![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Ben Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, December). An algorithmic approach to verification of intransitive non-interference in security policies [Paper]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. External link
Lafrance, S., & Mullins, J. (2003, June). A symbolic approach to the analysis of security protocols [Paper]. LICS 2003 Satellite Workshop on Foundations of Computer Security (FCS 2003), Ottawa, Ont. Canada. Unavailable
Lafrance, S., & Mullins, J. (2003, July). Using admissible interference to detect denial of service vulnerabilities [Paper]. 6th International Workshop in Formal Methods (IWFM 2003) and Electronic Workshops in Computing by British Computer Society (BCSeWiC 2003), Dublin, Irlande. External link
Lafrance, S., & Mullins, J. (2002, January). A generic enemy process for the analysis of cryptographic protocols [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Lund, Suède. Unavailable