop Wireless Ad Hoc Networks”, in the Proceedings of Mobile Ad Hoc Networks Workshop (MADNET), Sophia-Antipolis , France .
  69. F. Zhu, A. Chan, G. Noubir (2003). "Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast" , in Proceedings of MILCOM'03 [Full Paper PDF].
  70. G. Lin, G. Noubir, “Energy Efficient Broadcast with Sectored Antennas in Wireless Ad Hoc Networks”, in Proceedings of the IASTED/IEEE Wireless and Optical Communications Conference, July 2002 [Abstract, Full Paper PDF].
  71. G. Noubir, F. Zhu, A. H. Chan, “Key Management for Simultaneous Join/Leave in Secure Multicast”, to appear in the Proceedings of IEEE International Symposium on Information Theory (ISIT), June, 2002 [Abstract, Full Paper PDF].
  72. J.-C. Birget, X. Zou, G. Noubir, B. Ramamurthy, “Hierarchy-Based Access Control in Distributed Environments” in the Proceedings of IEEE ICC, June 2001 [Abstract, Full Paper PDF].
  73. S. Ci, H. Sharif, and G. Noubir (2001). “Improving the Performance of the MAC Layer Using Congestion Control/Avoidance Methods in a Wireless Network” in the Proceedings of the 16th ACM Symposium on Applied Computing, Las Vegas, 2001.
  74. G. Noubir, and L. von Allmen (1999), “Security Issues in Internet Protocols over Satellite Links”, In Proceedings of the IEEE Vehicular Technology Conference (VTC’99), Amsterdam, Holland [Abstract, Full Paper PDF].
  75. G. Noubir (1999). “A Scalable Key Distribution Scheme for Dynamic Multicast Groups.” In Proceedings of the Third European Research Seminar on Advances in Distributed Systems, Madeira Island, Portugal [Abstract, Full Paper PDF].
  76. G. Noubir (1999). “FRAMES Demonstrator Packet Access Mode.” In Proceedings of the ACTS FRAMES Workshop, Delft, Netherlands.
  77. Noubir, K. Vijayanada and H. J. Nussbaumer (1998). “Signature-Based Method for Run-Time Fault Detection in Communication Protocols.” Computer Communications Journal, Butterworth-Heinemann, Vol.21, No 5, May 1998 [Abstract, Full Paper PDF].
  78. G. Noubir (1998). “Inter-layer Radio Resource Management in Hierarchical Cell Structures for the FRAMES Project.” In Proceedings of the IEEE Globecom98, Sydney, Australia.
  79. G. Noubir (1998). “Collision-Free One-Way Communication Using Reed-Solomon Codes.” In Proceedings of the IEEE International Symposium on Information Theory and Applications (ISITA’98), Mexico city [Abstract, Full Paper PDF].
  80. G. Noubir (1998). “Inter-layer Radio Resource Management in Hierarchical Cell Structures.” In Proceedings of the 9th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’98), Boston, Massachusetts [Abstract, Full Paper PDF].
  81. B. Y. Choueiry and G. Noubir (1998). “On the computation of Local Interchangeability in Discrete Constraint Satisfaction Problems.” In the Proceedings of AAAI’98, pages 326-333. Madison, Wisconsin [Abstract, Full Paper PDF].
  82. B. Y. Choueiry and G. Noubir (1997). “Using Complete No-Good Sets to Build a Disjunctive Decomposition Scheme for Discrete Constraints Satisfaction Problems.” In the Proceedings of the 10th International FLAIRS Conference, pages 40-46. Daytona Beach, Fla.
  83. Noubir, B. Y. Choueiry and H. J. Nussbaumer (1996). “Fault Tolerant Multiple Observers Using Error Control Codes.” In Proceedings of the IEEE International Conference on Network Protocols ICNP'96, Ohio, U.S.A [Abstract, Full Paper PDF].
  84. G. Noubir and B. Y. Choueiry (1996). “Algebraic Techniques for the Optimization of Control Flow Checking.” In the Proceedings of the 26th IEEE Symposium on Fault-Tolerant Computing (FTCS'96) pages 128-137, Sendai, Japan [Abstract, Full Paper PDF].
  85. G. Noubir and H. J. Nussbaumer (1995). “Self-correcting polynomial programs.” In Journal of Reliable Computing, Vol 2, No 2, 1996.
  86. G. Noubir and M.-A. Péraldi (1996). “Vérification de la Sureté d'Exécution de Grafcets.” In Real-Time Systems and Embeded Systems, RTS'96. Paris, France, January, 1996.
  87. B. Y. Choueiry, G. Noubir, and B. Faltings (1996). “Blending AI and mathematics: the case of resource allocation.” In the Proceedings of the Fourth International Symposium on Artificial Intelligence and Mathematics. Fort Lauderdale, Fla.
  88. G. Noubir, K. Vijayananda, and H. J. Nussbaumer (1995). “A robust transport protocol for run-time fault detection.” In Proceedings of ICNP'95: IEEE International Conference on Network Protocols, Tokyo, Japan [Abstract, Full Paper PDF].
  89. G. Noubir and H. J. Nussbaumer (1995). “Voting with low communication overhead.” In Proceedings of the Sixth International Conference on Signal Processing Applications & Technology (ICSPAT`95), Boston, MA [Abstract, Full Paper PDF].
  90. G. Noubir and H. J. Nussbaumer (1995). “Self-correcting polynomial programs.” In Proceedings of Symposium of Scientific Computing, Computer Arithmetic & Validated Numerics, Kluwer-verlag, Wuppertal, Germany.
  91. G. Noubir, K. Vijayananda, and P. Raja (1995). “Signature based technique for fault detection in communication protocols.” In Proceedings of the IEEE International Symposium on Information Theory, Whistler, BC, Canada.
  92. G. Noubir, K. Vijayananda, and G. Berthet (1995). “Robust communication protocols for run-time fault detection.” In Proceedings of the Twelfth IEEE International Conference on Computer Communication (ICCC`95), pages 493-498. Seoul, Korea.
  93. G. Noubir and K. Vijayananda (1995). “Fault detection in communication protocols using signature analysis.” In Proceedings of the International Conference on Intelligent Information Management Systems (IASTED/ISMM’95), pages 148-151. Washington, D.C.
  94. G. Noubir and H. J. Nussbaumer (1995). “Arithmetization and self-reducibility methods for fault-detection in combinatorial circuits.” In Proceedings of the Thirteenth IASTED International Conference Applied Informatics, pages: 21-23. Innsbruck, Austria.
  95. G. Berthet, K. Vijayananda, and G. Noubir (1995). “A new presentation layer protocol for partitioned syntax transformation model.” In Proceedings of the IEEE Twelfth International Conference on Computer Communication (ICCC’95), pages 499-504. Seoul, Korea.
  96. T. Kouthon, G. Noubir, P. Raja, and J.-D. Decotignie (1995). “Modeling distributed PLC control.” In Proceedings of the Third IFAC/IFIP Workshop on Algorithms and Architectures for Real-Time Control (AARTC’95), pages: 239-246. Ostend, Belgium.
  97. G. Noubir, Prasad Raja, and J.-D. Decotignie (1994). “Simulating the fieldbus synchronous model by timed Petri nets.” In Proceedings of IEEE IECON'94, pages 1205-1210. Bologna, Italy.
  98. D. R. Stephens, G. Noubir, and M. Moreaux (1994). “Tool path correction in 2 and 3 dimensions.” In Proceedings of EURISCON'94, pages 1796-1809. Malaga, Spain.
  99. B. Y. Choueiry, B. Faltings, and G. Noubir (1994). “Abstraction methods for resource allocation.” In Proceedings 1994 Workshop on Theory Reformulation and Abstraction, pages 2-70/2-90. Jackson Hole, Wyoming.
  100. G. Noubir, Daniel R. Stephens, and Prasad Raja (1993). “Specification of timed finite state machine in Z for distributed real-time systems.”. In Proceedings of the IEEE Fourth Workshop on Future Trends in Distributed Computing Systems, pages 319-325. Lisbon, Portugal.
  101. P. Raja and G. Noubir (1993). “Static and dynamic polling mechanisms for fieldbus networks.” In the Journal of Operating Systems Review, 27(3), pages 34-45.
  102. P. Raja, G. Noubir, L. Ruiz, J. Hernandez, and J.-D. Decotignie (1993). “Synchronous model for distributed real-time control systems.” In Proceedings ICPADS'93, pages 26-30. Taipei, Taiwan.
  103. P. Raja, J. Hernandez, L. Ruiz, G. Noubir, and J.-D. Decotignie (1993). “A software architecture for maintaining temporal consistency in a distributed real-time environment.” In Proceedings of COMPSAC'93, pages 380-387. Phoenix, Arizona.
  104. P. Raja, G. Noubir, L. Ruiz, J. Hernandez, and J.-D. Decotignie (1993). “Analysis of polling protocols for fieldbus networks.” In the ACM-SIGCOMM Computer Communication Review, 23(3):69--90.
  105. P. Raja and G. Noubir (1993). “Implementing synchronous network model on a FIP network.” In IEEE Workshop on Advances in Parallel Distributed Systems (in conjunction with IEEE Symposium on reliable Distributed Systems), pages 20-27. Princeton, NJ.
  106. P. Raja and G. Noubir (1993). “A functional approach for expressing temporal properties in inputs and outputs of real-time applications.” In Proceedings of the Fourth Workshop on Future Trends in Distributed Computing Systems, pages 312-338. Lisbon, Portugal.
  107. P. Raja, G. Noubir, L. Ruiz, J. Hernandez, M. Riese, and J.-D. Decotignie (1993). “Analysis of a class of polling protocols for fieldbus networks.” In Proceedings of ICDDS'93, pages 139-155. Palma de Majorca, Spain.