-@CONFERENCE{wang2009,
- author = {Q Wang and C Guyeux and J M. Bahi},
- title = {A novel pseudo-random generator based on discrete chaotic
-iterations for cryptographic applications},
- booktitle = {First International Conference on Evolving Internet},
- year = {2009},
- owner = {qianxue},
- timestamp = {2009.10.29}
-}
@BOOK{Dev89,
-
-
-@ARTICLE{guyeux09-b,
- author = {Guyeux, Christophe and Bahi, J. M.},
- title = {Hash functions using chaotic iterations},
- journal = {Journal of Algorithms \& Computational Technology},
- year = {2009},
- note = {To appear},
- owner = {guyeux},
- timestamp = {2009.07.12}
-}
-
-
+@article{byrd1995limited,
+ author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou},
+ title = {A Limited Memory Algorithm for Bound Constrained Optimization},
+ journal = {SIAM J. Sci. Comput.},
+ issue_date = {Sept. 1995},
+ volume = {16},
+ number = {5},
+ month = sep,
+ year = {1995},
+ issn = {1064-8275},
+ pages = {1190--1208},
+ numpages = {19},
+ url = {http://dx.doi.org/10.1137/0916069},
+ doi = {10.1137/0916069},
+ acmid = {210980},
+ publisher = {Society for Industrial and Applied Mathematics},
+ address = {Philadelphia, PA, USA},
+ keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method},
+}
+
+@article{ANU:1770520,
+author = {Powell,M. J. D.},
+title = {Direct search algorithms for optimization calculations},
+journal = {Acta Numerica},
+volume = {7},
+month = {1},
+year = {1998},
+issn = {1474-0508},
+pages = {287--336},
+numpages = {50},
+doi = {10.1017/S0962492900002841},
+URL = {http://journals.cambridge.org/article_S0962492900002841},
+}
+
+
+
+@ARTICLE{HLG09,
+author={Yifeng He and Lee, I. and Ling Guan},
+journal={Circuits and Systems for Video Technology, IEEE Transactions on},
+title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks},
+year={2009},
+volume={19},
+number={5},
+pages={704-718},
+keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network},
+doi={10.1109/TCSVT.2009.2017411},
+ISSN={1051-8215},}
+
+@ARTICLE{PM06,
+author={Palomar, D.P. and Mung Chiang},
+journal={Selected Areas in Communications, IEEE Journal on},
+title={A tutorial on decomposition methods for network utility maximization},
+year={2006},
+volume={24},
+number={8},
+pages={1439-1451},
+keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation},
+doi={10.1109/JSAC.2006.879350},
+ISSN={0733-8716},}
\ No newline at end of file