]> AND Private Git Repository - bibliographie.git/commitdiff
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
totro
authorcouchot <jf.couchot@gmail.com>
Mon, 22 Sep 2014 07:29:30 +0000 (09:29 +0200)
committercouchot <jf.couchot@gmail.com>
Mon, 22 Sep 2014 07:29:30 +0000 (09:29 +0200)
bib/biblioand.bib

index 406a38c52a5ac8b1670ed0dbcaaabf811d223619..b1d4b0b03498e205a7ab492623eb3393057c1842 100644 (file)
@@ -12,6 +12,23 @@ c% This file was created with JabRef 2.3.1.
   crossref = {DBLP:conf/cav/2002}
 }
 
   crossref = {DBLP:conf/cav/2002}
 }
 
+@unpublished{Cha06,
+author = {Nishanth Chandrasekaran},
+title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions},
+year = 2006,
+}
+
+@InProceedings{GO01,
+ Author    = "Gastin, P. and Oddoux, D.",
+ Title     = "Fast {LTL} to {B{\"u}chi} Automata Translation",
+ BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)",
+ Publisher = "Springer",
+ Series    = lncs,
+ Number    = 2102,
+ Year      = 2001,
+ Pages     = "53--65"
+}
+
 @INPROCEEDINGS{CGK05,
   author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
   title = {A uniform deductive approach for parameterized protocol safety},
 @INPROCEEDINGS{CGK05,
   author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov},
   title = {A uniform deductive approach for parameterized protocol safety},
@@ -543,7 +560,7 @@ number={5},
 pages={704-718}, 
 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, 
 doi={10.1109/TCSVT.2009.2017411}, 
 pages={704-718}, 
 keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, 
 doi={10.1109/TCSVT.2009.2017411}, 
-ISSN={1051-8215},}
+ISSN={1051-8215}}
 
 @ARTICLE{PM06, 
 author={Palomar, D.P. and Mung Chiang}, 
 
 @ARTICLE{PM06, 
 author={Palomar, D.P. and Mung Chiang}, 
@@ -555,7 +572,42 @@ number={8},
 pages={1439-1451}, 
 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, 
 doi={10.1109/JSAC.2006.879350}, 
 pages={1439-1451}, 
 keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, 
 doi={10.1109/JSAC.2006.879350}, 
-ISSN={0733-8716},}
+ISSN={0733-8716}}
+
+@article{HFD14,
+year={2014},
+journal={EURASIP Journal on Information Security},
+eid={1},
+volume={2014},
+number={1},
+doi={10.1186/1687-417X-2014-1},
+title={Universal distortion function for steganography in an arbitrary domain},
+url={http://dx.doi.org/10.1186/1687-417X-2014-1},
+publisher={Springer International Publishing},
+author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš},
+language={English}
+}
+
+@inproceedings{conf/wifs/HolubF12,
+  added-at = {2013-01-23T00:00:00.000+0100},
+  author = {Holub, Vojtech and Fridrich, Jessica J.},
+  biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp},
+  booktitle = {WIFS},
+  crossref = {conf/wifs/2012},
+  ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655},
+  interhash = {cbef658a6868216eef585dd759ae0668},
+  intrahash = {a685b4b8b521ac99734fb52c064ca994},
+  isbn = {978-1-4673-2285-0},
+  keywords = {dblp},
+  pages = {234-239},
+  publisher = {IEEE},
+  timestamp = {2013-01-23T00:00:00.000+0100},
+  title = {Designing steganographic distortion using directional filters.},
+  url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12},
+  year = 2012
+}
+
+
 
 
 @article{FillerJF11,
 
 
 @article{FillerJF11,