1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @INPROCEEDINGS{BattiatoCGG99,
18 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
20 title = {Robust Watermarking for Images Based on Color Manipulation},
21 booktitle = {Information Hiding},
24 bibsource = {DBLP, http://dblp.uni-trier.de},
25 crossref = {DBLP:conf/ih/1999},
27 timestamp = {2009.06.29}
30 @INPROCEEDINGS{ComesanaPP05,
31 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
32 title = {The Return of the Sensitivity Attack},
36 bibsource = {DBLP, http://dblp.uni-trier.de},
37 crossref = {DBLP:conf/iwdw/2005},
38 ee = {http://dx.doi.org/10.1007/11551492_20},
40 timestamp = {2009.06.29}
43 @INPROCEEDINGS{ComesanaPP05bis,
44 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
45 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
47 booktitle = {IH'05: Information Hiding Workshop},
50 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
51 bibsource = {DBLP, http://dblp.uni-trier.de},
52 crossref = {DBLP:conf/ih/2005},
53 ee = {http://dx.doi.org/10.1007/11558859_12},
55 timestamp = {2009.06.30}
58 @INPROCEEDINGS{CongJQZ06,
59 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
60 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
61 booktitle = {ICCSA (1)},
64 bibsource = {DBLP, http://dblp.uni-trier.de},
65 crossref = {DBLP:conf/iccsa/2006-1},
66 ee = {http://dx.doi.org/10.1007/11751540_100}
69 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
70 author = {Stefan Dziembowski and Krzysztof Pietrzak},
71 title = {Leakage-Resilient Cryptography},
75 bibsource = {DBLP, http://dblp.uni-trier.de},
76 crossref = {DBLP:conf/focs/2008},
77 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
80 @INCOLLECTION{Filiol10,
81 author = {Eric Filiol},
82 title = {Viruses and Malware},
83 booktitle = {Handbook of Information and Communication Security},
86 bibsource = {DBLP, http://dblp.uni-trier.de},
87 crossref = {DBLP:reference/icsec/2010},
88 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
91 @INPROCEEDINGS{Filiol00,
92 author = {Eric Filiol},
93 title = {Decimation Attack of Stream Ciphers},
94 booktitle = {INDOCRYPT},
97 bibsource = {DBLP, http://dblp.uni-trier.de},
98 crossref = {DBLP:conf/indocrypt/2000},
99 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
102 @INPROCEEDINGS{Furon05,
103 author = {Teddy Furon},
104 title = {A Survey of Watermarking Security},
108 bibsource = {DBLP, http://dblp.uni-trier.de},
109 crossref = {DBLP:conf/iwdw/2005},
110 ee = {http://dx.doi.org/10.1007/11551492_16},
112 timestamp = {2009.06.29}
115 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
116 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
117 title = {Genetic algorithm feature-based resampling for protein structure
119 booktitle = {IEEE Congress on Evolutionary Computation},
122 bibsource = {DBLP, http://dblp.uni-trier.de},
123 crossref = {DBLP:conf/cec/2010},
124 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
127 @INPROCEEDINGS{Higgs2010,
128 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
129 title = {Genetic algorithm feature-based resampling for protein structure
131 booktitle = {IEEE Congress on Evolutionary Computation},
134 bibsource = {DBLP, http://dblp.uni-trier.de},
135 crossref = {DBLP:conf/cec/2010},
136 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
139 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
140 author = {Dragos Horvath and Camelia Chira},
141 title = {Simplified chain folding models as metaheuristic benchmark for tuning
142 real protein folding algorithms?},
143 booktitle = {IEEE Congress on Evolutionary Computation},
146 bibsource = {DBLP, http://dblp.uni-trier.de},
147 crossref = {DBLP:conf/cec/2010},
148 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
151 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
152 author = {Md. Kamrul Islam and Madhu Chetty},
153 title = {Clustered memetic algorithm for protein structure prediction},
154 booktitle = {IEEE Congress on Evolutionary Computation},
157 bibsource = {DBLP, http://dblp.uni-trier.de},
158 crossref = {DBLP:conf/cec/2010},
159 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
162 @INPROCEEDINGS{Ker06,
163 author = {Andrew D. Ker},
164 title = {Batch Steganography and Pooled Steganalysis},
165 booktitle = {Information Hiding},
168 bibsource = {DBLP, http://dblp.uni-trier.de},
169 crossref = {DBLP:conf/ih/2006},
170 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
172 timestamp = {2009.06.29}
175 @INPROCEEDINGS{Lin2009,
176 author = {H.-Y. Lin and T.-C. Chiang},
177 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
178 Curve Based Cryptosystems},
182 bibsource = {DBLP, http://dblp.uni-trier.de},
183 crossref = {DBLP:conf/cdve/2009},
184 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
187 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
188 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
189 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
191 booktitle = {CSE (2)},
194 bibsource = {DBLP, http://dblp.uni-trier.de},
195 crossref = {DBLP:conf/cse/2009},
196 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
199 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
200 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
201 title = {Coverage and adaptive scheduling algorithms for criticality management
202 on video wireless sensor networks},
206 bibsource = {DBLP, http://dblp.uni-trier.de},
207 crossref = {DBLP:conf/icumt/2009},
208 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
211 @INPROCEEDINGS{Mittelholzer99,
212 author = {Thomas Mittelholzer},
213 title = {An Information-Theoretic Approach to Steganography and Watermarking},
214 booktitle = {Information Hiding},
217 bibsource = {DBLP, http://dblp.uni-trier.de},
218 crossref = {DBLP:conf/ih/1999},
220 timestamp = {2009.06.29}
223 @INPROCEEDINGS{PellegriniBA10,
224 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
225 title = {Fault-based attack of RSA authentication},
229 bibsource = {DBLP, http://dblp.uni-trier.de},
230 crossref = {DBLP:conf/date/2010},
231 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
234 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
235 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
236 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
237 title = {Estimation of 3D Protein Structure by means of parallel Particle
239 booktitle = {IEEE Congress on Evolutionary Computation},
242 bibsource = {DBLP, http://dblp.uni-trier.de},
243 crossref = {DBLP:conf/cec/2010},
244 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
247 @INPROCEEDINGS{WangNHZH07,
248 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
250 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
251 and Embedding Optimization},
252 booktitle = {Information Hiding},
255 bibsource = {DBLP, http://dblp.uni-trier.de},
256 crossref = {DBLP:conf/ih/2007},
257 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
259 timestamp = {2009.06.29}
262 @INPROCEEDINGS{Zhao04,
263 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
265 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
267 booktitle = {ISNN (2)},
270 bibsource = {DBLP, http://dblp.uni-trier.de},
271 crossref = {DBLP:conf/isnn/2004-2},
272 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
275 @INPROCEEDINGS{Acharya05securecomparison,
276 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
277 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
278 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
279 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
282 address = {Washington, DC, USA},
283 publisher = {IEEE Computer Society},
284 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
285 isbn = {0-7695-2267-X}
288 @INPROCEEDINGS{Acimez07onthe,
289 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
290 title = {On the power of simple branch prediction analysis },
291 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
295 publisher = {ACM Press}
299 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
300 title = {Topological entropy},
301 journal = {Trans. Amer. Math. Soc.},
306 timestamp = {2008.05.29}
309 @INPROCEEDINGS{Agrawal04,
310 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
312 title = {Order preserving encryption for numeric data},
313 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
314 on Management of data},
317 address = {New York, NY, USA},
319 doi = {http://doi.acm.org/10.1145/1007568.1007632},
320 isbn = {1-58113-859-8},
321 location = {Paris, France}
324 @ARTICLE{Anfinsen20071973,
325 author = {Anfinsen, Christian B.},
326 title = {Principles that Govern the Folding of Protein Chains},
332 doi = {10.1126/science.181.4096.223},
333 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
334 url = {http://www.sciencemag.org/content/181/4096/223.short}
338 author = {D. G. Arques and C. J. Michel},
339 title = {Analytical expression of the purine/pyrimidine autocorrelation function
340 after and before random mutations.},
341 journal = {Math Biosci},
347 abstract = {The mutation process is a classical evolutionary genetic process.
348 The type of mutations studied here is the random substitutions of
349 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
350 or thymine) and reciprocally (transversions). The analytical expressions
351 derived allow us to analyze in genes the occurrence probabilities
352 of motifs and d-motifs (two motifs separated by any d bases) on the
353 R/Y alphabet under transversions. These motif probabilities can be
354 obtained after transversions (in the evolutionary sense; from the
355 past to the present) and, unexpectedly, also before transversions
356 (after back transversions, in the inverse evolutionary sense, from
357 the present to the past). This theoretical part in Section 2 is a
358 first generalization of a particular formula recently derived. The
359 application in Section 3 is based on the analytical expression giving
360 the autocorrelation function (the d-motif probabilities) before transversions.
361 It allows us to study primitive genes from actual genes. This approach
362 solves a biological problem. The protein coding genes of chloroplasts
363 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
364 (maximum of the autocorrelation function for d = 6, N = R or Y) with
365 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
366 the periodicity modulo 3 is also observed in the RNA coding genes
367 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
368 genes (introns and 5' regions of eukaryotic nuclei). However, there
369 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
370 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
371 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
372 3. When we go backward in time with the analytical expression, the
373 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
374 the YRY(N)6YRY preferential occurrence with a periodicity modulo
375 3 after 0.2 back transversions per base. In other words, the actual
376 protein coding genes of chloroplasts and mitochondria are similar
377 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
378 On the other hand, this application represents the first result concerning
379 the mutation process in the model of DNA sequence evolution we recently
380 proposed. According to this model, the actual genes on the R/Y alphabet
381 derive from two successive evolutionary genetic processes: an independent
382 mixing of a few nonrandom types of oligonucleotides leading to genes
383 called primitive followed by a mutation process in these primitive
384 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
385 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
387 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
388 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
390 medline-pst = {ppublish},
392 pii = {0025-5564(94)90020-5},
394 timestamp = {2011.05.05}
398 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
399 title = {An evolutionary analytical model of a complementary circular code
400 simulating the protein coding genes, the 5' and 3' regions.},
401 journal = {Bull Math Biol},
407 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
408 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
409 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
410 has a preferential occurrence in the frame 0 (reading frame established
411 by the ATG start trinucleotide) of protein (coding) genes of both
412 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
413 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
414 a preferential occurrence in the shifted frames 1 and 2 respectively
415 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
416 direction). T1 and T2 are complementary to each other. The subset
417 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
418 to be a complementary maximal circular code with two permutated maximal
419 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
420 called a C3 code. A quantitative study of these three subsets T0,
421 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
422 3' regions of eukaryotes, shows that their occurrence frequencies
423 are constant functions of the trinucleotide positions in the sequences.
424 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
425 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
426 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
427 of the frame. Indeed, the frequency of T0 in the three frames of
428 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
429 and is greater than the frequencies T1 and T2, both equal to 32.25\%
430 (respectively 31\%) in the three frames. Several frequency asymmetries
431 unexpectedly observed (e.g. the frequency difference between T1 and
432 T2 in the frame 0), are related to a new property of the subset T0
433 involving substitutions. An evolutionary analytical model at three
434 parameters (p, q, t) based on an independent mixing of the 22 codons
435 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
436 by t approximately 4 substitutions per codon according to the proportions
437 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
438 0.8 in the three codon sites respectively, retrieves the frequencies
439 of T0, T1, T2 observed in the three frames of protein genes and explains
440 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
441 t approximately 22 substitutions per codon, retrieves the statistical
442 properties observed in the three frames of the 5' and 3' regions.
443 The complex behaviour of these analytical curves is totally unexpected
444 and a priori difficult to imagine.},
445 doi = {10.1006/bulm.1997.0033},
446 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
447 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
448 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
449 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
452 medline-pst = {ppublish},
454 pii = {S0092-8240(97)90033-1},
456 timestamp = {2011.05.05},
457 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
461 author = {D. G. Arquès and C. J. Michel},
462 title = {Analytical expression of the purine/pyrimidine codon probability
463 after and before random mutations.},
464 journal = {Bull Math Biol},
467 pages = {1025--1038},
470 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
471 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
472 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
473 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
474 result of two successive evolutionary genetic processes: (i) a mixing
475 (independent) process of non-random oligonucleotides (words of base
476 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
477 N = R or Y) leading to primitive genes (words of several hundreds
478 of base length) and followed by (ii) a random mutation process, i.e.,
479 transformations of a base R (respectively Y) into the base Y (respectively
480 R) at random sites in these primitive genes. Following this model
481 the problem investigated here is the study of the variation of the
482 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
483 analytical expressions solved here allow analysis of this variation
484 in the classical evolutionary sense (from the past to the present,
485 i.e., after random mutations), but also in the inverted evolutionary
486 sense (from the present to the past, i.e., before random mutations).
487 Different properties are also derived from these formulae. Finally,
488 a few applications of these formulae are presented. They prove the
489 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
490 Section 3.3.2, with the existence of a maximal mean number of random
491 mutations per base of the order 0.3 in the protein coding genes.
492 They also confirm the mixing process of oligonucleotides by excluding
493 the purine/pyrimidine contiguous and alternating tracts from the
494 formation process of primitive genes.},
495 institution = {Université de Franche-Comté, Besançon, France.},
496 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
497 Genetic; Mutation; Probability; Purines; Pyrimidines},
499 medline-pst = {ppublish},
502 timestamp = {2011.05.05}
505 @ARTICLE{Arques1993b,
506 author = {D. G. Arquès and C. J. Michel},
507 title = {Identification and simulation of new non-random statistical properties
508 common to different eukaryotic gene subpopulations.},
509 journal = {Biochimie},
514 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
515 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
516 is studied by autocorrelation functions. The autocorrelation function
517 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
518 in protein coding genes and transfer RNA genes of these three eukaryotic
519 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
520 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
521 N = R or Y). The autocorrelation functions analysing the occurrence
522 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
523 (YYY-function) identify new non-random genetic statistical properties
524 in these three eukaryotic subpopulations, mainly: i) in their protein
525 coding genes: local maxima for i identical to 6 [12] (peaks for i
526 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
527 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
528 in their introns: local maxima for i identical to 3 [6] (peaks for
529 i = 3, 9, 15) and a short linear decrease followed by a large exponential
530 decrease both with the RRR- and YYY-functions. The non-random properties
531 identified in eukaryotic intron subpopulations are modelised with
532 a process of random insertions and deletions of nucleotides simulating
534 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
535 d'Informatique de Besançon, France.},
536 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
537 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
538 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
541 medline-pst = {ppublish},
543 pii = {0300-9084(93)90173-P},
545 timestamp = {2011.05.05}
549 author = {D. G. Arquès and C. J. Michel},
550 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
551 of nucleotide insertions and deletions.},
552 journal = {J Theor Biol},
558 abstract = {Recently, a new genetic process termed RNA editing has been identified
559 showing insertions and deletions of nucleotides in particular RNA
560 molecules. On the other hand, there are a few non-random statistical
561 properties in genes: in particular, the periodicity modulo 3 (P3)
562 associated with an open reading frame, the periodicity modulo 2 (P2)
563 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
564 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
565 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
566 helix pitch, etc. The problem investigated here is whether a process
567 of the type RNA editing can lead to the non-random statistical properties
568 commonly observed in genes. This paper will show in particular that:
569 The process of insertions and deletions of mononucleotides in the
570 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
571 modulo 2 (P2). The process of insertions and deletions of trinucleotides
572 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
573 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
574 Furthermore, these two processes lead to a strong correlation with
575 the reality, namely the mononucleotide insertion/deletion process,
576 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
577 process, with the eukaryotic protein coding genes.},
578 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
579 Unité Associée CNRS No 822, France.},
580 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
581 Mutagenesis, genetics; RNA, genetics},
583 medline-pst = {ppublish},
586 timestamp = {2011.05.05}
590 author = {D. G. Arquès and C. J. Michel},
591 title = {Periodicities in coding and noncoding regions of the genes.},
592 journal = {J Theor Biol},
598 abstract = {Gene population statistical studies of protein coding genes and introns
599 have identified two types of periodicities on the purine/pyrimidine
600 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
601 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
602 chloroplasts, mitochondria, plasmids and in introns of viruses and
603 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
604 in the eukaryotic introns. The periodicity study is herein extended
605 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
606 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
607 Therefore, these observations suggest a unitary and dynamic concept
608 for the genes as for a given genome, the 5' and 3' regions have the
609 genetic information for protein coding genes and for introns: (1)
610 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
611 have the information for protein coding genes (P3) and for introns
612 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
613 while the intensity of P2 is weak in 5' regions and high in 3' regions.
614 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
615 the information for protein coding genes (P3). (3) In the viral genome,
616 the 5' (P3) and 3' (P3) regions have the information for protein
617 coding genes (P3) and for introns (P3). The absence of P2 in viral
618 introns (in opposition to eukaryotic introns) may be related to the
619 absence of P2 in 5' and 3' regions of viruses.},
620 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
622 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
623 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
624 Nucleic Acid; Viruses, genetics},
626 medline-pst = {ppublish},
629 timestamp = {2011.05.05}
632 @ARTICLE{Arques1990a,
633 author = {D. G. Arquès and C. J. Michel},
634 title = {A model of DNA sequence evolution.},
635 journal = {Bull Math Biol},
640 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
641 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
642 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
643 i in the range, but presents a maximum at i = 6 in the following
644 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
645 and mitochondria, and also viral introns, ribosomal RNA genes and
646 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
647 457-461). From the "universality" of this observation, we suggested
648 that the oligonucleotide YRY(N)6 is a primitive one and that it has
649 a central function in DNA sequence evolution (Arquès and Michel,
650 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
651 a concept of a model of DNA sequence evolution which will be validated
652 according to a schema presented in three parts. In the first part,
653 using the last version of the gene database, the YRY(N)6YRY preferential
654 occurrence (maximum at i = 6) is confirmed for the populations mentioned
655 above and is extended to some newly analysed populations: chloroplast
656 introns, chloroplast 5' regions, mitochondrial 5' regions and small
657 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
658 occurrence and periodicities are used in order to classify 18 gene
659 populations. In the second part, we will demonstrate that several
660 statistical features characterizing different gene populations (in
661 particular the YRY(N)6YRY preferential occurrence and the periodicities)
662 can be retrieved from a simple Markov model based on the mixing of
663 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
664 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
665 and YRY(N)3. Several properties are identified and prove in particular
666 that the oligonucleotide mixing is an independent process and that
667 several different features are functions of a unique parameter. In
668 the third part, the return of the model to the reality shows a strong
669 correlation between reality and simulation concerning the presence
670 of a large alternating purine/pyrimidine stretches and of periodicities.
671 It also contributes to a greater understanding of biological reality,
672 e.g. the presence or the absence of large alternating purine/pyrimidine
673 stretches can be explained as being a simple consequence of the mixing
674 of two particular oligonucleotides. Finally, we believe that such
675 an approach is the first step toward a unified model of DNA sequence
676 evolution allowing the molecular understanding of both the origin
677 of life and the actual biological reality.},
678 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
679 Unité Associée CNRS No 822, France.},
680 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
683 medline-pst = {ppublish},
686 timestamp = {2011.05.05}
689 @ARTICLE{Arques1993a,
690 author = {D. G. Arquès and C. J. Michel and K. Orieux},
691 title = {Identification and simulation of new non-random statistical properties
692 common to different populations of eukaryotic non-coding genes.},
693 journal = {J Theor Biol},
699 abstract = {The autocorrelation function analysing the occurrence probability
700 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
701 two periodicities modulo 2, 3 and the preferential occurrence of
702 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
703 = cytosine or thymine, N = R or Y). These non-random genetic statistical
704 properties can be simulated by an independent mixing of the three
705 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
706 The problem investigated in this study is whether new properties
707 can be identified in genes with other autocorrelation functions and
708 also simulated with an oligonucleotide mixing model. The two autocorrelation
709 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
710 and YYY(N)iYYY simultaneously identify three new non-random genetic
711 statistical properties: a short linear decrease, local maxima for
712 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
713 Furthermore, these properties are common to three different populations
714 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
715 (see section 2). These three non-random properties can also be simulated
716 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
717 YYYRYRYYY and large alternating R/Y series. The short linear decrease
718 is a result of R8 and Y8, the local maxima for i identical to 3[6],
719 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
720 large alternating R/Y series (section 3). The biological meaning
721 of these results and their relation to the previous oligonucleotide
722 mixing model are presented in the Discussion.},
723 doi = {10.1006/jtbi.1993.1059},
724 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
725 d'Informatique de Besançon, France.},
726 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
727 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
729 medline-pst = {ppublish},
731 pii = {S0022-5193(83)71059-3},
733 timestamp = {2011.05.05},
734 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
738 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
739 title = {On the inadequacy of the logistic map for cryptographic applications},
740 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
745 owner = {christophe},
746 timestamp = {2010.03.01}
749 @MISC{Backofen99algorithmicapproach,
750 author = {R. Backofen and S. Will and P. Clote},
751 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
757 @inproceedings{Blum:1985:EPP:19478.19501,
758 author = {Blum, Manuel and Goldwasser, Shafi},
759 title = {An efficient probabilistic public key encryption scheme which hides all partial information},
760 booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology},
762 isbn = {0-387-15658-5},
763 location = {Santa Barbara, California, United States},
766 url = {http://dl.acm.org/citation.cfm?id=19478.19501},
768 publisher = {Springer-Verlag New York, Inc.},
769 address = {New York, NY, USA},
770 keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption},
774 @INPROCEEDINGS{bcgr11:ip,
775 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
776 and Richard, Adrien},
777 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
778 Boolean Discrete-Time Dynamical Systems},
779 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
784 address = {Oslo, Norway},
788 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
794 author = {Bahi, Jacques M. and Guyeux, Christophe},
795 title = {Hash Functions Using Chaotic Iterations},
796 journal = {Journal of Algorithms \& Computational Technology},
802 doi = {10.1260/1748-3018.4.2.167},
803 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
808 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
811 @INPROCEEDINGS{guyeux10ter,
812 author = {Bahi, Jacques M. and Guyeux, Christophe},
813 title = {A new chaos-based watermarking algorithm},
814 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
817 address = {Athens, Greece},
819 publisher = {SciTePress},
821 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
826 @INPROCEEDINGS{bgc11:ip,
827 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
828 title = {Chaos of Protein Folding},
829 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
832 address = {San Jose, California, United States},
836 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
841 @INPROCEEDINGS{guyeux10bis,
842 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
843 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
845 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
848 address = {Venice-Mestre, Italy},
851 doi = {10.1109/SENSORCOMM.2010.76},
852 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
855 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
858 @INPROCEEDINGS{guyeuxVictoria,
859 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
860 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
861 versus Watermarking Approach},
862 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
865 series = {Lecture Notes in ICST},
867 address = {Victoria, Canada},
870 doi = {10.1007/978-3-642-17994-5_23},
871 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
874 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
877 @INPROCEEDINGS{bgs11:ip,
878 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
879 title = {Building a Chaotic Proven Neural Network},
880 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
884 address = {Maldives, Maldives},
887 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
892 @INPROCEEDINGS{bgw10:ip,
893 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
894 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
896 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
901 address = {Sanya, China},
904 doi = {10.1007/978-3-642-16515-3_26},
905 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
908 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
911 @INPROCEEDINGS{bgw09:ip,
912 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
913 title = {A novel pseudo-random generator based on discrete chaotic iterations},
914 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
917 address = {Cannes, France},
920 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
925 @INPROCEEDINGS{bmg10:onp,
926 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
927 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
928 Networks for critical applications},
929 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
930 et Applications Critiques de Surveillance},
932 address = {Bayonne, France},
934 note = {Communication orale},
936 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
941 @INPROCEEDINGS{guyeuxBayonne,
942 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
943 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
944 Networks for critical applications},
945 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
946 et Applications Critiques de Surveillance},
948 address = {Bayonne, France},
950 note = {Communication orale},
957 author = {Bahi, Jacques M. and Salomon, Michel},
958 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
959 Lifetime of {MANETs}},
960 journal = {Computer Networks Journal},
963 note = {Accepted manuscript. To appear},
966 impact-factor = {1.201},
969 publisher = {Elsevier}
973 author = {J. M. Bahi},
974 title = {Boolean totally asynchronous iterations},
975 journal = {Int. Journal of Mathematical Algorithms},
980 timestamp = {17/02/2008}
983 @ARTICLE{Bahi2000bis,
984 author = {Jacques M. Bahi},
985 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
986 journal = {Journal of Parallel and Distributed Computing},
991 timestamp = {2009.01.10}
995 author = {J. M. Bahi},
996 title = {Parallel synchronous chaotic iterations for singular linear systems},
997 journal = {Parallel Algorithms and Applications},
1002 timestamp = {17/02/2008}
1006 author = {Jacques M. Bahi},
1007 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
1008 journal = {Comptes Rendus de l'Academie des Sciences},
1010 volume = {t. 326, serie 1},
1011 pages = {1421--1425},
1013 timestamp = {2009.01.18}
1017 author = {Jacques M. Bahi},
1018 title = {Méthodes itératives dans des espaces produits. Application au calcul
1020 school = {Université de Franche-Comté},
1022 type = {Habilitation à diriger des recherches},
1023 owner = {christophe},
1024 timestamp = {2010.08.24}
1028 author = {Jacques M. Bahi},
1029 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1030 Simulation numérique sur des exemples de circuits électriques},
1031 school = {Université de Franche-Comté},
1033 owner = {christophe},
1034 timestamp = {2010.08.24}
1038 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1039 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1041 journal = {IEEE Transactions on Neural Networks},
1048 timestamp = {2009.12.04}
1052 author = {J.~M. Bahi and S. Contassot-Vivier},
1053 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1055 journal = {IEEE Transactions on Neural Networks},
1058 pages = {1353-1363},
1060 timestamp = {2009.02.14}
1063 @TECHREPORT{bcgg10:ir,
1064 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1065 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1066 for {S}ynchronous {I}terations},
1067 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1070 type = {Research Report},
1071 number = {RR2010-04},
1073 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1077 author = {Bahi, Jacques M. and Guyeux, Christophe},
1078 title = {Hash Functions Using Chaotic Iterations},
1079 journal = {Journal of Algorithms \& Computational Technology},
1084 classement = {ACLNI},
1085 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1087 impact-factor = {#},
1092 @INPROCEEDINGS{guyeux10,
1093 author = {Bahi, Jacques M. and Guyeux, Christophe},
1094 title = {Topological chaos and chaotic iterations, application to Hash functions},
1095 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1098 address = {Barcelona, Spain},
1100 note = {Best paper award},
1101 classement = {ACTI},
1102 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1108 author = {Jacques M. Bahi and Christophe Guyeux},
1109 title = {A chaos-based approach for information hiding security.},
1110 howpublished = {arXiv},
1113 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1117 author = {Jacques M. Bahi and Christophe Guyeux},
1118 title = {A watermarking algorithm satisfying topological chaos properties},
1121 volume = {abs/0810.4713},
1122 bibsource = {DBLP, http://dblp.uni-trier.de},
1123 ee = {http://arxiv.org/abs/0810.4713}
1127 author = {Jacques M. Bahi and Christophe Guyeux},
1128 title = {Chaotic iterations and topological chaos},
1130 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1131 Miranker [5] and Miellou [9] in a numerical analysis context, and
1132 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1133 dynamical systems framework. In both cases, the objective was to
1134 derive conditions of convergence of such iterations to a fixed state.
1135 In this paper, a new point of view is presented, the goal here is
1136 to derive conditions under which chaotic iterations admit a chaotic
1137 behaviour in a rigorous mathematical sense. Contrary to what has
1138 been studied in the literature, convergence is not desired. More
1139 precisely, we establish in this paper a link between the concept
1140 of chaotic iterations on a finite set and the notion of topological
1141 chaos [8], [6], [7]. We are motivated by concrete applications of
1142 our approach, such as the use of chaotic boolean iterations in the
1143 computer security field. Indeed, the concept of chaos is used in
1144 many areas of data security without real rigorous theoretical foundations,
1145 and without using the fundamental properties that allow chaos. The
1146 wish of this paper is to bring a bit more mathematical rigour in
1148 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1150 comments = {6 pages},
1151 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1152 oai2identifier = {0810.3154},
1154 timestamp = {2008.10.23},
1155 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1158 @ARTICLE{arxivRNNchaos,
1159 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1160 title = {Building a Chaotic Proved Neural Network},
1163 volume = {abs/1101.4351},
1164 ee = {http://arxiv.org/abs/1101.4351}
1167 @INPROCEEDINGS{guyeuxTaiwan10,
1168 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1169 title = {Improving random number generators by chaotic iterations. Application
1171 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1173 pages = {V13-643--V13-647},
1174 address = {Taiyuan, China},
1176 classement = {ACTI},
1177 doi = {10.1109/ICCASM.2010.5622199},
1178 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1181 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1185 author = {Jacques M Bahi and Christian J Michel},
1186 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1188 journal = {Bull Math Biol},
1194 abstract = {We develop here a new class of stochastic models of gene evolution
1195 in which a random subset of the 64 possible trinucleotides mutates
1196 at each evolutionary time t according to some time dependent substitution
1197 probabilities. Therefore, at each time t, the numbers and the types
1198 of mutable trinucleotides are unknown. Thus, the mutation matrix
1199 changes at each time t. This pseudochaotic model developed generalizes
1200 the standard model in which all the trinucleotides mutate at each
1201 time t. It determines the occurrence probabilities at time t of trinucleotides
1202 which pseudochaotically mutate according to 3 time dependent substitution
1203 parameters associated with the 3 trinucleotide sites. The main result
1204 proves that under suitable assumptions, this pseudochaotic model
1205 converges to a uniform probability vector identical to that of the
1206 standard model. Furthermore, an application of this pseudochaotic
1207 model allows an evolutionary study of the 3 circular codes identified
1208 in both eukaryotic and prokaryotic genes. A circular code is a particular
1209 set of trinucleotides whose main property is the retrieval of the
1210 frames in genes locally, i.e., anywhere in genes and particularly
1211 without start codons, and automatically with a window of a few nucleotides.
1212 After a certain evolutionary time and with particular time dependent
1213 functions for the 3 substitution parameters, precisely an exponential
1214 decrease in the 1st and 2nd trinucleotide sites and an exponential
1215 increase in the 3rd one, this pseudochaotic model retrieves the main
1216 statistical properties of the 3 circular codes observed in genes.
1217 Furthermore, it leads to a circular code asymmetry stronger than
1218 the standard model (nonpseudochaotic) and, therefore, to a better
1219 correlation with the genes.},
1220 doi = {10.1007/s11538-008-9376-4},
1221 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1222 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1223 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1226 medline-pst = {ppublish},
1229 timestamp = {2011.05.05},
1230 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1234 author = {Jacques M Bahi and Christian J Michel},
1235 title = {A stochastic model of gene evolution with chaotic mutations.},
1236 journal = {J Theor Biol},
1242 abstract = {We develop here a new class of stochastic models of gene evolution
1243 in which the mutations are chaotic, i.e. a random subset of the 64
1244 possible trinucleotides mutates at each evolutionary time t according
1245 to some substitution probabilities. Therefore, at each time t, the
1246 numbers and the types of mutable trinucleotides are unknown. Thus,
1247 the mutation matrix changes at each time t. The chaotic model developed
1248 generalizes the standard model in which all the trinucleotides mutate
1249 at each time t. It determines the occurrence probabilities at time
1250 t of trinucleotides which chaotically mutate according to three substitution
1251 parameters associated with the three trinucleotide sites. Two theorems
1252 prove that this chaotic model has a probability vector at each time
1253 t and that it converges to a uniform probability vector identical
1254 to that of the standard model. Furthermore, four applications of
1255 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1256 and with a particular strategy for the three stop codons) allow an
1257 evolutionary study of the three circular codes identified in both
1258 eukaryotic and prokaryotic genes. A circular code is a particular
1259 set of trinucleotides whose main property is the retrieval of the
1260 frames in genes locally, i.e. anywhere in genes and particularly
1261 without start codons, and automatically with a window of a few nucleotides.
1262 After a certain evolutionary time and with particular values for
1263 the three substitution parameters, the chaotic models retrieve the
1264 main statistical properties of the three circular codes observed
1265 in genes. These applications also allow an evolutionary comparison
1266 between the standard and chaotic models.},
1267 doi = {10.1016/j.jtbi.2008.07.028},
1268 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1269 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1270 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1271 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1272 Stochastic Processes; Time},
1274 medline-pst = {ppublish},
1276 pii = {S0022-5193(08)00395-0},
1278 timestamp = {2011.05.05},
1279 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1282 @ARTICLE{Bahi2008bis,
1283 author = {Bahi, J. M. and Michel, C. J.},
1284 title = {A stochastic model of gene evolution with chaotic mutations},
1285 journal = {Journal of Theoretical Biology},
1290 timestamp = {2009.01.10}
1294 author = {Jacques M Bahi and Christian J Michel},
1295 title = {A stochastic gene evolution model with time dependent mutations.},
1296 journal = {Bull Math Biol},
1302 abstract = {We develop here a new class of gene evolution models in which the
1303 nucleotide mutations are time dependent. These models allow to study
1304 nonlinear gene evolution by accelerating or decelerating the mutation
1305 rates at different evolutionary times. They generalize the previous
1306 ones which are based on constant mutation rates. The stochastic model
1307 developed in this class determines at some time t the occurrence
1308 probabilities of trinucleotides mutating according to 3 time dependent
1309 substitution parameters associated with the 3 trinucleotide sites.
1310 Therefore, it allows to simulate the evolution of the circular code
1311 recently observed in genes. By varying the class of function for
1312 the substitution parameters, 1 among 12 models retrieves after mutation
1313 the statistical properties of the observed circular code in the 3
1314 frames of actual genes. In this model, the mutation rate in the 3rd
1315 trinucleotide site increases during gene evolution while the mutation
1316 rates in the 1st and 2nd sites decrease. This property agrees with
1317 the actual degeneracy of the genetic code. This approach can easily
1318 be generalized to study evolution of motifs of various lengths, e.g.,
1319 dicodons, etc., with time dependent mutations.},
1320 doi = {10.1016/j.bulm.2003.10.004},
1321 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1322 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1323 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1324 genetics; Models, Genetic; Mutation; Stochastic Processes},
1326 medline-pst = {ppublish},
1328 pii = {S0092824003001174},
1330 timestamp = {2011.05.05},
1331 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1335 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1336 title = {On Devaney's Definition of Chaos},
1337 journal = {Amer. Math. Monthly},
1343 timestamp = {27/01/2008}
1347 author = {E. Barker and A. Roginsky},
1348 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1349 of Cryptographic Algorithms and Key Sizes},
1351 owner = {christophe},
1352 timestamp = {2010.08.18}
1356 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1357 title = {A general framework for robust watermarking security},
1358 journal = {Signal Processing},
1361 pages = {2069-2084},
1363 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1364 bibsource = {DBLP, http://dblp.uni-trier.de},
1365 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1367 timestamp = {2009.06.30}
1371 author = {Baudet, G\'{e}rard M.},
1372 title = {Asynchronous Iterative Methods for Multiprocessors},
1378 address = {New York, NY, USA},
1379 doi = {http://doi.acm.org/10.1145/322063.322067},
1385 author = {Didier El Baz},
1386 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1387 : étude théorique, mise en œuvre, et application},
1388 school = {Institut national polytechnique de Toulouse},
1390 type = {Habilitation à diriger des recherches},
1391 owner = {christophe},
1392 timestamp = {2010.08.24}
1396 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1397 title = {Contention awareness and fault-tolerant scheduling for precedence
1398 constrained tasks in heterogeneous systems},
1399 journal = {Parallel Computing},
1405 doi = {10.1016/j.parco.2008.11.001},
1408 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1411 @INPROCEEDINGS{bhr08b:bl,
1412 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1413 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1415 booktitle = {IPDPS'08},
1418 publisher = {IEEE Computer Society Press},
1424 @INPROCEEDINGS{Berger98,
1425 author = {Berger, Bonnie and Leighton, Tom},
1426 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1427 booktitle = {Proceedings of the second annual international conference on Computational
1430 series = {RECOMB '98},
1432 address = {New York, NY, USA},
1435 isbn = {0-89791-976-9},
1436 location = {New York, New York, United States},
1441 title = {Parallel and distributed computation: numerical methods},
1442 publisher = {Prentice-Hall, Inc.},
1444 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1445 address = {Upper Saddle River, NJ, USA},
1446 isbn = {0-13-648700-9}
1449 @MISC{Bertsekas88paralleland,
1450 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1451 title = {Parallel and distributed iterative algorithms: a selective survey},
1456 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1457 title = {On Li-Yorke pairs},
1461 timestamp = {2008.01.02}
1465 author = {F. Blanchard and B. Host and S. Ruette},
1466 title = {Asymptotic pairs in positive-entropy systems},
1468 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1471 timestamp = {2008.01.02}
1475 author = {Dan Boneh and Matt Franklin},
1476 title = {Identity-Based Encryption from the {Weil} Pairing},
1477 journal = {SIAM J. of Computing},
1482 note = {Extended abstract in Crypto'01}
1485 @INCOLLECTION{boneh,
1486 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1487 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1490 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1491 We present a homomorphic public key encryption scheme that allows
1492 the public evaluation of ψ given an encryption of the variables x
1493 1,..., x n. In other words, given the encryption of the bits x 1,...,
1494 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1495 we can evaluate quadratic multi-variate polynomials on ciphertexts
1496 provided the resulting value falls within a small set. We present
1497 a number of applications of the system: 1 In a database of size n,
1498 the total communication in the basic step of the Kushilevitz-Ostrovsky
1499 PIR protocol is reduced from to . 2 An efficient election system
1500 based on homomorphic encryption where voters do not need to include
1501 non-interactive zero knowledge proofs that their ballots are valid.
1502 The election system is proved secure without random oracles but still
1503 efficient. 3 A protocol for universally verifiable computation.},
1504 citeulike-article-id = {2719460},
1505 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1506 journal = {Theory of Cryptography},
1507 keywords = {homomorphic, pairings},
1508 posted-at = {2008-04-25 21:53:15},
1510 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1514 author = {Bonneau, Richard and Baker, David},
1515 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1516 journal = {Annual Review of Biophysics and Biomolecular Structure},
1521 doi = {10.1146/annurev.biophys.30.1.173}
1525 author = {R. Bowen},
1526 title = {Entropy for group endomorphisms and homogeneous spaces},
1527 journal = {Trans. Amer. Math. Soc.},
1532 timestamp = {15/02/2008}
1536 author = {R. Bowen},
1537 title = {Periodic points and measures for Axiom A diffeomorphisms},
1538 journal = {Trans. Amer. Math. Soc.},
1543 timestamp = {15/02/2008}
1546 @ARTICLE{Braxenthaler97,
1547 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1549 title = {Chaos in protein dynamics},
1550 journal = {Proteins-structure Function and Bioinformatics},
1554 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1558 @INPROCEEDINGS{Brumley03remotetiming,
1559 author = {David Brumley and Dan Boneh},
1560 title = {Remote Timing Attacks are Practical},
1561 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1566 @ARTICLE{Bohm1991375,
1567 author = {Gerald Böhm},
1568 title = {Protein folding and deterministic chaos: Limits of protein folding
1569 simulations and calculations},
1570 journal = {Chaos, Solitons \& Fractals},
1573 pages = {375 - 382},
1575 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1577 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1580 @INCOLLECTION{Cachin2004,
1581 author = {Cachin, Christian},
1582 title = {An Information-Theoretic Model for Steganography},
1583 booktitle = {Information Hiding},
1584 publisher = {Springer Berlin / Heidelberg},
1587 series = {Lecture Notes in Computer Science},
1589 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1594 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1596 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1597 wireless sensor networks.},
1598 journal = {Computer Communication journal (29)},
1603 @ARTICLE{CarletCZ98,
1604 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1605 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1606 journal = {Des. Codes Cryptography},
1611 bibsource = {DBLP, http://dblp.uni-trier.de}
1614 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1615 author = {Claude Castelluccia},
1616 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1617 booktitle = {MobiQuitous},
1620 publisher = {IEEE Computer Society}
1624 author = {Cayre, F. and Bas, P.},
1625 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1626 journal = {IEEE Transactions on Information Forensics and Security},
1631 doi = {10.1109/TIFS.2007.916006},
1633 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1634 security, watermarking, Kerckhoffs-based embedding security classes,
1635 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1636 steganography security, watermark-only-attack, watermarking, Security,
1637 spread-spectrum (SS) watermarking},
1639 timestamp = {2009.06.29}
1643 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1644 title = {Watermarking security: theory and practice},
1645 journal = {IEEE Transactions on Signal Processing},
1648 pages = {3976--3987},
1650 doi = {10.1109/TSP.2005.855418},
1652 keywords = {blind source separation, cryptography, watermarking, Fisher information
1653 matrix, blind source separation, cryptanalysis, information theory,
1654 spread spectrum techniques, substitutive scheme, watermarking security,
1655 Blind source separation, Fisher information matrix, equivocation,
1656 security, watermarking},
1658 timestamp = {2009.06.29}
1661 @ARTICLE{Chajakis91,
1662 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1663 title = {Synchronous and asynchronous implementations of relaxation algorithms
1664 for nonlinear network optimization},
1665 journal = {Parallel Comput.},
1670 address = {Amsterdam, The Netherlands, The Netherlands},
1671 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1673 publisher = {Elsevier Science Publishers B. V.}
1677 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1679 title = {SIA: Secure information aggregation in sensor networks},
1680 journal = {J. Comput. Secur.},
1685 address = {Amsterdam, The Netherlands, The Netherlands},
1687 publisher = {IOS Press}
1690 @ARTICLE{Chandramouli06,
1691 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1692 title = {Battery power-aware encryption},
1693 journal = {ACM transactions on information and system security},
1696 owner = {christophe},
1697 timestamp = {2010.07.31}
1701 author = {Pascale Charpin},
1702 title = {A description of some extended cyclic codes with application to Reed-Solomon
1704 journal = {Discrete Mathematics},
1709 bibsource = {DBLP, http://dblp.uni-trier.de},
1710 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1714 author = {D. Chazan and W. Miranker},
1715 title = {Chaotic relaxation},
1716 journal = {Linear algebra and its applications},
1720 timestamp = {2008.05.22}
1724 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1725 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1726 homomorphism scheme},
1727 journal = {Inf. Process. Lett.},
1732 address = {Amsterdam, The Netherlands, The Netherlands},
1733 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1735 publisher = {Elsevier North-Holland, Inc.}
1738 @MISC{Cheon03acryptanalysis,
1739 author = {Jung Hee Cheon and Hyun Soo Nam},
1740 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1746 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1747 title = {Secure encrypted-data aggregation for wireless sensor networks},
1748 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1751 pages = {1048-1059},
1755 @ARTICLE{Chivian2005,
1756 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1757 Jack and Rohl, Carol A. and Baker, David},
1758 title = {Prediction of CASP6 structures using automated robetta protocols},
1759 journal = {Proteins},
1765 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1766 alignment ensemble},
1767 owner = {christophe},
1768 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1769 timestamp = {2011.01.22},
1770 url = {http://dx.doi.org/10.1002/prot.20733}
1774 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1775 title = {Chaos-based multipurpose image watermarking algorithm},
1776 journal = {Wuhan University Journal of Natural Sciences},
1779 pages = {1675-1678},
1780 note = {10.1007/BF02831848},
1781 abstract = {To achieve the goal of image content authentication and copyright
1782 protection simultaneously, this paper presents a novel image dual
1783 watermarking method based on chaotic map. Firstly, the host image
1784 was split into many nonoverlapping small blocks, and the block-wise
1785 discrete cosine transform (DCT) is computed. Secondly, the robust
1786 watermarks, shuffled by the chaotic sequences, are embedded in the
1787 DC coefficients of blocks to achieve the goal of copyright protection.
1788 The semi-fragile watermarks, generated by chaotic map, are embedded
1789 in the AC coefficients of blocks to obtain the aim of image authentication.
1790 Both of them can be extracted without the original image. Simulation
1791 results demonstrate the effectiveness of our algorithm in terms of
1792 robustness and fragility.},
1793 affiliation = {Central South University School of Information Science and Engineering
1794 410083 Changsha, Hunan China},
1797 keyword = {Mathematics, general},
1798 publisher = {Wuhan University, co-published with Springer},
1799 url = {http://dx.doi.org/10.1007/BF02831848}
1802 @ARTICLE{Conley1978,
1803 author = {C. Conley},
1804 title = {Isolated invariant sets and the Morse index},
1805 journal = {CBMS Regional Conference. AMS.},
1809 timestamp = {2008.01.02}
1813 author = {Philippe Cornu and André Smolarz},
1814 title = {Image characterization by texture},
1815 journal = {Traitement du signal},
1819 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1821 timestamp = {2008.05.12}
1824 @INPROCEEDINGS{Cox99,
1825 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1826 title = {Watermarking as Communications With Side Information},
1827 booktitle = {Proceedings of the IEEE},
1829 pages = {1127--1141},
1830 owner = {christophe},
1831 timestamp = {2010.03.06}
1834 @ARTICLE{Cox97securespread,
1835 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1837 title = {Secure spread spectrum watermarking for multimedia},
1838 journal = {IEEE Transactions on Image Processing},
1841 pages = {1673--1687}
1845 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1846 title = {Video Compression with Random Neural Networks},
1847 journal = {Neural Networks for Identification, Control, and Robotics, International
1852 address = {Los Alamitos, CA, USA},
1853 isbn = {0-8186-7456-3},
1854 publisher = {IEEE Computer Society}
1857 @INPROCEEDINGS{Crescenzi98,
1858 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1859 and Piccolboni, Antonio and Yannakakis, Mihalis},
1860 title = {On the complexity of protein folding (extended abstract)},
1861 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1863 series = {STOC '98},
1865 address = {New York, NY, USA},
1868 isbn = {0-89791-962-9},
1869 location = {Dallas, Texas, United States},
1874 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1875 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1876 journal = {Chaos, Solitons and Fractals},
1881 timestamp = {2008.10.07}
1885 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1886 title = {Processor-Dependent Malware... and codes},
1888 comment = {arXiv:1011.1638},
1889 eprint = {arXiv:1011.1638}
1893 title = {An Introduction to Chaotic Dynamical Systems},
1894 publisher = {Addison-Wesley},
1896 author = {Devaney, Robert L.},
1897 address = {Redwood City, CA},
1902 author = {Whitfield Diffie and Martin E. Hellman},
1903 title = {New Directions in Cryptography},
1904 journal = {IEEE Transactions on Information Theory},
1909 date = {November 1976},
1911 timestamp = {2009.06.30},
1912 url = {citeseer.ist.psu.edu/diffie76new.html}
1915 @INCOLLECTION{Dijk10,
1916 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1918 title = {Fully Homomorphic Encryption over the Integers},
1919 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1920 publisher = {Springer Berlin / Heidelberg},
1922 editor = {Gilbert, Henri},
1924 series = {Lecture Notes in Computer Science},
1926 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1927 elementary modular arithmetic. We use Gentry’s technique to construct
1928 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1929 scheme. However, instead of using ideal lattices over a polynomial
1930 ring, our bootstrappable encryption scheme merely uses addition and
1931 multiplication over the integers. The main appeal of our scheme is
1932 the conceptual simplicity. We reduce the security of our scheme to
1933 finding an approximate integer gcd – i.e., given a list of integers
1934 that are near-multiples of a hidden integer, output that hidden integer.
1935 We investigate the hardness of this task, building on earlier work
1936 of Howgrave-Graham.},
1937 affiliation = {MIT CSAIL}
1941 author = {Dill, KA},
1942 title = {Theory for the folding and stability of globular proteins.},
1943 journal = {Biochemistry},
1949 abstract = {Using lattice statistical mechanics, we develop theory to account
1950 for the folding of a heteropolymer molecule such as a protein to
1951 the globular and soluble state. Folding is assumed to be driven by
1952 the association of solvophobic monomers to avoid solvent and opposed
1953 by the chain configurational entropy. Theory predicts a phase transition
1954 as a function of temperature or solvent character. Molecules that
1955 are too short or too long or that have too few solvophobic residues
1956 are predicted not to fold. Globular molecules should have a largely
1957 solvophobic core, but there is an entropic tendency for some residues
1958 to be "out of place", particularly in small molecules. For long chains,
1959 molecules comprised of globular domains are predicted to be thermodynamically
1960 more stable than spherical molecules. The number of accessible conformations
1961 in the globular state is calculated to be an exceedingly small fraction
1962 of the number available to the random coil. Previous estimates of
1963 this number, which have motivated kinetic theories of folding, err
1964 by many tens of orders of magnitude.},
1965 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
1966 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
1967 owner = {christophe},
1968 timestamp = {2011.01.22},
1969 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
1973 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
1974 Thomas, PD and Chan, HS},
1975 title = {Principles of protein folding--a perspective from simple exact models.},
1976 journal = {Protein Sci},
1979 pages = {561-602--},
1982 abstract = {General principles of protein structure, stability, and folding kinetics
1983 have recently been explored in computer simulations of simple exact
1984 lattice models. These models represent protein chains at a rudimentary
1985 level, but they involve few parameters, approximations, or implicit
1986 biases, and they allow complete explorations of conformational and
1987 sequence spaces. Such simulations have resulted in testable predictions
1988 that are sometimes unanticipated: The folding code is mainly binary
1989 and delocalized throughout the amino acid sequence. The secondary
1990 and tertiary structures of a protein are specified mainly by the
1991 sequence of polar and nonpolar monomers. More specific interactions
1992 may refine the structure, rather than dominate the folding code.
1993 Simple exact models can account for the properties that characterize
1994 protein folding: two-state cooperativity, secondary and tertiary
1995 structures, and multistage folding kinetics--fast hydrophobic collapse
1996 followed by slower annealing. These studies suggest the possibility
1997 of creating "foldable" chain molecules other than proteins. The encoding
1998 of a unique compact chain conformation may not require amino acids;
1999 it may require only the ability to synthesize specific monomer sequences
2000 in which at least one monomer type is solvent-averse.},
2001 address = {Department of Pharmaceutical Chemistry, University of California,
2002 San Francisco 94143-1204, USA.},
2003 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
2004 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
2005 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
2006 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
2007 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
2008 owner = {christophe},
2009 timestamp = {2011.01.22},
2010 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
2013 @INPROCEEDINGS{Dobbertin96,
2014 author = {Dobbertin, Hans},
2015 title = {Cryptanalysis of MD4},
2016 booktitle = {Proceedings of the Third International Workshop on Fast Software
2020 address = {London, UK},
2021 publisher = {Springer-Verlag},
2022 isbn = {3-540-60865-6}
2025 @INPROCEEDINGS{DomingoFerrer2002,
2026 author = {Domingo-Ferrer, Josep},
2027 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2028 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2032 address = {London, UK},
2033 publisher = {Springer-Verlag},
2034 isbn = {3-540-44270-7}
2037 @ARTICLE{Dubchak1995,
2038 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2039 title = {Prediction of protein folding class using global description of amino
2041 journal = {Proc Natl Acad Sci U S A},
2044 pages = {8700--8704},
2047 __markedentry = {[guyeux]},
2048 abstract = {We present a method for predicting protein folding class based on
2049 global protein chain description and a voting process. Selection
2050 of the best descriptors was achieved by a computer-simulated neural
2051 network trained on a data base consisting of 83 folding classes.
2052 Protein-chain descriptors include overall composition, transition,
2053 and distribution of amino acid attributes, such as relative hydrophobicity,
2054 predicted secondary structure, and predicted solvent exposure. Cross-validation
2055 testing was performed on 15 of the largest classes. The test shows
2056 that proteins were assigned to the correct class (correct positive
2057 prediction) with an average accuracy of 71.7\%, whereas the inverse
2058 prediction of proteins as not belonging to a particular class (correct
2059 negative prediction) was 90-95\% accurate. When tested on 254 structures
2060 used in this study, the top two predictions contained the correct
2061 class in 91\% of the cases.},
2062 institution = {Department of Chemistry, University of California, Berkeley 94720,
2064 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2065 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2066 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2067 Reproducibility of Results; Solvents},
2069 medline-pst = {ppublish},
2072 timestamp = {2011.07.18}
2076 title = {Real analysis and probability},
2077 publisher = {Cambridge University Press},
2078 author = {Richard M. Dudley},
2081 timestamp = {2008.01.02}
2085 author = {El Tarazi, Mouhamed Nabih},
2086 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2087 journal = {Numerische Mathematik},
2091 note = {10.1007/BF01405568},
2092 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2096 keyword = {Mathematics and Statistics},
2097 publisher = {Springer Berlin / Heidelberg},
2098 url = {http://dx.doi.org/10.1007/BF01405568}
2102 author = {El Tarazi, Mouhamed Nabih},
2103 title = {Some convergence results for asynchronous algorithms},
2104 journal = {Numerische Mathematik},
2108 note = {10.1007/BF01407866},
2109 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2110 Box 5969 Kuwait Kuwait},
2113 keyword = {Mathematics and Statistics},
2114 publisher = {Springer Berlin / Heidelberg},
2115 url = {http://dx.doi.org/10.1007/BF01407866}
2119 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2120 title = {A secure digital signature algorithm based on elliptic curve and
2122 journal = {Circuits Systems Signal Processing},
2124 volume = {24, No. 5},
2127 timestamp = {2009.01.16}
2130 @BOOK{Feigenbaum1908,
2131 title = {Universal behavior in nonlinear systems},
2132 publisher = {Los Alamos Science},
2134 author = {Feigenbaum},
2136 timestamp = {2008.01.02}
2139 @ARTICLE{Felsenstein1980,
2140 author = {J. Felsenstein},
2141 title = {A view of population genetics.},
2142 journal = {Science},
2148 doi = {10.1126/science.208.4449.1253},
2150 medline-pst = {ppublish},
2152 pii = {208/4449/1253},
2154 timestamp = {2011.05.05},
2155 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2159 title = {Les virus informatiques : techniques virales et antivirales avancées},
2161 editor = {Springer},
2162 author = {Eric Filiol},
2163 owner = {christophe},
2164 timestamp = {2010.10.13}
2167 @INPROCEEDINGS{FiliolBlackHat,
2168 author = {Eric Filiol},
2169 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2170 booktitle = {Black Hat},
2172 owner = {christophe},
2173 timestamp = {2010.11.28}
2176 @PHDTHESIS{Formenti2003,
2177 author = {Enrico Formenti},
2178 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2179 school = {Université de Provence},
2182 timestamp = {2008.01.02}
2185 @PHDTHESIS{Formenti1998,
2186 author = {Enrico Formenti},
2187 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2189 school = {\'Ecole Normale Supérieure de Lyon},
2191 optmonth = {Octobre},
2193 timestamp = {2008.01.02}
2197 author = {Gabriel Frey and Christian J Michel},
2198 title = {Identification of circular codes in bacterial genomes and their use
2199 in a factorization method for retrieving the reading frames of genes.},
2200 journal = {Comput Biol Chem},
2206 abstract = {We developed a statistical method that allows each trinucleotide to
2207 be associated with a unique frame among the three possible ones in
2208 a (protein coding) gene. An extensive gene study in 175 complete
2209 bacterial genomes based on this statistical approach resulted in
2210 identification of 72 new circular codes. Finding a circular code
2211 enables an immediate retrieval of the reading frame locally anywhere
2212 in a gene. No knowledge of location of the start codon is required
2213 and a short window of only a few nucleotides is sufficient for automatic
2214 retrieval. We have therefore developed a factorization method (that
2215 explores previously found circular codes) for retrieving the reading
2216 frames of bacterial genes. Its principle is new and easy to understand.
2217 Neither complex treatment nor specific information on the nucleotide
2218 sequences is necessary. Moreover, the method can be used for short
2219 regions in nucleotide sequences (less than 25 nucleotides in protein
2220 coding genes). Selected additional properties of circular codes and
2221 their possible biological consequences are also discussed.},
2222 doi = {10.1016/j.compbiolchem.2005.11.001},
2223 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2224 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2225 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2226 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2227 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2228 Statistical; Reading Frames},
2230 medline-pst = {ppublish},
2232 pii = {S1476-9271(05)00111-8},
2234 timestamp = {2011.05.05},
2235 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2239 author = {Gabriel Frey and Christian J Michel},
2240 title = {An analytical model of gene evolution with six mutation parameters:
2241 an application to archaeal circular codes.},
2242 journal = {Comput Biol Chem},
2248 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2249 mutation matrix 64 x 64 with six substitution parameters associated
2250 with the transitions and transversions in the three trinucleotide
2251 sites. It generalizes the previous models based on the nucleotide
2252 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2253 x 64 with three parameters. It determines at some time t the exact
2254 occurrence probabilities of trinucleotides mutating randomly according
2255 to six substitution parameters. An application of this model allows
2256 an evolutionary study of the common circular code COM and the 15
2257 archaeal circular codes X which have been recently identified in
2258 several archaeal genomes. The main property of a circular code is
2259 the retrieval of the reading frames in genes, both locally, i.e.
2260 anywhere in genes and in particular without a start codon, and automatically
2261 with a window of a few nucleotides. In genes, the circular code is
2262 superimposed on the traditional genetic one. Very unexpectedly, the
2263 evolutionary model demonstrates that the archaeal circular codes
2264 can derive from the common circular code subjected to random substitutions
2265 with particular values for six substitutions parameters. It has a
2266 strong correlation with the statistical observations of three archaeal
2267 codes in actual genes. Furthermore, the properties of these substitution
2268 rates allow proposal of an evolutionary classification of the 15
2269 archaeal codes into three main classes according to this model. In
2270 almost all the cases, they agree with the actual degeneracy of the
2271 genetic code with substitutions more frequent in the third trinucleotide
2272 site and with transitions more frequent that transversions in any
2273 trinucleotide site.},
2274 doi = {10.1016/j.compbiolchem.2005.09.001},
2275 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2276 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2277 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2278 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2279 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2281 medline-pst = {ppublish},
2283 pii = {S1476-9271(05)00083-6},
2285 timestamp = {2011.05.05},
2286 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2289 @INPROCEEDINGS{fgb11:ip,
2290 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2291 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2292 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2295 address = {Sevilla, Spain},
2298 classement = {ACTI},
2299 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2305 author = {Alain Frisch},
2306 title = {Entropie topologique et définition du chaos},
2308 note = {Rapport de tipe},
2309 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2310 keywords = {Chaos, Entropie Topologique, Tipe},
2312 timestamp = {2008.01.02},
2313 url = {http://alain.frisch.fr/math.html}
2317 author = {Alain Frisch},
2318 title = {Entropie topologique et définition du chaos},
2320 note = {[En ligne; Page disponible le 12-août-2010]},
2321 url = {\url{http://alain.frisch.fr/math.html}}
2324 @ARTICLE{Frommer97asynchronousweighted,
2325 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2326 title = {Asynchronous Weighted Additive Schwarz Methods},
2327 journal = {Electronic Transactions on Numerical Analysis},
2333 @MISC{Frommer94asynchronoustwo-stage,
2334 author = {Andreas Frommer and Daniel B. Szyld},
2335 title = {Asynchronous Two-Stage Iterative Methods},
2340 title = {Introduction to Chaos and Coherence},
2341 publisher = {IOP Publishing},
2343 author = {J. Frøyland},
2345 timestamp = {2008.01.02}
2349 author = {T. Furon},
2350 title = {Security analysis},
2352 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2354 timestamp = {2009.06.30}
2358 author = {Furon, Teddy and Bas, Patrick},
2359 title = {Broken arrows},
2360 journal = {EURASIP J. Inf. Secur.},
2364 address = {New York, NY, United States},
2365 doi = {http://dx.doi.org/10.1155/2008/597040},
2367 owner = {christophe},
2368 publisher = {Hindawi Publishing Corp.},
2369 timestamp = {2010.03.06}
2372 @ARTICLE{P1150442004,
2373 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2374 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2376 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2382 owner = {christophe},
2383 timestamp = {2010.03.07}
2386 @INPROCEEDINGS{Gentry09,
2387 author = {Gentry, Craig},
2388 title = {Fully homomorphic encryption using ideal lattices},
2389 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2393 address = {New York, NY, USA},
2395 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2396 isbn = {978-1-60558-506-2},
2397 location = {Bethesda, MD, USA}
2400 @INPROCEEDINGS{Girao04,
2401 author = {J. Girao and M. Schneider and D. Westhoff},
2402 title = {CDA: Concealed data aggregation in wireless sensor networks},
2403 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2405 owner = {christophe},
2406 timestamp = {2010.07.31}
2409 @CONFERENCE{Gotsman88,
2410 author = {C. Gotsman and D. Lehmann and E. Shamir},
2411 title = {Asynchronous Dynamics of Random Boolean Networks},
2412 booktitle = {San Diego '88 Neural Networks Conference},
2415 timestamp = {30/03/2008}
2418 @ARTICLE{Guckenheimer1979,
2419 author = {J. Guckenheimer},
2420 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2421 journal = {Comm. Math. Phys.},
2423 optpages = {133-160},
2425 timestamp = {2008.01.02}
2429 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2431 publisher = {Springer Verlag},
2433 author = {J. Guckenheimer and P. Holmes},
2435 timestamp = {2008.01.02}
2438 @ARTICLE{Guo20093201,
2439 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2440 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2442 journal = {Physics Letters A},
2445 pages = {3201 - 3206},
2447 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2448 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2449 in parallel computing environment. We show how to devise forgery
2450 attacks on Xiao's scheme with differential cryptanalysis and give
2451 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2452 we discuss the problem of weak keys in the scheme and demonstrate
2453 how to utilize weak keys to construct collision.},
2455 keywords = {Cryptanalysis}
2458 @PHDTHESIS{GuyeuxThese10,
2459 author = {Christophe Guyeux},
2460 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2461 en s\'{e}curit\'{e} informatique},
2462 school = {Universit\'{e} de Franche-Comt\'{e}},
2464 owner = {christophe},
2465 timestamp = {2010.12.21}
2469 author = {Guyeux, Christophe and Bahi, Jacques},
2470 title = {\'Etude topologique de l'\'etalement de spectre},
2471 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2476 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2481 @INPROCEEDINGS{bg10:ip,
2482 author = {Guyeux, Christophe and Bahi, Jacques},
2483 title = {An improved watermarking algorithm for Internet applications},
2484 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2487 address = {Valencia, Spain},
2489 classement = {ACTI},
2490 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2495 @INPROCEEDINGS{gfb10:ip,
2496 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2497 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2498 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2499 Multimedia Signal Processing},
2502 address = {Darmstadt, Germany},
2504 classement = {ACTI},
2505 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2511 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2512 title = {A more secure information hiding scheme than spread-spectrum obtained
2514 journal = {arXiv 0032565},
2517 timestamp = {2010.04.30}
2521 title = {Guide to Elliptic Curve Cryptography},
2522 publisher = {Springer Professional Computing},
2524 editor = {Springer},
2525 author = {D. Hankerson and A. Menezes and S. Vanstone},
2526 owner = {christophe},
2527 timestamp = {2010.07.31}
2530 @ARTICLE{Hasegawa1985,
2531 author = {M. Hasegawa and H. Kishino and T. Yano},
2532 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2534 journal = {J Mol Evol},
2539 abstract = {A new statistical method for estimating divergence dates of species
2540 from DNA sequence data by a molecular clock approach is developed.
2541 This method takes into account effectively the information contained
2542 in a set of DNA sequence data. The molecular clock of mitochondrial
2543 DNA (mtDNA) was calibrated by setting the date of divergence between
2544 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2545 years ago), when the extinction of dinosaurs occurred. A generalized
2546 least-squares method was applied in fitting a model to mtDNA sequence
2547 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2548 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2549 second of each pair of numbers is the standard deviation) for the
2550 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2551 respectively, from the line leading to humans. Although there is
2552 some uncertainty in the clock, this dating may pose a problem for
2553 the widely believed hypothesis that the pipedal creature Australopithecus
2554 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2555 and at Hadar in Ethiopia, was ancestral to man and evolved after
2556 the human-ape splitting. Another likelier possibility is that mtDNA
2557 was transferred through hybridization between a proto-human and a
2558 proto-chimpanzee after the former had developed bipedalism.},
2559 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2560 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2561 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2564 medline-pst = {ppublish},
2567 timestamp = {2011.05.05}
2571 title = {A First Course in Discrete Dynamical Systems},
2572 publisher = {Springer-Verlag},
2574 author = {R. Homlgren},
2577 timestamp = {2008.01.02}
2580 @INCOLLECTION{Hoque09,
2581 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2582 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2583 Low Resolution Model: A Review},
2584 booktitle = {Biomedical Data and Applications},
2585 publisher = {Springer Berlin Heidelberg},
2587 editor = {Sidhu, Amandeep and Dillon, Tharam},
2589 series = {Studies in Computational Intelligence},
2591 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2594 @CONFERENCE{Houmansadr09,
2595 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2596 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2597 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2599 owner = {christophe},
2600 timestamp = {2010.03.07}
2604 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2605 title = {Secure encrypted-data aggregation for wireless sensor networks},
2606 journal = {Wireless Networks},
2607 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2608 aggregation scheme for wireless sensor networks. Our design for data
2609 aggregation eliminates redundant sensor readings without using encryption
2610 and maintains data secrecy and privacy during transmission. Conventional
2611 aggregation functions operate when readings are received in plaintext.
2612 If readings are encrypted, aggregation requires decryption creating
2613 extra overhead and key management issues. In contrast to conventional
2614 schemes, our proposed scheme provides security and privacy, and duplicate
2615 instances of original readings will be aggregated into a single packet.
2616 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2617 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2618 experiments show that our proposed aggregation method significantly
2619 reduces communication overhead and can be practically implemented
2620 in on-the-shelf sensor platforms.},
2621 citeulike-article-id = {4499496},
2622 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2623 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2624 doi = {10.1007/s11276-009-0177-y},
2625 posted-at = {2009-05-10 09:55:44},
2626 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2630 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2631 title = {Secure encrypted-data aggregation for wireless sensor networks},
2632 journal = {Wirel. Netw.},
2637 address = {Hingham, MA, USA},
2638 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2640 publisher = {Kluwer Academic Publishers}
2644 author = {W. Huang and X. Ye},
2645 title = {Homeomorphisms with the whole compacta being scrambled sets},
2646 journal = {Ergod. Th. Dynam. Systems},
2652 timestamp = {2008.01.02}
2655 @ARTICLE{Hurley1982,
2656 author = {M. Hurley},
2657 title = {Attractors, persistence and density of their bassin},
2658 journal = {Transactions of AMS},
2660 optpages = {247-271},
2663 timestamp = {2008.01.02}
2666 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2667 author = {Islam, Md. Kamrul and Chetty, Madhu},
2668 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2669 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2670 in Artificial Intelligence},
2674 address = {Berlin, Heidelberg},
2675 publisher = {Springer-Verlag},
2677 isbn = {978-3-642-10438-1},
2678 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2679 Pair-wise-interchange, Schema preservation, Tabu Search},
2680 location = {Melbourne, Australia},
2684 @PHDTHESIS{Jacquemard77,
2685 author = {C. Jacquemard},
2686 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2687 school = {Université de Franche-Comté},
2689 owner = {christophe},
2690 timestamp = {2010.08.25}
2694 title = {{Evolution of Protein Molecules}},
2695 publisher = {Academy Press},
2697 editor = {Munro, H. N.},
2698 author = {Jukes, T. H. and Cantor, C. R.},
2699 booktitle = {Evolution of Protein Molecules},
2700 citeulike-article-id = {1673661},
2701 keywords = {compbio, fresco},
2702 posted-at = {2007-09-19 06:23:18},
2706 @INPROCEEDINGS{Kalker2001,
2707 author = {Kalker, T.},
2708 title = {Considerations on watermarking security},
2711 abstract = {In this paper we address the usually implicit assumption that digital
2712 watermarking has as its main target copyright and copy protection
2713 applications. From these target applications a great many conclusions
2714 are drawn about the required security of a watermarking system, and
2715 in fact, a considerably percentage of the watermarking literature
2716 has this very topic as its main focus of attention. In this paper
2717 we take a step back, and try to do a more careful analysis of the
2718 'watermarking-is-for-security-applications' paradigm. The intention
2719 of this paper is to discuss the meaning of the concept security in
2720 the context of watermarking, and try to show that one has to be careful
2721 in using analogies from the related field of cryptography},
2722 citeulike-article-id = {1226513},
2723 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2724 keywords = {security, wateramarking},
2726 posted-at = {2007-04-14 14:30:06},
2728 timestamp = {2009.06.30}
2731 @ARTICLE{Kerckhoffs83,
2732 author = {Kerckhoffs, Auguste},
2733 title = {La cryptographie militaire},
2734 journal = {Journal des sciences militaires},
2739 abstract = {pp. 161–191, Feb. 1883.},
2740 citeulike-article-id = {505508},
2741 keywords = {cryptography, master},
2743 posted-at = {2006-02-15 04:49:15},
2745 timestamp = {2009.06.30}
2749 author = {Kimura, Motoo},
2750 title = {A simple method for estimating evolutionary rates of base substitutions
2751 through comparative studies of nucleotide sequences},
2752 journal = {Journal of Molecular Evolution},
2756 note = {10.1007/BF01731581},
2757 affiliation = {National Institute of Genetics 411 Mishima Japan},
2760 keyword = {Biomedical and Life Sciences},
2761 publisher = {Springer New York},
2762 url = {http://dx.doi.org/10.1007/BF01731581}
2767 title = {Chaos Without Nonperiodicity},
2768 journal = {Amer. Math. Monthly},
2772 timestamp = {27/01/2008}
2775 @PHDTHESIS{Knudsen1994a,
2776 author = {C. Knudsen},
2777 title = {Aspects of noninvertible dynamics and chaos},
2778 school = {Technical University of Denmark},
2781 timestamp = {2008.01.02}
2785 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2786 title = {Discrete Chaos - I: Theory},
2787 journal = {IEEE Trans. on Circuits Systems},
2790 pages = {1300-1309},
2791 owner = {christophe},
2792 timestamp = {2010.10.10}
2795 @INPROCEEDINGS{Kocher95cryptanalysisof,
2796 author = {Paul C. Kocher},
2797 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2798 Timing Attacks (Extended Abstract)},
2799 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2803 publisher = {Springer-Verlag}
2806 @ARTICLE{Kullback1951,
2807 author = {Kullback, Solomon and Leibler, Richard A.},
2808 title = {On Information and Sufficiency},
2809 journal = {The Annals of Mathematical Statistics},
2814 citeulike-article-id = {3245942},
2815 keywords = {file-import-08-09-12},
2817 posted-at = {2008-09-12 14:30:37},
2819 timestamp = {2009.06.29}
2823 author = {Eshter Ledoux},
2824 title = {Introduction à la théorie du chaos},
2826 note = {[En ligne; Page disponible le 12-août-2010]},
2827 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2831 title = {Analyse en dimension finie},
2832 publisher = {Masson},
2838 timestamp = {2008.01.02}
2842 author = {A.K. Lenstra and E.R. Verheul},
2843 title = {Selecting Cryptographic Key Sizes},
2844 journal = {Jour. of the International Association for Cryptologic Research},
2852 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2853 title = {What the Frog's Eye Tells the Frog's Brain},
2854 journal = {Proceedings of the IRE},
2859 owner = {christophe},
2860 timestamp = {2010.12.21}
2864 author = {T. Y. Li and J. A. Yorke},
2865 title = {Period three implies chaos},
2866 journal = {Amer. Math. Monthly},
2872 timestamp = {27/01/2008}
2876 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2877 title = {A novel Hash algorithm construction based on chaotic neural network},
2878 journal = {Neural Computing and Applications},
2881 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2884 keyword = {Computer Science},
2885 publisher = {Springer London}
2888 @INPROCEEDINGS{Lin09,
2889 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2890 title = {Cooperative secure data aggregation in sensor networks using elliptic
2891 curve based cryptosystems},
2892 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2893 design, visualization, and engineering},
2896 address = {Berlin, Heidelberg},
2897 publisher = {Springer-Verlag},
2898 isbn = {3-642-04264-3, 978-3-642-04264-5},
2899 location = {Luxembourg, Luxembourg}
2902 @INPROCEEDINGS{Liu2008,
2903 author = {Liu, An and Ning, Peng},
2904 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2905 Wireless Sensor Networks},
2906 booktitle = {7th International Conference on Information Processing in Sensor
2907 Networks (IPSN 2008)},
2911 citeulike-article-id = {3041699},
2912 howpublished = {SPOTS Track},
2914 posted-at = {2008-07-25 05:25:05},
2918 @ARTICLE{Liu2007bis,
2919 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2920 title = {An image fragile watermark scheme based on chaotic image pattern
2922 journal = {Applied Mathematics and Computation},
2927 timestamp = {2008.10.07}
2930 @INPROCEEDINGS{Liu07,
2931 author = {Liu, Zhen and Xi, Lifeng},
2932 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2933 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2934 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2935 of the 11th International Conference},
2938 address = {Berlin, Heidelberg},
2939 publisher = {Springer-Verlag},
2940 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
2941 isbn = {978-3-540-74826-7},
2942 location = {Vietri sul Mare, Italy}
2946 author = {Zhen Liu and Lifeng Xi},
2947 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2953 timestamp = {11/04/2008}
2956 @ARTICLE{Lubachevsky86,
2957 author = {Lubachevsky, Boris and Mitra, Debasis},
2958 title = {A chaotic asynchronous algorithm for computing the fixed point of
2959 a nonnegative matrix of unit spectral radius},
2965 address = {New York, NY, USA},
2966 doi = {http://doi.acm.org/10.1145/4904.4801},
2972 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
2973 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
2974 journal = {{N}ature },
2980 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
2981 bench-top platform to study a wide range of nonlinear dynamic systems,
2982 from ultrastable clocks to complex chaotic devices.},
2983 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
2984 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
2985 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
2986 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
2987 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
2988 audience = {internationale },
2990 doi = {10.1038/465041a },
2991 hal_id = {hal-00517696},
2992 language = {{A}nglais},
2993 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
2996 @INPROCEEDINGS{Mahoney00,
2997 author = {Mahoney, Matthew V.},
2998 title = {Fast Text Compression with Neural Networks},
2999 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
3000 Research Society Conference},
3003 publisher = {AAAI Press},
3005 isbn = {1-57735-113-4},
3009 @INPROCEEDINGS{msp10:bl,
3010 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
3011 title = {Risk Management in Intrusion Detection Applications with Wireless
3012 Video Sensor Networks},
3013 booktitle = {WCNC'10 IEEE Int. Conf.},
3016 address = {Sydney, Australia},
3025 author = {H.S. Malvar and D. Florêncio},
3026 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3027 journal = {IEEE Trans. Signal Proceeding},
3031 owner = {christophe},
3032 timestamp = {2010.03.07}
3035 @ARTICLE{Marsaglia2003,
3036 author = {G. Marsaglia},
3037 title = {Xorshift RNGs},
3038 journal = {Journal of Statistical Software},
3043 timestamp = {2009.10.28}
3046 @ARTICLE{Marsaglia1996,
3047 author = {G. Marsaglia},
3048 title = {DIEHARD: a battery of tests of randomness.},
3049 journal = {http://stat.fsu.edu/~geo/diehard.html},
3052 timestamp = {2009.11.09}
3055 @ARTICLE{Simard07testu01:a,
3056 author = {Richard Simard and Université De Montréal},
3057 title = {TestU01: A C library for empirical testing of random number generators},
3058 journal = {ACM Transactions on Mathematical Software},
3063 @ARTICLE{DefiningChaos,
3064 author = {M. Martelli and M. Dang and T. Seph},
3065 title = {Defining chaos},
3066 journal = {Mathematics Magazine},
3070 owner = {christophe},
3071 timestamp = {2010.08.11}
3074 @ARTICLE{Michel2007c,
3075 author = {Christian J Michel},
3076 title = {An analytical model of gene evolution with 9 mutation parameters:
3077 an application to the amino acids coded by the common circular code.},
3078 journal = {Bull Math Biol},
3084 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3085 mutation matrix 64 x 64 with nine substitution parameters associated
3086 with the three types of substitutions in the three trinucleotide
3087 sites. It generalizes the previous models based on the nucleotide
3088 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3089 x 64 with three and six parameters. It determines at some time t
3090 the exact occurrence probabilities of trinucleotides mutating randomly
3091 according to these nine substitution parameters. An application of
3092 this model allows an evolutionary study of the common circular code
3093 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3094 amino acids. The main property of this code [Formula: see text] is
3095 the retrieval of the reading frames in genes, both locally, i.e.
3096 anywhere in genes and in particular without a start codon, and automatically
3097 with a window of a few nucleotides. However, since its identification
3098 in 1996, amino acid information coded by [Formula: see text] has
3099 never been studied. Very unexpectedly, this evolutionary model demonstrates
3100 that random substitutions in this code [Formula: see text] and with
3101 particular values for the nine substitutions parameters retrieve
3102 after a certain time of evolution a frequency distribution of these
3103 12 amino acids very close to the one coded by the actual genes.},
3104 doi = {10.1007/s11538-006-9147-z},
3105 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3106 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3107 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3108 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3109 Molecular; Models, Genetic; Prokaryotic Cells},
3111 medline-pst = {ppublish},
3114 timestamp = {2011.05.05},
3115 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3119 author = {J.-C. Miellou},
3120 title = {Algorithmes de relaxation chaotique \`{a} retards},
3126 timestamp = {2008.05.22}
3129 @ARTICLE{Miellou75b,
3130 author = {Miellou, J.-C.},
3131 title = {Itérations chaotiques à retards, étude de la convergence dans le
3132 cas d'espaces partiellement ordonnés},
3133 journal = {C.R.A.S. Paris},
3137 owner = {christophe},
3138 timestamp = {2010.08.17}
3142 author = {Jean-Claude Miellou and Pierre Spitéri},
3143 title = {Un critère de convergence pour des méthodes générales de point fixe},
3144 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3149 owner = {christophe},
3150 timestamp = {2010.10.13}
3154 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3155 title = {A comparative study of chaotic and white noise signals in digital
3157 journal = {Chaos, Solitons and Fractals},
3161 owner = {christophe},
3162 timestamp = {2010.03.01}
3165 @ARTICLE{Nakashima2003,
3166 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3167 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3169 journal = {IEEE Transactions on Multimedia},
3171 note = {Accepted for future publication Multimedia}
3174 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3175 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3177 title = {SVD-Based Ghost Circuitry Detection},
3178 booktitle = {Information Hiding},
3179 publisher = {Springer Berlin / Heidelberg},
3181 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3183 series = {Lecture Notes in Computer Science},
3185 note = {10.1007/978-3-642-04431-1_16},
3186 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3187 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3190 @INPROCEEDINGS{Perez-Hernandez09,
3191 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3192 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3193 title = {Parallel particle swarm optimization applied to the protein folding
3195 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3198 series = {GECCO '09},
3199 pages = {1791--1792},
3200 address = {New York, NY, USA},
3203 isbn = {978-1-60558-325-9},
3204 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3205 parallelization, swarm intelligence},
3206 location = {Montreal, Qu\&\#233;bec, Canada},
3210 @PHDTHESIS{Pellegrin1986,
3211 author = {D. Pellegrin},
3212 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3213 school = {Grenoble},
3216 timestamp = {2008.05.22}
3220 author = {F. Peng and S.-S. Qiu and M. Long},
3221 title = {One way Hash function construction based on two-dimensional hyperchaotic
3223 journal = {Acta Phys. Sinici.},
3228 timestamp = {2009.01.16}
3231 @INPROCEEDINGS{Perez06,
3232 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3233 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3235 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3237 editor = {Edward J. Delp and Ping W. Wong},
3238 address = {San Jose, California, USA},
3240 organization = {SPIE},
3242 timestamp = {2009.06.30}
3245 @INPROCEEDINGS{Perez-Freire06,
3246 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3247 and Fernando Perez-Gonzalez},
3248 title = {Watermarking Security: a Survey},
3249 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3252 timestamp = {2009.06.29}
3255 @PROCEEDINGS{Peter07,
3256 title = {On Concealed Data Aggregation for WSNs},
3258 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3259 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3261 citeulike-article-id = {2281643},
3262 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3263 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3264 doi = {10.1109/CCNC.2007.45},
3265 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3269 posted-at = {2008-01-23 19:36:19},
3271 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3275 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3276 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3277 Networks for Critical Surveillance Applications},
3278 journal = {Journal of Network and Computer Applications},
3283 note = {Accepted manuscript. To appear},
3284 classement = {ACLI},
3286 impact-factor = {1.111},
3288 isi-acro = {J NETW COMPU APPL},
3289 publisher = {Springer}
3293 author = {Edgar Alan Poe},
3294 title = {The Raven},
3297 note = {American Museum (Baltimore)},
3298 owner = {christophe},
3299 timestamp = {2010.11.23}
3302 @ARTICLE{Perez-Freire2006:Security,
3303 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3305 title = {Security of lattice-based data hiding against the known message attack},
3306 journal = {IEEE Trans. on Information Forensics and Security},
3313 timestamp = {2009.12.06}
3316 @MISC{Quisquater02sidechannel,
3317 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3319 title = {Side Channel Cryptanalysis},
3323 @ARTICLE{Raynal2001,
3324 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3325 title = {Evaluation automatique des méthodes de tatouage},
3326 journal = {Traitement du signal},
3331 timestamp = {2008.05.21}
3335 author = {Vincent Rijmen and Elisabeth Oswald},
3336 title = {Update on SHA-1},
3337 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3339 note = {\url{http://eprint.iacr.org/}}
3343 title = {Discrete Iterations, a Metric Study},
3344 publisher = {Springer-Verlag},
3346 editor = {Berlin Heidelberg New-York},
3347 author = {François Robert},
3349 series = {Series in Computational Mathematics}
3353 title = {Discrete Iterations: A Metric Study},
3355 editor = {Springer-Verlag},
3356 author = {F. Robert},
3358 series = {Springer Series in Computational Mathematics},
3360 timestamp = {17/02/2008}
3364 author = {Rudenko, O. and Snytkin, M.},
3365 title = {Image compression based on the neural network art},
3366 journal = {Cybernetics and Systems Analysis},
3370 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3373 keyword = {Computer Science},
3374 publisher = {Springer New York}
3377 @PHDTHESIS{Ruette2001,
3378 author = {Sylvie Ruette},
3379 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3380 mesures d'entropie maximale},
3381 school = {Université d'Aix-Marseille II},
3383 optmonth = {Novembre},
3385 timestamp = {2008.01.02}
3388 @MASTERSTHESIS{Saulnier02,
3389 author = {Boris Saulnier},
3390 title = {Entropie topologique},
3391 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3393 owner = {christophe},
3394 timestamp = {2010.08.12}
3397 @ARTICLE{Schmitz2001,
3398 author = {Roland Schmitz},
3399 title = {Use of chaotic dynamical systems in cryptography},
3400 journal = {Journal of Franklin Institute},
3405 timestamp = {17/02/2008}
3409 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3410 publisher = {Hermann},
3413 author = {Laurent Schwartz},
3414 owner = {christophe},
3415 timestamp = {2010.09.15}
3419 author = {Shannon, Claude E.},
3420 title = {Communication Theory of Secrecy Systems},
3421 journal = {Bell Systems Technical Journal},
3425 citeulike-article-id = {507362},
3426 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3427 theory\_cryptography},
3429 posted-at = {2006-02-16 23:24:09},
3431 timestamp = {2009.06.29}
3434 @ARTICLE{Shmygelska05,
3435 author = {Shmygelska, Alena and Hoos, Holger},
3436 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3437 polar protein folding problem},
3438 journal = {BMC Bioinformatics},
3443 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3444 computational molecular biology and biochemical physics. Various
3445 optimisation methods have been applied to formulations of the ab-initio
3446 folding problem that are based on reduced models of protein structure,
3447 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3448 and hybrid approaches. In our work, we have introduced an ant colony
3449 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3450 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3451 from its amino acid sequence under a widely studied, conceptually
3452 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3453 (HP) model.RESULTS:We present an improvement of our previous ACO
3454 algorithm for the 2D HP model and its extension to the 3D HP model.
3455 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3456 than previous state-of-the-art algorithms on sequences whose native
3457 conformations do not contain structural nuclei (parts of the native
3458 fold that predominantly consist of local interactions) at the ends,
3459 but rather in the middle of the sequence, and that it generally finds
3460 a more diverse set of native conformations.CONCLUSIONS:The application
3461 of ACO to this bioinformatics problem compares favourably with specialised,
3462 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3463 our empirical results indicate that our rather simple ACO algorithm
3464 scales worse with sequence length but usually finds a more diverse
3465 ensemble of native states. Therefore the development of ACO algorithms
3466 for more complex and realistic models of protein structure holds
3467 significant promise.},
3468 doi = {10.1186/1471-2105-6-30},
3470 pubmedid = {15710037}
3473 @OTHER{Shmygelska2005Feb,
3474 __markedentry = {[christophe]},
3475 abstract = {Abstract Background The protein folding problem is a fundamental problems
3476 in computational molecular biology and biochemical physics. Various
3477 optimisation methods have been applied to formulations of the ab-initio
3478 folding problem that are based on reduced models of protein structure,
3479 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3480 and hybrid approaches. In our work, we have introduced an ant colony
3481 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3482 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3483 from its amino acid sequence under a widely studied, conceptually
3484 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3485 (HP) model. Results We present an improvement of our previous ACO
3486 algorithm for the 2D HP model and its extension to the 3D HP model.
3487 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3488 than previous state-of-the-art algorithms on sequences whose native
3489 conformations do not contain structural nuclei (parts of the native
3490 fold that predominantly consist of local interactions) at the ends,
3491 but rather in the middle of the sequence, and that it generally finds
3492 a more diverse set of native conformations. Conclusions The application
3493 of ACO to this bioinformatics problem compares favourably with specialised,
3494 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3495 our empirical results indicate that our rather simple ACO algorithm
3496 scales worse with sequence length but usually finds a more diverse
3497 ensemble of native states. Therefore the development of ACO algorithms
3498 for more complex and realistic models of protein structure holds
3499 significant promise.},
3500 author = {Shmygelska, Alena and Hoos, Holger H},
3501 journal = {BMC Bioinformatics. 2005 Feb 14},
3503 owner = {christophe},
3505 timestamp = {2011.01.24},
3506 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3507 polar protein folding problem},
3513 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3514 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3515 Their Roles in Cryptography and Pseudo-Random Coding},
3516 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3521 owner = {christophe},
3522 timestamp = {2010.03.06}
3525 @INPROCEEDINGS{Simmons83,
3526 author = {Gustavus J. Simmons},
3527 title = {The Prisoners' Problem and the Subliminal Channel},
3528 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3531 bibsource = {DBLP, http://dblp.uni-trier.de},
3533 timestamp = {2009.06.29}
3536 @ARTICLE{Solak2004389,
3537 author = {Ercan Solak},
3538 title = {On the security of a class of discrete-time chaotic cryptosystems},
3539 journal = {Physics Letters A},
3542 pages = {389 - 395},
3544 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3546 keywords = {Communication using chaos},
3548 timestamp = {2009.12.12},
3549 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3552 @PHDTHESIS{Spiteri74,
3553 author = {Pierre Spitéri},
3554 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3555 systemes differentiels non lineaires},
3556 school = {Université de Franche-Comté},
3558 owner = {christophe},
3559 timestamp = {2010.10.13}
3563 title = {Does God Play Dices ?: the mathematics of chaos},
3564 publisher = {Penguin},
3566 author = {Ian Stewart},
3568 timestamp = {2008.01.02}
3572 title = {Cryptography: Theory and Practice, Second Edition},
3573 publisher = {{Chapman \& Hall/CRC}},
3575 author = {Stinson, Douglas R.},
3577 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3578 a mathematically intensive examination of cryptography, including
3579 ciphers, the Data Encryption Standard (DES), public key cryptography,
3580 one-way hash functions, and digital signatures. Stinson's explication
3581 of "zero-sum proofs"--a process by which one person lets another
3582 person know that he or she has a password without actually revealing
3583 any information--is especially good.<P> If you are new to the math
3584 behind cryptography but want to tackle it, the author covers all
3585 of the required background to understand the real mathematics here.
3586 <I>Cryptography</I> includes extensive exercises with each chapter
3587 and makes an ideal introduction for any math-literate person willing
3588 to get acquainted with this material.} {<P>Major advances over the
3589 last five years precipitated this major revision of the bestselling
3590 Cryptography: Theory and Practice. With more than 40 percent new
3591 or updated material, the second edition now provides an even more
3592 comprehensive treatment of modern cryptography. It focuses on the
3593 new Advanced Encryption Standards and features an entirely new chapter
3594 on that subject. Another new chapter explores the applications of
3595 secret sharing schemes, including ramp schemes, visual cryptography,
3596 threshold cryptography, and broadcast encryption. This is an ideal
3597 introductory text for both computer science and mathematics students
3598 and a valuable reference for professionals.</P>}},
3599 citeulike-article-id = {2401855},
3601 howpublished = {Hardcover},
3602 isbn = {1584882069},
3603 keywords = {security},
3604 posted-at = {2008-02-20 08:28:49},
3606 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3609 @INPROCEEDINGS{Takana90,
3610 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3611 title = {Embedding Secret Information into a Dithered Multi-level Image},
3612 booktitle = {IEEE Military Communications Conference},
3614 owner = {christophe},
3615 timestamp = {2010.08.05}
3618 @PHDTHESIS{ElTarazi81,
3619 author = {M. N. El Tarazi},
3620 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3621 et asynchrones en analyse numérique},
3622 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3625 owner = {christophe},
3626 timestamp = {2010.08.17}
3629 @INPROCEEDINGS{Unger93,
3630 author = {Unger, Ron and Moult, John},
3631 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3632 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3635 address = {San Francisco, CA, USA},
3636 publisher = {Morgan Kaufmann Publishers Inc.},
3638 isbn = {1-55860-299-2},
3642 @MISC{Van93electronicwater,
3643 author = {Tirkel Rankin Van},
3644 title = {Electronic Water Mark},
3648 @ARTICLE{Venkatesan2007397,
3649 author = {R.C. Venkatesan},
3650 title = {Encryption of covert information into multiple statistical distributions},
3651 journal = {Physics Letters A},
3654 pages = {397 - 404},
3656 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3658 keywords = {Statistical encryption/decryption},
3660 timestamp = {2009.12.12},
3661 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3665 author = {G. Voyatzis and I. Pitas},
3666 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3667 journal = {Proceedings of IEEE ICIP},
3671 owner = {christophe},
3672 timestamp = {2010.03.06}
3675 @INCOLLECTION{Wagner03,
3676 author = {Wagner, David},
3677 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3678 booktitle = {Information Security},
3679 publisher = {Springer Berlin, Heidelberg},
3682 series = {Lecture Notes in Computer Science},
3684 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3685 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3686 affiliation = {University of California, Berkeley USA}
3689 @INPROCEEDINGS{Wagner03cryptanalysisof,
3690 author = {David Wagner},
3691 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3692 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3697 @ARTICLE{Wang_ellipticcurve,
3698 author = {Haodong Wang and Bo Sheng and Qun Li},
3699 title = {Elliptic curve cryptography-based access control in sensor networks},
3700 journal = {Int. J. Security and Networks}
3703 @INPROCEEDINGS{wbg10:ip,
3704 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3706 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3708 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3711 address = {Valencia, Spain},
3713 publisher = {IEEE Computer Society Press},
3714 note = {Best Paper award},
3715 classement = {ACTI},
3716 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3722 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3723 title = {One-way hash function construction based on the extended chaotic
3725 journal = {Acta Phys. Sinici.},
3727 volume = {52, No. 11},
3728 pages = {2737--2742},
3730 timestamp = {2009.01.16}
3734 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3735 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3736 Networks: Encryption, Key Distribution, and Routing Adaptation},
3737 journal = {IEEE Transactions on Mobile Computing},
3740 pages = {1417--1431},
3742 address = {Piscataway, NJ, USA},
3743 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3745 publisher = {IEEE Educational Activities Department}
3749 author = {Wikipédia},
3750 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3752 note = {[En ligne; Page disponible le 9-septembre-2010]},
3753 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3757 author = {Wikipédia},
3758 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3760 note = {[En ligne; Page disponible le 9-août-2010]},
3761 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3765 author = {Wikipédia},
3766 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3768 note = {[En ligne; Page disponible le 8-août-2010]},
3769 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3773 author = {Wikipédia},
3774 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3776 note = {[En ligne; Page disponible le 5-août-2010]},
3777 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3780 @MISC{wiki:Kerkhoffs,
3781 author = {Wikipédia},
3782 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3784 note = {[En ligne; Page disponible le 20-août-2010]},
3785 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3788 @MISC{wiki:sarkovskii,
3789 author = {Wikipédia},
3790 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3792 note = {[En ligne; Page disponible le 8-août-2010]},
3793 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3796 @MISC{wiki:steganographie,
3797 author = {Wikipédia},
3798 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3800 note = {[En ligne; Page disponible le 5-août-2010]},
3801 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3804 @MISC{wiki:tatouage,
3805 author = {Wikipédia},
3806 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3808 note = {[En ligne; Page disponible le 5-août-2010]},
3809 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3812 @MISC{wiki:testsHypothese,
3813 author = {Wikipédia},
3814 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3816 note = {[En ligne; Page disponible le 5-août-2010]},
3817 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3821 author = {Xianyong Wu and Zhi-Hong Guan},
3822 title = {A novel digital watermark algorithm based on chaotic maps},
3823 journal = {Physics Letters A},
3826 pages = {403 - 406},
3828 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3830 keywords = {Watermarking},
3831 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3834 @INPROCEEDINGS{Wu2007,
3835 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3836 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3837 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3841 address = {Berlin, Heidelberg},
3842 publisher = {Springer-Verlag},
3843 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3844 isbn = {978-3-540-72392-9},
3845 location = {Nanjing, China}
3848 @ARTICLE{Xiao20092288,
3849 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3850 title = {Parallel keyed hash function construction based on chaotic neural
3852 journal = {Neurocomputing},
3855 pages = {2288 - 2296},
3857 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3858 in Intelligent Systems Designn (ISDA 2007)},
3859 abstract = {Recently, various hash functions based on chaos or neural networks
3860 were proposed. Nevertheless, none of them works efficiently in parallel
3861 computing environment. In this paper, an algorithm for parallel keyed
3862 hash function construction based on chaotic neural network is proposed.
3863 The mechanism of changeable-parameter and self-synchronization establishes
3864 a close relation between the hash value bit and message, and the
3865 algorithm structure ensures the uniform sensitivity of the hash value
3866 to the message blocks at different positions. The proposed algorithm
3867 can satisfy the performance requirements of hash function. These
3868 properties make it a promising choice for hashing on parallel computing
3871 keywords = {Chaotic neural network}
3874 @ARTICLE{Xiao20094346,
3875 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3876 title = {Improving the security of a parallel keyed hash function based on
3878 journal = {Physics Letters A},
3881 pages = {4346 - 4353},
3884 keywords = {Hash function},
3886 timestamp = {2009.12.12}
3889 @ARTICLE{Xiao20102254,
3890 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3891 title = {A chaos-based hash function with both modification detection and
3892 localization capabilities},
3893 journal = {Communications in Nonlinear Science and Numerical Simulation},
3896 pages = {2254 - 2261},
3898 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3899 Nevertheless, none of them can realize modification localization.
3900 In this paper, a hash function with both modification detection and
3901 localization capabilities is proposed, which can also support the
3902 parallel processing mode. By using the mechanism of changeable-parameter
3903 and self-synchronization, the keystream can establish a close relation
3904 with the algorithm key, the content, and the order of each message
3905 unit. Theoretical analysis and computer simulation indicate that
3906 the proposed algorithm can satisfy the performance requirements of
3909 keywords = {Hash function}
3912 @INPROCEEDINGS{Yu06,
3913 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3914 title = {A Study on the Security of Privacy Homomorphism},
3915 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3916 Technology: New Generations},
3919 address = {Washington, DC, USA},
3920 publisher = {IEEE Computer Society},
3921 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3922 isbn = {0-7695-2497-4}
3925 @ARTICLE{Zhang2008658,
3926 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3927 title = {Secure data aggregation in wireless sensor networks: A watermark
3928 based authentication supportive approach},
3929 journal = {Pervasive and Mobile Computing},
3932 pages = {658 - 680},
3934 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3936 keywords = {Wireless sensor networks},
3937 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
3941 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
3942 title = {TASSER: An automated method for the prediction of protein tertiary
3943 structures in CASP6},
3944 journal = {Proteins},
3950 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
3951 owner = {christophe},
3952 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
3953 timestamp = {2011.01.22},
3954 url = {http://dx.doi.org/10.1002/prot.20724}
3957 @ARTICLE{Zhou1997429,
3958 author = {Chang-song Zhou and Tian-lun Chen},
3959 title = {Extracting information masked by chaos and contaminated with noise:
3960 Some considerations on the security of communication approaches using
3962 journal = {Physics Letters A},
3965 pages = {429 - 435},
3968 keywords = {Communication},
3970 timestamp = {2009.12.12}
3974 author = {Zhou, Huai-bei and Wang, Lu},
3975 title = {Chaos in Biomolecular Dynamics},
3976 journal = {The Journal of Physical Chemistry},
3979 pages = {8101-8105},
3981 doi = {10.1021/jp953409x}
3984 @PROCEEDINGS{DBLP:conf/iwdw/2005,
3985 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
3987 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
3989 series = {Lecture Notes in Computer Science},
3990 address = {Siena, Italy},
3991 publisher = {Springer},
3992 month = {September 15-17},
3993 bibsource = {DBLP, http://dblp.uni-trier.de},
3995 isbn = {3-540-28768-X},
3997 timestamp = {2009.06.29}
4000 @PROCEEDINGS{DBLP:conf/ih/2006,
4001 title = {IH 2006: Information Hiding, 8th International Workshop},
4003 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
4006 series = {Lecture Notes in Computer Science},
4007 address = {Alexandria, VA, USA},
4008 publisher = {Springer},
4010 bibsource = {DBLP, http://dblp.uni-trier.de},
4011 booktitle = {Information Hiding},
4012 isbn = {978-3-540-74123-7},
4014 timestamp = {2009.06.29}
4017 @PROCEEDINGS{DBLP:conf/ih/2007,
4018 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4019 France, June 11-13, 2007, Revised Selected Papers},
4021 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4024 series = {Lecture Notes in Computer Science},
4025 publisher = {Springer},
4026 bibsource = {DBLP, http://dblp.uni-trier.de},
4027 booktitle = {Information Hiding},
4028 isbn = {978-3-540-77369-6},
4030 timestamp = {2009.06.29}
4033 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4034 title = {Computational Science and Its Applications - ICCSA 2006, International
4035 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4037 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4038 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4039 Mun and Hyunseung Choo},
4041 series = {Lecture Notes in Computer Science},
4042 publisher = {Springer},
4043 bibsource = {DBLP, http://dblp.uni-trier.de},
4044 booktitle = {ICCSA (1)},
4045 isbn = {3-540-34070-X}
4048 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4049 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4050 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4051 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4053 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4054 publisher = {SciTePress},
4055 bibsource = {DBLP, http://dblp.uni-trier.de},
4056 booktitle = {SECRYPT},
4057 isbn = {978-989-8425-18-8}
4060 @BOOK{Katzenbeisser00,
4061 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4062 publisher = {Artech House, Inc.},
4064 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4065 address = {Norwood, MA, USA},
4069 @PROCEEDINGS{DBLP:conf/ih/1999,
4070 title = {IH'99: 3rd International Workshop on Information Hiding},
4072 editor = {Andreas Pfitzmann},
4074 series = {Lecture Notes in Computer Science},
4075 address = {Dresden, Germany},
4076 publisher = {Springer},
4077 month = {September 29 - October 1.},
4078 bibsource = {DBLP, http://dblp.uni-trier.de},
4079 booktitle = {Information Hiding},
4080 isbn = {3-540-67182-X},
4082 timestamp = {2009.06.29}
4085 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4086 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4087 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4089 editor = {Bimal K. Roy and Eiji Okamoto},
4091 series = {Lecture Notes in Computer Science},
4092 publisher = {Springer},
4093 bibsource = {DBLP, http://dblp.uni-trier.de},
4094 booktitle = {INDOCRYPT},
4095 isbn = {3-540-41452-5}
4098 @BOOK{DBLP:reference/icsec/2010,
4099 title = {Handbook of Information and Communication Security},
4100 publisher = {Springer},
4102 editor = {Peter P. Stavroulakis and Mark Stamp},
4103 bibsource = {DBLP, http://dblp.uni-trier.de},
4104 booktitle = {Handbook of Information and Communication Security},
4105 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4106 isbn = {978-3-642-04116-7}
4109 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4110 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4111 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4114 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4116 series = {Lecture Notes in Computer Science},
4117 publisher = {Springer},
4118 bibsource = {DBLP, http://dblp.uni-trier.de},
4119 booktitle = {ISNN (2)},
4120 isbn = {3-540-22843-8}
4123 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4124 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4125 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4127 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4129 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4130 and Telecommunications Engineering},
4131 publisher = {Springer},
4132 bibsource = {DBLP, http://dblp.uni-trier.de},
4133 booktitle = {ADHOCNETS},
4134 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4135 isbn = {978-3-642-17993-8}
4140 timestamp = {2011.03.29}
4144 title = {Delicious social bookmarking, http://delicious.com/},
4145 comment = {http://delicious.com/},
4147 url = {http://delicious.com/}
4151 title = {The Frick Collection, http://www.frick.org/},
4152 comment = {http://www.frick.org/},
4154 url = {http://www.frick.org/}
4158 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4159 2010, Barcelona, Spain, 18-23 July 2010},
4162 bibsource = {DBLP, http://dblp.uni-trier.de},
4163 booktitle = {IEEE Congress on Evolutionary Computation}
4166 @PROCEEDINGS{DBLP:conf/cec/2010,
4167 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4168 2010, Barcelona, Spain, 18-23 July 2010},
4171 bibsource = {DBLP, http://dblp.uni-trier.de},
4172 booktitle = {IEEE Congress on Evolutionary Computation}
4175 @PROCEEDINGS{DBLP:conf/date/2010,
4176 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4180 bibsource = {DBLP, http://dblp.uni-trier.de},
4184 @PROCEEDINGS{DBLP:conf/cse/2009,
4185 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4186 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4188 publisher = {IEEE Computer Society},
4189 bibsource = {DBLP, http://dblp.uni-trier.de},
4193 @PROCEEDINGS{DBLP:conf/icumt/2009,
4194 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4195 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4198 bibsource = {DBLP, http://dblp.uni-trier.de},
4202 @PROCEEDINGS{DBLP:conf/focs/2008,
4203 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4204 2008, October 25-28, 2008, Philadelphia, PA, USA},
4206 publisher = {IEEE Computer Society},
4207 bibsource = {DBLP, http://dblp.uni-trier.de},
4211 @comment{jabref-meta: selector_publisher:}
4213 @comment{jabref-meta: selector_author:}
4215 @comment{jabref-meta: selector_journal:}
4217 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4222 @InProceedings{Pang:2008:cec,
4223 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4224 title = "Generating Massive High-Quality Random Numbers using
4226 booktitle = "2008 IEEE World Congress on Computational
4229 editor = "Jun Wang",
4230 address = "Hong Kong",
4231 organization = "IEEE Computational Intelligence Society",
4232 publisher = "IEEE Press",
4236 @Article{LEcuyerS07,
4237 title = "Test{U01}: {A} {C} library for empirical testing of
4238 random number generators",
4239 author = "Pierre L'Ecuyer and Richard J. Simard",
4240 journal = "ACM Trans. Math. Softw",
4244 bibdate = "2007-11-06",
4246 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4247 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4251 author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov},
4252 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4253 journal = {J. Phys. Chem. B},
4257 pages = {5278--5288},
4262 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4263 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4265 @InProceedings{conf/fpga/ThomasHL09,
4266 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4267 parallel processor arrays for random number
4269 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4270 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4271 Symposium on Field Programmable Gate Arrays, {FPGA}
4272 2009, Monterey, California, {USA}, February 22-24,
4274 bibdate = "2010-06-29",
4277 editor = "Paul Chow and Peter Y. K. Cheung",
4278 ISBN = "978-1-60558-410-2",
4280 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4285 @InProceedings{Jenkins96,
4288 booktitle = "IWFSE: International Workshop on Fast Software
4295 title = {Cuda cublas library},
4297 Note = {Version 4.0},
4302 title = {Curand library},
4304 Note = {Version 4.0},
4310 author = {Lenore Blum and Manuel Blum and Michael Shub},
4311 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4312 journal = {SIAM Journal on Computing},
4319 author = {Oded Goldreich},
4321 title = {Foundations of Cryptography: Basic Tools},
4322 publisher = {Cambridge University Press},