X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/blobdiff_plain/e33be76d23718889bbc811c70d9e28526fb9a347..ca904fb2c99239a78882b7987764f59a48bcc202:/bib/biblioand.bib?ds=inline diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 4da6eec..64ae71d 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -483,15 +483,6 @@ c% This file was created with JabRef 2.3.1. -@CONFERENCE{wang2009, - author = {Q Wang and C Guyeux and J M. Bahi}, - title = {A novel pseudo-random generator based on discrete chaotic -iterations for cryptographic applications}, - booktitle = {First International Conference on Evolving Internet}, - year = {2009}, - owner = {qianxue}, - timestamp = {2009.10.29} -} @BOOK{Dev89, @@ -506,16 +497,62 @@ iterations for cryptographic applications}, - - -@ARTICLE{guyeux09-b, - author = {Guyeux, Christophe and Bahi, J. M.}, - title = {Hash functions using chaotic iterations}, - journal = {Journal of Algorithms \& Computational Technology}, - year = {2009}, - note = {To appear}, - owner = {guyeux}, - timestamp = {2009.07.12} -} - - +@article{byrd1995limited, + author = {Byrd, Richard H. and Lu, Peihuang and Nocedal, Jorge and Zhu, Ciyou}, + title = {A Limited Memory Algorithm for Bound Constrained Optimization}, + journal = {SIAM J. Sci. Comput.}, + issue_date = {Sept. 1995}, + volume = {16}, + number = {5}, + month = sep, + year = {1995}, + issn = {1064-8275}, + pages = {1190--1208}, + numpages = {19}, + url = {http://dx.doi.org/10.1137/0916069}, + doi = {10.1137/0916069}, + acmid = {210980}, + publisher = {Society for Industrial and Applied Mathematics}, + address = {Philadelphia, PA, USA}, + keywords = {bound constrained optimization, large-scale optimization, limited memory method, nonlinear optimization, quasi-Newton method}, +} + +@article{ANU:1770520, +author = {Powell,M. J. D.}, +title = {Direct search algorithms for optimization calculations}, +journal = {Acta Numerica}, +volume = {7}, +month = {1}, +year = {1998}, +issn = {1474-0508}, +pages = {287--336}, +numpages = {50}, +doi = {10.1017/S0962492900002841}, +URL = {http://journals.cambridge.org/article_S0962492900002841}, +} + + + +@ARTICLE{HLG09, +author={Yifeng He and Lee, I. and Ling Guan}, +journal={Circuits and Systems for Video Technology, IEEE Transactions on}, +title={Distributed Algorithms for Network Lifetime Maximization in Wireless Visual Sensor Networks}, +year={2009}, +volume={19}, +number={5}, +pages={704-718}, +keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, +doi={10.1109/TCSVT.2009.2017411}, +ISSN={1051-8215},} + +@ARTICLE{PM06, +author={Palomar, D.P. and Mung Chiang}, +journal={Selected Areas in Communications, IEEE Journal on}, +title={A tutorial on decomposition methods for network utility maximization}, +year={2006}, +volume={24}, +number={8}, +pages={1439-1451}, +keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, +doi={10.1109/JSAC.2006.879350}, +ISSN={0733-8716},} \ No newline at end of file