1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @INPROCEEDINGS{BattiatoCGG99,
18 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
20 title = {Robust Watermarking for Images Based on Color Manipulation},
21 booktitle = {Information Hiding},
24 bibsource = {DBLP, http://dblp.uni-trier.de},
25 crossref = {DBLP:conf/ih/1999},
27 timestamp = {2009.06.29}
30 @INPROCEEDINGS{ComesanaPP05,
31 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
32 title = {The Return of the Sensitivity Attack},
36 bibsource = {DBLP, http://dblp.uni-trier.de},
37 crossref = {DBLP:conf/iwdw/2005},
38 ee = {http://dx.doi.org/10.1007/11551492_20},
40 timestamp = {2009.06.29}
43 @INPROCEEDINGS{ComesanaPP05bis,
44 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
45 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
47 booktitle = {IH'05: Information Hiding Workshop},
50 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
51 bibsource = {DBLP, http://dblp.uni-trier.de},
52 crossref = {DBLP:conf/ih/2005},
53 ee = {http://dx.doi.org/10.1007/11558859_12},
55 timestamp = {2009.06.30}
58 @INPROCEEDINGS{CongJQZ06,
59 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
60 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
61 booktitle = {ICCSA (1)},
64 bibsource = {DBLP, http://dblp.uni-trier.de},
65 crossref = {DBLP:conf/iccsa/2006-1},
66 ee = {http://dx.doi.org/10.1007/11751540_100}
69 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
70 author = {Stefan Dziembowski and Krzysztof Pietrzak},
71 title = {Leakage-Resilient Cryptography},
75 bibsource = {DBLP, http://dblp.uni-trier.de},
76 crossref = {DBLP:conf/focs/2008},
77 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
80 @INCOLLECTION{Filiol10,
81 author = {Eric Filiol},
82 title = {Viruses and Malware},
83 booktitle = {Handbook of Information and Communication Security},
86 bibsource = {DBLP, http://dblp.uni-trier.de},
87 crossref = {DBLP:reference/icsec/2010},
88 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
91 @INPROCEEDINGS{Filiol00,
92 author = {Eric Filiol},
93 title = {Decimation Attack of Stream Ciphers},
94 booktitle = {INDOCRYPT},
97 bibsource = {DBLP, http://dblp.uni-trier.de},
98 crossref = {DBLP:conf/indocrypt/2000},
99 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
102 @INPROCEEDINGS{Furon05,
103 author = {Teddy Furon},
104 title = {A Survey of Watermarking Security},
108 bibsource = {DBLP, http://dblp.uni-trier.de},
109 crossref = {DBLP:conf/iwdw/2005},
110 ee = {http://dx.doi.org/10.1007/11551492_16},
112 timestamp = {2009.06.29}
116 author = {Oded Goldreich},
118 title = {Foundations of Cryptography: Basic Tools},
119 publisher = {Cambridge University Press},
123 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
124 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
125 title = {Genetic algorithm feature-based resampling for protein structure
127 booktitle = {IEEE Congress on Evolutionary Computation},
130 bibsource = {DBLP, http://dblp.uni-trier.de},
131 crossref = {DBLP:conf/cec/2010},
132 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
135 @INPROCEEDINGS{Higgs2010,
136 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
137 title = {Genetic algorithm feature-based resampling for protein structure
139 booktitle = {IEEE Congress on Evolutionary Computation},
142 bibsource = {DBLP, http://dblp.uni-trier.de},
143 crossref = {DBLP:conf/cec/2010},
144 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
147 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
148 author = {Dragos Horvath and Camelia Chira},
149 title = {Simplified chain folding models as metaheuristic benchmark for tuning
150 real protein folding algorithms?},
151 booktitle = {IEEE Congress on Evolutionary Computation},
154 bibsource = {DBLP, http://dblp.uni-trier.de},
155 crossref = {DBLP:conf/cec/2010},
156 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
159 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
160 author = {Md. Kamrul Islam and Madhu Chetty},
161 title = {Clustered memetic algorithm for protein structure prediction},
162 booktitle = {IEEE Congress on Evolutionary Computation},
165 bibsource = {DBLP, http://dblp.uni-trier.de},
166 crossref = {DBLP:conf/cec/2010},
167 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
170 @INPROCEEDINGS{Ker06,
171 author = {Andrew D. Ker},
172 title = {Batch Steganography and Pooled Steganalysis},
173 booktitle = {Information Hiding},
176 bibsource = {DBLP, http://dblp.uni-trier.de},
177 crossref = {DBLP:conf/ih/2006},
178 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
180 timestamp = {2009.06.29}
183 @INPROCEEDINGS{Lin2009,
184 author = {H.-Y. Lin and T.-C. Chiang},
185 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
186 Curve Based Cryptosystems},
190 bibsource = {DBLP, http://dblp.uni-trier.de},
191 crossref = {DBLP:conf/cdve/2009},
192 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
195 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
196 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
197 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
199 booktitle = {CSE (2)},
202 bibsource = {DBLP, http://dblp.uni-trier.de},
203 crossref = {DBLP:conf/cse/2009},
204 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
207 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
208 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
209 title = {Coverage and adaptive scheduling algorithms for criticality management
210 on video wireless sensor networks},
214 bibsource = {DBLP, http://dblp.uni-trier.de},
215 crossref = {DBLP:conf/icumt/2009},
216 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
219 @INPROCEEDINGS{Mittelholzer99,
220 author = {Thomas Mittelholzer},
221 title = {An Information-Theoretic Approach to Steganography and Watermarking},
222 booktitle = {Information Hiding},
225 bibsource = {DBLP, http://dblp.uni-trier.de},
226 crossref = {DBLP:conf/ih/1999},
228 timestamp = {2009.06.29}
231 @INPROCEEDINGS{PellegriniBA10,
232 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
233 title = {Fault-based attack of RSA authentication},
237 bibsource = {DBLP, http://dblp.uni-trier.de},
238 crossref = {DBLP:conf/date/2010},
239 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
242 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
243 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
244 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
245 title = {Estimation of 3D Protein Structure by means of parallel Particle
247 booktitle = {IEEE Congress on Evolutionary Computation},
250 bibsource = {DBLP, http://dblp.uni-trier.de},
251 crossref = {DBLP:conf/cec/2010},
252 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
255 @INPROCEEDINGS{WangNHZH07,
256 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
258 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
259 and Embedding Optimization},
260 booktitle = {Information Hiding},
263 bibsource = {DBLP, http://dblp.uni-trier.de},
264 crossref = {DBLP:conf/ih/2007},
265 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
267 timestamp = {2009.06.29}
270 @INPROCEEDINGS{Zhao04,
271 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
273 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
275 booktitle = {ISNN (2)},
278 bibsource = {DBLP, http://dblp.uni-trier.de},
279 crossref = {DBLP:conf/isnn/2004-2},
280 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
283 @INPROCEEDINGS{Acharya05securecomparison,
284 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
285 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
286 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
287 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
290 address = {Washington, DC, USA},
291 publisher = {IEEE Computer Society},
292 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
293 isbn = {0-7695-2267-X}
296 @INPROCEEDINGS{Acimez07onthe,
297 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
298 title = {On the power of simple branch prediction analysis },
299 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
303 publisher = {ACM Press}
307 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
308 title = {Topological entropy},
309 journal = {Trans. Amer. Math. Soc.},
314 timestamp = {2008.05.29}
317 @INPROCEEDINGS{Agrawal04,
318 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
320 title = {Order preserving encryption for numeric data},
321 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
322 on Management of data},
325 address = {New York, NY, USA},
327 doi = {http://doi.acm.org/10.1145/1007568.1007632},
328 isbn = {1-58113-859-8},
329 location = {Paris, France}
332 @ARTICLE{Anfinsen20071973,
333 author = {Anfinsen, Christian B.},
334 title = {Principles that Govern the Folding of Protein Chains},
340 doi = {10.1126/science.181.4096.223},
341 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
342 url = {http://www.sciencemag.org/content/181/4096/223.short}
346 author = {D. G. Arques and C. J. Michel},
347 title = {Analytical expression of the purine/pyrimidine autocorrelation function
348 after and before random mutations.},
349 journal = {Math Biosci},
355 abstract = {The mutation process is a classical evolutionary genetic process.
356 The type of mutations studied here is the random substitutions of
357 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
358 or thymine) and reciprocally (transversions). The analytical expressions
359 derived allow us to analyze in genes the occurrence probabilities
360 of motifs and d-motifs (two motifs separated by any d bases) on the
361 R/Y alphabet under transversions. These motif probabilities can be
362 obtained after transversions (in the evolutionary sense; from the
363 past to the present) and, unexpectedly, also before transversions
364 (after back transversions, in the inverse evolutionary sense, from
365 the present to the past). This theoretical part in Section 2 is a
366 first generalization of a particular formula recently derived. The
367 application in Section 3 is based on the analytical expression giving
368 the autocorrelation function (the d-motif probabilities) before transversions.
369 It allows us to study primitive genes from actual genes. This approach
370 solves a biological problem. The protein coding genes of chloroplasts
371 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
372 (maximum of the autocorrelation function for d = 6, N = R or Y) with
373 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
374 the periodicity modulo 3 is also observed in the RNA coding genes
375 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
376 genes (introns and 5' regions of eukaryotic nuclei). However, there
377 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
378 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
379 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
380 3. When we go backward in time with the analytical expression, the
381 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
382 the YRY(N)6YRY preferential occurrence with a periodicity modulo
383 3 after 0.2 back transversions per base. In other words, the actual
384 protein coding genes of chloroplasts and mitochondria are similar
385 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
386 On the other hand, this application represents the first result concerning
387 the mutation process in the model of DNA sequence evolution we recently
388 proposed. According to this model, the actual genes on the R/Y alphabet
389 derive from two successive evolutionary genetic processes: an independent
390 mixing of a few nonrandom types of oligonucleotides leading to genes
391 called primitive followed by a mutation process in these primitive
392 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
393 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
395 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
396 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
398 medline-pst = {ppublish},
400 pii = {0025-5564(94)90020-5},
402 timestamp = {2011.05.05}
406 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
407 title = {An evolutionary analytical model of a complementary circular code
408 simulating the protein coding genes, the 5' and 3' regions.},
409 journal = {Bull Math Biol},
415 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
416 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
417 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
418 has a preferential occurrence in the frame 0 (reading frame established
419 by the ATG start trinucleotide) of protein (coding) genes of both
420 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
421 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
422 a preferential occurrence in the shifted frames 1 and 2 respectively
423 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
424 direction). T1 and T2 are complementary to each other. The subset
425 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
426 to be a complementary maximal circular code with two permutated maximal
427 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
428 called a C3 code. A quantitative study of these three subsets T0,
429 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
430 3' regions of eukaryotes, shows that their occurrence frequencies
431 are constant functions of the trinucleotide positions in the sequences.
432 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
433 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
434 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
435 of the frame. Indeed, the frequency of T0 in the three frames of
436 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
437 and is greater than the frequencies T1 and T2, both equal to 32.25\%
438 (respectively 31\%) in the three frames. Several frequency asymmetries
439 unexpectedly observed (e.g. the frequency difference between T1 and
440 T2 in the frame 0), are related to a new property of the subset T0
441 involving substitutions. An evolutionary analytical model at three
442 parameters (p, q, t) based on an independent mixing of the 22 codons
443 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
444 by t approximately 4 substitutions per codon according to the proportions
445 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
446 0.8 in the three codon sites respectively, retrieves the frequencies
447 of T0, T1, T2 observed in the three frames of protein genes and explains
448 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
449 t approximately 22 substitutions per codon, retrieves the statistical
450 properties observed in the three frames of the 5' and 3' regions.
451 The complex behaviour of these analytical curves is totally unexpected
452 and a priori difficult to imagine.},
453 doi = {10.1006/bulm.1997.0033},
454 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
455 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
456 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
457 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
460 medline-pst = {ppublish},
462 pii = {S0092-8240(97)90033-1},
464 timestamp = {2011.05.05},
465 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
469 author = {D. G. Arquès and C. J. Michel},
470 title = {Analytical expression of the purine/pyrimidine codon probability
471 after and before random mutations.},
472 journal = {Bull Math Biol},
475 pages = {1025--1038},
478 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
479 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
480 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
481 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
482 result of two successive evolutionary genetic processes: (i) a mixing
483 (independent) process of non-random oligonucleotides (words of base
484 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
485 N = R or Y) leading to primitive genes (words of several hundreds
486 of base length) and followed by (ii) a random mutation process, i.e.,
487 transformations of a base R (respectively Y) into the base Y (respectively
488 R) at random sites in these primitive genes. Following this model
489 the problem investigated here is the study of the variation of the
490 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
491 analytical expressions solved here allow analysis of this variation
492 in the classical evolutionary sense (from the past to the present,
493 i.e., after random mutations), but also in the inverted evolutionary
494 sense (from the present to the past, i.e., before random mutations).
495 Different properties are also derived from these formulae. Finally,
496 a few applications of these formulae are presented. They prove the
497 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
498 Section 3.3.2, with the existence of a maximal mean number of random
499 mutations per base of the order 0.3 in the protein coding genes.
500 They also confirm the mixing process of oligonucleotides by excluding
501 the purine/pyrimidine contiguous and alternating tracts from the
502 formation process of primitive genes.},
503 institution = {Université de Franche-Comté, Besançon, France.},
504 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
505 Genetic; Mutation; Probability; Purines; Pyrimidines},
507 medline-pst = {ppublish},
510 timestamp = {2011.05.05}
513 @ARTICLE{Arques1993b,
514 author = {D. G. Arquès and C. J. Michel},
515 title = {Identification and simulation of new non-random statistical properties
516 common to different eukaryotic gene subpopulations.},
517 journal = {Biochimie},
522 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
523 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
524 is studied by autocorrelation functions. The autocorrelation function
525 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
526 in protein coding genes and transfer RNA genes of these three eukaryotic
527 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
528 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
529 N = R or Y). The autocorrelation functions analysing the occurrence
530 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
531 (YYY-function) identify new non-random genetic statistical properties
532 in these three eukaryotic subpopulations, mainly: i) in their protein
533 coding genes: local maxima for i identical to 6 [12] (peaks for i
534 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
535 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
536 in their introns: local maxima for i identical to 3 [6] (peaks for
537 i = 3, 9, 15) and a short linear decrease followed by a large exponential
538 decrease both with the RRR- and YYY-functions. The non-random properties
539 identified in eukaryotic intron subpopulations are modelised with
540 a process of random insertions and deletions of nucleotides simulating
542 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
543 d'Informatique de Besançon, France.},
544 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
545 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
546 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
549 medline-pst = {ppublish},
551 pii = {0300-9084(93)90173-P},
553 timestamp = {2011.05.05}
557 author = {D. G. Arquès and C. J. Michel},
558 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
559 of nucleotide insertions and deletions.},
560 journal = {J Theor Biol},
566 abstract = {Recently, a new genetic process termed RNA editing has been identified
567 showing insertions and deletions of nucleotides in particular RNA
568 molecules. On the other hand, there are a few non-random statistical
569 properties in genes: in particular, the periodicity modulo 3 (P3)
570 associated with an open reading frame, the periodicity modulo 2 (P2)
571 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
572 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
573 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
574 helix pitch, etc. The problem investigated here is whether a process
575 of the type RNA editing can lead to the non-random statistical properties
576 commonly observed in genes. This paper will show in particular that:
577 The process of insertions and deletions of mononucleotides in the
578 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
579 modulo 2 (P2). The process of insertions and deletions of trinucleotides
580 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
581 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
582 Furthermore, these two processes lead to a strong correlation with
583 the reality, namely the mononucleotide insertion/deletion process,
584 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
585 process, with the eukaryotic protein coding genes.},
586 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
587 Unité Associée CNRS No 822, France.},
588 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
589 Mutagenesis, genetics; RNA, genetics},
591 medline-pst = {ppublish},
594 timestamp = {2011.05.05}
598 author = {D. G. Arquès and C. J. Michel},
599 title = {Periodicities in coding and noncoding regions of the genes.},
600 journal = {J Theor Biol},
606 abstract = {Gene population statistical studies of protein coding genes and introns
607 have identified two types of periodicities on the purine/pyrimidine
608 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
609 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
610 chloroplasts, mitochondria, plasmids and in introns of viruses and
611 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
612 in the eukaryotic introns. The periodicity study is herein extended
613 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
614 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
615 Therefore, these observations suggest a unitary and dynamic concept
616 for the genes as for a given genome, the 5' and 3' regions have the
617 genetic information for protein coding genes and for introns: (1)
618 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
619 have the information for protein coding genes (P3) and for introns
620 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
621 while the intensity of P2 is weak in 5' regions and high in 3' regions.
622 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
623 the information for protein coding genes (P3). (3) In the viral genome,
624 the 5' (P3) and 3' (P3) regions have the information for protein
625 coding genes (P3) and for introns (P3). The absence of P2 in viral
626 introns (in opposition to eukaryotic introns) may be related to the
627 absence of P2 in 5' and 3' regions of viruses.},
628 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
630 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
631 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
632 Nucleic Acid; Viruses, genetics},
634 medline-pst = {ppublish},
637 timestamp = {2011.05.05}
640 @ARTICLE{Arques1990a,
641 author = {D. G. Arquès and C. J. Michel},
642 title = {A model of DNA sequence evolution.},
643 journal = {Bull Math Biol},
648 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
649 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
650 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
651 i in the range, but presents a maximum at i = 6 in the following
652 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
653 and mitochondria, and also viral introns, ribosomal RNA genes and
654 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
655 457-461). From the "universality" of this observation, we suggested
656 that the oligonucleotide YRY(N)6 is a primitive one and that it has
657 a central function in DNA sequence evolution (Arquès and Michel,
658 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
659 a concept of a model of DNA sequence evolution which will be validated
660 according to a schema presented in three parts. In the first part,
661 using the last version of the gene database, the YRY(N)6YRY preferential
662 occurrence (maximum at i = 6) is confirmed for the populations mentioned
663 above and is extended to some newly analysed populations: chloroplast
664 introns, chloroplast 5' regions, mitochondrial 5' regions and small
665 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
666 occurrence and periodicities are used in order to classify 18 gene
667 populations. In the second part, we will demonstrate that several
668 statistical features characterizing different gene populations (in
669 particular the YRY(N)6YRY preferential occurrence and the periodicities)
670 can be retrieved from a simple Markov model based on the mixing of
671 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
672 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
673 and YRY(N)3. Several properties are identified and prove in particular
674 that the oligonucleotide mixing is an independent process and that
675 several different features are functions of a unique parameter. In
676 the third part, the return of the model to the reality shows a strong
677 correlation between reality and simulation concerning the presence
678 of a large alternating purine/pyrimidine stretches and of periodicities.
679 It also contributes to a greater understanding of biological reality,
680 e.g. the presence or the absence of large alternating purine/pyrimidine
681 stretches can be explained as being a simple consequence of the mixing
682 of two particular oligonucleotides. Finally, we believe that such
683 an approach is the first step toward a unified model of DNA sequence
684 evolution allowing the molecular understanding of both the origin
685 of life and the actual biological reality.},
686 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
687 Unité Associée CNRS No 822, France.},
688 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
691 medline-pst = {ppublish},
694 timestamp = {2011.05.05}
697 @ARTICLE{Arques1993a,
698 author = {D. G. Arquès and C. J. Michel and K. Orieux},
699 title = {Identification and simulation of new non-random statistical properties
700 common to different populations of eukaryotic non-coding genes.},
701 journal = {J Theor Biol},
707 abstract = {The autocorrelation function analysing the occurrence probability
708 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
709 two periodicities modulo 2, 3 and the preferential occurrence of
710 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
711 = cytosine or thymine, N = R or Y). These non-random genetic statistical
712 properties can be simulated by an independent mixing of the three
713 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
714 The problem investigated in this study is whether new properties
715 can be identified in genes with other autocorrelation functions and
716 also simulated with an oligonucleotide mixing model. The two autocorrelation
717 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
718 and YYY(N)iYYY simultaneously identify three new non-random genetic
719 statistical properties: a short linear decrease, local maxima for
720 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
721 Furthermore, these properties are common to three different populations
722 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
723 (see section 2). These three non-random properties can also be simulated
724 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
725 YYYRYRYYY and large alternating R/Y series. The short linear decrease
726 is a result of R8 and Y8, the local maxima for i identical to 3[6],
727 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
728 large alternating R/Y series (section 3). The biological meaning
729 of these results and their relation to the previous oligonucleotide
730 mixing model are presented in the Discussion.},
731 doi = {10.1006/jtbi.1993.1059},
732 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
733 d'Informatique de Besançon, France.},
734 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
735 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
737 medline-pst = {ppublish},
739 pii = {S0022-5193(83)71059-3},
741 timestamp = {2011.05.05},
742 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
746 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
747 title = {On the inadequacy of the logistic map for cryptographic applications},
748 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
753 owner = {christophe},
754 timestamp = {2010.03.01}
757 @MISC{Backofen99algorithmicapproach,
758 author = {R. Backofen and S. Will and P. Clote},
759 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
765 @inproceedings{Blum:1985:EPP:19478.19501,
766 author = {Blum, Manuel and Goldwasser, Shafi},
767 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
768 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
770 isbn = {0-387-15658-5},
771 location = {Santa Barbara, California, United States},
774 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
776 publisher = {Springer-Verlag New York, Inc.},
777 address = {New York, NY, USA},
778 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
782 @INPROCEEDINGS{bcgr11:ip,
783 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
784 and Richard, Adrien},
785 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
786 Boolean Discrete-Time Dynamical Systems},
787 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
792 address = {Oslo, Norway},
796 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
802 author = {Bahi, Jacques M. and Guyeux, Christophe},
803 title = {Hash Functions Using Chaotic Iterations},
804 journal = {Journal of Algorithms \& Computational Technology},
810 doi = {10.1260/1748-3018.4.2.167},
811 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
816 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
819 @INPROCEEDINGS{guyeux10ter,
820 author = {Bahi, Jacques M. and Guyeux, Christophe},
821 title = {A new chaos-based watermarking algorithm},
822 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
825 address = {Athens, Greece},
827 publisher = {SciTePress},
829 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
834 @INPROCEEDINGS{bgc11:ip,
835 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
836 title = {Chaos of Protein Folding},
837 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
840 address = {San Jose, California, United States},
844 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
849 @INPROCEEDINGS{guyeux10bis,
850 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
851 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
853 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
856 address = {Venice-Mestre, Italy},
859 doi = {10.1109/SENSORCOMM.2010.76},
860 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
863 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
866 @INPROCEEDINGS{guyeuxVictoria,
867 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
868 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
869 versus Watermarking Approach},
870 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
873 series = {Lecture Notes in ICST},
875 address = {Victoria, Canada},
878 doi = {10.1007/978-3-642-17994-5_23},
879 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
882 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
885 @INPROCEEDINGS{bgs11:ip,
886 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
887 title = {Building a Chaotic Proven Neural Network},
888 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
892 address = {Maldives, Maldives},
895 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
900 @INPROCEEDINGS{bgw10:ip,
901 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
902 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
904 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
909 address = {Sanya, China},
912 doi = {10.1007/978-3-642-16515-3_26},
913 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
916 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
919 @INPROCEEDINGS{bgw09:ip,
920 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
921 title = {A novel pseudo-random generator based on discrete chaotic iterations},
922 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
925 address = {Cannes, France},
928 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
933 @INPROCEEDINGS{bmg10:onp,
934 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
935 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
936 Networks for critical applications},
937 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
938 et Applications Critiques de Surveillance},
940 address = {Bayonne, France},
942 note = {Communication orale},
944 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
949 @INPROCEEDINGS{guyeuxBayonne,
950 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
951 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
952 Networks for critical applications},
953 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
954 et Applications Critiques de Surveillance},
956 address = {Bayonne, France},
958 note = {Communication orale},
965 author = {Bahi, Jacques M. and Salomon, Michel},
966 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
967 Lifetime of {MANETs}},
968 journal = {Computer Networks Journal},
971 note = {Accepted manuscript. To appear},
974 impact-factor = {1.201},
977 publisher = {Elsevier}
981 author = {J. M. Bahi},
982 title = {Boolean totally asynchronous iterations},
983 journal = {Int. Journal of Mathematical Algorithms},
988 timestamp = {17/02/2008}
991 @ARTICLE{Bahi2000bis,
992 author = {Jacques M. Bahi},
993 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
994 journal = {Journal of Parallel and Distributed Computing},
999 timestamp = {2009.01.10}
1003 author = {J. M. Bahi},
1004 title = {Parallel synchronous chaotic iterations for singular linear systems},
1005 journal = {Parallel Algorithms and Applications},
1010 timestamp = {17/02/2008}
1014 author = {Jacques M. Bahi},
1015 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1016 journal = {Comptes Rendus de l'Academie des Sciences},
1018 volume = {t. 326, serie 1},
1019 pages = {1421--1425},
1021 timestamp = {2009.01.18}
1025 author = {Jacques M. Bahi},
1026 title = {Méthodes itératives dans des espaces produits. Application au calcul
1028 school = {Université de Franche-Comté},
1030 type = {Habilitation à diriger des recherches},
1031 owner = {christophe},
1032 timestamp = {2010.08.24}
1036 author = {Jacques M. Bahi},
1037 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1038 Simulation numérique sur des exemples de circuits électriques},
1039 school = {Université de Franche-Comté},
1041 owner = {christophe},
1042 timestamp = {2010.08.24}
1046 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1047 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1049 journal = {IEEE Transactions on Neural Networks},
1056 timestamp = {2009.12.04}
1060 author = {J.~M. Bahi and S. Contassot-Vivier},
1061 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1063 journal = {IEEE Transactions on Neural Networks},
1066 pages = {1353-1363},
1068 timestamp = {2009.02.14}
1071 @TECHREPORT{bcgg10:ir,
1072 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1073 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1074 for {S}ynchronous {I}terations},
1075 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1078 type = {Research Report},
1079 number = {RR2010-04},
1081 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1085 author = {Bahi, Jacques M. and Guyeux, Christophe},
1086 title = {Hash Functions Using Chaotic Iterations},
1087 journal = {Journal of Algorithms \& Computational Technology},
1092 classement = {ACLNI},
1093 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1095 impact-factor = {#},
1100 @INPROCEEDINGS{guyeux10,
1101 author = {Bahi, Jacques M. and Guyeux, Christophe},
1102 title = {Topological chaos and chaotic iterations, application to Hash functions},
1103 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1106 address = {Barcelona, Spain},
1108 note = {Best paper award},
1109 classement = {ACTI},
1110 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1116 author = {Jacques M. Bahi and Christophe Guyeux},
1117 title = {A chaos-based approach for information hiding security.},
1118 howpublished = {arXiv},
1121 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1125 author = {Jacques M. Bahi and Christophe Guyeux},
1126 title = {A watermarking algorithm satisfying topological chaos properties},
1129 volume = {abs/0810.4713},
1130 bibsource = {DBLP, http://dblp.uni-trier.de},
1131 ee = {http://arxiv.org/abs/0810.4713}
1135 author = {Jacques M. Bahi and Christophe Guyeux},
1136 title = {Chaotic iterations and topological chaos},
1138 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1139 Miranker [5] and Miellou [9] in a numerical analysis context, and
1140 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1141 dynamical systems framework. In both cases, the objective was to
1142 derive conditions of convergence of such iterations to a fixed state.
1143 In this paper, a new point of view is presented, the goal here is
1144 to derive conditions under which chaotic iterations admit a chaotic
1145 behaviour in a rigorous mathematical sense. Contrary to what has
1146 been studied in the literature, convergence is not desired. More
1147 precisely, we establish in this paper a link between the concept
1148 of chaotic iterations on a finite set and the notion of topological
1149 chaos [8], [6], [7]. We are motivated by concrete applications of
1150 our approach, such as the use of chaotic boolean iterations in the
1151 computer security field. Indeed, the concept of chaos is used in
1152 many areas of data security without real rigorous theoretical foundations,
1153 and without using the fundamental properties that allow chaos. The
1154 wish of this paper is to bring a bit more mathematical rigour in
1156 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1158 comments = {6 pages},
1159 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1160 oai2identifier = {0810.3154},
1162 timestamp = {2008.10.23},
1163 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1166 @ARTICLE{arxivRNNchaos,
1167 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1168 title = {Building a Chaotic Proved Neural Network},
1171 volume = {abs/1101.4351},
1172 ee = {http://arxiv.org/abs/1101.4351}
1175 @INPROCEEDINGS{guyeuxTaiwan10,
1176 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1177 title = {Improving random number generators by chaotic iterations. Application
1179 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1181 pages = {V13-643--V13-647},
1182 address = {Taiyuan, China},
1184 classement = {ACTI},
1185 doi = {10.1109/ICCASM.2010.5622199},
1186 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1189 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1193 author = {Jacques M Bahi and Christian J Michel},
1194 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1196 journal = {Bull Math Biol},
1202 abstract = {We develop here a new class of stochastic models of gene evolution
1203 in which a random subset of the 64 possible trinucleotides mutates
1204 at each evolutionary time t according to some time dependent substitution
1205 probabilities. Therefore, at each time t, the numbers and the types
1206 of mutable trinucleotides are unknown. Thus, the mutation matrix
1207 changes at each time t. This pseudochaotic model developed generalizes
1208 the standard model in which all the trinucleotides mutate at each
1209 time t. It determines the occurrence probabilities at time t of trinucleotides
1210 which pseudochaotically mutate according to 3 time dependent substitution
1211 parameters associated with the 3 trinucleotide sites. The main result
1212 proves that under suitable assumptions, this pseudochaotic model
1213 converges to a uniform probability vector identical to that of the
1214 standard model. Furthermore, an application of this pseudochaotic
1215 model allows an evolutionary study of the 3 circular codes identified
1216 in both eukaryotic and prokaryotic genes. A circular code is a particular
1217 set of trinucleotides whose main property is the retrieval of the
1218 frames in genes locally, i.e., anywhere in genes and particularly
1219 without start codons, and automatically with a window of a few nucleotides.
1220 After a certain evolutionary time and with particular time dependent
1221 functions for the 3 substitution parameters, precisely an exponential
1222 decrease in the 1st and 2nd trinucleotide sites and an exponential
1223 increase in the 3rd one, this pseudochaotic model retrieves the main
1224 statistical properties of the 3 circular codes observed in genes.
1225 Furthermore, it leads to a circular code asymmetry stronger than
1226 the standard model (nonpseudochaotic) and, therefore, to a better
1227 correlation with the genes.},
1228 doi = {10.1007/s11538-008-9376-4},
1229 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1230 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1231 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1234 medline-pst = {ppublish},
1237 timestamp = {2011.05.05},
1238 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1242 author = {Jacques M Bahi and Christian J Michel},
1243 title = {A stochastic model of gene evolution with chaotic mutations.},
1244 journal = {J Theor Biol},
1250 abstract = {We develop here a new class of stochastic models of gene evolution
1251 in which the mutations are chaotic, i.e. a random subset of the 64
1252 possible trinucleotides mutates at each evolutionary time t according
1253 to some substitution probabilities. Therefore, at each time t, the
1254 numbers and the types of mutable trinucleotides are unknown. Thus,
1255 the mutation matrix changes at each time t. The chaotic model developed
1256 generalizes the standard model in which all the trinucleotides mutate
1257 at each time t. It determines the occurrence probabilities at time
1258 t of trinucleotides which chaotically mutate according to three substitution
1259 parameters associated with the three trinucleotide sites. Two theorems
1260 prove that this chaotic model has a probability vector at each time
1261 t and that it converges to a uniform probability vector identical
1262 to that of the standard model. Furthermore, four applications of
1263 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1264 and with a particular strategy for the three stop codons) allow an
1265 evolutionary study of the three circular codes identified in both
1266 eukaryotic and prokaryotic genes. A circular code is a particular
1267 set of trinucleotides whose main property is the retrieval of the
1268 frames in genes locally, i.e. anywhere in genes and particularly
1269 without start codons, and automatically with a window of a few nucleotides.
1270 After a certain evolutionary time and with particular values for
1271 the three substitution parameters, the chaotic models retrieve the
1272 main statistical properties of the three circular codes observed
1273 in genes. These applications also allow an evolutionary comparison
1274 between the standard and chaotic models.},
1275 doi = {10.1016/j.jtbi.2008.07.028},
1276 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1277 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1278 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1279 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1280 Stochastic Processes; Time},
1282 medline-pst = {ppublish},
1284 pii = {S0022-5193(08)00395-0},
1286 timestamp = {2011.05.05},
1287 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1290 @ARTICLE{Bahi2008bis,
1291 author = {Bahi, J. M. and Michel, C. J.},
1292 title = {A stochastic model of gene evolution with chaotic mutations},
1293 journal = {Journal of Theoretical Biology},
1298 timestamp = {2009.01.10}
1302 author = {Jacques M Bahi and Christian J Michel},
1303 title = {A stochastic gene evolution model with time dependent mutations.},
1304 journal = {Bull Math Biol},
1310 abstract = {We develop here a new class of gene evolution models in which the
1311 nucleotide mutations are time dependent. These models allow to study
1312 nonlinear gene evolution by accelerating or decelerating the mutation
1313 rates at different evolutionary times. They generalize the previous
1314 ones which are based on constant mutation rates. The stochastic model
1315 developed in this class determines at some time t the occurrence
1316 probabilities of trinucleotides mutating according to 3 time dependent
1317 substitution parameters associated with the 3 trinucleotide sites.
1318 Therefore, it allows to simulate the evolution of the circular code
1319 recently observed in genes. By varying the class of function for
1320 the substitution parameters, 1 among 12 models retrieves after mutation
1321 the statistical properties of the observed circular code in the 3
1322 frames of actual genes. In this model, the mutation rate in the 3rd
1323 trinucleotide site increases during gene evolution while the mutation
1324 rates in the 1st and 2nd sites decrease. This property agrees with
1325 the actual degeneracy of the genetic code. This approach can easily
1326 be generalized to study evolution of motifs of various lengths, e.g.,
1327 dicodons, etc., with time dependent mutations.},
1328 doi = {10.1016/j.bulm.2003.10.004},
1329 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1330 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1331 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1332 genetics; Models, Genetic; Mutation; Stochastic Processes},
1334 medline-pst = {ppublish},
1336 pii = {S0092824003001174},
1338 timestamp = {2011.05.05},
1339 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1343 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1344 title = {On Devaney's Definition of Chaos},
1345 journal = {Amer. Math. Monthly},
1351 timestamp = {27/01/2008}
1355 author = {E. Barker and A. Roginsky},
1356 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1357 of Cryptographic Algorithms and Key Sizes},
1359 owner = {christophe},
1360 timestamp = {2010.08.18}
1364 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1365 title = {A general framework for robust watermarking security},
1366 journal = {Signal Processing},
1369 pages = {2069-2084},
1371 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1372 bibsource = {DBLP, http://dblp.uni-trier.de},
1373 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1375 timestamp = {2009.06.30}
1379 author = {Baudet, G\'{e}rard M.},
1380 title = {Asynchronous Iterative Methods for Multiprocessors},
1386 address = {New York, NY, USA},
1387 doi = {http://doi.acm.org/10.1145/322063.322067},
1393 author = {Didier El Baz},
1394 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1395 : étude théorique, mise en œuvre, et application},
1396 school = {Institut national polytechnique de Toulouse},
1398 type = {Habilitation à diriger des recherches},
1399 owner = {christophe},
1400 timestamp = {2010.08.24}
1404 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1405 title = {Contention awareness and fault-tolerant scheduling for precedence
1406 constrained tasks in heterogeneous systems},
1407 journal = {Parallel Computing},
1413 doi = {10.1016/j.parco.2008.11.001},
1416 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1419 @INPROCEEDINGS{bhr08b:bl,
1420 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1421 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1423 booktitle = {IPDPS'08},
1426 publisher = {IEEE Computer Society Press},
1432 @INPROCEEDINGS{Berger98,
1433 author = {Berger, Bonnie and Leighton, Tom},
1434 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1435 booktitle = {Proceedings of the second annual international conference on Computational
1438 series = {RECOMB '98},
1440 address = {New York, NY, USA},
1443 isbn = {0-89791-976-9},
1444 location = {New York, New York, United States},
1449 title = {Parallel and distributed computation: numerical methods},
1450 publisher = {Prentice-Hall, Inc.},
1452 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1453 address = {Upper Saddle River, NJ, USA},
1454 isbn = {0-13-648700-9}
1457 @MISC{Bertsekas88paralleland,
1458 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1459 title = {Parallel and distributed iterative algorithms: a selective survey},
1464 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1465 title = {On Li-Yorke pairs},
1469 timestamp = {2008.01.02}
1473 author = {F. Blanchard and B. Host and S. Ruette},
1474 title = {Asymptotic pairs in positive-entropy systems},
1476 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1479 timestamp = {2008.01.02}
1483 author = {Dan Boneh and Matt Franklin},
1484 title = {Identity-Based Encryption from the {Weil} Pairing},
1485 journal = {SIAM J. of Computing},
1490 note = {Extended abstract in Crypto'01}
1493 @INCOLLECTION{boneh,
1494 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1495 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1498 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1499 We present a homomorphic public key encryption scheme that allows
1500 the public evaluation of ψ given an encryption of the variables x
1501 1,..., x n. In other words, given the encryption of the bits x 1,...,
1502 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1503 we can evaluate quadratic multi-variate polynomials on ciphertexts
1504 provided the resulting value falls within a small set. We present
1505 a number of applications of the system: 1 In a database of size n,
1506 the total communication in the basic step of the Kushilevitz-Ostrovsky
1507 PIR protocol is reduced from to . 2 An efficient election system
1508 based on homomorphic encryption where voters do not need to include
1509 non-interactive zero knowledge proofs that their ballots are valid.
1510 The election system is proved secure without random oracles but still
1511 efficient. 3 A protocol for universally verifiable computation.},
1512 citeulike-article-id = {2719460},
1513 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1514 journal = {Theory of Cryptography},
1515 keywords = {homomorphic, pairings},
1516 posted-at = {2008-04-25 21:53:15},
1518 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1522 author = {Bonneau, Richard and Baker, David},
1523 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1524 journal = {Annual Review of Biophysics and Biomolecular Structure},
1529 doi = {10.1146/annurev.biophys.30.1.173}
1533 author = {R. Bowen},
1534 title = {Entropy for group endomorphisms and homogeneous spaces},
1535 journal = {Trans. Amer. Math. Soc.},
1540 timestamp = {15/02/2008}
1544 author = {R. Bowen},
1545 title = {Periodic points and measures for Axiom A diffeomorphisms},
1546 journal = {Trans. Amer. Math. Soc.},
1551 timestamp = {15/02/2008}
1554 @ARTICLE{Braxenthaler97,
1555 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1557 title = {Chaos in protein dynamics},
1558 journal = {Proteins-structure Function and Bioinformatics},
1562 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1566 @INPROCEEDINGS{Brumley03remotetiming,
1567 author = {David Brumley and Dan Boneh},
1568 title = {Remote Timing Attacks are Practical},
1569 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1574 @ARTICLE{Bohm1991375,
1575 author = {Gerald Böhm},
1576 title = {Protein folding and deterministic chaos: Limits of protein folding
1577 simulations and calculations},
1578 journal = {Chaos, Solitons \& Fractals},
1581 pages = {375 - 382},
1583 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1585 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1588 @INCOLLECTION{Cachin2004,
1589 author = {Cachin, Christian},
1590 title = {An Information-Theoretic Model for Steganography},
1591 booktitle = {Information Hiding},
1592 publisher = {Springer Berlin / Heidelberg},
1595 series = {Lecture Notes in Computer Science},
1597 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1602 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1604 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1605 wireless sensor networks.},
1606 journal = {Computer Communication journal (29)},
1611 @ARTICLE{CarletCZ98,
1612 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1613 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1614 journal = {Des. Codes Cryptography},
1619 bibsource = {DBLP, http://dblp.uni-trier.de}
1622 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1623 author = {Claude Castelluccia},
1624 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1625 booktitle = {MobiQuitous},
1628 publisher = {IEEE Computer Society}
1632 author = {Cayre, F. and Bas, P.},
1633 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1634 journal = {IEEE Transactions on Information Forensics and Security},
1639 doi = {10.1109/TIFS.2007.916006},
1641 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1642 security, watermarking, Kerckhoffs-based embedding security classes,
1643 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1644 steganography security, watermark-only-attack, watermarking, Security,
1645 spread-spectrum (SS) watermarking},
1647 timestamp = {2009.06.29}
1651 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1652 title = {Watermarking security: theory and practice},
1653 journal = {IEEE Transactions on Signal Processing},
1656 pages = {3976--3987},
1658 doi = {10.1109/TSP.2005.855418},
1660 keywords = {blind source separation, cryptography, watermarking, Fisher information
1661 matrix, blind source separation, cryptanalysis, information theory,
1662 spread spectrum techniques, substitutive scheme, watermarking security,
1663 Blind source separation, Fisher information matrix, equivocation,
1664 security, watermarking},
1666 timestamp = {2009.06.29}
1669 @ARTICLE{Chajakis91,
1670 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1671 title = {Synchronous and asynchronous implementations of relaxation algorithms
1672 for nonlinear network optimization},
1673 journal = {Parallel Comput.},
1678 address = {Amsterdam, The Netherlands, The Netherlands},
1679 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1681 publisher = {Elsevier Science Publishers B. V.}
1685 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1687 title = {SIA: Secure information aggregation in sensor networks},
1688 journal = {J. Comput. Secur.},
1693 address = {Amsterdam, The Netherlands, The Netherlands},
1695 publisher = {IOS Press}
1698 @ARTICLE{Chandramouli06,
1699 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1700 title = {Battery power-aware encryption},
1701 journal = {ACM transactions on information and system security},
1704 owner = {christophe},
1705 timestamp = {2010.07.31}
1709 author = {Pascale Charpin},
1710 title = {A description of some extended cyclic codes with application to Reed-Solomon
1712 journal = {Discrete Mathematics},
1717 bibsource = {DBLP, http://dblp.uni-trier.de},
1718 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1722 author = {D. Chazan and W. Miranker},
1723 title = {Chaotic relaxation},
1724 journal = {Linear algebra and its applications},
1728 timestamp = {2008.05.22}
1732 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1733 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1734 homomorphism scheme},
1735 journal = {Inf. Process. Lett.},
1740 address = {Amsterdam, The Netherlands, The Netherlands},
1741 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1743 publisher = {Elsevier North-Holland, Inc.}
1746 @MISC{Cheon03acryptanalysis,
1747 author = {Jung Hee Cheon and Hyun Soo Nam},
1748 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1754 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1755 title = {Secure encrypted-data aggregation for wireless sensor networks},
1756 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1759 pages = {1048-1059},
1763 @ARTICLE{Chivian2005,
1764 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1765 Jack and Rohl, Carol A. and Baker, David},
1766 title = {Prediction of CASP6 structures using automated robetta protocols},
1767 journal = {Proteins},
1773 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1774 alignment ensemble},
1775 owner = {christophe},
1776 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1777 timestamp = {2011.01.22},
1778 url = {http://dx.doi.org/10.1002/prot.20733}
1782 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1783 title = {Chaos-based multipurpose image watermarking algorithm},
1784 journal = {Wuhan University Journal of Natural Sciences},
1787 pages = {1675-1678},
1788 note = {10.1007/BF02831848},
1789 abstract = {To achieve the goal of image content authentication and copyright
1790 protection simultaneously, this paper presents a novel image dual
1791 watermarking method based on chaotic map. Firstly, the host image
1792 was split into many nonoverlapping small blocks, and the block-wise
1793 discrete cosine transform (DCT) is computed. Secondly, the robust
1794 watermarks, shuffled by the chaotic sequences, are embedded in the
1795 DC coefficients of blocks to achieve the goal of copyright protection.
1796 The semi-fragile watermarks, generated by chaotic map, are embedded
1797 in the AC coefficients of blocks to obtain the aim of image authentication.
1798 Both of them can be extracted without the original image. Simulation
1799 results demonstrate the effectiveness of our algorithm in terms of
1800 robustness and fragility.},
1801 affiliation = {Central South University School of Information Science and Engineering
1802 410083 Changsha, Hunan China},
1805 keyword = {Mathematics, general},
1806 publisher = {Wuhan University, co-published with Springer},
1807 url = {http://dx.doi.org/10.1007/BF02831848}
1810 @ARTICLE{Conley1978,
1811 author = {C. Conley},
1812 title = {Isolated invariant sets and the Morse index},
1813 journal = {CBMS Regional Conference. AMS.},
1817 timestamp = {2008.01.02}
1821 author = {Philippe Cornu and André Smolarz},
1822 title = {Image characterization by texture},
1823 journal = {Traitement du signal},
1827 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1829 timestamp = {2008.05.12}
1832 @INPROCEEDINGS{Cox99,
1833 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1834 title = {Watermarking as Communications With Side Information},
1835 booktitle = {Proceedings of the IEEE},
1837 pages = {1127--1141},
1838 owner = {christophe},
1839 timestamp = {2010.03.06}
1842 @ARTICLE{Cox97securespread,
1843 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1845 title = {Secure spread spectrum watermarking for multimedia},
1846 journal = {IEEE Transactions on Image Processing},
1849 pages = {1673--1687}
1853 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1854 title = {Video Compression with Random Neural Networks},
1855 journal = {Neural Networks for Identification, Control, and Robotics, International
1860 address = {Los Alamitos, CA, USA},
1861 isbn = {0-8186-7456-3},
1862 publisher = {IEEE Computer Society}
1865 @INPROCEEDINGS{Crescenzi98,
1866 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1867 and Piccolboni, Antonio and Yannakakis, Mihalis},
1868 title = {On the complexity of protein folding (extended abstract)},
1869 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1871 series = {STOC '98},
1873 address = {New York, NY, USA},
1876 isbn = {0-89791-962-9},
1877 location = {Dallas, Texas, United States},
1882 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1883 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1884 journal = {Chaos, Solitons and Fractals},
1889 timestamp = {2008.10.07}
1893 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1894 title = {Processor-Dependent Malware... and codes},
1896 comment = {arXiv:1011.1638},
1897 eprint = {arXiv:1011.1638}
1901 title = {An Introduction to Chaotic Dynamical Systems},
1902 publisher = {Addison-Wesley},
1904 author = {Devaney, Robert L.},
1905 address = {Redwood City, CA},
1910 author = {Whitfield Diffie and Martin E. Hellman},
1911 title = {New Directions in Cryptography},
1912 journal = {IEEE Transactions on Information Theory},
1917 date = {November 1976},
1919 timestamp = {2009.06.30},
1920 url = {citeseer.ist.psu.edu/diffie76new.html}
1923 @INCOLLECTION{Dijk10,
1924 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1926 title = {Fully Homomorphic Encryption over the Integers},
1927 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1928 publisher = {Springer Berlin / Heidelberg},
1930 editor = {Gilbert, Henri},
1932 series = {Lecture Notes in Computer Science},
1934 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1935 elementary modular arithmetic. We use Gentry’s technique to construct
1936 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1937 scheme. However, instead of using ideal lattices over a polynomial
1938 ring, our bootstrappable encryption scheme merely uses addition and
1939 multiplication over the integers. The main appeal of our scheme is
1940 the conceptual simplicity. We reduce the security of our scheme to
1941 finding an approximate integer gcd – i.e., given a list of integers
1942 that are near-multiples of a hidden integer, output that hidden integer.
1943 We investigate the hardness of this task, building on earlier work
1944 of Howgrave-Graham.},
1945 affiliation = {MIT CSAIL}
1949 author = {Dill, KA},
1950 title = {Theory for the folding and stability of globular proteins.},
1951 journal = {Biochemistry},
1957 abstract = {Using lattice statistical mechanics, we develop theory to account
1958 for the folding of a heteropolymer molecule such as a protein to
1959 the globular and soluble state. Folding is assumed to be driven by
1960 the association of solvophobic monomers to avoid solvent and opposed
1961 by the chain configurational entropy. Theory predicts a phase transition
1962 as a function of temperature or solvent character. Molecules that
1963 are too short or too long or that have too few solvophobic residues
1964 are predicted not to fold. Globular molecules should have a largely
1965 solvophobic core, but there is an entropic tendency for some residues
1966 to be "out of place", particularly in small molecules. For long chains,
1967 molecules comprised of globular domains are predicted to be thermodynamically
1968 more stable than spherical molecules. The number of accessible conformations
1969 in the globular state is calculated to be an exceedingly small fraction
1970 of the number available to the random coil. Previous estimates of
1971 this number, which have motivated kinetic theories of folding, err
1972 by many tens of orders of magnitude.},
1973 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
1974 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
1975 owner = {christophe},
1976 timestamp = {2011.01.22},
1977 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
1981 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
1982 Thomas, PD and Chan, HS},
1983 title = {Principles of protein folding--a perspective from simple exact models.},
1984 journal = {Protein Sci},
1987 pages = {561-602--},
1990 abstract = {General principles of protein structure, stability, and folding kinetics
1991 have recently been explored in computer simulations of simple exact
1992 lattice models. These models represent protein chains at a rudimentary
1993 level, but they involve few parameters, approximations, or implicit
1994 biases, and they allow complete explorations of conformational and
1995 sequence spaces. Such simulations have resulted in testable predictions
1996 that are sometimes unanticipated: The folding code is mainly binary
1997 and delocalized throughout the amino acid sequence. The secondary
1998 and tertiary structures of a protein are specified mainly by the
1999 sequence of polar and nonpolar monomers. More specific interactions
2000 may refine the structure, rather than dominate the folding code.
2001 Simple exact models can account for the properties that characterize
2002 protein folding: two-state cooperativity, secondary and tertiary
2003 structures, and multistage folding kinetics--fast hydrophobic collapse
2004 followed by slower annealing. These studies suggest the possibility
2005 of creating "foldable" chain molecules other than proteins. The encoding
2006 of a unique compact chain conformation may not require amino acids;
2007 it may require only the ability to synthesize specific monomer sequences
2008 in which at least one monomer type is solvent-averse.},
2009 address = {Department of Pharmaceutical Chemistry, University of California,
2010 San Francisco 94143-1204, USA.},
2011 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2012 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2013 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2014 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2015 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2016 owner = {christophe},
2017 timestamp = {2011.01.22},
2018 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2021 @INPROCEEDINGS{Dobbertin96,
2022 author = {Dobbertin, Hans},
2023 title = {Cryptanalysis of MD4},
2024 booktitle = {Proceedings of the Third International Workshop on Fast Software
2028 address = {London, UK},
2029 publisher = {Springer-Verlag},
2030 isbn = {3-540-60865-6}
2033 @INPROCEEDINGS{DomingoFerrer2002,
2034 author = {Domingo-Ferrer, Josep},
2035 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2036 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2040 address = {London, UK},
2041 publisher = {Springer-Verlag},
2042 isbn = {3-540-44270-7}
2045 @ARTICLE{Dubchak1995,
2046 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2047 title = {Prediction of protein folding class using global description of amino
2049 journal = {Proc Natl Acad Sci U S A},
2052 pages = {8700--8704},
2055 __markedentry = {[guyeux]},
2056 abstract = {We present a method for predicting protein folding class based on
2057 global protein chain description and a voting process. Selection
2058 of the best descriptors was achieved by a computer-simulated neural
2059 network trained on a data base consisting of 83 folding classes.
2060 Protein-chain descriptors include overall composition, transition,
2061 and distribution of amino acid attributes, such as relative hydrophobicity,
2062 predicted secondary structure, and predicted solvent exposure. Cross-validation
2063 testing was performed on 15 of the largest classes. The test shows
2064 that proteins were assigned to the correct class (correct positive
2065 prediction) with an average accuracy of 71.7\%, whereas the inverse
2066 prediction of proteins as not belonging to a particular class (correct
2067 negative prediction) was 90-95\% accurate. When tested on 254 structures
2068 used in this study, the top two predictions contained the correct
2069 class in 91\% of the cases.},
2070 institution = {Department of Chemistry, University of California, Berkeley 94720,
2072 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2073 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2074 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2075 Reproducibility of Results; Solvents},
2077 medline-pst = {ppublish},
2080 timestamp = {2011.07.18}
2084 title = {Real analysis and probability},
2085 publisher = {Cambridge University Press},
2086 author = {Richard M. Dudley},
2089 timestamp = {2008.01.02}
2093 author = {El Tarazi, Mouhamed Nabih},
2094 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2095 journal = {Numerische Mathematik},
2099 note = {10.1007/BF01405568},
2100 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2104 keyword = {Mathematics and Statistics},
2105 publisher = {Springer Berlin / Heidelberg},
2106 url = {http://dx.doi.org/10.1007/BF01405568}
2110 author = {El Tarazi, Mouhamed Nabih},
2111 title = {Some convergence results for asynchronous algorithms},
2112 journal = {Numerische Mathematik},
2116 note = {10.1007/BF01407866},
2117 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2118 Box 5969 Kuwait Kuwait},
2121 keyword = {Mathematics and Statistics},
2122 publisher = {Springer Berlin / Heidelberg},
2123 url = {http://dx.doi.org/10.1007/BF01407866}
2127 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2128 title = {A secure digital signature algorithm based on elliptic curve and
2130 journal = {Circuits Systems Signal Processing},
2132 volume = {24, No. 5},
2135 timestamp = {2009.01.16}
2138 @BOOK{Feigenbaum1908,
2139 title = {Universal behavior in nonlinear systems},
2140 publisher = {Los Alamos Science},
2142 author = {Feigenbaum},
2144 timestamp = {2008.01.02}
2147 @ARTICLE{Felsenstein1980,
2148 author = {J. Felsenstein},
2149 title = {A view of population genetics.},
2150 journal = {Science},
2156 doi = {10.1126/science.208.4449.1253},
2158 medline-pst = {ppublish},
2160 pii = {208/4449/1253},
2162 timestamp = {2011.05.05},
2163 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2167 title = {Les virus informatiques : techniques virales et antivirales avancées},
2169 editor = {Springer},
2170 author = {Eric Filiol},
2171 owner = {christophe},
2172 timestamp = {2010.10.13}
2175 @INPROCEEDINGS{FiliolBlackHat,
2176 author = {Eric Filiol},
2177 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2178 booktitle = {Black Hat},
2180 owner = {christophe},
2181 timestamp = {2010.11.28}
2184 @PHDTHESIS{Formenti2003,
2185 author = {Enrico Formenti},
2186 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2187 school = {Université de Provence},
2190 timestamp = {2008.01.02}
2193 @PHDTHESIS{Formenti1998,
2194 author = {Enrico Formenti},
2195 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2197 school = {\'Ecole Normale Supérieure de Lyon},
2199 optmonth = {Octobre},
2201 timestamp = {2008.01.02}
2205 author = {Gabriel Frey and Christian J Michel},
2206 title = {Identification of circular codes in bacterial genomes and their use
2207 in a factorization method for retrieving the reading frames of genes.},
2208 journal = {Comput Biol Chem},
2214 abstract = {We developed a statistical method that allows each trinucleotide to
2215 be associated with a unique frame among the three possible ones in
2216 a (protein coding) gene. An extensive gene study in 175 complete
2217 bacterial genomes based on this statistical approach resulted in
2218 identification of 72 new circular codes. Finding a circular code
2219 enables an immediate retrieval of the reading frame locally anywhere
2220 in a gene. No knowledge of location of the start codon is required
2221 and a short window of only a few nucleotides is sufficient for automatic
2222 retrieval. We have therefore developed a factorization method (that
2223 explores previously found circular codes) for retrieving the reading
2224 frames of bacterial genes. Its principle is new and easy to understand.
2225 Neither complex treatment nor specific information on the nucleotide
2226 sequences is necessary. Moreover, the method can be used for short
2227 regions in nucleotide sequences (less than 25 nucleotides in protein
2228 coding genes). Selected additional properties of circular codes and
2229 their possible biological consequences are also discussed.},
2230 doi = {10.1016/j.compbiolchem.2005.11.001},
2231 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2232 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2233 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2234 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2235 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2236 Statistical; Reading Frames},
2238 medline-pst = {ppublish},
2240 pii = {S1476-9271(05)00111-8},
2242 timestamp = {2011.05.05},
2243 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2247 author = {Gabriel Frey and Christian J Michel},
2248 title = {An analytical model of gene evolution with six mutation parameters:
2249 an application to archaeal circular codes.},
2250 journal = {Comput Biol Chem},
2256 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2257 mutation matrix 64 x 64 with six substitution parameters associated
2258 with the transitions and transversions in the three trinucleotide
2259 sites. It generalizes the previous models based on the nucleotide
2260 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2261 x 64 with three parameters. It determines at some time t the exact
2262 occurrence probabilities of trinucleotides mutating randomly according
2263 to six substitution parameters. An application of this model allows
2264 an evolutionary study of the common circular code COM and the 15
2265 archaeal circular codes X which have been recently identified in
2266 several archaeal genomes. The main property of a circular code is
2267 the retrieval of the reading frames in genes, both locally, i.e.
2268 anywhere in genes and in particular without a start codon, and automatically
2269 with a window of a few nucleotides. In genes, the circular code is
2270 superimposed on the traditional genetic one. Very unexpectedly, the
2271 evolutionary model demonstrates that the archaeal circular codes
2272 can derive from the common circular code subjected to random substitutions
2273 with particular values for six substitutions parameters. It has a
2274 strong correlation with the statistical observations of three archaeal
2275 codes in actual genes. Furthermore, the properties of these substitution
2276 rates allow proposal of an evolutionary classification of the 15
2277 archaeal codes into three main classes according to this model. In
2278 almost all the cases, they agree with the actual degeneracy of the
2279 genetic code with substitutions more frequent in the third trinucleotide
2280 site and with transitions more frequent that transversions in any
2281 trinucleotide site.},
2282 doi = {10.1016/j.compbiolchem.2005.09.001},
2283 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2284 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2285 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2286 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2287 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2289 medline-pst = {ppublish},
2291 pii = {S1476-9271(05)00083-6},
2293 timestamp = {2011.05.05},
2294 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2297 @INPROCEEDINGS{fgb11:ip,
2298 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2299 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2300 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2303 address = {Sevilla, Spain},
2306 classement = {ACTI},
2307 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2313 author = {Alain Frisch},
2314 title = {Entropie topologique et définition du chaos},
2316 note = {Rapport de tipe},
2317 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2318 keywords = {Chaos, Entropie Topologique, Tipe},
2320 timestamp = {2008.01.02},
2321 url = {http://alain.frisch.fr/math.html}
2325 author = {Alain Frisch},
2326 title = {Entropie topologique et définition du chaos},
2328 note = {[En ligne; Page disponible le 12-août-2010]},
2329 url = {\url{http://alain.frisch.fr/math.html}}
2332 @ARTICLE{Frommer97asynchronousweighted,
2333 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2334 title = {Asynchronous Weighted Additive Schwarz Methods},
2335 journal = {Electronic Transactions on Numerical Analysis},
2341 @MISC{Frommer94asynchronoustwo-stage,
2342 author = {Andreas Frommer and Daniel B. Szyld},
2343 title = {Asynchronous Two-Stage Iterative Methods},
2348 title = {Introduction to Chaos and Coherence},
2349 publisher = {IOP Publishing},
2351 author = {J. Frøyland},
2353 timestamp = {2008.01.02}
2357 author = {T. Furon},
2358 title = {Security analysis},
2360 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2362 timestamp = {2009.06.30}
2366 author = {Furon, Teddy and Bas, Patrick},
2367 title = {Broken arrows},
2368 journal = {EURASIP J. Inf. Secur.},
2372 address = {New York, NY, United States},
2373 doi = {http://dx.doi.org/10.1155/2008/597040},
2375 owner = {christophe},
2376 publisher = {Hindawi Publishing Corp.},
2377 timestamp = {2010.03.06}
2380 @ARTICLE{P1150442004,
2381 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2382 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2384 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2390 owner = {christophe},
2391 timestamp = {2010.03.07}
2394 @INPROCEEDINGS{Gentry09,
2395 author = {Gentry, Craig},
2396 title = {Fully homomorphic encryption using ideal lattices},
2397 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2401 address = {New York, NY, USA},
2403 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2404 isbn = {978-1-60558-506-2},
2405 location = {Bethesda, MD, USA}
2408 @INPROCEEDINGS{Girao04,
2409 author = {J. Girao and M. Schneider and D. Westhoff},
2410 title = {CDA: Concealed data aggregation in wireless sensor networks},
2411 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2413 owner = {christophe},
2414 timestamp = {2010.07.31}
2417 @CONFERENCE{Gotsman88,
2418 author = {C. Gotsman and D. Lehmann and E. Shamir},
2419 title = {Asynchronous Dynamics of Random Boolean Networks},
2420 booktitle = {San Diego '88 Neural Networks Conference},
2423 timestamp = {30/03/2008}
2426 @ARTICLE{Guckenheimer1979,
2427 author = {J. Guckenheimer},
2428 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2429 journal = {Comm. Math. Phys.},
2431 optpages = {133-160},
2433 timestamp = {2008.01.02}
2437 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2439 publisher = {Springer Verlag},
2441 author = {J. Guckenheimer and P. Holmes},
2443 timestamp = {2008.01.02}
2446 @ARTICLE{Guo20093201,
2447 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2448 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2450 journal = {Physics Letters A},
2453 pages = {3201 - 3206},
2455 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2456 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2457 in parallel computing environment. We show how to devise forgery
2458 attacks on Xiao's scheme with differential cryptanalysis and give
2459 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2460 we discuss the problem of weak keys in the scheme and demonstrate
2461 how to utilize weak keys to construct collision.},
2463 keywords = {Cryptanalysis}
2466 @PHDTHESIS{GuyeuxThese10,
2467 author = {Christophe Guyeux},
2468 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2469 en s\'{e}curit\'{e} informatique},
2470 school = {Universit\'{e} de Franche-Comt\'{e}},
2472 owner = {christophe},
2473 timestamp = {2010.12.21}
2477 author = {Guyeux, Christophe and Bahi, Jacques},
2478 title = {\'Etude topologique de l'\'etalement de spectre},
2479 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2484 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2489 @INPROCEEDINGS{bg10:ip,
2490 author = {Guyeux, Christophe and Bahi, Jacques},
2491 title = {An improved watermarking algorithm for Internet applications},
2492 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2495 address = {Valencia, Spain},
2497 classement = {ACTI},
2498 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2503 @INPROCEEDINGS{gfb10:ip,
2504 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2505 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2506 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2507 Multimedia Signal Processing},
2510 address = {Darmstadt, Germany},
2512 classement = {ACTI},
2513 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2519 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2520 title = {A more secure information hiding scheme than spread-spectrum obtained
2522 journal = {arXiv 0032565},
2525 timestamp = {2010.04.30}
2529 title = {Guide to Elliptic Curve Cryptography},
2530 publisher = {Springer Professional Computing},
2532 editor = {Springer},
2533 author = {D. Hankerson and A. Menezes and S. Vanstone},
2534 owner = {christophe},
2535 timestamp = {2010.07.31}
2538 @ARTICLE{Hasegawa1985,
2539 author = {M. Hasegawa and H. Kishino and T. Yano},
2540 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2542 journal = {J Mol Evol},
2547 abstract = {A new statistical method for estimating divergence dates of species
2548 from DNA sequence data by a molecular clock approach is developed.
2549 This method takes into account effectively the information contained
2550 in a set of DNA sequence data. The molecular clock of mitochondrial
2551 DNA (mtDNA) was calibrated by setting the date of divergence between
2552 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2553 years ago), when the extinction of dinosaurs occurred. A generalized
2554 least-squares method was applied in fitting a model to mtDNA sequence
2555 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2556 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2557 second of each pair of numbers is the standard deviation) for the
2558 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2559 respectively, from the line leading to humans. Although there is
2560 some uncertainty in the clock, this dating may pose a problem for
2561 the widely believed hypothesis that the pipedal creature Australopithecus
2562 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2563 and at Hadar in Ethiopia, was ancestral to man and evolved after
2564 the human-ape splitting. Another likelier possibility is that mtDNA
2565 was transferred through hybridization between a proto-human and a
2566 proto-chimpanzee after the former had developed bipedalism.},
2567 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2568 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2569 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2572 medline-pst = {ppublish},
2575 timestamp = {2011.05.05}
2579 title = {A First Course in Discrete Dynamical Systems},
2580 publisher = {Springer-Verlag},
2582 author = {R. Homlgren},
2585 timestamp = {2008.01.02}
2588 @INCOLLECTION{Hoque09,
2589 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2590 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2591 Low Resolution Model: A Review},
2592 booktitle = {Biomedical Data and Applications},
2593 publisher = {Springer Berlin Heidelberg},
2595 editor = {Sidhu, Amandeep and Dillon, Tharam},
2597 series = {Studies in Computational Intelligence},
2599 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2602 @CONFERENCE{Houmansadr09,
2603 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2604 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2605 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2607 owner = {christophe},
2608 timestamp = {2010.03.07}
2612 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2613 title = {Secure encrypted-data aggregation for wireless sensor networks},
2614 journal = {Wireless Networks},
2615 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2616 aggregation scheme for wireless sensor networks. Our design for data
2617 aggregation eliminates redundant sensor readings without using encryption
2618 and maintains data secrecy and privacy during transmission. Conventional
2619 aggregation functions operate when readings are received in plaintext.
2620 If readings are encrypted, aggregation requires decryption creating
2621 extra overhead and key management issues. In contrast to conventional
2622 schemes, our proposed scheme provides security and privacy, and duplicate
2623 instances of original readings will be aggregated into a single packet.
2624 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2625 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2626 experiments show that our proposed aggregation method significantly
2627 reduces communication overhead and can be practically implemented
2628 in on-the-shelf sensor platforms.},
2629 citeulike-article-id = {4499496},
2630 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2631 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2632 doi = {10.1007/s11276-009-0177-y},
2633 posted-at = {2009-05-10 09:55:44},
2634 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2638 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2639 title = {Secure encrypted-data aggregation for wireless sensor networks},
2640 journal = {Wirel. Netw.},
2645 address = {Hingham, MA, USA},
2646 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2648 publisher = {Kluwer Academic Publishers}
2652 author = {W. Huang and X. Ye},
2653 title = {Homeomorphisms with the whole compacta being scrambled sets},
2654 journal = {Ergod. Th. Dynam. Systems},
2660 timestamp = {2008.01.02}
2663 @ARTICLE{Hurley1982,
2664 author = {M. Hurley},
2665 title = {Attractors, persistence and density of their bassin},
2666 journal = {Transactions of AMS},
2668 optpages = {247-271},
2671 timestamp = {2008.01.02}
2674 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2675 author = {Islam, Md. Kamrul and Chetty, Madhu},
2676 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2677 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2678 in Artificial Intelligence},
2682 address = {Berlin, Heidelberg},
2683 publisher = {Springer-Verlag},
2685 isbn = {978-3-642-10438-1},
2686 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2687 Pair-wise-interchange, Schema preservation, Tabu Search},
2688 location = {Melbourne, Australia},
2692 @PHDTHESIS{Jacquemard77,
2693 author = {C. Jacquemard},
2694 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2695 school = {Université de Franche-Comté},
2697 owner = {christophe},
2698 timestamp = {2010.08.25}
2702 title = {{Evolution of Protein Molecules}},
2703 publisher = {Academy Press},
2705 editor = {Munro, H. N.},
2706 author = {Jukes, T. H. and Cantor, C. R.},
2707 booktitle = {Evolution of Protein Molecules},
2708 citeulike-article-id = {1673661},
2709 keywords = {compbio, fresco},
2710 posted-at = {2007-09-19 06:23:18},
2714 @INPROCEEDINGS{Kalker2001,
2715 author = {Kalker, T.},
2716 title = {Considerations on watermarking security},
2719 abstract = {In this paper we address the usually implicit assumption that digital
2720 watermarking has as its main target copyright and copy protection
2721 applications. From these target applications a great many conclusions
2722 are drawn about the required security of a watermarking system, and
2723 in fact, a considerably percentage of the watermarking literature
2724 has this very topic as its main focus of attention. In this paper
2725 we take a step back, and try to do a more careful analysis of the
2726 'watermarking-is-for-security-applications' paradigm. The intention
2727 of this paper is to discuss the meaning of the concept security in
2728 the context of watermarking, and try to show that one has to be careful
2729 in using analogies from the related field of cryptography},
2730 citeulike-article-id = {1226513},
2731 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2732 keywords = {security, wateramarking},
2734 posted-at = {2007-04-14 14:30:06},
2736 timestamp = {2009.06.30}
2739 @ARTICLE{Kerckhoffs83,
2740 author = {Kerckhoffs, Auguste},
2741 title = {La cryptographie militaire},
2742 journal = {Journal des sciences militaires},
2747 abstract = {pp. 161–191, Feb. 1883.},
2748 citeulike-article-id = {505508},
2749 keywords = {cryptography, master},
2751 posted-at = {2006-02-15 04:49:15},
2753 timestamp = {2009.06.30}
2757 author = {Kimura, Motoo},
2758 title = {A simple method for estimating evolutionary rates of base substitutions
2759 through comparative studies of nucleotide sequences},
2760 journal = {Journal of Molecular Evolution},
2764 note = {10.1007/BF01731581},
2765 affiliation = {National Institute of Genetics 411 Mishima Japan},
2768 keyword = {Biomedical and Life Sciences},
2769 publisher = {Springer New York},
2770 url = {http://dx.doi.org/10.1007/BF01731581}
2775 title = {Chaos Without Nonperiodicity},
2776 journal = {Amer. Math. Monthly},
2780 timestamp = {27/01/2008}
2783 @PHDTHESIS{Knudsen1994a,
2784 author = {C. Knudsen},
2785 title = {Aspects of noninvertible dynamics and chaos},
2786 school = {Technical University of Denmark},
2789 timestamp = {2008.01.02}
2793 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2794 title = {Discrete Chaos - I: Theory},
2795 journal = {IEEE Trans. on Circuits Systems},
2798 pages = {1300-1309},
2799 owner = {christophe},
2800 timestamp = {2010.10.10}
2803 @INPROCEEDINGS{Kocher95cryptanalysisof,
2804 author = {Paul C. Kocher},
2805 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2806 Timing Attacks (Extended Abstract)},
2807 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2811 publisher = {Springer-Verlag}
2814 @ARTICLE{Kullback1951,
2815 author = {Kullback, Solomon and Leibler, Richard A.},
2816 title = {On Information and Sufficiency},
2817 journal = {The Annals of Mathematical Statistics},
2822 citeulike-article-id = {3245942},
2823 keywords = {file-import-08-09-12},
2825 posted-at = {2008-09-12 14:30:37},
2827 timestamp = {2009.06.29}
2831 author = {Eshter Ledoux},
2832 title = {Introduction à la théorie du chaos},
2834 note = {[En ligne; Page disponible le 12-août-2010]},
2835 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2839 title = {Analyse en dimension finie},
2840 publisher = {Masson},
2846 timestamp = {2008.01.02}
2850 author = {A.K. Lenstra and E.R. Verheul},
2851 title = {Selecting Cryptographic Key Sizes},
2852 journal = {Jour. of the International Association for Cryptologic Research},
2860 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2861 title = {What the Frog's Eye Tells the Frog's Brain},
2862 journal = {Proceedings of the IRE},
2867 owner = {christophe},
2868 timestamp = {2010.12.21}
2872 author = {T. Y. Li and J. A. Yorke},
2873 title = {Period three implies chaos},
2874 journal = {Amer. Math. Monthly},
2880 timestamp = {27/01/2008}
2884 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2885 title = {A novel Hash algorithm construction based on chaotic neural network},
2886 journal = {Neural Computing and Applications},
2889 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2892 keyword = {Computer Science},
2893 publisher = {Springer London}
2896 @INPROCEEDINGS{Lin09,
2897 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2898 title = {Cooperative secure data aggregation in sensor networks using elliptic
2899 curve based cryptosystems},
2900 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2901 design, visualization, and engineering},
2904 address = {Berlin, Heidelberg},
2905 publisher = {Springer-Verlag},
2906 isbn = {3-642-04264-3, 978-3-642-04264-5},
2907 location = {Luxembourg, Luxembourg}
2910 @INPROCEEDINGS{Liu2008,
2911 author = {Liu, An and Ning, Peng},
2912 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2913 Wireless Sensor Networks},
2914 booktitle = {7th International Conference on Information Processing in Sensor
2915 Networks (IPSN 2008)},
2919 citeulike-article-id = {3041699},
2920 howpublished = {SPOTS Track},
2922 posted-at = {2008-07-25 05:25:05},
2926 @ARTICLE{Liu2007bis,
2927 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2928 title = {An image fragile watermark scheme based on chaotic image pattern
2930 journal = {Applied Mathematics and Computation},
2935 timestamp = {2008.10.07}
2938 @INPROCEEDINGS{Liu07,
2939 author = {Liu, Zhen and Xi, Lifeng},
2940 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2941 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2942 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2943 of the 11th International Conference},
2946 address = {Berlin, Heidelberg},
2947 publisher = {Springer-Verlag},
2948 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
2949 isbn = {978-3-540-74826-7},
2950 location = {Vietri sul Mare, Italy}
2954 author = {Zhen Liu and Lifeng Xi},
2955 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2961 timestamp = {11/04/2008}
2964 @ARTICLE{Lubachevsky86,
2965 author = {Lubachevsky, Boris and Mitra, Debasis},
2966 title = {A chaotic asynchronous algorithm for computing the fixed point of
2967 a nonnegative matrix of unit spectral radius},
2973 address = {New York, NY, USA},
2974 doi = {http://doi.acm.org/10.1145/4904.4801},
2980 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
2981 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
2982 journal = {{N}ature },
2988 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
2989 bench-top platform to study a wide range of nonlinear dynamic systems,
2990 from ultrastable clocks to complex chaotic devices.},
2991 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
2992 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
2993 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
2994 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
2995 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
2996 audience = {internationale },
2998 doi = {10.1038/465041a },
2999 hal_id = {hal-00517696},
3000 language = {{A}nglais},
3001 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
3004 @INPROCEEDINGS{Mahoney00,
3005 author = {Mahoney, Matthew V.},
3006 title = {Fast Text Compression with Neural Networks},
3007 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3008 Research Society Conference},
3011 publisher = {AAAI Press},
3013 isbn = {1-57735-113-4},
3017 @INPROCEEDINGS{msp10:bl,
3018 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3019 title = {Risk Management in Intrusion Detection Applications with Wireless
3020 Video Sensor Networks},
3021 booktitle = {WCNC'10 IEEE Int. Conf.},
3024 address = {Sydney, Australia},
3033 author = {H.S. Malvar and D. Florêncio},
3034 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3035 journal = {IEEE Trans. Signal Proceeding},
3039 owner = {christophe},
3040 timestamp = {2010.03.07}
3043 @ARTICLE{Marsaglia2003,
3044 author = {G. Marsaglia},
3045 title = {Xorshift RNGs},
3046 journal = {Journal of Statistical Software},
3051 timestamp = {2009.10.28}
3054 @ARTICLE{Marsaglia1996,
3055 author = {G. Marsaglia},
3056 title = {DIEHARD: a battery of tests of randomness.},
3057 journal = {http://stat.fsu.edu/~geo/diehard.html},
3060 timestamp = {2009.11.09}
3063 @ARTICLE{Simard07testu01:a,
3064 author = {Richard Simard and Université De Montréal},
3065 title = {TestU01: A C library for empirical testing of random number generators},
3066 journal = {ACM Transactions on Mathematical Software},
3071 @ARTICLE{DefiningChaos,
3072 author = {M. Martelli and M. Dang and T. Seph},
3073 title = {Defining chaos},
3074 journal = {Mathematics Magazine},
3078 owner = {christophe},
3079 timestamp = {2010.08.11}
3082 @ARTICLE{Michel2007c,
3083 author = {Christian J Michel},
3084 title = {An analytical model of gene evolution with 9 mutation parameters:
3085 an application to the amino acids coded by the common circular code.},
3086 journal = {Bull Math Biol},
3092 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3093 mutation matrix 64 x 64 with nine substitution parameters associated
3094 with the three types of substitutions in the three trinucleotide
3095 sites. It generalizes the previous models based on the nucleotide
3096 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3097 x 64 with three and six parameters. It determines at some time t
3098 the exact occurrence probabilities of trinucleotides mutating randomly
3099 according to these nine substitution parameters. An application of
3100 this model allows an evolutionary study of the common circular code
3101 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3102 amino acids. The main property of this code [Formula: see text] is
3103 the retrieval of the reading frames in genes, both locally, i.e.
3104 anywhere in genes and in particular without a start codon, and automatically
3105 with a window of a few nucleotides. However, since its identification
3106 in 1996, amino acid information coded by [Formula: see text] has
3107 never been studied. Very unexpectedly, this evolutionary model demonstrates
3108 that random substitutions in this code [Formula: see text] and with
3109 particular values for the nine substitutions parameters retrieve
3110 after a certain time of evolution a frequency distribution of these
3111 12 amino acids very close to the one coded by the actual genes.},
3112 doi = {10.1007/s11538-006-9147-z},
3113 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3114 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3115 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3116 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3117 Molecular; Models, Genetic; Prokaryotic Cells},
3119 medline-pst = {ppublish},
3122 timestamp = {2011.05.05},
3123 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3127 author = {J.-C. Miellou},
3128 title = {Algorithmes de relaxation chaotique \`{a} retards},
3134 timestamp = {2008.05.22}
3137 @ARTICLE{Miellou75b,
3138 author = {Miellou, J.-C.},
3139 title = {Itérations chaotiques à retards, étude de la convergence dans le
3140 cas d'espaces partiellement ordonnés},
3141 journal = {C.R.A.S. Paris},
3145 owner = {christophe},
3146 timestamp = {2010.08.17}
3150 author = {Jean-Claude Miellou and Pierre Spitéri},
3151 title = {Un critère de convergence pour des méthodes générales de point fixe},
3152 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3157 owner = {christophe},
3158 timestamp = {2010.10.13}
3162 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3163 title = {A comparative study of chaotic and white noise signals in digital
3165 journal = {Chaos, Solitons and Fractals},
3169 owner = {christophe},
3170 timestamp = {2010.03.01}
3173 @ARTICLE{Nakashima2003,
3174 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3175 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3177 journal = {IEEE Transactions on Multimedia},
3179 note = {Accepted for future publication Multimedia}
3182 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3183 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3185 title = {SVD-Based Ghost Circuitry Detection},
3186 booktitle = {Information Hiding},
3187 publisher = {Springer Berlin / Heidelberg},
3189 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3191 series = {Lecture Notes in Computer Science},
3193 note = {10.1007/978-3-642-04431-1_16},
3194 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3195 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3198 @INPROCEEDINGS{Perez-Hernandez09,
3199 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3200 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3201 title = {Parallel particle swarm optimization applied to the protein folding
3203 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3206 series = {GECCO '09},
3207 pages = {1791--1792},
3208 address = {New York, NY, USA},
3211 isbn = {978-1-60558-325-9},
3212 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3213 parallelization, swarm intelligence},
3214 location = {Montreal, Qu\&\#233;bec, Canada},
3218 @PHDTHESIS{Pellegrin1986,
3219 author = {D. Pellegrin},
3220 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3221 school = {Grenoble},
3224 timestamp = {2008.05.22}
3228 author = {F. Peng and S.-S. Qiu and M. Long},
3229 title = {One way Hash function construction based on two-dimensional hyperchaotic
3231 journal = {Acta Phys. Sinici.},
3236 timestamp = {2009.01.16}
3239 @INPROCEEDINGS{Perez06,
3240 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3241 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3243 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3245 editor = {Edward J. Delp and Ping W. Wong},
3246 address = {San Jose, California, USA},
3248 organization = {SPIE},
3250 timestamp = {2009.06.30}
3253 @INPROCEEDINGS{Perez-Freire06,
3254 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3255 and Fernando Perez-Gonzalez},
3256 title = {Watermarking Security: a Survey},
3257 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3260 timestamp = {2009.06.29}
3263 @PROCEEDINGS{Peter07,
3264 title = {On Concealed Data Aggregation for WSNs},
3266 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3267 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3269 citeulike-article-id = {2281643},
3270 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3271 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3272 doi = {10.1109/CCNC.2007.45},
3273 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3277 posted-at = {2008-01-23 19:36:19},
3279 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3283 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3284 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3285 Networks for Critical Surveillance Applications},
3286 journal = {Journal of Network and Computer Applications},
3291 note = {Accepted manuscript. To appear},
3292 classement = {ACLI},
3294 impact-factor = {1.111},
3296 isi-acro = {J NETW COMPU APPL},
3297 publisher = {Springer}
3301 author = {Edgar Alan Poe},
3302 title = {The Raven},
3305 note = {American Museum (Baltimore)},
3306 owner = {christophe},
3307 timestamp = {2010.11.23}
3310 @ARTICLE{Perez-Freire2006:Security,
3311 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3313 title = {Security of lattice-based data hiding against the known message attack},
3314 journal = {IEEE Trans. on Information Forensics and Security},
3321 timestamp = {2009.12.06}
3324 @MISC{Quisquater02sidechannel,
3325 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3327 title = {Side Channel Cryptanalysis},
3331 @ARTICLE{Raynal2001,
3332 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3333 title = {Evaluation automatique des méthodes de tatouage},
3334 journal = {Traitement du signal},
3339 timestamp = {2008.05.21}
3343 author = {Vincent Rijmen and Elisabeth Oswald},
3344 title = {Update on SHA-1},
3345 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3347 note = {\url{http://eprint.iacr.org/}}
3351 title = {Discrete Iterations, a Metric Study},
3352 publisher = {Springer-Verlag},
3354 editor = {Berlin Heidelberg New-York},
3355 author = {François Robert},
3357 series = {Series in Computational Mathematics}
3361 title = {Discrete Iterations: A Metric Study},
3363 editor = {Springer-Verlag},
3364 author = {F. Robert},
3366 series = {Springer Series in Computational Mathematics},
3368 timestamp = {17/02/2008}
3372 author = {Rudenko, O. and Snytkin, M.},
3373 title = {Image compression based on the neural network art},
3374 journal = {Cybernetics and Systems Analysis},
3378 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3381 keyword = {Computer Science},
3382 publisher = {Springer New York}
3385 @PHDTHESIS{Ruette2001,
3386 author = {Sylvie Ruette},
3387 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3388 mesures d'entropie maximale},
3389 school = {Université d'Aix-Marseille II},
3391 optmonth = {Novembre},
3393 timestamp = {2008.01.02}
3396 @MASTERSTHESIS{Saulnier02,
3397 author = {Boris Saulnier},
3398 title = {Entropie topologique},
3399 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3401 owner = {christophe},
3402 timestamp = {2010.08.12}
3405 @ARTICLE{Schmitz2001,
3406 author = {Roland Schmitz},
3407 title = {Use of chaotic dynamical systems in cryptography},
3408 journal = {Journal of Franklin Institute},
3413 timestamp = {17/02/2008}
3417 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3418 publisher = {Hermann},
3421 author = {Laurent Schwartz},
3422 owner = {christophe},
3423 timestamp = {2010.09.15}
3427 author = {Shannon, Claude E.},
3428 title = {Communication Theory of Secrecy Systems},
3429 journal = {Bell Systems Technical Journal},
3433 citeulike-article-id = {507362},
3434 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3435 theory\_cryptography},
3437 posted-at = {2006-02-16 23:24:09},
3439 timestamp = {2009.06.29}
3442 @ARTICLE{Shmygelska05,
3443 author = {Shmygelska, Alena and Hoos, Holger},
3444 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3445 polar protein folding problem},
3446 journal = {BMC Bioinformatics},
3451 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3452 computational molecular biology and biochemical physics. Various
3453 optimisation methods have been applied to formulations of the ab-initio
3454 folding problem that are based on reduced models of protein structure,
3455 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3456 and hybrid approaches. In our work, we have introduced an ant colony
3457 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3458 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3459 from its amino acid sequence under a widely studied, conceptually
3460 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3461 (HP) model.RESULTS:We present an improvement of our previous ACO
3462 algorithm for the 2D HP model and its extension to the 3D HP model.
3463 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3464 than previous state-of-the-art algorithms on sequences whose native
3465 conformations do not contain structural nuclei (parts of the native
3466 fold that predominantly consist of local interactions) at the ends,
3467 but rather in the middle of the sequence, and that it generally finds
3468 a more diverse set of native conformations.CONCLUSIONS:The application
3469 of ACO to this bioinformatics problem compares favourably with specialised,
3470 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3471 our empirical results indicate that our rather simple ACO algorithm
3472 scales worse with sequence length but usually finds a more diverse
3473 ensemble of native states. Therefore the development of ACO algorithms
3474 for more complex and realistic models of protein structure holds
3475 significant promise.},
3476 doi = {10.1186/1471-2105-6-30},
3478 pubmedid = {15710037}
3481 @OTHER{Shmygelska2005Feb,
3482 __markedentry = {[christophe]},
3483 abstract = {Abstract Background The protein folding problem is a fundamental problems
3484 in computational molecular biology and biochemical physics. Various
3485 optimisation methods have been applied to formulations of the ab-initio
3486 folding problem that are based on reduced models of protein structure,
3487 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3488 and hybrid approaches. In our work, we have introduced an ant colony
3489 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3490 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3491 from its amino acid sequence under a widely studied, conceptually
3492 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3493 (HP) model. Results We present an improvement of our previous ACO
3494 algorithm for the 2D HP model and its extension to the 3D HP model.
3495 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3496 than previous state-of-the-art algorithms on sequences whose native
3497 conformations do not contain structural nuclei (parts of the native
3498 fold that predominantly consist of local interactions) at the ends,
3499 but rather in the middle of the sequence, and that it generally finds
3500 a more diverse set of native conformations. Conclusions The application
3501 of ACO to this bioinformatics problem compares favourably with specialised,
3502 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3503 our empirical results indicate that our rather simple ACO algorithm
3504 scales worse with sequence length but usually finds a more diverse
3505 ensemble of native states. Therefore the development of ACO algorithms
3506 for more complex and realistic models of protein structure holds
3507 significant promise.},
3508 author = {Shmygelska, Alena and Hoos, Holger H},
3509 journal = {BMC Bioinformatics. 2005 Feb 14},
3511 owner = {christophe},
3513 timestamp = {2011.01.24},
3514 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3515 polar protein folding problem},
3521 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3522 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3523 Their Roles in Cryptography and Pseudo-Random Coding},
3524 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3529 owner = {christophe},
3530 timestamp = {2010.03.06}
3533 @INPROCEEDINGS{Simmons83,
3534 author = {Gustavus J. Simmons},
3535 title = {The Prisoners' Problem and the Subliminal Channel},
3536 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3539 bibsource = {DBLP, http://dblp.uni-trier.de},
3541 timestamp = {2009.06.29}
3544 @ARTICLE{Solak2004389,
3545 author = {Ercan Solak},
3546 title = {On the security of a class of discrete-time chaotic cryptosystems},
3547 journal = {Physics Letters A},
3550 pages = {389 - 395},
3552 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3554 keywords = {Communication using chaos},
3556 timestamp = {2009.12.12},
3557 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3560 @PHDTHESIS{Spiteri74,
3561 author = {Pierre Spitéri},
3562 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3563 systemes differentiels non lineaires},
3564 school = {Université de Franche-Comté},
3566 owner = {christophe},
3567 timestamp = {2010.10.13}
3571 title = {Does God Play Dices ?: the mathematics of chaos},
3572 publisher = {Penguin},
3574 author = {Ian Stewart},
3576 timestamp = {2008.01.02}
3580 title = {Cryptography: Theory and Practice, Second Edition},
3581 publisher = {{Chapman \& Hall/CRC}},
3583 author = {Stinson, Douglas R.},
3585 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3586 a mathematically intensive examination of cryptography, including
3587 ciphers, the Data Encryption Standard (DES), public key cryptography,
3588 one-way hash functions, and digital signatures. Stinson's explication
3589 of "zero-sum proofs"--a process by which one person lets another
3590 person know that he or she has a password without actually revealing
3591 any information--is especially good.<P> If you are new to the math
3592 behind cryptography but want to tackle it, the author covers all
3593 of the required background to understand the real mathematics here.
3594 <I>Cryptography</I> includes extensive exercises with each chapter
3595 and makes an ideal introduction for any math-literate person willing
3596 to get acquainted with this material.} {<P>Major advances over the
3597 last five years precipitated this major revision of the bestselling
3598 Cryptography: Theory and Practice. With more than 40 percent new
3599 or updated material, the second edition now provides an even more
3600 comprehensive treatment of modern cryptography. It focuses on the
3601 new Advanced Encryption Standards and features an entirely new chapter
3602 on that subject. Another new chapter explores the applications of
3603 secret sharing schemes, including ramp schemes, visual cryptography,
3604 threshold cryptography, and broadcast encryption. This is an ideal
3605 introductory text for both computer science and mathematics students
3606 and a valuable reference for professionals.</P>}},
3607 citeulike-article-id = {2401855},
3609 howpublished = {Hardcover},
3610 isbn = {1584882069},
3611 keywords = {security},
3612 posted-at = {2008-02-20 08:28:49},
3614 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3617 @INPROCEEDINGS{Takana90,
3618 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3619 title = {Embedding Secret Information into a Dithered Multi-level Image},
3620 booktitle = {IEEE Military Communications Conference},
3622 owner = {christophe},
3623 timestamp = {2010.08.05}
3626 @PHDTHESIS{ElTarazi81,
3627 author = {M. N. El Tarazi},
3628 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3629 et asynchrones en analyse numérique},
3630 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3633 owner = {christophe},
3634 timestamp = {2010.08.17}
3637 @INPROCEEDINGS{Unger93,
3638 author = {Unger, Ron and Moult, John},
3639 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3640 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3643 address = {San Francisco, CA, USA},
3644 publisher = {Morgan Kaufmann Publishers Inc.},
3646 isbn = {1-55860-299-2},
3650 @MISC{Van93electronicwater,
3651 author = {Tirkel Rankin Van},
3652 title = {Electronic Water Mark},
3656 @ARTICLE{Venkatesan2007397,
3657 author = {R.C. Venkatesan},
3658 title = {Encryption of covert information into multiple statistical distributions},
3659 journal = {Physics Letters A},
3662 pages = {397 - 404},
3664 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3666 keywords = {Statistical encryption/decryption},
3668 timestamp = {2009.12.12},
3669 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3673 author = {G. Voyatzis and I. Pitas},
3674 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3675 journal = {Proceedings of IEEE ICIP},
3679 owner = {christophe},
3680 timestamp = {2010.03.06}
3683 @INCOLLECTION{Wagner03,
3684 author = {Wagner, David},
3685 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3686 booktitle = {Information Security},
3687 publisher = {Springer Berlin, Heidelberg},
3690 series = {Lecture Notes in Computer Science},
3692 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3693 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3694 affiliation = {University of California, Berkeley USA}
3697 @INPROCEEDINGS{Wagner03cryptanalysisof,
3698 author = {David Wagner},
3699 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3700 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3705 @ARTICLE{Wang_ellipticcurve,
3706 author = {Haodong Wang and Bo Sheng and Qun Li},
3707 title = {Elliptic curve cryptography-based access control in sensor networks},
3708 journal = {Int. J. Security and Networks}
3711 @INPROCEEDINGS{wbg10:ip,
3712 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3714 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3716 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3719 address = {Valencia, Spain},
3721 publisher = {IEEE Computer Society Press},
3722 note = {Best Paper award},
3723 classement = {ACTI},
3724 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3730 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3731 title = {One-way hash function construction based on the extended chaotic
3733 journal = {Acta Phys. Sinici.},
3735 volume = {52, No. 11},
3736 pages = {2737--2742},
3738 timestamp = {2009.01.16}
3742 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3743 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3744 Networks: Encryption, Key Distribution, and Routing Adaptation},
3745 journal = {IEEE Transactions on Mobile Computing},
3748 pages = {1417--1431},
3750 address = {Piscataway, NJ, USA},
3751 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3753 publisher = {IEEE Educational Activities Department}
3757 author = {Wikipédia},
3758 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3760 note = {[En ligne; Page disponible le 9-septembre-2010]},
3761 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3765 author = {Wikipédia},
3766 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3768 note = {[En ligne; Page disponible le 9-août-2010]},
3769 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3773 author = {Wikipédia},
3774 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3776 note = {[En ligne; Page disponible le 8-août-2010]},
3777 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3781 author = {Wikipédia},
3782 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3784 note = {[En ligne; Page disponible le 5-août-2010]},
3785 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3788 @MISC{wiki:Kerkhoffs,
3789 author = {Wikipédia},
3790 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3792 note = {[En ligne; Page disponible le 20-août-2010]},
3793 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3796 @MISC{wiki:sarkovskii,
3797 author = {Wikipédia},
3798 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3800 note = {[En ligne; Page disponible le 8-août-2010]},
3801 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3804 @MISC{wiki:steganographie,
3805 author = {Wikipédia},
3806 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3808 note = {[En ligne; Page disponible le 5-août-2010]},
3809 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3812 @MISC{wiki:tatouage,
3813 author = {Wikipédia},
3814 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3816 note = {[En ligne; Page disponible le 5-août-2010]},
3817 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3820 @MISC{wiki:testsHypothese,
3821 author = {Wikipédia},
3822 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3824 note = {[En ligne; Page disponible le 5-août-2010]},
3825 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3829 author = {Xianyong Wu and Zhi-Hong Guan},
3830 title = {A novel digital watermark algorithm based on chaotic maps},
3831 journal = {Physics Letters A},
3834 pages = {403 - 406},
3836 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3838 keywords = {Watermarking},
3839 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3842 @INPROCEEDINGS{Wu2007,
3843 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3844 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3845 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3849 address = {Berlin, Heidelberg},
3850 publisher = {Springer-Verlag},
3851 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3852 isbn = {978-3-540-72392-9},
3853 location = {Nanjing, China}
3856 @ARTICLE{Xiao20092288,
3857 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3858 title = {Parallel keyed hash function construction based on chaotic neural
3860 journal = {Neurocomputing},
3863 pages = {2288 - 2296},
3865 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3866 in Intelligent Systems Designn (ISDA 2007)},
3867 abstract = {Recently, various hash functions based on chaos or neural networks
3868 were proposed. Nevertheless, none of them works efficiently in parallel
3869 computing environment. In this paper, an algorithm for parallel keyed
3870 hash function construction based on chaotic neural network is proposed.
3871 The mechanism of changeable-parameter and self-synchronization establishes
3872 a close relation between the hash value bit and message, and the
3873 algorithm structure ensures the uniform sensitivity of the hash value
3874 to the message blocks at different positions. The proposed algorithm
3875 can satisfy the performance requirements of hash function. These
3876 properties make it a promising choice for hashing on parallel computing
3879 keywords = {Chaotic neural network}
3882 @ARTICLE{Xiao20094346,
3883 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3884 title = {Improving the security of a parallel keyed hash function based on
3886 journal = {Physics Letters A},
3889 pages = {4346 - 4353},
3892 keywords = {Hash function},
3894 timestamp = {2009.12.12}
3897 @ARTICLE{Xiao20102254,
3898 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3899 title = {A chaos-based hash function with both modification detection and
3900 localization capabilities},
3901 journal = {Communications in Nonlinear Science and Numerical Simulation},
3904 pages = {2254 - 2261},
3906 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3907 Nevertheless, none of them can realize modification localization.
3908 In this paper, a hash function with both modification detection and
3909 localization capabilities is proposed, which can also support the
3910 parallel processing mode. By using the mechanism of changeable-parameter
3911 and self-synchronization, the keystream can establish a close relation
3912 with the algorithm key, the content, and the order of each message
3913 unit. Theoretical analysis and computer simulation indicate that
3914 the proposed algorithm can satisfy the performance requirements of
3917 keywords = {Hash function}
3920 @INPROCEEDINGS{Yu06,
3921 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3922 title = {A Study on the Security of Privacy Homomorphism},
3923 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3924 Technology: New Generations},
3927 address = {Washington, DC, USA},
3928 publisher = {IEEE Computer Society},
3929 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3930 isbn = {0-7695-2497-4}
3933 @ARTICLE{Zhang2008658,
3934 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3935 title = {Secure data aggregation in wireless sensor networks: A watermark
3936 based authentication supportive approach},
3937 journal = {Pervasive and Mobile Computing},
3940 pages = {658 - 680},
3942 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3944 keywords = {Wireless sensor networks},
3945 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
3949 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
3950 title = {TASSER: An automated method for the prediction of protein tertiary
3951 structures in CASP6},
3952 journal = {Proteins},
3958 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
3959 owner = {christophe},
3960 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
3961 timestamp = {2011.01.22},
3962 url = {http://dx.doi.org/10.1002/prot.20724}
3965 @ARTICLE{Zhou1997429,
3966 author = {Chang-song Zhou and Tian-lun Chen},
3967 title = {Extracting information masked by chaos and contaminated with noise:
3968 Some considerations on the security of communication approaches using
3970 journal = {Physics Letters A},
3973 pages = {429 - 435},
3976 keywords = {Communication},
3978 timestamp = {2009.12.12}
3982 author = {Zhou, Huai-bei and Wang, Lu},
3983 title = {Chaos in Biomolecular Dynamics},
3984 journal = {The Journal of Physical Chemistry},
3987 pages = {8101-8105},
3989 doi = {10.1021/jp953409x}
3992 @PROCEEDINGS{DBLP:conf/iwdw/2005,
3993 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
3995 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
3997 series = {Lecture Notes in Computer Science},
3998 address = {Siena, Italy},
3999 publisher = {Springer},
4000 month = {September 15-17},
4001 bibsource = {DBLP, http://dblp.uni-trier.de},
4003 isbn = {3-540-28768-X},
4005 timestamp = {2009.06.29}
4008 @PROCEEDINGS{DBLP:conf/ih/2006,
4009 title = {IH 2006: Information Hiding, 8th International Workshop},
4011 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4014 series = {Lecture Notes in Computer Science},
4015 address = {Alexandria, VA, USA},
4016 publisher = {Springer},
4018 bibsource = {DBLP, http://dblp.uni-trier.de},
4019 booktitle = {Information Hiding},
4020 isbn = {978-3-540-74123-7},
4022 timestamp = {2009.06.29}
4025 @PROCEEDINGS{DBLP:conf/ih/2007,
4026 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4027 France, June 11-13, 2007, Revised Selected Papers},
4029 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4032 series = {Lecture Notes in Computer Science},
4033 publisher = {Springer},
4034 bibsource = {DBLP, http://dblp.uni-trier.de},
4035 booktitle = {Information Hiding},
4036 isbn = {978-3-540-77369-6},
4038 timestamp = {2009.06.29}
4041 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4042 title = {Computational Science and Its Applications - ICCSA 2006, International
4043 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4045 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4046 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4047 Mun and Hyunseung Choo},
4049 series = {Lecture Notes in Computer Science},
4050 publisher = {Springer},
4051 bibsource = {DBLP, http://dblp.uni-trier.de},
4052 booktitle = {ICCSA (1)},
4053 isbn = {3-540-34070-X}
4056 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4057 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4058 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4059 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4061 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4062 publisher = {SciTePress},
4063 bibsource = {DBLP, http://dblp.uni-trier.de},
4064 booktitle = {SECRYPT},
4065 isbn = {978-989-8425-18-8}
4068 @BOOK{Katzenbeisser00,
4069 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4070 publisher = {Artech House, Inc.},
4072 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4073 address = {Norwood, MA, USA},
4077 @PROCEEDINGS{DBLP:conf/ih/1999,
4078 title = {IH'99: 3rd International Workshop on Information Hiding},
4080 editor = {Andreas Pfitzmann},
4082 series = {Lecture Notes in Computer Science},
4083 address = {Dresden, Germany},
4084 publisher = {Springer},
4085 month = {September 29 - October 1.},
4086 bibsource = {DBLP, http://dblp.uni-trier.de},
4087 booktitle = {Information Hiding},
4088 isbn = {3-540-67182-X},
4090 timestamp = {2009.06.29}
4093 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4094 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4095 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4097 editor = {Bimal K. Roy and Eiji Okamoto},
4099 series = {Lecture Notes in Computer Science},
4100 publisher = {Springer},
4101 bibsource = {DBLP, http://dblp.uni-trier.de},
4102 booktitle = {INDOCRYPT},
4103 isbn = {3-540-41452-5}
4106 @BOOK{DBLP:reference/icsec/2010,
4107 title = {Handbook of Information and Communication Security},
4108 publisher = {Springer},
4110 editor = {Peter P. Stavroulakis and Mark Stamp},
4111 bibsource = {DBLP, http://dblp.uni-trier.de},
4112 booktitle = {Handbook of Information and Communication Security},
4113 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4114 isbn = {978-3-642-04116-7}
4117 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4118 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4119 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4122 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4124 series = {Lecture Notes in Computer Science},
4125 publisher = {Springer},
4126 bibsource = {DBLP, http://dblp.uni-trier.de},
4127 booktitle = {ISNN (2)},
4128 isbn = {3-540-22843-8}
4131 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4132 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4133 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4135 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4137 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4138 and Telecommunications Engineering},
4139 publisher = {Springer},
4140 bibsource = {DBLP, http://dblp.uni-trier.de},
4141 booktitle = {ADHOCNETS},
4142 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4143 isbn = {978-3-642-17993-8}
4148 timestamp = {2011.03.29}
4152 title = {Delicious social bookmarking, http://delicious.com/},
4153 comment = {http://delicious.com/},
4155 url = {http://delicious.com/}
4159 title = {The Frick Collection, http://www.frick.org/},
4160 comment = {http://www.frick.org/},
4162 url = {http://www.frick.org/}
4166 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4167 2010, Barcelona, Spain, 18-23 July 2010},
4170 bibsource = {DBLP, http://dblp.uni-trier.de},
4171 booktitle = {IEEE Congress on Evolutionary Computation}
4174 @PROCEEDINGS{DBLP:conf/cec/2010,
4175 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4176 2010, Barcelona, Spain, 18-23 July 2010},
4179 bibsource = {DBLP, http://dblp.uni-trier.de},
4180 booktitle = {IEEE Congress on Evolutionary Computation}
4183 @PROCEEDINGS{DBLP:conf/date/2010,
4184 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4188 bibsource = {DBLP, http://dblp.uni-trier.de},
4192 @PROCEEDINGS{DBLP:conf/cse/2009,
4193 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4194 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4196 publisher = {IEEE Computer Society},
4197 bibsource = {DBLP, http://dblp.uni-trier.de},
4201 @PROCEEDINGS{DBLP:conf/icumt/2009,
4202 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4203 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4206 bibsource = {DBLP, http://dblp.uni-trier.de},
4210 @PROCEEDINGS{DBLP:conf/focs/2008,
4211 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4212 2008, October 25-28, 2008, Philadelphia, PA, USA},
4214 publisher = {IEEE Computer Society},
4215 bibsource = {DBLP, http://dblp.uni-trier.de},
4219 @comment{jabref-meta: selector_publisher:}
4221 @comment{jabref-meta: selector_author:}
4223 @comment{jabref-meta: selector_journal:}
4225 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4230 @InProceedings{Pang:2008:cec,
4231 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4232 title = "Generating Massive High-Quality Random Numbers using
4234 booktitle = "2008 IEEE World Congress on Computational
4237 editor = "Jun Wang",
4238 address = "Hong Kong",
4239 organization = "IEEE Computational Intelligence Society",
4240 publisher = "IEEE Press",
4244 @Article{LEcuyerS07,
4245 title = "Test{U01}: {A} {C} library for empirical testing of
4246 random number generators",
4247 author = "Pierre L'Ecuyer and Richard J. Simard",
4248 journal = "ACM Trans. Math. Softw",
4252 bibdate = "2007-11-06",
4254 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4255 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4259 author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov},
4260 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4261 journal = {J. Phys. Chem. B},
4265 pages = {5278--5288},
4270 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4271 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4273 @InProceedings{conf/fpga/ThomasHL09,
4274 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4275 parallel processor arrays for random number
4277 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4278 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4279 Symposium on Field Programmable Gate Arrays, {FPGA}
4280 2009, Monterey, California, {USA}, February 22-24,
4282 bibdate = "2010-06-29",
4285 editor = "Paul Chow and Peter Y. K. Cheung",
4286 ISBN = "978-1-60558-410-2",
4288 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4293 @InProceedings{Jenkins96,
4296 booktitle = "IWFSE: International Workshop on Fast Software
4303 title = {Cuda cublas library},
4305 Note = {Version 4.0},
4310 title = {Curand library},
4312 Note = {Version 4.0},
4318 author = {Lenore Blum and Manuel Blum and Michael Shub},
4319 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4320 journal = {SIAM Journal on Computing},