From: couchot Date: Mon, 22 Sep 2014 07:29:30 +0000 (+0200) Subject: totro X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/bibliographie.git/commitdiff_plain/0a16bf2dd727ea39cde1630af90f877e26dffc43?ds=sidebyside;hp=--cc totro --- 0a16bf2dd727ea39cde1630af90f877e26dffc43 diff --git a/bib/biblioand.bib b/bib/biblioand.bib index 406a38c..b1d4b0b 100644 --- a/bib/biblioand.bib +++ b/bib/biblioand.bib @@ -12,6 +12,23 @@ c% This file was created with JabRef 2.3.1. crossref = {DBLP:conf/cav/2002} } +@unpublished{Cha06, +author = {Nishanth Chandrasekaran}, +title = {Verifying Convergence of Asynchronous Iterative Algorithms based on Lyapunov Functions}, +year = 2006, +} + +@InProceedings{GO01, + Author = "Gastin, P. and Oddoux, D.", + Title = "Fast {LTL} to {B{\"u}chi} Automata Translation", + BookTitle = "Proceedings of the 13th Conference on Computer Aided Verification (CAV'01)", + Publisher = "Springer", + Series = lncs, + Number = 2102, + Year = 2001, + Pages = "53--65" +} + @INPROCEEDINGS{CGK05, author = {Jean-Fran\c{c}ois Couchot and Alain Giorgetti and Nikolai Kosmatov}, title = {A uniform deductive approach for parameterized protocol safety}, @@ -543,7 +560,7 @@ number={5}, pages={704-718}, keywords={distributed algorithms;video communication;wireless sensor networks;Lagrangian duality;distributed algorithms;network lifetime maximization;numerical simulations;routing scheme;video quality;video sensor nodes;wireless visual sensor networks;Convex optimization;distributed algorithms;network lifetime maximization;power consumption;wireless visual sensor network}, doi={10.1109/TCSVT.2009.2017411}, -ISSN={1051-8215},} +ISSN={1051-8215}} @ARTICLE{PM06, author={Palomar, D.P. and Mung Chiang}, @@ -555,7 +572,42 @@ number={8}, pages={1439-1451}, keywords={distributed algorithms;gradient methods;radio networks;resource allocation;Gauss-Seidel iteration;Jacobi method;Lagrange duality;decomposition method;decoupling technique;distributed algorithm;modular network;network utility maximization;resource allocation;subgradient method;Congestion control;cross-layer design;decomposition;distributed algorithm;network architecture;network control by pricing;network utility maximization;optimization;power control;resource allocation}, doi={10.1109/JSAC.2006.879350}, -ISSN={0733-8716},} +ISSN={0733-8716}} + +@article{HFD14, +year={2014}, +journal={EURASIP Journal on Information Security}, +eid={1}, +volume={2014}, +number={1}, +doi={10.1186/1687-417X-2014-1}, +title={Universal distortion function for steganography in an arbitrary domain}, +url={http://dx.doi.org/10.1186/1687-417X-2014-1}, +publisher={Springer International Publishing}, +author={Holub, Vojtěch and Fridrich, Jessica and Denemark, Tomáš}, +language={English} +} + +@inproceedings{conf/wifs/HolubF12, + added-at = {2013-01-23T00:00:00.000+0100}, + author = {Holub, Vojtech and Fridrich, Jessica J.}, + biburl = {http://www.bibsonomy.org/bibtex/2a685b4b8b521ac99734fb52c064ca994/dblp}, + booktitle = {WIFS}, + crossref = {conf/wifs/2012}, + ee = {http://dx.doi.org/10.1109/WIFS.2012.6412655}, + interhash = {cbef658a6868216eef585dd759ae0668}, + intrahash = {a685b4b8b521ac99734fb52c064ca994}, + isbn = {978-1-4673-2285-0}, + keywords = {dblp}, + pages = {234-239}, + publisher = {IEEE}, + timestamp = {2013-01-23T00:00:00.000+0100}, + title = {Designing steganographic distortion using directional filters.}, + url = {http://dblp.uni-trier.de/db/conf/wifs/wifs2012.html#HolubF12}, + year = 2012 +} + + @article{FillerJF11,