X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/183501424bd9451799bcb283c554d0735744fac7..78c3750f579c5f7489ee74661e9aebd336777a65:/bib/biblioand.bib diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 406a38c..702a945 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -1,6 +1,45 @@ -c% This file was created with JabRef 2.3.1. +% This file was created with JabRef 2.3.1. % Encoding: ANSI_X3.4-1968 + +@InProceedings{, + author = {Bassam Alkindy, Christophe Guyeux, Jean-François Couchot, +Michel Salomon, Jacques M Bahi}, + title = {Gene Similarity-based Approaches for Determining Core-Genes of Chloroplasts}, + OPTcrossref = {}, + OPTkey = {}, + booktitle = {The IEEE International Conference on Bioinformatics and Biomedicine (BIBM)}, + OPTyear = {2014}, + OPTeditor = {}, + OPTvolume = {}, + OPTnumber = {}, + OPTseries = {}, + pages = {***--***}, + month = nov, + address = {Belfast, UK}, + OPTorganization = {}, + publisher = {IEE }, + note = {To appear}, + OPTannote = {} +} + +@inproceedings{chgw+14:oip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO, INFO:INFO_SE}, +equipe = {ie}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Pseudorandom Number Generators with Balanced Gray Codes}, +booktitle = {Secrypt 2014, 11th Int. Conf. on Security and Cryptography}, +pages = {469--475}, +address = {Vienna, Austria}, +month = aug, +date = aug, +year = 2014 +} + + + + @INPROCEEDINGS{nusmv02, author = {Alessandro Cimatti and Edmund M. Clarke and Enrico Giunchiglia and Fausto Giunchiglia and Marco Pistore and Marco Roveri and Roberto @@ -12,6 +51,23 @@ c% This file was created with JabRef 2.3.1. crossref = {DBLP:conf/cav/2002} } +@unpublished{Cha06, +author = {Nishanth Chandrasekaran}, +title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions}, +year = 2006, +} + +@InProceedings{GO01, + Author = "Gastin, P. and Oddoux, D.", + Title = "Fast {LTL} to {B{\"u}chi} Automata Translation", + BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)", + Publisher = "Springer", + Series = lncs, + Number = 2102, + Year = 2001, + Pages = "53--65" +} + @INPROCEEDINGS{CGK05, author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, title = {A uniform deductive approach for parameterized protocol safety}, @@ -84,7 +140,6 @@ c% This file was created with JabRef 2.3.1. author = {Couchot, J.-F.}, title = {Formal {C}onvergence {P}roof for {D}iscrete {D}ynamical {S}ystems}, - year = {2010}, institution = {LIFC - Laboratoire d’{I}nformatique de l'{U}niversit\'{e} de {F}ranche {C}omt\'{e}}, type = {Research Report}, @@ -485,7 +540,7 @@ c% This file was created with JabRef 2.3.1. -@BOOK{Dev89, +@BOOK{Devaney, title = {An Introduction to Chaotic Dynamical Systems}, publisher = {Redwood City: Addison-Wesley}, year = {1989}, @@ -496,6 +551,283 @@ c% This file was created with JabRef 2.3.1. } +@article{bcgs12:ij, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACLI}, +impact-factor ={2.081}, +isi-acro = {CHAOS}, +author = {Bahi, Jacques and Couchot, Jean-Fran\c{c}ois and Guyeux, Christophe and Salomon, Michel}, +title = {Neural Networks and Chaos: Construction, Evaluation of Chaotic Networks, and Prediction of Chaos with MultiLayer Feedforward Network}, +journal = {Chaos, An Interdisciplinary Journal of Nonlinear Science}, +volume = 22, +number = 1, +pages = {013122-1 -- 013122-9}, +doi = {10.1063/1.3685524}, +url = {http://dx.doi.org/10.1063/1.3685524}, +publisher = {American Institute of Physics}, +month = mar, +year = 2012, +note = {9 pages}, + +} + + +@inproceedings{bgs11:ip, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {ACTI}, +author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel}, +title = {Building a Chaotic Proven Neural Network}, +booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network Security}, +address = {Maldives, Maldives}, +month = may, +year = 2011, +} + +@ARTICLE{guyeux09, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {Hash Functions Using Chaotic Iterations}, + journal = {Journal of Algorithms \& Computational Technology}, + year = {2010}, + volume = {4}, + pages = {167--181}, + number = {2}, + classement = {ACLNI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + impact-factor = {#}, + inhal = {no}, + isi-acro = {#} +} + + + +@PHDTHESIS{GuyeuxThese10, + author = {Christophe Guyeux}, + title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e} + en s\'{e}curit\'{e} informatique}, + school = {Universit\'{e} de Franche-Comt\'{e}}, + year = {2010}, + owner = {christophe}, + timestamp = {2010.12.21} +} + +@INPROCEEDINGS{gfb10:ip, + author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques M.}, + title = {Chaotic iterations versus Spread-spectrum: chaos and stego security}, + booktitle = {IIH-MSP'10, 6-th International Conference on Intelligent Information Hiding and + Multimedia Signal Processing}, + year = {2010}, + pages = {208--211}, + address = {Darmstadt, Germany}, + month = oct, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@ARTICLE{Adler65, + author = {R. L. Adler and A. G. Konheim and M. H. McAndrew}, + title = {Topological entropy}, + journal = {Transactions of the American Mathematical Society}, + year = {1965}, + volume = {114}, + pages = {309-319}, + owner = {guyeux}, + timestamp = {2008.05.29} +} + +@ARTICLE{Bowen, + author = {Rufus Bowen}, + title = {Entropy for group endomorphisms and homogeneous spaces}, + journal = {Transactions of the American Mathematical Society}, + year = {1971}, + volume = {153}, + pages = {401-414}, + owner = {guyeux}, + timestamp = {15/02/2008} +} + +@article{10.1109/CIMSiM.2010.36, +author = {Jiri Holoska and Zuzana Oplatkova and Ivan Zelinka and Roman Senkerik}, +title = {Comparison between Neural Network Steganalysis and Linear Classification Method Stegdetect}, +journal ={Computational Intelligence, Modelling and Simulation, International Conference on.}, +volume = {0}, +year = {2010}, +pages = {15-20}, +doi = {http://doi.ieeecomputersociety.org/10.1109/CIMSiM.2010.36}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} +@article{10.1109/ICME.2003.1221665, +author = {Liu Shaohui and Yao Hongxun and Gao Wen}, +title = {Neural network based steganalysis in still images}, +journal ={Multimedia and Expo, IEEE International Conference on}, +volume = {2}, +year = {2003}, +pages = {509-512}, +doi = {http://doi.ieeecomputersociety.org/10.1109/ICME.2003.1221665}, +publisher = {IEEE Computer Society}, +address = {Los Alamitos, CA, USA}, +} + +@ARTICLE{Sullivan06steganalysisfor, + author = {Sullivan, Kenneth and Madhow,Upamanyu and Chandrasekaran,Shivkumar and Manjunath,B. S. }, + title = {Steganalysis for Markov cover data with applications to images}, + journal = {IEEE Transactions on Information Forensics and Security}, + year = {2006}, + volume = {1}, + pages = {275--287} +} + + +@misc{Gray47, +year=1953, +author = "Gray, Frank", +title = "Pulse code communication", +note = "{US} Patent 2,632,058, March 17 1953,(filed November 13 1947)"} + + + + +@INPROCEEDINGS{guyeux10ter, + author = {Bahi, Jacques M. and Guyeux, Christophe}, + title = {A new chaos-based watermarking algorithm}, + booktitle = {SECRYPT'10, International Conference on Security +and Cryptography}, + year = {2010}, + pages = {455--458}, + address = {Athens, Greece}, + month = jul, + publisher = {SciTePress}, + classement = {ACTI}, + domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, + equipe = {and}, + inhal = {no} +} + + +@inproceedings{Qiao:2009:SM:1704555.1704664, + author = {Qiao, Mengyu and Sung, Andrew H. and Liu, Qingzhong}, + title = {Steganalysis of MP3Stego}, + booktitle = {Proceedings of the 2009 international joint conference on Neural Networks}, + series = {IJCNN'09}, + year = {2009}, + location = {Atlanta, Georgia, USA}, + pages = {2723--2728}, + numpages = {6}, + publisher = {IEEE Press} +} + +@inproceedings{CouchotD07IFM, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {ie}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric}, +title = {Guiding the Correction of Parameterized Specifications}, +booktitle = {IFM'07, 6th Int. Conf. on Integrated Formal Methods}, +pages = {176--194}, +series = {LNCS}, +volume = 4591, +publisher = {Springer}, +doi = {10.1007/978-3-540-73210-5_10}, +url = {http://dx.doi.org/10.1007/978-3-540-73210-5_10}, +address = {Oxford, UK}, +month = jul, +year = 2007, + +} + +@inproceedings{couchot07FTP, +inhal = {no}, +equipe = {and}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Hubert, T.}, +title = {A Graph-based Strategy for the Selection of Hypotheses}, +booktitle = {FTP'07, Int. Workshop on First-Order Theorem Proving}, +address = {Liverpool, UK}, +month = sep, +year = 2007, + +} + + +@inproceedings{cgs09:ip, +inhal = {inria}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {ie}, +classement = {ACTI}, +author = {Couchot, Jean-Fran\c{c}ois and Giorgetti, Alain and Stouls, Nicolas}, +title = {{G}raph {B}ased {R}eduction of {P}rogram {V}erification {C}onditions}, +abstract = {{I}ncreasing the automaticity of proofs in deductive verification of {C} programs is a challenging task. {W}hen applied to industrial {C} programs known heuristics to generate simpler verification conditions are not efficient enough. {T}his is mainly due to their size and a high number of irrelevant hypotheses. {T}his work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. {T}he relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. {T}he first graph is labeled by constants and the second one by the predicates in the axioms. {T}he approach is applied on a benchmark arising in industrial program verification.}, +affiliation = {{L}aboratoire d'{I}nformatique de l'{U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {LIFC} - {INRIA} - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {AMAZONES} - {CITI} {I}nsa {L}yon / {INRIA} {G}renoble {R}h{\^o}ne-{A}lpes - {INSA} - {I}nstitut {N}ational des {S}ciences {A}ppliqu{\'e}es - {INRIA} }, +booktitle = {AFM'09, {A}utomated {F}ormal {M}ethods (colocated with {CAV}'09)}, +publisher = {ACM Press}, +pages = {40--47}, +url = {http://arxiv.org/abs/0907.1357}, +otherUrl = {http://hal.inria.fr/inria-00402204}, +address = {Grenoble, France}, +editor = {Hassen Sa\"{i}di and N. Shankar}, +year = 2009, + +} + + + +@inproceedings{couchot07cade, +inhal = {no}, +equipe = {and}, +classement = {*}, +author = {Couchot, Jean-Fran\c{c}ois and Lescuyer, S.}, +title = {Handling Polymorphism in Automated Deduction}, +booktitle = {CADE'07, 21st Int. Conf. on Automated Deduction}, +pages = {263--278}, +series = {LNCS}, +volume = 4603, +publisher = {Springer}, +isbn = {978-3-540-73594-6}, +doi = {10.1007/978-3-540-73595-3_18}, +url = {http://dx.doi.org/10.1007/978-3-540-73595-3_18}, +address = {Bremen, Germany}, +month = jul, +year = 2007, + +} + + + + + + + +@inproceedings{BCDG07, +inhal = {no}, +domainehal = {INFO:INFO_SE, INFO:INFO_MO}, +equipe = {vesontio}, +classement = {ACTI}, +author = {Bouquet, Fabrice and Couchot, Jean-Fran\c{c}ois and Dadeau, Fr\'ed\'eric and Giorgetti, Alain}, +title = {Instantiation of Parameterized Data Structures for Model-Based Testing}, +booktitle = {B'2007, the 7th Int. B Conference}, +pages = {96--110}, +series = {LNCS}, +volume = 4355, +publisher = {Springer}, +doi = {10.1007/11955757_10}, +url = {http://dx.doi.org/10.1007/11955757_10}, +editor = {Julliand, Jacques and Kouchnarenko, Olga}, +address = {Besancon, France}, +month = jan, +year = 2007, + +} + + @article{byrd1995limited, author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou}, @@ -531,7 +863,21 @@ doi = {10.1017/S0962492900002841}, URL = {http://journals.cambridge.org/article_S0962492900002841}, } - +@article{Wang13, +year={2013}, +issn={0920-8542}, +journal={The Journal of Supercomputing}, +volume={64}, +number={3}, +doi={10.1007/s11227-010-0500-5}, +title={Communication-resource-aware adaptive watermarking for multimedia authentication in wireless multimedia sensor networks}, +url={http://dx.doi.org/10.1007/s11227-010-0500-5}, +publisher={Springer US}, +keywords={Watermarking; Authentication; Wireless multimedia sensor network}, +author={Wang, Honggang}, +pages={883-897}, +language={English} +} @ARTICLE{HLG09, author={Yifeng He and Lee, I. and Ling Guan}, @@ -543,7 +889,7 @@ number={5}, pages={704-718}, keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, doi={10.1109/TCSVT.2009.2017411}, -ISSN={1051-8215},} +ISSN={1051-8215}} @ARTICLE{PM06, author={Palomar, D.P. and Mung Chiang}, @@ -555,7 +901,42 @@ number={8}, pages={1439-1451}, keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, doi={10.1109/JSAC.2006.879350}, -ISSN={0733-8716},} +ISSN={0733-8716}} + +@article{HFD14, +year={2014}, +journal={EURASIP Journal on Information Security}, +eid={1}, +volume={2014}, +number={1}, +doi={10.1186/1687-417X-2014-1}, +title={Universal distortion function for steganography in an arbitrary domain}, +url={http://dx.doi.org/10.1186/1687-417X-2014-1}, +publisher={Springer International Publishing}, +author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, +language={English} +} + +@inproceedings{conf/wifs/HolubF12, + added-at = {2013-01-23T00:00:00.000+0100}, + author = {Holub, Vojtech and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp}, + booktitle = {WIFS}, + crossref = {conf/wifs/2012}, + ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655}, + interhash = {cbef658a6868216eef585dd759ae0668}, + intrahash = {a685b4b8b521ac99734fb52c064ca994}, + isbn = {978-1-4673-2285-0}, + keywords = {dblp}, + pages = {234-239}, + publisher = {IEEE}, + timestamp = {2013-01-23T00:00:00.000+0100}, + title = {Designing steganographic distortion using directional filters.}, + url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12}, + year = 2012 +} + + @article{FillerJF11, @@ -1344,3 +1725,227 @@ keywords = "Fuzzy edge detector" } + + +@article{MCErlang07, + author = {Fredlund, Lars-\AAke and Svensson, Hans}, + title = {McErlang: a model checker for a distributed functional programming language}, + journal = {SIGPLAN Not.}, + volume = {42}, + issue = {9}, + year = {2007}, + issn = {0362-1340}, + pages = {125--136}, + numpages = {12}, + publisher = {ACM}, +} +@inproceedings{Bogor03, + author = {Robby and + Matthew B. Dwyer and + John Hatcliff}, + title = {Bogor: an extensible and highly-modular software model checking + framework}, + booktitle = {Proc. of the 11th ACM SIGSOFT Symposium on Foundations + of Software Engineering 2003}, + publisher = {ACM}, + year = {2003}, + pages = {267-276}, +} + + +@ARTICLE{Banks92, + author = {Banks, John and J. Brooks and G. Cairns and P. Stacey}, + title = {On Devaney's Definition of Chaos}, + journal = {Amer. Math. Monthly}, + year = {1992}, + volume = {99}, + pages = {332--334}, + keywords = {(c+),}, + owner = {guyeux}, + timestamp = {27/01/2008} +} + +@article{Crook2007267, +title = "Pattern recall in networks of chaotic neurons", +journal = "Biosystems", +volume = "87", +number = "2-3", +pages = "267 - 274", +year = "2007", +issn = "0303-2647", +doi = "DOI: 10.1016/j.biosystems.2006.09.022", +author = "Nigel Crook and Wee Jin Goh and Mohammad Hawarat", +keywords = "Chaos", +keywords = "Spiking neural network" +} + +@ARTICLE{Xiao10, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + year = {2010}, + pages = {1-9}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing + China}, + issn = {0941-0643}, + keyword = {Computer Science}, + publisher = {Springer London} +} + +@ARTICLE{1309431, +author={Satish, K. and Jayakar, T. and Tobin, C. and Madhavi, K. and Murali, K.}, +journal={Consumer Electronics, IEEE Transactions on}, title={Chaos based spread spectrum image steganography}, +year={2004}, +month=may, +volume={50}, +number={2}, +pages={ 587 - 590}, +keywords={ authentication; chaos based spread spectrum image steganography; chaotic encryption; chaotic modulation; covert communication; digital security schemes; home-office environment; in-band captioning; large-scale proliferation; tamperproofing; wireless products; chaotic communication; cryptography; data encapsulation; image processing; message authentication; modulation; spread spectrum communication;}, +doi={10.1109/TCE.2004.1309431}, +} + +@article{Zhang2005759, +title = "An image encryption approach based on chaotic maps", +journal = "Chaos, Solitons \& Fractals", +volume = "24", +number = "3", +pages = "759 - 765", +year = "2005", +note = "", +issn = "0960-0779", +doi = "10.1016/j.chaos.2004.09.035", +author = "Linhua Zhang and Xiaofeng Liao and Xuebing Wang" +} + +@article{Lian20091296, +title = "A block cipher based on chaotic neural networks", +journal = "Neurocomputing", +volume = "72", +number = "4-6", +pages = "1296 - 1301", +year = "2009", +issn = "0925-2312", +author = "Shiguo Lian", +keywords = "Neural network", +keywords = "Chaos", +keywords = "Security", +keywords = "Block cipher", +keywords = "Image encryption" +} + +@article{Cybenko89, + author = {George Cybenko}, + title = {Approximation by Superpositions of a Sigmoidal function}, + journal = {Mathematics of Control, Signals and Systems}, + volume = {2}, + year = {1989}, + pages = {303-314} +} + + +@article{DBLP:journals/nn/HornikSW89, + author = {Kurt Hornik and + Maxwell B. Stinchcombe and + Halbert White}, + title = {Multilayer feedforward networks are universal approximators}, + journal = {Neural Networks}, + volume = {2}, + number = {5}, + year = {1989}, + pages = {359-366}, + ee = {http://dx.doi.org/10.1016/0893-6080(89)90020-8}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{dalkiran10, + author = {Ilker Dalkiran and Kenan Danisman}, + affiliation = {Faculty of Engineering Erciyes University 38039 Kayseri Turkey}, + title = {Artificial neural network based chaotic generator for cryptology}, + journal = TESC, + volume = {18}, + number = {2}, + pages = {225-240}, + year = {2010} +} + +@article{springerlink:10.1007/s00521-010-0432-2, + author = {Li, Yantao and Deng, Shaojiang and Xiao, Di}, + affiliation = {Chongqing University College of Computer Science 400044 Chongqing China}, + title = {A novel Hash algorithm construction based on chaotic neural network}, + journal = {Neural Computing and Applications}, + publisher = {Springer}, + issn = {0941-0643}, + keyword = {Computer Science}, + pages = {1-9}, + year = {2010} +} + + +@article{Feder2009NTB, + author = {Feder, Tom\'{a}s and Subi, Carlos}, + title = {Nearly Tight Bounds on the Number of Hamiltonian Circuits of the Hypercube and Generalizations}, + journal = {Inf. Process. Lett.}, + issue_date = {February, 2009}, + volume = {109}, + number = {5}, + month = feb, + year = {2009}, + issn = {0020-0190}, + pages = {267--272}, + numpages = {6}, + url = {http://dx.doi.org/10.1016/j.ipl.2008.10.015}, + doi = {10.1016/j.ipl.2008.10.015}, + acmid = {1496515}, + publisher = {Elsevier North-Holland, Inc.}, + address = {Amsterdam, The Netherlands, The Netherlands}, + keywords = {Cartesian products, Counting problems, Hamiltonian circuits, Hypercube, Matchings}, +} + + + +@Article{ZanSup04, + author={Zanten, A.~J.~van and Suparta, I.~N.}, + title={ Totally balanced and exponentially balanced Gray codes}, + journal={Discrete Analysis and Operational Research}, + series={Ser.~1}, + year={2004}, + volume={11}, + issue={4}, + pages={81--98} +} + +@book{LevinPeresWilmer2006, + added-at = {2010-01-19T17:51:27.000+0100}, + author = {Levin, David A. and Peres, Yuval and Wilmer, Elizabeth L.}, + biburl = {http://www.bibsonomy.org/bibtex/2097dc4d1d0e412b2444f540b04110797/tmalsburg}, + interhash = {61354795a6accb6407bfdbf04753a683}, + intrahash = {097dc4d1d0e412b2444f540b04110797}, + keywords = {markovchains probabilitytheory textbook}, + publisher = {American Mathematical Society}, + timestamp = {2010-01-19T17:51:27.000+0100}, + title = {{Markov chains and mixing times}}, + url = {http://scholar.google.com/scholar.bib?q=info:3wf9IU94tyMJ:scholar.google.com/&output=citation&hl=en&as_sdt=2000&ct=citation&cd=0}, + year = 2006 +} + + @Book{proba, + author = {M. Mitzenmacher and Eli Upfal}, + ALTeditor = {}, + title = {Probability and Computing}, + publisher = {Cambridge University Press}, + year = {2005}, +} + +@misc{Mons14, +inhal = {no}, +domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO}, +equipe = {and}, +classement = {COM}, +author = {Couchot, Jean-Fran\c{c}ois and H\'eam, Pierre-Cyrille and Guyeux, Christophe and Wang, Qianxue and Bahi, Jacques}, +title = {Traversing a n-cube without Balanced Hamiltonian Cycle to Generate Pseudorandom Numbers}, +howpublished = {15-th Mons Theoretical Computer Science Days (15e Journ\'ees Montoises d'Informatique Th\'eorique), Nancy, France}, +day = 23, +month = sep, +year = 2014, + +}