Publications

Year Type Publications
2013 Journal
Sethserey, S., Albert, T.M., JosepLluis R.E. (2013). Using cache to optimize question wave social search agents, Techno-Science Research Journal, Vol. 01, pp: 25-30.
2013 Journal
Seangmeng, L. (2013). Improving Recognition Result Using Character Trigram for Khmer OCR, Techno-Science Research Journal, Vol. 01, pp: 31-33
2013 Journal
Annanda Thavymony RATH and Jean-Noël Colin. Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare. Int. J. Secur. Netw. 8, 2 (Aug. 2013), 94-105. Volume 8, Issue 2, DOI: 10.1504/IJSN.2013.055943.
2013 Conference
Sopheap, S., Sethserey, S. Flipped classroom: a case study in engineering program, e-Learning Korea 2013 conference, Korea, 3-5 September 2013
2013 Conference
Chhun, S., Moalla, N., & Ouzrout, Y. (2013). “Model-Based Service Orchestration for Business Applications Re-Engineering”, a publication of the International Council on Systems Engineering, volume 16, issue 4, pp. 28-29
2013 Conference
Annanda Thavymony RATH and Jean-Noël Colin. “Towards enforcement of purpose for privacy policy in distributed healthcare”. The third IEEE International Conference on Consumer eHealth Platforms, Services and Applications (CeHPSA), IEEE CCNC 2013. Las Vegas, NV, USA. DOI: 10.1109/CCNC.2013.6488578, Print ISBN:978-1-4673-3131-9.
2013 Conference
Annanda Thavymony RATH and Jean-Noël Colin. “Access and Usage Control requirements for Patient Controlled Record type of Healthcare Information System”, International Conference on Health Informatics (HEALTHINF) 2013, Barcelona, Spain. pp. 331-336.
2013 Conference
Annanda Thavymony RATH and Jean-Noël Colin. “A purpose model and policy enforcement engine for usage control in distributed healthcare information system”, International Conference on Health Informatics (HEALTHINF) 2013, Barcelona, Spain. pp. 174-180.
2013 Conference
Annanda Thavymony RATH and Jean-Noël Colin. “Modelling and Expressing Purpose Validation Policy for Privacy-aware Usage Control in Distributed Environment”. 4e Atelier sur la Protection de la Vie Privé (APVP) (4th Workshop on the Protection of Privacy). Les Loges en Josas, 17-19 June 2013, France.
2014 Conference
Laurent Besacier, B Lecouteux, Ngoc-Quang Luong, K Hour, M Hadjsalah. WORD CONFIDENCE ESTIMATION FOR SPEECH TRANSLATION. International Workshop on Spoken Language Translation, Dec 2014, Lake Tahoe, United States. 2014. <hal-01110393>
2014 Conference
2014 Conference
Samboeun HEAN, Kimheng SOK (2014) Using Flipped Methodology for Teaching and Learning in Engineering Program: Case Study in ITC, Cambodia. In ICET 2014 Conference, Seoul, Korea.
2014 Conference
Wautelet, Yves, Samedi Heng, Manuel Kolp, and Isabelle Mirbel. "Unifying and Extending User Story Models." In Advanced Information Systems Engineering, pp. 211-225. Springer International Publishing, 2014.
2014 Conference
S. Kheang, K. Katsurada, Y. Iribe, and T. Nitta, “Novel Two-Stage Model for Grapheme-to-Phoneme Conversion using New Grapheme Generation Rules,” in Proc. of ICAICTA, (Bandung, Indonesia), pp. 110-115, August 2014.
2014 Journal
Chhun, S., Moalla, N., & Ouzrout, Y. (2014). “QoS ontology for service selection and reuse”, Journal of Intelligent Manufacturing, doi:10.1007/s10845-013-0855-6, Springer US, pp. 1-13.
2014 Journal
Catherine PAPETTI, Kimheng SOK, Serge MIRANDA et Gregory GALLI (2014). Chapitre 3. Une application de gestion de tags pour le tourisme mobiquitaire: Application au projet Thom au Cambodge. In Immatériel Touristique (pp. 139-158). France: ISBN: 978-2-343-03087, L'Harmattan.
2014 Journal
S. Kheang, K. Katsurada, Y. Iribe, and T. Nitta, “New grapheme generation rules for two-stage model-based grapheme-to-phoneme conversion,” Journal of ICT Research and Applications, vol. 8, no. 2, pp. 157-174, 2014.
2014 Journal
S. Kheang, K. Katsurada, Y. Iribe, and T. Nitta, “Solving the phoneme conflict in grapheme-to-phoneme conversion using a two-stage neural network-based approach,” IEICE Transactions on Information and Systems, vol. E97-D, pp. 901-910, April 2014.
2015 Conference
Annanda Thavymony RATH and Jean-Noël Colin. “Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System”. The 29th Annual International Federation for Information Processing (IFIP), WG 11.3 Working Conference on Data and Applications Security and Privacy, Fairfax, VA, USA , July 13-15, 2015.
This paper will also be a part of a book (Chapter 16) published in Springer 2015. ISBN: 978-3-319-20809-1, Book ID: 340025_1_En.
2015 Conference
Annanda Thavymony RATH and Jean-Noël Colin. ``Purpose Enforcement: Predicting purpose achievement using association rule learning method with the support of access history and contextual information". ESORICS 2015, 20th European Symposium on Research in Computer Security, 21-25, September 2015, Vienna, Austria.
2015 Conference
SOK, K., Serge Miranda (2015). “Future Mobiquitous Tourism in Cambodia”, (pp. 257-259). In The 15th SCA Conference and International Symposium under the theme Science and Technology for Culture, 15th-16th May 2015 ,Siem Reap, Cambodia.
2015 Conference
Tith Dara and Annanda Thavymony RATH. Prediction methods: Predicting access goal based on user’s access history. The third international conference on inclusive innovation and innovative management, ICIIIM 2015, 25- 26 Nov 2015, Pathumthani, Thailand.
2015 Conference
S. Kheang, K. Katsurada, Y. Iribe, and T. Nitta, “Model Prioritization Voting Schemes for Phoneme Transition Network-based Grapheme-to-Phoneme Conversion,” in Proc. of the International Conference on Computer and Information Science and Technology (CIST'15), (Ottawa, Canada), May 2015.
2015 Conference
Chuor, P., Verleysen, M., & Valy, D. (December 2015). Khmer Optical Character Recognition Using Zernike Moment. 2015 Khmer Natural Language Processing annual conference (KNLP 2015)
2016 Journal
S. Kheang, K. Katsurada, Y. Iribe, and T. Nitta, “Using reversed sequences and grapheme generation rules to extend the feasibility of a phoneme transition network-based grapheme-to-phoneme conversion,” IEICE Transactions on Information and Systems, Vol.E99-D, No. 4, April 2016.
2016 Conference
Valy, D., Verleysen, M., & Sok, K. (2016, October). Line Segmentation Approach for Ancient Palm Leaf Manuscripts using Competive Learning Algorithm. In Frontiers in Handwriting Recognition (ICFHR), 2016 15th International Conference on. IEEE.
2016 Conference
Burie, J. C., Coustaty, M., Hadi, S., Kesiman, M. W. A., Ogier, J. M., Paulus, E., Sok, K., Sunraya, I. M. G. & Valy, D. (2016, October). ICFHR2016 Competition on Analysis of Handwritten Text in Images of Balinese Palm Leaf Manuscripts. In Frontiers in Handwriting Recognition (ICFHR), 2016 15th International Conference on. IEEE.
2017 Journal
Kesiman, M. W. A., Valy, D., Burie, J. C., Paulus, E., Sunarya, I. M. G., Hadi, S., Sok, K., & Ogier, J. M. (2017). Southeast Asian palm leaf manuscript images: a review of handwritten text line segmentation methods and new challenges. Journal of Electronic Imaging, 26(1), 011011-011011.
2017 Conference
Valy, D., Verleysen, M., & Sok, K. (2017). Text Line Segmentation Approach for Grayscale Text Images of Khmer Palm Leaf Manuscripts. In 7th International Conference on Image Processing Theory, Tools, and Applications (IPTA). IEEE.
2017 Conference
D. Valy, M. Verleysen, S. Chhun, and J.-C. Burie, “A New Khmer Palm Leaf Manuscript Dataset for Document Analysis and Recognition: SleukRith Set,” in Proceedings of the 4th International Workshop on Historical Document Imaging and Processing, 2017, pp. 1–6.
2017 Conference
Annanda Thavymony RATH and Jean-Noël Colin. Strengthening Access Control in case of Compromised Account in Smart Home. The 2nd IEEE WiMob 2017 Workshop on Smart Environments & Urban Networking, (SEUNet 2017) Collocated with the 13th IEEE WiMob 2017, Rome, Italy, 9th October 2017.
2017 Conference
Annanda Thavymony RATH and Jean-Noël Colin. Adaptive Risk-aware Access Control Model for Internet of Things. International Workshop on Secure Internet of Things in conjunction with esorics2017. Oslo, 13-15 September 2017.
2018 Journal
M. W. A. Kesiman, D. Valy, J.-C. Burie, E. Paulus, M. Suryani, S. Hadi, M. Verleysen, S. Chhun, and J.-M. Ogier, “Benchmarking of Document Image Analysis Tasks for Palm Leaf Manuscripts from Southeast Asia,” Journal of Imaging, vol. 4, no. 2, p. 43, 2018.
2018 Conference
S. Hen, D. Valy, S. Chhun, and R. Siv, “An Initial Study on Synthetic Data for Khmer Ancient Document Analysis,” in 11th AUN/SEED-Net Regional Conference on Computer and Information Engineering 2018 (AUN-RC CIE 2018), Surabaya, Indonesia, 2018.
2018 Conference
Sok, K., Colin, J-N. & PO, K., 6 déc. 2018, "Blockchain and Internet of Things Opportunities and Challenges", Proceedings of the 9th International Symposium on Information and Communication Technology, SoICT 2018. p. 150-154 5 p.
2018 Conference
Burie, J. C., Kesiman, M. W. A., Valy, D., Paulus, E., Suryani, M., Hadi, S., Verleysen, M., Chhun, S. & Ogier, J. M. (2018). ICFHR 2018 Competition on Document Image Analysis Tasks for Southeast Asian Palm Leaf Manuscripts. In 16th International Conference on Frontiers in Handwriting Recognition (ICFHR). IEEE.
2018 Conference
Valy, D., Verleysen, M., Chhun, S. & Burie, J. C. (2018). Character and Text Recognition of Khmer Historical Palm Leaf Manuscripts. In 16th International Conference on Frontiers in Handwriting Recognition (ICFHR). IEEE.
2018 Conference
Phutphalla Kong, Matei Mancas, Seng Kheang, and Bernard Gosselin. Saliency and object detection. In 2018 International Conference on Pattern Recognition and Artificial Intelligence (ICPRAI), pages 523–528. CENPARMI, 2018.
2018 Conference
Phutphalla Kong, Matei Mancas, Nimol Thuon, Seng Kheang, and Bernard Gosselin. Do deep-learning saliency models really model saliency? In 2018 25th IEEE International Conference on Image Processing (ICIP), pages 2331–2335. IEEE, 2018.