1 % This file was created with JabRef 2.3.1.
2 % Encoding: ANSI_X3.4-1968
4 @INPROCEEDINGS{rifq/others03,
5 author = {Rifqi, Maria and Detyniecki, Marcin and Bouchon-Meunier, Bernadette},
8 x-international-audience = {yes},
9 title = {{D}iscrimination power of measures of resemblance},
10 booktitle = {{IFSA}'03},
12 location = {Istanbul, Turkey}
16 @ARTICLE{Rifqi:2000:DPM:342947.342970,
17 author = {Rifqi, Maria and Berger, Vincent and Bouchon-Meunier, Bernadette},
20 x-international-audience = {yes},
21 title = {{D}iscrimination power of measures of comparison},
22 journal = {{F}uzzy {S}ets and {S}ystems},
30 @book{Anderberg-Cluster-1973,
31 added-at = {2008-10-29T00:31:48.000+0100},
32 author = {Anderberg, M. R.},
33 biburl = {http://www.bibsonomy.org/bibtex/2f586cc49441c591f06539d11d3e06006/kirylenka},
34 interhash = {a94e1d2f9a5f6cf6c2e7822f789040b0},
35 intrahash = {f586cc49441c591f06539d11d3e06006},
36 keywords = {cluster_analysis wismasys0809},
37 publisher = {Academic Press},
38 timestamp = {2008-10-29T00:31:48.000+0100},
39 title = {Cluster Analysis for Applications},
45 @article{yule1950introduction,
46 Author = {Yule, G.U. and Kendall, MG},
47 Date-Added = {2009-08-14 22:16:50 -0500},
48 Date-Modified = {2009-08-14 22:16:50 -0500},
49 Journal = {Statistics},
50 Title = {An Introduction to the Theory of},
54 @inproceedings{fgb11:ip,
56 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
59 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
60 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
61 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications},
63 address = {Sevilla, Spain},
64 editor = {Javier Lopez and Pierangela Samarati},
65 publisher = {SciTePress},
73 author = {Cayre, F. and Bas, P.},
74 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
75 journal = {IEEE Transactions on Information Forensics and Security},
80 doi = {10.1109/TIFS.2007.916006},
82 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
83 security, watermarking, Kerckhoffs-based embedding security classes,
84 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
85 steganography security, watermark-only-attack, watermarking, Security,
86 spread-spectrum (SS) watermarking},
88 timestamp = {2009.06.29}
90 @INPROCEEDINGS{Perez06,
91 author = {Perez-Freire, Luis and Pérez-Gonzalez, F. and Comesaña, Pedro },
92 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
94 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents, San Jose, California},
106 author = {Cayre, F. and Fontaine, C. and Furon, T.},
107 title = {Watermarking security: theory and practice},
108 journal = {IEEE Transactions on Signal Processing},
111 pages = {3976--3987},
113 keywords = {blind source separation, cryptography, watermarking, Fisher information
114 matrix, blind source separation, cryptanalysis, information theory,
115 spread spectrum techniques, substitutive scheme, watermarking security,
116 Blind source separation, Fisher information matrix, equivocation,
117 security, watermarking}
122 @inproceedings{Shujun1,
123 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
124 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
125 Their Roles in Cryptography and Pseudo-Random Coding},
126 booktitle = {Cryptography and Coding, 8th IMA International Conference,
130 publisher = springer,
131 address = springer_loc,
139 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
142 author = {Couchot, Jean-François and Guyeux, Christophe and H\'eam, Pierre-Cyrille},
143 title = {Random Walk in a N-cube Without Hamiltonian Cycle
144 to Chaotic Pseudorandom Number Generation: Theoretical and Practical
146 howpublished = {in submission to the RAIRO - Theoretical Informatics and Applications special issue to the 15-th Mons Theoretical Computer Science Days},
154 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
157 author = {Bakiri, Mohammed and Guyeux, Christophe and Couchot, Jean-Fran{\c}cois and Oudjida, Abdelkrim Kamel},
158 title = {Survey on Hardware Implementation of Random Number Generators on FPGA: Theory and Experimental Analyses},
159 howpublished = {in submission to the ACM Computing Surveys journal},
166 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
172 Couchot, Jean-Fran{\c}cois and
173 Couturier, Rapha\¨el},
174 title = {Blind digital watermarking in PDF documents using
175 Spread Transform Dither Modulation},
176 howpublished = {in submission to the Multimedia Tools and Applications journal},
185 @inproceedings{couchot04:onp,
187 author = {Couchot, Jean-Fran\c{c}ois},
188 title = {V\'erification d'invariant par superposition},
189 booktitle = {{MAJECSTIC}'04, {MA}nifestation de {JE}unes {C}hercheurs {STIC}},
190 address = {Calais, France},
191 ps = {http://lifc.univ-fcomte.fr/~couchot/pubs/cou04.ps.gz},
192 url = {http://lil.univ-littoral.fr/~lewandowski/majecstic/programme.html},
193 note = {Actes en ligne sur { t http://lil.univ-littoral.fr/\~{}lewandowski/majecstic/programme.html}},
194 abstract = {Un système d'événements B modélise un système d'intérêt et l'environnement avec lequel il réagit. Il permet d'exprimer une spécification abstraite au niveau ensembliste, dont les événements sont parfois indéterministes et dont la propriété de cohérence, appelée invariant, s'exprime à l'aide d'une formule logique du premier ordre. Cette étude s'applique à un langage de spécification équivalent à une classe de systèmes d'événements qui conserve les notions d'ensemble, d'indéterminisme et d'invariant écrit en logique équationnelle du premier ordre. Elle propose une démarche de vérification automatique d'invariant inductif et de construction d'un tel invariant par renforcement. L'apport principal est le caractère automatique de la démarche, fondée sur une procédure de décision par superposition. L'étude est illustrée par deux exemples d'algorithmes d'exclusion mutuelle.},
203 @inproceedings{aangc+15:ip,
205 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
208 author = {Alkindy, Bassam and Al'Nayyef, Huda and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
209 title = {Improved Core Genes Prediction for Constructing well-supported Phylogenetic Trees in large sets of Plant Species},
210 booktitle = {IWBBIO 2015, 3rd Int. Work-Conf. on Bioinformatics and Biomedical Engineering, Part I},
212 doi = {10.1007/978-3-319-16483-0_38},
213 url = {http://dx.doi.org/10.1007/978-3-319-16483-0_38},
216 address = {Granada, Spain},
228 @inproceedings{agcs+15:ip,
230 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
233 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Parisod, Christian and Bahi, Jacques},
234 affiliation = {Christian Parisod est privat docent a l'Université de Neuchatel (Suisse)},
235 title = {Hybrid Genetic Algorithm and Lasso Test Approach for Inferring Well Supported Phylogenetic Trees based on Subsets of Chloroplastic Core Genes},
236 booktitle = {AlCoB 2015, 2nd Int. Conf. on Algorithms for Computational Biology},
238 series = {LNCS/LNBI},
240 publisher = {Springer},
241 address = {Mexico City, Mexico},
245 note = {To appear in the LNCS/LNBI series},
251 @inproceedings{bcg11:ip,
253 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
256 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
257 title = {Performance Analysis of a Keyed Hash Function based on Discrete and Chaotic Proven Iterations},
258 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
260 address = {Luxembourg, Luxembourg},
263 note = {Best paper award},
269 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
271 classement = {ACLNI},
274 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
275 title = {Quality analysis of a chaotic proven keyed hash function},
276 journal = {International Journal On Advances in Internet Technology},
288 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
293 author = {Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
294 title = {{STABYLO}: {STeganography with Adaptive, Bbs, and binarY embedding at LOw cost}},
295 journal = {Annals of Telecommunications},
296 doi = {10.1007/s12243-015-0466-7},
297 url = {http://dx.doi.org/10.1007/s12243-015-0466-7},
298 publisher = {Springer},
300 note = {Available online. Paper version to appear},
304 @inproceedings{fccg15:ip,
306 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
309 author = {Fadil, Yousra Ahmed and Couchot, Jean-Fran\c{c}ois and Couturier, Rapha\"el and Guyeux, Christophe},
310 title = {Steganalyzer performances in operational contexts},
311 booktitle = {IIH-MSP 2015, 11th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
313 address = {Adelaide, Australia},
321 @inproceedings{bcfg12a:ip,
323 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
326 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
327 title = {Application of Steganography for Anonymity through the Internet},
328 booktitle = {IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy},
330 url = {http://arxiv.org/abs/1202.5302v1},
331 address = {Venice, Italy},
338 @inproceedings{bcfg+13:ip,
340 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
343 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe and Mazouzi, Kamel},
344 title = {Quality Studies of an Invisible Chaos-Based Watermarking Scheme with Message Extraction},
345 booktitle = {IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
347 doi = {10.1109/IIH-MSP.2013.141},
348 url = {http://dx.doi.org/10.1109/IIH-MSP.2013.141},
349 address = {Beijing, China},
355 @inproceedings{bcfg12b:ip,
357 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
360 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Friot, Nicolas and Guyeux, Christophe},
361 title = {A Robust Data Hiding Process Contributing to the Development of a Semantic Web},
362 booktitle = {INTERNET'2012, 4-th Int. Conf. on Evolving Internet},
364 address = {Venice, Italy},
374 @inproceedings{bcg11b:ip,
376 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
379 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
380 title = {Steganography: a Class of Algorithms having Secure Properties},
381 booktitle = {IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing},
383 address = {Dalian, China},
392 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
395 impact-factor ={1.363},
396 isi-acro = {COMPUT J},
397 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe},
398 title = {Steganography: a class of secure and robust algorithms},
399 journal = {The Computer Journal},
403 doi = {10.1093/comjnl/bxr116},
404 url = {http://dx.doi.org/10.1093/comjnl/bxr116},
405 publisher = {Oxford University Press},
411 @inproceedings{bcgw11:ip,
413 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
416 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Wang, Qianxue},
417 title = {Class of Trustworthy Pseudo Random Number Generators},
418 booktitle = {INTERNET 2011, the 3-rd Int. Conf. on Evolving Internet},
420 address = {Luxembourg, Luxembourg},
428 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
431 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
432 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
433 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},
443 @inproceedings{aagp+15:ip,
445 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
447 classement = {ACTIN},
448 author = {Alsrraj, Reem and Alkindy, Bassam and Guyeux, Christophe and Philippe, Laurent and Couchot, Jean-Fran\c{c}ois},
449 title = {Well-supported phylogenies using largest subsets of core-genes by discrete particle swarm optimization},
450 booktitle = {CIBB 2015, 12th Int. Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics},
452 address = {Naples, Italy},
460 @inproceedings{acgm+14:ij,
462 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
465 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Mouly, Arnaud and Salomon, Michel and Bahi, Jacques},
466 title = {Finding the Core-Genes of Chloroplasts},
467 booktitle = {ICBBS 2014, 3rd Int. Conf. on Bioinformatics and Biomedical Science},
469 series = {IJBBB, Journal of Bioscience, Biochemistery, and Bioinformatics},
471 doi = {10.7763/IJBBB.2014.V4.371},
472 url = {http://dx.doi.org/10.7763/IJBBB.2014.V4.371},
473 address = {Copenhagen, Denmark},
483 @inproceedings{akgcs+14:oip,
485 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
488 author = {Alkindy, Bassam and Guyeux, Christophe and Couchot, Jean-Fran\c{c}ois and Salomon, Michel and Bahi, Jacques},
489 title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts},
490 booktitle = {BIBM14, IEEE Int. Conf. on Bioinformatics and Biomedicine},
491 address = {Belfast, United Kingdom},
495 note = {Short paper},
500 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
503 author = {Alkindy, Bassam and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
504 title = {Finding the core-genes of Chloroplast Species},
505 howpublished = {Journ\'ees SeqBio 2013, Montpellier},
515 @PhdThesis{guyeuxphd,
516 author = {Guyeux, Christophe},
517 title = {Le désordre des it\'erations chaotiques et leur utilit\'e en sécurit\'e informatique},
518 type = {Th\`ese de {D}octorat},
519 school = {LIFC, Universit\'e de Franche-Comt\'e},
521 note = {Rapporteurs~: Pascale Charpin, Directrice de Recherche, INRIA-Rocquencourt ; Eric Filiol, Professeur, ESIEA-Laval ; Pierre Spitéri, Professeur Emérite, IRIT-ENSEEIHT. Examinateurs~: Michel de Labachelerie, Directeur de recherche CNRS, Université de Franche-Comté ; Laurent Larger, Professeur, Université de Franche-Comté ; Jean-Claude Miellou, Professeur, Université de Franche-Comté ; Congduc Pham, Professeur, Université de Pau. Directeur~: Jacques M. Bahi, Professeur, Université de Franche-Comté},
522 month = {13 décembre},
527 @inproceedings{chgw+14:oip,
529 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE},
531 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
532 title = {Pseudorandom Number Generators with Balanced Gray Codes},
533 booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography},
535 address = {Vienna, Austria},
544 @INPROCEEDINGS{nusmv02,
545 author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and
546 Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto
547 Sebastiani and Armando Tacchella},
548 title = {NuSMV 2: An OpenSource Tool for Symbolic Model Checking},
552 crossref = {DBLP:conf/cav/2002}
556 author = {Nishanth Chandrasekaran},
557 title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
562 Author = "Gastin, P. and Oddoux, D.",
563 Title = "Fast {LTL} to {B{\"u}chi} Automata Translation",
564 BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
565 Publisher = "Springer",
572 @inproceedings{cg04:np,
574 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain},
575 title = {Analyse d'atteignabilit\'e d\'eductive},
576 booktitle = {Congr\`es Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, AFADL'04},
578 editor = {Julliand, Jacques},
579 address = {Besan\c{c}on, France},
588 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
589 title = {Scalable Automated Proving and Debugging of Set-Based Specifications},
590 journal = {Journal of the Brazilian Computer Society (JBCS)},
594 url = {http://lifc.univ-fcomte.fr/~couchot/pubs/CDGR03.pdf},
597 note = {ISSN 0104-6500},
602 @inproceedings{cddg+04:ip,
604 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
606 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
607 title = {Proving and Debugging Set-Based Specifications},
608 booktitle = {WMF'03 proceedings},
609 series = {ENTCS, Electronic Notes in Theoretical Computer Science},
612 editor = {A. Cavalcanti and P. Machado},
613 address = {Campina Grande, Brazil},
614 url = {http://dx.doi.org/10.1016/j.entcs.2004.04.012},
621 @inproceedings{cdgr04:onp,
623 author = {Couchot, Jean-Fran\c{c}ois and D\'eharbe, D. and Giorgetti, Alain and Ranise, S.},
624 title = {{B}arvey~: {V}\'erification automatique de consistance de machines abstraites {B}},
626 booktitle = {AFADL'04, Approches Formelles dans l'Assistance au D\'eveloppement de Logiciels, },
627 address = {Besan\c{c}on, France},
630 editor = {Julliand, Jacques},
631 note = {Session outils},
636 @INPROCEEDINGS{CGK05,
637 author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
638 title = {A uniform deductive approach for parameterized protocol safety},
642 bibsource = {DBLP, http://dblp.uni-trier.de},
643 crossref = {DBLP:conf/kbse/2005},
644 ee = {http://doi.acm.org/10.1145/1101908.1101971}
647 @INPROCEEDINGS{abcvs05,
648 author = {Abbas, A. and Bahi, J. M. and Contassot-Vivier, S. and Salomon, M.},
649 title = {Mixing Synchronism / Asynchronism in Discrete-State Discrete-Time
651 booktitle = {4th Int. Conf. on Engineering Applications and Computational Algorithms,
655 address = {Guelph, Canada},
657 note = {ISSN 1492-8760}
661 author = {Bahi, J. M.},
662 title = {Boolean totally asynchronous iterations},
670 author = {Bahi, J. M. and Contassot-Vivier, S.},
671 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
681 author = {Bahi, J. M. and Contassot-Vivier, S.},
682 title = {Stability of fully asynchronous discrete-time discrete-state dynamic
687 pages = {1353--1363},
692 @inproceedings{bcgr11:ip,
694 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
697 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Richard, Adrien},
698 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems},
699 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
703 doi = {10.1007/978-3-642-22953-4_11},
704 url = {http://dx.doi.org/10.1007/978-3-642-22953-4_11},
705 address = {Oslo, Norway},
713 @techreport{BCVC10:ir,
714 author = {Bahi, J. M. and Contassot-Vivier, S. and Couchot, J.-F.},
715 title = {Convergence Results of Combining Synchronism and Asynchronism for
716 Discrete-State Discrete-Time Dynamic Network},
718 institution = {LIFC - Laboratoire d’{I}nformatique de
719 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
720 type = {Research Report},
721 number = {RR2010-02},
722 pdf = {/publis/papers/pub/2010/RR2010-02.pdf},
726 @techreport{Cou10:ir,
727 author = {Couchot, J.-F.},
728 title = {Formal {C}onvergence {P}roof for {D}iscrete
729 {D}ynamical {S}ystems},
730 institution = {LIFC - Laboratoire d’{I}nformatique de
731 l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}},
732 type = {Research Report},
733 number = {RR2010-03},
734 pdf = {/publis/papers/pub/2010/RR2010-03.pdf},
742 author = {Bahi, J. M. and Michel, C.},
743 title = {Convergence of discrete asynchronous iterations},
744 journal = {International Journal Computer Mathematics},
751 author = {Bahi, J. M. and Michel, C.},
752 title = {Simulations of asynchronous evolution of discrete systems},
753 journal = {Simulation Practice and Theory},
761 author = {G\'{e}rard M. Baudet},
762 title = {Asynchronous Iterative Methods for Multiprocessors},
768 doi = {http://doi.acm.org/10.1145/322063.322067},
774 title = {Parallel and distributed computation: numerical methods},
775 publisher = prenticeHall,
777 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
778 isbn = {0-13-648700-9}
782 author = {Dirk Beyer and Thomas A. Henzinger and Ranjit Jhala and Rupak Majumdar},
783 title = {The software model checker Blast},
791 @INPROCEEDINGS{LeCun85,
793 title = {A learning scheme for threshold networks},
794 booktitle = {Cognitiva'95},
797 address = {Paris, France}
801 author = {Jeffrey L. Elman},
802 title = {Finding Structure in Time},
803 journal = {Cognitive Science},
810 author = {Andreas Frommer and Daniel B. Szyld},
811 title = {On asynchronous iterations},
817 doi = {http://dx.doi.org/10.1016/S0377-0427(00)00409-X},
823 author = {Goles Ch., E. and Salinas,L.},
824 title = {Comparison between parallel and serial dynamics of Boolean networks},
833 title = {The SPIN Model Checker: Primer and Reference Manual},
834 publisher = {Addison-Wesley, Pearson Education},
836 author = {Gerard J. Holzmann}
840 author = {Shih M.-H. and Ho, J.-L.},
841 title = {Solution of the Boolean Markus-Yamabe Problem},
842 journal = advapplMath,
850 author = {Adrien Richard},
851 title = {An extension of a combinatorial fixed point theorem of Shih and Dong
853 journal = advapplMath,
862 author = {Adrien Richard and Jean-Paul Comet},
863 title = {Necessary conditions for multistationarity in discrete dynamical
865 journal = discreteapplMath,
868 pages = {2403--2413},
875 title = {Les syst\`emes dynamiques discrets},
876 publisher = springer,
878 author = {F. Robert},
880 series = {Math\'ematiques et Applications}
884 author = {Shih, M.-H. and Dong J.-L.},
885 title = {A combinatorial analogue of the Jacobian problem in automata networks},
886 journal = advapplMath,
895 author = {Thomas, R.},
896 title = {Boolean Formalization of Genetic Control Circuits},
904 author = {Xin Wang and Arun K. Jagota and Fernanda Botelho and Max H. Garzon},
905 title = {Absence of Cycles in Symmetric Neural Networks},
911 file = {:/home/couchot/rech/Ref/WJBG98.pdf:PDF}
914 @PROCEEDINGS{DBLP:conf/cav/2002,
915 title = {Computer Aided Verification, 14th International Conference, CAV 2002,Copenhagen,
916 Denmark, July 27-31, 2002, Proceedings},
918 editor = {Ed Brinksma and Kim Guldstrand Larsen},
921 publisher = springer,
925 @PROCEEDINGS{DBLP:conf/kbse/2005,
926 title = {20th IEEE/ACM International Conference on Automated Software Engineering
927 (ASE 2005), November 7-11, 2005, Long Beach, CA, USA},
929 editor = {David F. Redmiles and Thomas Ellman and Andrea Zisman},
931 bibsource = {DBLP, http://dblp.uni-trier.de},
936 author = {Ben-Ari, Mordechai},
938 title = {Principles of the Spin Model Checker},
939 isbn = {1846287693, 9781846287695}},
940 publisher = springer,
944 @INPROCEEDINGS{Wei97,
945 author = {Weise,Carsten},
946 title = {An incremental formal semantics for {PROMELA}},
947 booktitle = {SPIN97, the Third SPIN Workshop},
952 @PHDTHESIS{Couchot-PhD06,
953 AUTHOR = {Couchot, Jean-Fran\c{c}ois},
954 TITLE = {V\'erification d'invariant de syst\`emes param\'etr\'es par
957 SCHOOL = {LIFC, Universit\'e de Franche-Comt\'e},
958 TYPE = {Th\`ese de {D}octorat},
963 author = {de Jong, H. and Gouz\'e, J.-L. and Hernandez, C. and
964 Page, M. and Tewfik, S. and Geiselmann, J.},
965 title = {Qualitative simulation of genetic regulatory networks
966 using piecewise-linear models},
967 journal = {Bull. Math. Biol.},
979 author = {Bernot, G. and Comet, J.-P. and Richard, A. and Guespin, J.},
980 title = {A Fruitful Application of Formal Methods to Biological
981 Regulatory Networks: Extending {T}homas' Asynchronous
982 Logical Approach with Temporal Logic},
983 journal = {J. Theor. Biol.},
993 author = {Gonzales, A.G. and Naldi, A. and S\'anchez, L. and Thieffry, D. and Chaouiya, C.},
994 title = {{GINsim}: a software suite for the qualitative modelling, simulation and analysis of regulatory networks},
995 journal = {Biosystems},
1007 author = {De Jong, H. and Geiselmann, J. and Hernandez, C. and
1009 title = {Genetic Network Analyzer: qualitative simulation
1010 of genetic regulatory networks.},
1011 journal = {Bioinformatics},
1019 author = {Khalis, Z. and Comet, J.-P. and Richard, A. and Bernot, G.},
1020 title = {The SMBioNet Method for Discovering Models of Gene Regulatory Networks},
1021 journal = {Genes, Genomes and Genomics},
1033 author = {Ahmad, Jamil and Roux, Olivier and Bernot, Gilles and Comet, Jean-Paul and Richard, Adrien},
1034 title = {Analysing formal models of genetic regulatory networks with delays},
1035 journal = {Int. J. Bioinformatics Res. Appl.},
1041 doi = {http://dx.doi.org/10.1504/IJBRA.2008.019573},
1042 publisher = {Inderscience Publishers},
1043 address = {Inderscience Publishers, Geneva, SWITZERLAND},
1046 author = {Richard, A.},
1047 title = {Local negative circuits and fixed points in Boolean networks},
1048 institution = {preprint arXiv number 0910.0750},
1061 author = {Remy, R. and Ruet, P. and Thieffry, D.},
1062 title = {Graphic requirement for multistability and attractive cycles in a
1063 Boolean dynamical framework},
1064 journal = {Advances in Applied Mathematics},
1070 timestamp = {2009.02.05}
1073 @inproceedings{DBLP:conf/icann/BahiCMMS06,
1074 author = {Jacques M. Bahi and
1075 Sylvain Contassot-Vivier and
1079 title = {Neural Network Based Algorithm for Radiation Dose Evaluation
1080 in Heterogeneous Environments},
1081 booktitle = {ICANN (2)},
1084 ee = {http://dx.doi.org/10.1007/11840930_81},
1085 crossref = {DBLP:conf/icann/2006-2},
1086 bibsource = {DBLP, http://dblp.uni-trier.de}
1089 @proceedings{DBLP:conf/icann/2006-2,
1090 editor = {Stefanos D. Kollias and
1091 Andreas Stafylopatis and
1094 title = {Artificial Neural Networks - ICANN 2006, 16th International
1095 Conference, Athens, Greece, September 10-14, 2006. Proceedings,
1097 booktitle = {ICANN (2)},
1098 publisher = {Springer},
1099 series = {Lecture Notes in Computer Science},
1102 isbn = {3-540-38871-0},
1103 bibsource = {DBLP, http://dblp.uni-trier.de}
1110 author = {Dreyfus, Gérard and Martinez, Jean-Marc and Samuelides, Manuel and Gordon, Mirta B. and Badran, Fouad and Thiria, Sylvie },
1112 title = {Apprentissage statistique, Réseaux de neurones - Cartes topologiques - Machines à vecteurs supports},
1113 publisher = {Eyrolles},
1131 title = {An Introduction to Chaotic Dynamical Systems},
1132 publisher = {Redwood City: Addison-Wesley},
1134 author = {R. L. Devaney},
1137 timestamp = {27/01/2008}
1143 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1145 classement = {ACLI},
1146 impact-factor ={1.255},
1147 isi-acro = {MECHATRONICS},
1148 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1149 title = {Active {MEMS}-based flow control using artificial neural network},
1150 journal = {Mechatronics},
1154 doi = {10.1016/j.mechatronics.2013.02.010},
1155 url = {http://dx.doi.org/10.1016/j.mechatronics.2013.02.010},
1156 abstract = {These last years several research works have studied the application of Micro-Electro-Mechanical Systems (MEMS) for aerodynamic active flow control. Controlling such MEMS-based systems remains a challenge. Among the several existing control approaches for time varying systems, many of them use a process model representing the dynamic behavior of the process to be controlled. The purpose of this paper is to study the suitability of an artificial neural network first to predict the flow evolution induced by MEMS, and next to optimize the flow w.r.t. a numerical criterion. To achieve this objective, we focus on a dynamic flow over a backward facing step where MEMS actuators velocities are adjusted to maximize the pressure over the step surface. The first effort has been to establish a baseline database provided by computational fluid dynamics simulations for training the neural network. Then we investigate the possibility to control the flow through MEMS configuration changes. Results are promising, despite slightly high computational times for real time application.},
1157 publisher = {Elsevier},
1160 note = {Available online. Paper version to appear},
1165 @inproceedings{cds12:ip,
1167 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1169 classement = {ACTI},
1170 author = {Couchot, Jean-Fran\c{c}ois and Deschinkel, Karine and Salomon, Michel},
1171 title = {Suitability of Artificial Neural Network for {MEMS}-based Flow Control},
1172 booktitle = {dMEMS 2012, Workshop on design, control and software implementation for distributed MEMS},
1174 editor = {Bourgeois, Julien and de Labachelerie, Michel},
1175 address = {Besan\c{c}on, France},
1176 publisher = {IEEE CPS},
1185 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1187 classement = {ACLI},
1188 impact-factor ={2.081},
1190 author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel},
1191 title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network},
1192 journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science},
1195 pages = {013122-1 -- 013122-9},
1196 doi = {10.1063/1.3685524},
1197 url = {http://dx.doi.org/10.1063/1.3685524},
1198 publisher = {American Institute of Physics},
1206 @inproceedings{bgs11:ip,
1208 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1210 classement = {ACTI},
1211 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
1212 title = {Building a Chaotic Proven Neural Network},
1213 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security},
1214 address = {Maldives, Maldives},
1220 author = {Bahi, Jacques M. and Guyeux, Christophe},
1221 title = {Hash Functions Using Chaotic Iterations},
1222 journal = {Journal of Algorithms \& Computational Technology},
1227 classement = {ACLNI},
1228 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1230 impact-factor = {#},
1237 @PHDTHESIS{GuyeuxThese10,
1238 author = {Christophe Guyeux},
1239 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
1240 en s\'{e}curit\'{e} informatique},
1241 school = {Universit\'{e} de Franche-Comt\'{e}},
1243 owner = {christophe},
1244 timestamp = {2010.12.21}
1247 @INPROCEEDINGS{gfb10:ip,
1248 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.},
1249 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
1250 booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and
1251 Multimedia Signal Processing},
1254 address = {Darmstadt, Germany},
1256 classement = {ACTI},
1257 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1264 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
1265 title = {Topological entropy},
1266 journal = {Transactions of the American Mathematical Society},
1271 timestamp = {2008.05.29}
1275 author = {Rufus Bowen},
1276 title = {Entropy for group endomorphisms and homogeneous spaces},
1277 journal = {Transactions of the American Mathematical Society},
1282 timestamp = {15/02/2008}
1285 @article{10.1109/CIMSiM.2010.36,
1286 author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik},
1287 title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect},
1288 journal ={Computational Intelligence, Modelling and Simulation, International Conference on.},
1292 doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36},
1293 publisher = {IEEE Computer Society},
1294 address = {Los Alamitos, CA, USA},
1296 @article{10.1109/ICME.2003.1221665,
1297 author = {Liu Shaohui and Yao Hongxun and Gao Wen},
1298 title = {Neural network based steganalysis in still images},
1299 journal ={Multimedia and Expo, IEEE International Conference on},
1303 doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665},
1304 publisher = {IEEE Computer Society},
1305 address = {Los Alamitos, CA, USA},
1308 @ARTICLE{Sullivan06steganalysisfor,
1309 author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. },
1310 title = {Steganalysis for Markov cover data with applications to images},
1311 journal = {IEEE Transactions on Information Forensics and Security},
1320 author = "Gray, Frank",
1321 title = "Pulse code communication",
1322 note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"}
1327 @INPROCEEDINGS{guyeux10ter,
1328 author = {Bahi, Jacques M. and Guyeux, Christophe},
1329 title = {A new chaos-based watermarking algorithm},
1330 booktitle = {SECRYPT'10, International Conference on Security
1334 address = {Athens, Greece},
1336 publisher = {SciTePress},
1337 classement = {ACTI},
1338 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1344 @inproceedings{Qiao:2009:SM:1704555.1704664,
1345 author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong},
1346 title = {Steganalysis of MP3Stego},
1347 booktitle = {Proceedings of the 2009 international joint conference on Neural Networks},
1348 series = {IJCNN'09},
1350 location = {Atlanta, Georgia, USA},
1351 pages = {2723--2728},
1353 publisher = {IEEE Press}
1356 @inproceedings{CouchotD07IFM,
1358 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1361 author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric},
1362 title = {Guiding the Correction of Parameterized Specifications},
1363 booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods},
1367 publisher = {Springer},
1368 doi = {10.1007/978-3-540-73210-5_10},
1369 url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10},
1370 address = {Oxford, UK},
1376 @inproceedings{couchot07FTP,
1380 author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.},
1381 title = {A Graph-based Strategy for the Selection of Hypotheses},
1382 booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving},
1383 address = {Liverpool, UK},
1390 @inproceedings{cgs09:ip,
1392 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1394 classement = {ACTI},
1395 author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas},
1396 title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions},
1397 abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.},
1398 affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} },
1399 booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)},
1400 publisher = {ACM Press},
1402 url = {http://arxiv.org/abs/0907.1357},
1403 otherUrl = {http://hal.inria.fr/inria-00402204},
1404 address = {Grenoble, France},
1405 editor = {Hassen Sa\"{i}di and N. Shankar},
1412 @inproceedings{couchot07cade,
1416 author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.},
1417 title = {Handling Polymorphism in Automated Deduction},
1418 booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction},
1422 publisher = {Springer},
1423 isbn = {978-3-540-73594-6},
1424 doi = {10.1007/978-3-540-73595-3_18},
1425 url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18},
1426 address = {Bremen, Germany},
1438 @inproceedings{BCDG07,
1440 domainehal = {INFO:INFO_SE, INFO:INFO_MO},
1441 equipe = {vesontio},
1442 classement = {ACTI},
1443 author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain},
1444 title = {Instantiation of Parameterized Data Structures for Model-Based Testing},
1445 booktitle = {B'2007, the 7th Int. B Conference},
1449 publisher = {Springer},
1450 doi = {10.1007/11955757_10},
1451 url = {http://dx.doi.org/10.1007/11955757_10},
1452 editor = {Julliand, Jacques and Kouchnarenko, Olga},
1453 address = {Besancon, France},
1461 @article{byrd1995limited,
1462 author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
1463 title = {A Limited Memory Algorithm for Bound Constrained Optimization},
1464 journal = {SIAM J. Sci. Comput.},
1465 issue_date = {Sept. 1995},
1471 pages = {1190--1208},
1473 url = {http://dx.doi.org/10.1137/0916069},
1474 doi = {10.1137/0916069},
1476 publisher = {Society for Industrial and Applied Mathematics},
1477 address = {Philadelphia, PA, USA},
1478 keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
1481 @article{ANU:1770520,
1482 author = {Powell,M. J. D.},
1483 title = {Direct search algorithms for optimization calculations},
1484 journal = {Acta Numerica},
1491 doi = {10.1017/S0962492900002841},
1492 URL = {http://journals.cambridge.org/article_S0962492900002841},
1498 journal={The Journal of Supercomputing},
1501 doi={10.1007/s11227-010-0500-5},
1502 title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks},
1503 url={http://dx.doi.org/10.1007/s11227-010-0500-5},
1504 publisher={Springer US},
1505 keywords={Watermarking; Authentication; Wireless multimedia sensor network},
1506 author={Wang, Honggang},
1512 author={Yifeng He and Lee, I. and Ling Guan},
1513 journal={Circuits and Systems for Video Technology, IEEE Transactions on},
1514 title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
1519 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
1520 doi={10.1109/TCSVT.2009.2017411},
1524 author={Palomar, D.P. and Mung Chiang},
1525 journal={Selected Areas in Communications, IEEE Journal on},
1526 title={A tutorial on decomposition methods for network utility maximization},
1531 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
1532 doi={10.1109/JSAC.2006.879350},
1537 journal={EURASIP Journal on Information Security},
1541 doi={10.1186/1687-417X-2014-1},
1542 title={Universal distortion function for steganography in an arbitrary domain},
1543 url={http://dx.doi.org/10.1186/1687-417X-2014-1},
1544 publisher={Springer International Publishing},
1545 author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
1549 @inproceedings{conf/wifs/HolubF12,
1550 added-at = {2013-01-23T00:00:00.000+0100},
1551 author = {Holub, Vojtech and Fridrich, Jessica J.},
1552 biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
1554 crossref = {conf/wifs/2012},
1555 ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
1556 interhash = {cbef658a6868216eef585dd759ae0668},
1557 intrahash = {a685b4b8b521ac99734fb52c064ca994},
1558 isbn = {978-1-4673-2285-0},
1562 timestamp = {2013-01-23T00:00:00.000+0100},
1563 title = {Designing steganographic distortion using directional filters.},
1564 url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
1571 @article{FillerJF11,
1572 author = {Tom{\'a}s Filler and
1574 Jessica J. Fridrich},
1575 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis
1577 journal = {IEEE Transactions on Information Forensics and Security},
1582 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1583 bibsource = {DBLP, http://dblp.uni-trier.de}
1586 @inproceedings{DBLP:conf/ih/PereiraVMMP01,
1587 editor = {Ira S. Moskowitz},
1588 author = {Shelby Pereira and
1589 Sviatoslav Voloshynovskiy and
1591 St{\'e}phane Marchand-Maillet and
1593 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1594 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1595 title = {Second Generation Benchmarking and Application Oriented
1600 publisher = springer,
1601 address = springer_loc,
1607 @inproceedings{DBLP:conf/ih/Westfeld01,
1608 added-at = {2011-06-28T00:00:00.000+0200},
1609 author = {Westfeld, Andreas},
1610 booktitle = {Information Hiding, 4th International Workshop, IHW 2001,
1611 Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
1612 editor = {Ira S. Moskowitz},
1614 publisher = springer,
1615 address = springer_loc,
1618 title = {F5-A Steganographic Algorithm.},
1627 @article{Chang20101286,
1628 title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector",
1629 journal = "Digital Signal Processing",
1632 pages = "1286 - 1307",
1636 doi = "10.1016/j.dsp.2009.11.005",
1637 url = "http://www.sciencedirect.com/science/article/pii/S1051200409002413",
1638 author = "Chin-Chen Chang and Jung-San Lee and T. Hoang Ngan Le",
1639 keywords = "Security",
1640 keywords = "Wet paper coding",
1641 keywords = "Steganography",
1642 keywords = "Indicator",
1643 keywords = "Fuzzy edge detector"
1648 @article{Hu:2007:HPE:1282866.1282944,
1649 author = {Hu, Liming and Cheng, H. D. and Zhang, Ming},
1650 title = {A high performance edge detector based on fuzzy inference rules},
1651 journal = {Inf. Sci.},
1652 issue_date = {November, 2007},
1658 pages = {4768--4784},
1660 url = {http://dx.doi.org/10.1016/j.ins.2007.04.001},
1661 doi = {10.1016/j.ins.2007.04.001},
1663 publisher = {Elsevier Science Inc.},
1664 address = {New York, NY, USA},
1665 keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables},
1669 @inproceedings{Dumitrescu:2005:LSB:1073170.1073176,
1670 author = {Sorina Dumitrescu and
1672 editor = {Ahmet M. Eskicioglu and
1673 Jessica J. Fridrich and
1675 title = {LSB steganalysis based on high-order statistics},
1676 booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security,
1677 MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
1680 address = {New York, NY, USA},
1683 ee = {http://doi.acm.org/10.1145/1073170.1073176},
1684 bibsource = {DBLP, http://dblp.uni-trier.de}
1687 @inproceedings{DBLP:conf/ih/Ker05,
1688 author = {Andrew D. Ker},
1689 title = {A General Framework for Structural Steganalysis of LSB Replacement},
1690 editor = {Mauro Barni and
1691 Jordi Herrera-Joancomart\'{\i} and
1692 Stefan Katzenbeisser and
1693 Fernando P{\'e}rez-Gonz{\'a}lez},
1694 booktitle = {Information Hiding, 7th International Workshop, IH 2005,
1695 Barcelona, Spain, June 6-8, 2005, Revised Selected Papers},
1698 ee = {http://dx.doi.org/10.1007/11558859_22},
1699 publisher = springer,
1700 address = springer_loc,
1707 @inproceedings{FK12,
1708 editor = {Matthias Kirchner and
1710 booktitle = {Information Hiding - 14th International Conference, IH 2012,
1711 Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers},
1712 author = {Jessica J. Fridrich and
1714 title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
1718 ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
1720 publisher = springer,
1721 address = springer_loc,
1723 bibsource = {DBLP, http://dblp.uni-trier.de}
1727 @article{DBLP:journals/tsp/DumitrescuWW03,
1728 added-at = {2012-02-06T00:00:00.000+0100},
1729 author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe},
1730 biburl = {http://www.bibsonomy.org/bibtex/2556caad9b61980d3458885153a52321c/dblp},
1731 ee = {http://dx.doi.org/10.1109/TSP.2003.812753},
1732 interhash = {f51bec0b4e4f8aba644eb0938018d2c6},
1733 intrahash = {556caad9b61980d3458885153a52321c},
1734 journal = {IEEE Transactions on Signal Processing},
1737 pages = {1995-2007},
1738 timestamp = {2012-02-06T00:00:00.000+0100},
1739 title = {Detection of LSB steganography via sample pair analysis.},
1740 url = {http://dblp.uni-trier.de/db/journals/tsp/tsp51.html#DumitrescuWW03},
1748 @inproceedings{DBLP:conf/mmsec/FridrichGD01,
1749 editor = {Nicolas D. Georganas and
1750 Radu Popescu-Zeletin},
1751 booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security:
1752 New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada,
1754 author = {Jessica J. Fridrich and
1757 title = {Reliable detection of LSB steganography in color and grayscale
1761 ee = {http://doi.acm.org/10.1145/1232454.1232466},
1763 address = {New York, NY, USA},
1765 bibsource = {DBLP, http://dblp.uni-trier.de}
1772 @inproceedings{DBLP:conf/ih/PevnyFB10,
1773 author = {Tom{\'a}s Pevn{\'y} and
1774 Tom{\'a}s Filler and
1776 title = {Using High-Dimensional Image Models to Perform Highly Undetectable
1778 editor = {Rainer B{\"o}hme and
1779 Philip W. L. Fong and
1780 Reihaneh Safavi-Naini},
1781 booktitle = {Information Hiding - 12th International Conference, IH 2010,
1782 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1787 publisher = springer,
1788 address = springer_loc,
1791 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
1792 bibsource = {DBLP, http://dblp.uni-trier.de}
1801 author = {Tom{\'a}s Pevn{\'y} and
1802 Tom{\'a}s Filler and
1805 title = {Break Our Steganographic System},
1806 OPThowpublished = {},
1809 note = {Available at \url{http://www.agents.cz/boss/}},
1813 @proceedings{DBLP:conf/ih/2010,
1814 editor = {Rainer B{\"o}hme and
1815 Philip W. L. Fong and
1816 Reihaneh Safavi-Naini},
1817 title = {Information Hiding - 12th International Conference, IH 2010,
1818 Calgary, AB, Canada, June 28-30, 2010, Revised Selected
1820 booktitle = {Information Hiding},
1821 publisher = springer,
1822 address = springer_loc,
1826 isbn = {978-3-642-16434-7},
1827 ee = {http://dx.doi.org/10.1007/978-3-642-16435-4},
1828 bibsource = {DBLP, http://dblp.uni-trier.de}
1832 @article{DBLP:journals/eswa/ChenCL10,
1833 added-at = {2010-07-21T15:44:10.000+0200},
1834 author = {Chen, Wen-Jan and Chang, Chin-Chen and Le, T. Hoang Ngan},
1835 biburl = {http://www.bibsonomy.org/bibtex/228889a4ab329da28559f0910469f054b/dblp},
1836 date = {2010-05-03},
1837 ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050},
1838 interhash = {bc34a5f04661fee24ee62c39e76361be},
1839 intrahash = {28889a4ab329da28559f0910469f054b},
1840 journal = {Expert Systems with Applications},
1843 pages = {3292-3301},
1844 timestamp = {2010-07-21T15:44:10.000+0200},
1845 title = {High payload steganography mechanism using hybrid edge detector.},
1846 url = {http://dblp.uni-trier.de/db/journals/eswa/eswa37.html#ChenCL10},
1851 @article{DBLP:journals/tifs/FillerJF11,
1852 added-at = {2011-09-29T00:00:00.000+0200},
1853 author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.},
1854 biburl = {http://www.bibsonomy.org/bibtex/250e43c05a74eec17524b3df8db442da5/dblp},
1855 ee = {http://dx.doi.org/10.1109/TIFS.2011.2134094},
1856 interhash = {b27d23ed0c9936d568e16c51378abccd},
1857 intrahash = {50e43c05a74eec17524b3df8db442da5},
1858 journal = {IEEE Transactions on Information Forensics and Security},
1862 timestamp = {2011-09-29T00:00:00.000+0200},
1863 title = {Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes.},
1864 url = {http://dblp.uni-trier.de/db/journals/tifs/tifs6.html#FillerJF11},
1872 @inproceedings{DBLP:conf/ih/KimDR06,
1873 added-at = {2007-09-20T00:00:00.000+0200},
1874 author = {Kim, Younhee and Duric, Zoran and Richards, Dana},
1875 biburl = {http://www.bibsonomy.org/bibtex/2f0324f70d62d9dfba568e393920aaa16/dblp},
1876 booktitle = {Information Hiding},
1877 crossref = {DBLP:conf/ih/2006},
1878 date = {2007-09-20},
1879 description = {dblp},
1880 editor = {Camenisch, Jan and Collberg, Christian S. and Johnson, Neil F. and Sallee, Phil},
1881 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_21},
1882 interhash = {399aab122b39cfd6f6e951a1b276c786},
1883 intrahash = {f0324f70d62d9dfba568e393920aaa16},
1884 isbn = {978-3-540-74123-7},
1888 publisher = springer,
1889 address = springer_loc,
1891 timestamp = {2007-09-20T00:00:00.000+0200},
1892 title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
1893 url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
1899 @proceedings{DBLP:conf/ih/2006,
1900 editor = {Jan Camenisch and
1901 Christian S. Collberg and
1904 title = {Information Hiding, 8th International Workshop, IH 2006,
1905 Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
1906 booktitle = {Information Hiding},
1907 publisher = springer,
1908 address = springer_loc,
1912 isbn = {978-3-540-74123-7},
1913 bibsource = {DBLP, http://dblp.uni-trier.de}
1918 @inproceedings{DBLP:conf/mmsec/FridrichPK07,
1919 author = {Jessica J. Fridrich and
1920 Tom{\'a}s Pevn{\'y} and
1922 title = {Statistically undetectable jpeg steganography: dead ends
1923 challenges, and opportunities},
1925 ee = {http://doi.acm.org/10.1145/1288869.1288872},
1926 editor = {Deepa Kundur and
1927 Balakrishnan Prabhakaran and
1929 Jessica J. Fridrich},
1930 booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
1931 MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
1933 address = {New York, NY, USA},
1936 isbn = {978-1-59593-857-2},
1937 bibsource = {DBLP, http://dblp.uni-trier.de}
1943 @inproceedings{DBLP:conf/mediaforensics/FillerJF10,
1944 editor = {Nasir D. Memon and
1946 Adnan M. Alattar and
1948 booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1949 Electronic Imaging Symposium, San Jose, CA, USA, January
1950 18-20, 2010, Proceedings},
1951 author = {Tom{\'a}s Filler and
1953 Jessica J. Fridrich},
1954 title = {Minimizing embedding impact in steganography using trellis-coded
1958 ee = {http://dx.doi.org/10.1117/12.838002},
1959 bibsource = {DBLP, http://dblp.uni-trier.de},
1963 series = {SPIE Proceedings},
1974 @proceedings{DBLP:conf/mediaforensics/2010,
1975 editor = {Nasir D. Memon and
1977 Adnan M. Alattar and
1979 title = {Media Forensics and Security II, part of the IS{\&}T-SPIE
1980 Electronic Imaging Symposium, San Jose, CA, USA, January
1981 18-20, 2010, Proceedings},
1982 booktitle = {Media Forensics and Security},
1985 series = {SPIE Proceedings},
1988 isbn = {978-0-8194-7934-1},
1989 bibsource = {DBLP, http://dblp.uni-trier.de}
1992 @article{DBLP:journals/corr/abs-1112-5239,
1993 author = {Jacques M. Bahi and
1994 Rapha{\"e}l Couturier and
1995 Christophe Guyeux and
1996 Pierre-Cyrille H{\'e}am},
1997 title = {Efficient and Cryptographically Secure Generation of Chaotic
1998 Pseudorandom Numbers on GPU},
2000 volume = {abs/1112.5239},
2002 ee = {http://arxiv.org/abs/1112.5239},
2003 bibsource = {DBLP, http://dblp.uni-trier.de}
2007 author = {Ponomarenko, Nikolay},
2008 title = {PSNR-HVS-M page},
2009 OPThowpublished = {},
2012 note = {\url{http://www.ponomarenko.info/psnrhvsm.htm}},
2018 author = {Bovik, Alan C.},
2019 title = {BIQI page},
2020 OPThowpublished = {},
2023 note = {\url{http://live.ece.utexas.edu/research/quality/BIQI_release.zip}},
2028 @InProceedings{PSECAL07,
2029 author = {Ponomarenko, Nikolay and Silvestri, Flavia and Egiazarian, Karen and Carli, Marco and Astola, Jaakko and Lukin,Vladimir},
2030 title = {On between-coefficient contrast masking of DCT basis functions},
2031 booktitle = {CD-ROM Proceedings of the Third International Workshop on Video Processing and Quality Metrics for Consumer Electronics VPQM-07,Scottsdale, Arizona, USA},
2034 editor = {Li,Baoxin},
2040 OPTorganization = {},
2048 author = {Moorthy, Anush K. Moorthy and Bovik, Alan Conrad},
2049 title = {A Two-Step Framework for Constructing Blind Image Quality Indices},
2050 journal = {IEEE Signal Processing Letters},
2061 @inproceedings{DBLP:conf/crypto/ShubBB82,
2062 author = {Lenore Blum and
2065 title = {Comparison of Two Pseudo-Random Number Generators},
2066 editor = {David Chaum and
2067 Ronald L. Rivest and
2069 booktitle = {Advances in Cryptology: Proceedings of CRYPTO '82, Santa
2070 Barbara, California, USA, August 23-25, 1982},
2072 bibsource = {DBLP, http://dblp.uni-trier.de},
2073 publisher = {Plenum Press},
2074 address={New York, NY, USA},
2077 bibsource = {DBLP, http://dblp.uni-trier.de}
2081 @inproceedings{Blum:1985:EPP:19478.19501,
2082 booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa
2083 Barbara, California, USA, August 19-22, 1984, Proceedings},
2084 author = {Manuel Blum and
2086 title = {An Efficient Probabilistic Public-Key Encryption Scheme
2087 Which Hides All Partial Information},
2091 editor = {G. R. Blakley and
2093 publisher = springer,
2094 address = springer_loc,
2101 @article{DBLP:journals/ejisec/FontaineG07,
2102 author = {Caroline Fontaine and
2104 title = {A Survey of Homomorphic Encryption for Nonspecialists},
2105 journal = {EURASIP Journal on Information Security},
2110 ee = {http://dx.doi.org/10.1155/2007/13801},
2111 bibsource = {DBLP, http://dblp.uni-trier.de}
2115 @article{Luo:2010:EAI:1824719.1824720,
2116 author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu},
2117 title = {Edge adaptive image steganography based on LSB matching revisited},
2118 journal = {IEEE Transactions on Information Forensics and Security},
2126 url = {http://dx.doi.org/10.1109/TIFS.2010.2041812},
2127 doi = {10.1109/TIFS.2010.2041812},
2129 publisher = {IEEE Press},
2130 address = {Piscataway, NJ, USA},
2131 keywords = {Content-based steganography, content-based steganography, least-significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis},
2134 @article{Mielikainen06,
2135 author = {Mielikainen, J.},
2136 title = {LSB Matching Revisited},
2137 journal = {IEEE Signal Processing Letters},
2152 @article{Liu:2008:FMP:1284917.1285196,
2153 author = {Liu, Qingzhong and Sung, Andrew H. and Chen, Zhongxue and Xu, Jianyun},
2154 title = {Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images},
2155 journal = {Pattern Recogn.},
2156 issue_date = {January, 2008},
2164 url = {http://dx.doi.org/10.1016/j.patcog.2007.06.005},
2165 doi = {10.1016/j.patcog.2007.06.005},
2167 publisher = {Elsevier Science Inc.},
2168 address = {New York, NY, USA},
2169 keywords = {DENFIS, Image complexity, LSB matching, SVMRFE, Steganalysis},
2174 @InProceedings{LHS08,
2175 author = {Bin Li and Jiwu Huang and Yun Q. Shi},
2176 title = {Textural features based universal steganalysis},
2179 booktitle = {Proc. SPIE 6819},
2190 OPTorganization = {},
2197 @InProceedings{KF11,
2198 author = {Jan Kodovsk{\'y} and Jessica Fridrich},
2199 title = {Steganalysis in high dimensions: Fusing classifiers built on random subspaces},
2202 booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
2206 pages = {78800L-78800L-13},
2215 OPTorganization = {},
2221 @article{DBLP:journals/tifs/KodovskyFH12,
2222 author = {Jan Kodovsk{\'y} and
2223 Jessica J. Fridrich and
2225 title = {Ensemble Classifiers for Steganalysis of Digital Media},
2226 journal = {IEEE Transactions on Information Forensics and Security},
2231 ee = {http://dx.doi.org/10.1109/TIFS.2011.2175919},
2232 bibsource = {DBLP, http://dblp.uni-trier.de}
2237 @article{Fillatre:2012:ASL:2333143.2333587,
2238 author = {Fillatre, Lionel},
2239 title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images},
2240 journal = {IEEE Transactions on Signal Processing},
2248 url = {http://dx.doi.org/10.1109/TSP.2011.2174231},
2249 doi = {10.1109/TSP.2011.2174231},
2251 publisher = {IEEE Press},
2252 address = {Piscataway, NJ, USA},
2256 @inproceedings{Tyan1993,
2257 abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
2258 address = ieecs_loc,
2260 author = {Tyan, C. Y. and Wang, P. P.},
2261 booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
2262 citeulike-article-id = {7936501},
2263 keywords = {additive, and, approach, computational, detection, domain, edge, enhancement, filtering, frequency, functions, fuzzy, if-then, image, linguistic, linguistics, logic, membership, noise, prediction, processing, random, restoration, rules, set, statements, theory},
2265 posted-at = {2010-10-01 17:27:48},
2268 title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
2274 @article{Canny:1986:CAE:11274.11275,
2275 author = {Canny, J},
2276 title = {A Computational Approach to Edge Detection},
2277 journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence},
2278 issue_date = {June 1986},
2286 url = {http://dx.doi.org/10.1109/TPAMI.1986.4767851},
2287 doi = {10.1109/TPAMI.1986.4767851},
2289 publisher = {IEEE Computer Society},
2290 address = {Washington, DC, USA},
2291 keywords = {Edge detection, feature extraction, image processing, machine vision, multiscale image analysis},
2295 @inproceedings{DBLP:conf/ih/FridrichKHG11a,
2296 author = {Jessica J. Fridrich and
2297 Jan Kodovsk{\'y} and
2300 title = {Steganalysis of Content-Adaptive Steganography in Spatial
2302 booktitle = {Information Hiding},
2305 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9_8},
2306 crossref = {DBLP:conf/ih/2011},
2307 bibsource = {DBLP, http://dblp.uni-trier.de}
2309 @proceedings{DBLP:conf/ih/2011,
2310 editor = {Tom{\'a}s Filler and
2311 Tom{\'a}s Pevn{\'y} and
2314 title = {Information Hiding - 13th International Conference, IH 2011,
2315 Prague, Czech Republic, May 18-20, 2011, Revised Selected
2317 booktitle = {Information Hiding},
2318 publisher = springer,
2319 address = springer_loc,
2323 isbn = {978-3-642-24177-2},
2324 ee = {http://dx.doi.org/10.1007/978-3-642-24178-9},
2325 bibsource = {DBLP, http://dblp.uni-trier.de}
2328 @inproceedings{DBLP:conf/iwdw/Fridrich11,
2329 author = {Jessica J. Fridrich},
2330 title = {Modern Trends in Steganography and Steganalysis},
2334 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1_1},
2335 crossref = {DBLP:conf/iwdw/2011},
2336 bibsource = {DBLP, http://dblp.uni-trier.de}
2338 @proceedings{DBLP:conf/iwdw/2011,
2339 editor = {Yun-Qing Shi and
2340 Hyoung-Joong Kim and
2341 Fernando P{\'e}rez-Gonz{\'a}lez},
2342 title = {Digital Forensics and Watermarking - 10th International
2343 Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2344 2011, Revised Selected Papers},
2346 publisher = springer,
2347 address = springer_loc,
2351 isbn = {978-3-642-32204-4},
2352 ee = {http://dx.doi.org/10.1007/978-3-642-32205-1},
2353 bibsource = {DBLP, http://dblp.uni-trier.de}
2359 @article{MCErlang07,
2360 author = {Fredlund, Lars-\AAke and Svensson, Hans},
2361 title = {McErlang: a model checker for a distributed functional programming language},
2362 journal = {SIGPLAN Not.},
2371 @inproceedings{Bogor03,
2373 Matthew B. Dwyer and
2375 title = {Bogor: an extensible and highly-modular software model checking
2377 booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations
2378 of Software Engineering 2003},
2386 author = {Banks, John and J. Brooks and G. Cairns and P. Stacey},
2387 title = {On Devaney's Definition of Chaos},
2388 journal = {Amer. Math. Monthly},
2394 timestamp = {27/01/2008}
2397 @article{Crook2007267,
2398 title = "Pattern recall in networks of chaotic neurons",
2399 journal = "Biosystems",
2402 pages = "267 - 274",
2405 doi = "DOI: 10.1016/j.biosystems.2006.09.022",
2406 author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat",
2408 keywords = "Spiking neural network"
2412 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2413 title = {A novel Hash algorithm construction based on chaotic neural network},
2414 journal = {Neural Computing and Applications},
2417 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2420 keyword = {Computer Science},
2421 publisher = {Springer London}
2425 author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.},
2426 journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography},
2432 keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;},
2433 doi={10.1109/TCE.2004.1309431},
2436 @article{Zhang2005759,
2437 title = "An image encryption approach based on chaotic maps",
2438 journal = "Chaos, Solitons \& Fractals",
2441 pages = "759 - 765",
2445 doi = "10.1016/j.chaos.2004.09.035",
2446 author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang"
2449 @article{Lian20091296,
2450 title = "A block cipher based on chaotic neural networks",
2451 journal = "Neurocomputing",
2454 pages = "1296 - 1301",
2457 author = "Shiguo Lian",
2458 keywords = "Neural network",
2460 keywords = "Security",
2461 keywords = "Block cipher",
2462 keywords = "Image encryption"
2466 author = {George Cybenko},
2467 title = {Approximation by Superpositions of a Sigmoidal function},
2468 journal = {Mathematics of Control, Signals and Systems},
2475 @article{DBLP:journals/nn/HornikSW89,
2476 author = {Kurt Hornik and
2477 Maxwell B. Stinchcombe and
2479 title = {Multilayer feedforward networks are universal approximators},
2480 journal = {Neural Networks},
2485 ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8},
2486 bibsource = {DBLP, http://dblp.uni-trier.de}
2489 @article{dalkiran10,
2490 author = {Ilker Dalkiran and Kenan Danisman},
2491 affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey},
2492 title = {Artificial neural network based chaotic generator for cryptology},
2500 @article{springerlink:10.1007/s00521-010-0432-2,
2501 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2502 affiliation = {Chongqing University College of Computer Science 400044 Chongqing China},
2503 title = {A novel Hash algorithm construction based on chaotic neural network},
2504 journal = {Neural Computing and Applications},
2505 publisher = {Springer},
2507 keyword = {Computer Science},
2513 @article{Feder2009NTB,
2514 author = {Feder, Tom\'{a}s and Subi, Carlos},
2515 title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations},
2516 journal = {Inf. Process. Lett.},
2517 issue_date = {February, 2009},
2525 url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015},
2526 doi = {10.1016/j.ipl.2008.10.015},
2528 publisher = {Elsevier North-Holland, Inc.},
2529 address = {Amsterdam, The Netherlands, The Netherlands},
2530 keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings},
2536 author={Zanten, A.~J.~van and Suparta, I.~N.},
2537 title={ Totally balanced and exponentially balanced Gray codes},
2538 journal={Discrete Analysis and Operational Research},
2546 @book{LevinPeresWilmer2006,
2547 added-at = {2010-01-19T17:51:27.000+0100},
2548 author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.},
2549 biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg},
2550 interhash = {61354795a6accb6407bfdbf04753a683},
2551 intrahash = {097dc4d1d0e412b2444f540b04110797},
2552 keywords = {markovchains probabilitytheory textbook},
2553 publisher = {American Mathematical Society},
2554 timestamp = {2010-01-19T17:51:27.000+0100},
2555 title = {{Markov chains and mixing times}},
2556 url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0},
2561 author = {M. Mitzenmacher and Eli Upfal},
2563 title = {Probability and Computing},
2564 publisher = {Cambridge University Press},
2570 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2573 author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques},
2574 title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers},
2575 howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France},