X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/183501424bd9451799bcb283c554d0735744fac7..5736bcac6b3052114e1052f5b95c5b9be456aab0:/bib/biblioand.bib?ds=sidebyside diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 406a38c..8a6f141 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,46 @@ -c% This file was created with JabRef 2.3.1. +% This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 + + + +@InProceedings{, + author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot, +Michel Salomon, Jacques M Bahi}, + title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)}, + OPTyear = {2014}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {***--***}, + month = nov, + address = {Belfast, UK}, + OPTorganization = {}, + publisher = {IEE }, + note = {To appear}, + OPTannote = {} +} + +@inproceedings{chgw+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE}, +equipe = {ie}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Pseudorandom Number Generators with Balanced Gray Codes}, +booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography}, +pages = {469--475}, +address = {Vienna, Austria}, +month = aug, +date = aug, +year = 2014 +} + + + @INPROCEEDINGS{nusmv02, author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto @@ -12,6 +52,23 @@ c% This file was created with JabRef 2.3.1. crossref = {DBLP:conf/cav/2002} } +@unpublished{Cha06, +author = {Nishanth Chandrasekaran}, +title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions}, +year = 2006, +} + +@InProceedings{GO01, + Author = "Gastin, P. and Oddoux, D.", + Title = "Fast {LTL} to {B{\"u}chi} Automata Translation", + BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)", + Publisher = "Springer", + Series = lncs, + Number = 2102, + Year = 2001, + Pages = "53--65" +} + @INPROCEEDINGS{CGK05, author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, title = {A uniform deductive approach for parameterized protocol safety}, @@ -531,7 +588,21 @@ doi = {10.1017/S0962492900002841}, URL = {http://journals.cambridge.org/article_S0962492900002841}, } - +@article{Wang13, +year={2013}, +issn={0920-8542}, +journal={The Journal of Supercomputing}, +volume={64}, +number={3}, +doi={10.1007/s11227-010-0500-5}, +title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks}, +url={http://dx.doi.org/10.1007/s11227-010-0500-5}, +publisher={Springer US}, +keywords={Watermarking; Authentication; Wireless multimedia sensor network}, +author={Wang, Honggang}, +pages={883-897}, +language={English} +} @ARTICLE{HLG09, author={Yifeng He and Lee, I. and Ling Guan}, @@ -543,7 +614,7 @@ number={5}, pages={704-718}, keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, doi={10.1109/TCSVT.2009.2017411}, -ISSN={1051-8215},} +ISSN={1051-8215}} @ARTICLE{PM06, author={Palomar, D.P. and Mung Chiang}, @@ -555,7 +626,42 @@ number={8}, pages={1439-1451}, keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, doi={10.1109/JSAC.2006.879350}, -ISSN={0733-8716},} +ISSN={0733-8716}} + +@article{HFD14, +year={2014}, +journal={EURASIP Journal on Information Security}, +eid={1}, +volume={2014}, +number={1}, +doi={10.1186/1687-417X-2014-1}, +title={Universal distortion function for steganography in an arbitrary domain}, +url={http://dx.doi.org/10.1186/1687-417X-2014-1}, +publisher={Springer International Publishing}, +author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, +language={English} +} + +@inproceedings{conf/wifs/HolubF12, + added-at = {2013-01-23T00:00:00.000+0100}, + author = {Holub, Vojtech and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp}, + booktitle = {WIFS}, + crossref = {conf/wifs/2012}, + ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655}, + interhash = {cbef658a6868216eef585dd759ae0668}, + intrahash = {a685b4b8b521ac99734fb52c064ca994}, + isbn = {978-1-4673-2285-0}, + keywords = {dblp}, + pages = {234-239}, + publisher = {IEEE}, + timestamp = {2013-01-23T00:00:00.000+0100}, + title = {Designing steganographic distortion using directional filters.}, + url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12}, + year = 2012 +} + + @article{FillerJF11,