1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @INPROCEEDINGS{BattiatoCGG99,
18 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
20 title = {Robust Watermarking for Images Based on Color Manipulation},
21 booktitle = {Information Hiding},
24 bibsource = {DBLP, http://dblp.uni-trier.de},
25 crossref = {DBLP:conf/ih/1999},
27 timestamp = {2009.06.29}
30 @INPROCEEDINGS{ComesanaPP05,
31 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
32 title = {The Return of the Sensitivity Attack},
36 bibsource = {DBLP, http://dblp.uni-trier.de},
37 crossref = {DBLP:conf/iwdw/2005},
38 ee = {http://dx.doi.org/10.1007/11551492_20},
40 timestamp = {2009.06.29}
43 @INPROCEEDINGS{ComesanaPP05bis,
44 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
45 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
47 booktitle = {IH'05: Information Hiding Workshop},
50 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
51 bibsource = {DBLP, http://dblp.uni-trier.de},
52 crossref = {DBLP:conf/ih/2005},
53 ee = {http://dx.doi.org/10.1007/11558859_12},
55 timestamp = {2009.06.30}
58 @INPROCEEDINGS{CongJQZ06,
59 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
60 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
61 booktitle = {ICCSA (1)},
64 bibsource = {DBLP, http://dblp.uni-trier.de},
65 crossref = {DBLP:conf/iccsa/2006-1},
66 ee = {http://dx.doi.org/10.1007/11751540_100}
69 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
70 author = {Stefan Dziembowski and Krzysztof Pietrzak},
71 title = {Leakage-Resilient Cryptography},
75 bibsource = {DBLP, http://dblp.uni-trier.de},
76 crossref = {DBLP:conf/focs/2008},
77 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
80 @INCOLLECTION{Filiol10,
81 author = {Eric Filiol},
82 title = {Viruses and Malware},
83 booktitle = {Handbook of Information and Communication Security},
86 bibsource = {DBLP, http://dblp.uni-trier.de},
87 crossref = {DBLP:reference/icsec/2010},
88 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
91 @INPROCEEDINGS{Filiol00,
92 author = {Eric Filiol},
93 title = {Decimation Attack of Stream Ciphers},
94 booktitle = {INDOCRYPT},
97 bibsource = {DBLP, http://dblp.uni-trier.de},
98 crossref = {DBLP:conf/indocrypt/2000},
99 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
102 @INPROCEEDINGS{Furon05,
103 author = {Teddy Furon},
104 title = {A Survey of Watermarking Security},
108 bibsource = {DBLP, http://dblp.uni-trier.de},
109 crossref = {DBLP:conf/iwdw/2005},
110 ee = {http://dx.doi.org/10.1007/11551492_16},
112 timestamp = {2009.06.29}
115 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
116 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
117 title = {Genetic algorithm feature-based resampling for protein structure
119 booktitle = {IEEE Congress on Evolutionary Computation},
122 bibsource = {DBLP, http://dblp.uni-trier.de},
123 crossref = {DBLP:conf/cec/2010},
124 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
127 @INPROCEEDINGS{Higgs2010,
128 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
129 title = {Genetic algorithm feature-based resampling for protein structure
131 booktitle = {IEEE Congress on Evolutionary Computation},
134 bibsource = {DBLP, http://dblp.uni-trier.de},
135 crossref = {DBLP:conf/cec/2010},
136 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
139 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
140 author = {Dragos Horvath and Camelia Chira},
141 title = {Simplified chain folding models as metaheuristic benchmark for tuning
142 real protein folding algorithms?},
143 booktitle = {IEEE Congress on Evolutionary Computation},
146 bibsource = {DBLP, http://dblp.uni-trier.de},
147 crossref = {DBLP:conf/cec/2010},
148 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
151 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
152 author = {Md. Kamrul Islam and Madhu Chetty},
153 title = {Clustered memetic algorithm for protein structure prediction},
154 booktitle = {IEEE Congress on Evolutionary Computation},
157 bibsource = {DBLP, http://dblp.uni-trier.de},
158 crossref = {DBLP:conf/cec/2010},
159 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
162 @INPROCEEDINGS{Ker06,
163 author = {Andrew D. Ker},
164 title = {Batch Steganography and Pooled Steganalysis},
165 booktitle = {Information Hiding},
168 bibsource = {DBLP, http://dblp.uni-trier.de},
169 crossref = {DBLP:conf/ih/2006},
170 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
172 timestamp = {2009.06.29}
175 @INPROCEEDINGS{Lin2009,
176 author = {H.-Y. Lin and T.-C. Chiang},
177 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
178 Curve Based Cryptosystems},
182 bibsource = {DBLP, http://dblp.uni-trier.de},
183 crossref = {DBLP:conf/cdve/2009},
184 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
187 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
188 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
189 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
191 booktitle = {CSE (2)},
194 bibsource = {DBLP, http://dblp.uni-trier.de},
195 crossref = {DBLP:conf/cse/2009},
196 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
199 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
200 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
201 title = {Coverage and adaptive scheduling algorithms for criticality management
202 on video wireless sensor networks},
206 bibsource = {DBLP, http://dblp.uni-trier.de},
207 crossref = {DBLP:conf/icumt/2009},
208 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
211 @INPROCEEDINGS{Mittelholzer99,
212 author = {Thomas Mittelholzer},
213 title = {An Information-Theoretic Approach to Steganography and Watermarking},
214 booktitle = {Information Hiding},
217 bibsource = {DBLP, http://dblp.uni-trier.de},
218 crossref = {DBLP:conf/ih/1999},
220 timestamp = {2009.06.29}
223 @INPROCEEDINGS{PellegriniBA10,
224 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
225 title = {Fault-based attack of RSA authentication},
229 bibsource = {DBLP, http://dblp.uni-trier.de},
230 crossref = {DBLP:conf/date/2010},
231 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
234 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
235 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
236 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
237 title = {Estimation of 3D Protein Structure by means of parallel Particle
239 booktitle = {IEEE Congress on Evolutionary Computation},
242 bibsource = {DBLP, http://dblp.uni-trier.de},
243 crossref = {DBLP:conf/cec/2010},
244 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
247 @INPROCEEDINGS{WangNHZH07,
248 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
250 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
251 and Embedding Optimization},
252 booktitle = {Information Hiding},
255 bibsource = {DBLP, http://dblp.uni-trier.de},
256 crossref = {DBLP:conf/ih/2007},
257 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
259 timestamp = {2009.06.29}
262 @INPROCEEDINGS{Zhao04,
263 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
265 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
267 booktitle = {ISNN (2)},
270 bibsource = {DBLP, http://dblp.uni-trier.de},
271 crossref = {DBLP:conf/isnn/2004-2},
272 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
275 @INPROCEEDINGS{Acharya05securecomparison,
276 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
277 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
278 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
279 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
282 address = {Washington, DC, USA},
283 publisher = {IEEE Computer Society},
284 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
285 isbn = {0-7695-2267-X}
288 @INPROCEEDINGS{Acimez07onthe,
289 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
290 title = {On the power of simple branch prediction analysis },
291 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
295 publisher = {ACM Press}
299 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
300 title = {Topological entropy},
301 journal = {Trans. Amer. Math. Soc.},
306 timestamp = {2008.05.29}
309 @INPROCEEDINGS{Agrawal04,
310 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
312 title = {Order preserving encryption for numeric data},
313 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
314 on Management of data},
317 address = {New York, NY, USA},
319 doi = {http://doi.acm.org/10.1145/1007568.1007632},
320 isbn = {1-58113-859-8},
321 location = {Paris, France}
324 @ARTICLE{Anfinsen20071973,
325 author = {Anfinsen, Christian B.},
326 title = {Principles that Govern the Folding of Protein Chains},
332 doi = {10.1126/science.181.4096.223},
333 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
334 url = {http://www.sciencemag.org/content/181/4096/223.short}
338 author = {D. G. Arques and C. J. Michel},
339 title = {Analytical expression of the purine/pyrimidine autocorrelation function
340 after and before random mutations.},
341 journal = {Math Biosci},
347 abstract = {The mutation process is a classical evolutionary genetic process.
348 The type of mutations studied here is the random substitutions of
349 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
350 or thymine) and reciprocally (transversions). The analytical expressions
351 derived allow us to analyze in genes the occurrence probabilities
352 of motifs and d-motifs (two motifs separated by any d bases) on the
353 R/Y alphabet under transversions. These motif probabilities can be
354 obtained after transversions (in the evolutionary sense; from the
355 past to the present) and, unexpectedly, also before transversions
356 (after back transversions, in the inverse evolutionary sense, from
357 the present to the past). This theoretical part in Section 2 is a
358 first generalization of a particular formula recently derived. The
359 application in Section 3 is based on the analytical expression giving
360 the autocorrelation function (the d-motif probabilities) before transversions.
361 It allows us to study primitive genes from actual genes. This approach
362 solves a biological problem. The protein coding genes of chloroplasts
363 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
364 (maximum of the autocorrelation function for d = 6, N = R or Y) with
365 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
366 the periodicity modulo 3 is also observed in the RNA coding genes
367 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
368 genes (introns and 5' regions of eukaryotic nuclei). However, there
369 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
370 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
371 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
372 3. When we go backward in time with the analytical expression, the
373 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
374 the YRY(N)6YRY preferential occurrence with a periodicity modulo
375 3 after 0.2 back transversions per base. In other words, the actual
376 protein coding genes of chloroplasts and mitochondria are similar
377 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
378 On the other hand, this application represents the first result concerning
379 the mutation process in the model of DNA sequence evolution we recently
380 proposed. According to this model, the actual genes on the R/Y alphabet
381 derive from two successive evolutionary genetic processes: an independent
382 mixing of a few nonrandom types of oligonucleotides leading to genes
383 called primitive followed by a mutation process in these primitive
384 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
385 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
387 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
388 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
390 medline-pst = {ppublish},
392 pii = {0025-5564(94)90020-5},
394 timestamp = {2011.05.05}
398 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
399 title = {An evolutionary analytical model of a complementary circular code
400 simulating the protein coding genes, the 5' and 3' regions.},
401 journal = {Bull Math Biol},
407 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
408 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
409 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
410 has a preferential occurrence in the frame 0 (reading frame established
411 by the ATG start trinucleotide) of protein (coding) genes of both
412 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
413 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
414 a preferential occurrence in the shifted frames 1 and 2 respectively
415 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
416 direction). T1 and T2 are complementary to each other. The subset
417 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
418 to be a complementary maximal circular code with two permutated maximal
419 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
420 called a C3 code. A quantitative study of these three subsets T0,
421 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
422 3' regions of eukaryotes, shows that their occurrence frequencies
423 are constant functions of the trinucleotide positions in the sequences.
424 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
425 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
426 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
427 of the frame. Indeed, the frequency of T0 in the three frames of
428 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
429 and is greater than the frequencies T1 and T2, both equal to 32.25\%
430 (respectively 31\%) in the three frames. Several frequency asymmetries
431 unexpectedly observed (e.g. the frequency difference between T1 and
432 T2 in the frame 0), are related to a new property of the subset T0
433 involving substitutions. An evolutionary analytical model at three
434 parameters (p, q, t) based on an independent mixing of the 22 codons
435 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
436 by t approximately 4 substitutions per codon according to the proportions
437 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
438 0.8 in the three codon sites respectively, retrieves the frequencies
439 of T0, T1, T2 observed in the three frames of protein genes and explains
440 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
441 t approximately 22 substitutions per codon, retrieves the statistical
442 properties observed in the three frames of the 5' and 3' regions.
443 The complex behaviour of these analytical curves is totally unexpected
444 and a priori difficult to imagine.},
445 doi = {10.1006/bulm.1997.0033},
446 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
447 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
448 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
449 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
452 medline-pst = {ppublish},
454 pii = {S0092-8240(97)90033-1},
456 timestamp = {2011.05.05},
457 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
461 author = {D. G. Arquès and C. J. Michel},
462 title = {Analytical expression of the purine/pyrimidine codon probability
463 after and before random mutations.},
464 journal = {Bull Math Biol},
467 pages = {1025--1038},
470 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
471 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
472 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
473 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
474 result of two successive evolutionary genetic processes: (i) a mixing
475 (independent) process of non-random oligonucleotides (words of base
476 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
477 N = R or Y) leading to primitive genes (words of several hundreds
478 of base length) and followed by (ii) a random mutation process, i.e.,
479 transformations of a base R (respectively Y) into the base Y (respectively
480 R) at random sites in these primitive genes. Following this model
481 the problem investigated here is the study of the variation of the
482 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
483 analytical expressions solved here allow analysis of this variation
484 in the classical evolutionary sense (from the past to the present,
485 i.e., after random mutations), but also in the inverted evolutionary
486 sense (from the present to the past, i.e., before random mutations).
487 Different properties are also derived from these formulae. Finally,
488 a few applications of these formulae are presented. They prove the
489 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
490 Section 3.3.2, with the existence of a maximal mean number of random
491 mutations per base of the order 0.3 in the protein coding genes.
492 They also confirm the mixing process of oligonucleotides by excluding
493 the purine/pyrimidine contiguous and alternating tracts from the
494 formation process of primitive genes.},
495 institution = {Université de Franche-Comté, Besançon, France.},
496 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
497 Genetic; Mutation; Probability; Purines; Pyrimidines},
499 medline-pst = {ppublish},
502 timestamp = {2011.05.05}
505 @ARTICLE{Arques1993b,
506 author = {D. G. Arquès and C. J. Michel},
507 title = {Identification and simulation of new non-random statistical properties
508 common to different eukaryotic gene subpopulations.},
509 journal = {Biochimie},
514 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
515 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
516 is studied by autocorrelation functions. The autocorrelation function
517 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
518 in protein coding genes and transfer RNA genes of these three eukaryotic
519 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
520 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
521 N = R or Y). The autocorrelation functions analysing the occurrence
522 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
523 (YYY-function) identify new non-random genetic statistical properties
524 in these three eukaryotic subpopulations, mainly: i) in their protein
525 coding genes: local maxima for i identical to 6 [12] (peaks for i
526 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
527 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
528 in their introns: local maxima for i identical to 3 [6] (peaks for
529 i = 3, 9, 15) and a short linear decrease followed by a large exponential
530 decrease both with the RRR- and YYY-functions. The non-random properties
531 identified in eukaryotic intron subpopulations are modelised with
532 a process of random insertions and deletions of nucleotides simulating
534 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
535 d'Informatique de Besançon, France.},
536 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
537 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
538 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
541 medline-pst = {ppublish},
543 pii = {0300-9084(93)90173-P},
545 timestamp = {2011.05.05}
549 author = {D. G. Arquès and C. J. Michel},
550 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
551 of nucleotide insertions and deletions.},
552 journal = {J Theor Biol},
558 abstract = {Recently, a new genetic process termed RNA editing has been identified
559 showing insertions and deletions of nucleotides in particular RNA
560 molecules. On the other hand, there are a few non-random statistical
561 properties in genes: in particular, the periodicity modulo 3 (P3)
562 associated with an open reading frame, the periodicity modulo 2 (P2)
563 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
564 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
565 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
566 helix pitch, etc. The problem investigated here is whether a process
567 of the type RNA editing can lead to the non-random statistical properties
568 commonly observed in genes. This paper will show in particular that:
569 The process of insertions and deletions of mononucleotides in the
570 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
571 modulo 2 (P2). The process of insertions and deletions of trinucleotides
572 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
573 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
574 Furthermore, these two processes lead to a strong correlation with
575 the reality, namely the mononucleotide insertion/deletion process,
576 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
577 process, with the eukaryotic protein coding genes.},
578 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
579 Unité Associée CNRS No 822, France.},
580 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
581 Mutagenesis, genetics; RNA, genetics},
583 medline-pst = {ppublish},
586 timestamp = {2011.05.05}
590 author = {D. G. Arquès and C. J. Michel},
591 title = {Periodicities in coding and noncoding regions of the genes.},
592 journal = {J Theor Biol},
598 abstract = {Gene population statistical studies of protein coding genes and introns
599 have identified two types of periodicities on the purine/pyrimidine
600 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
601 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
602 chloroplasts, mitochondria, plasmids and in introns of viruses and
603 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
604 in the eukaryotic introns. The periodicity study is herein extended
605 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
606 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
607 Therefore, these observations suggest a unitary and dynamic concept
608 for the genes as for a given genome, the 5' and 3' regions have the
609 genetic information for protein coding genes and for introns: (1)
610 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
611 have the information for protein coding genes (P3) and for introns
612 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
613 while the intensity of P2 is weak in 5' regions and high in 3' regions.
614 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
615 the information for protein coding genes (P3). (3) In the viral genome,
616 the 5' (P3) and 3' (P3) regions have the information for protein
617 coding genes (P3) and for introns (P3). The absence of P2 in viral
618 introns (in opposition to eukaryotic introns) may be related to the
619 absence of P2 in 5' and 3' regions of viruses.},
620 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
622 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
623 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
624 Nucleic Acid; Viruses, genetics},
626 medline-pst = {ppublish},
629 timestamp = {2011.05.05}
632 @ARTICLE{Arques1990a,
633 author = {D. G. Arquès and C. J. Michel},
634 title = {A model of DNA sequence evolution.},
635 journal = {Bull Math Biol},
640 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
641 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
642 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
643 i in the range, but presents a maximum at i = 6 in the following
644 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
645 and mitochondria, and also viral introns, ribosomal RNA genes and
646 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
647 457-461). From the "universality" of this observation, we suggested
648 that the oligonucleotide YRY(N)6 is a primitive one and that it has
649 a central function in DNA sequence evolution (Arquès and Michel,
650 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
651 a concept of a model of DNA sequence evolution which will be validated
652 according to a schema presented in three parts. In the first part,
653 using the last version of the gene database, the YRY(N)6YRY preferential
654 occurrence (maximum at i = 6) is confirmed for the populations mentioned
655 above and is extended to some newly analysed populations: chloroplast
656 introns, chloroplast 5' regions, mitochondrial 5' regions and small
657 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
658 occurrence and periodicities are used in order to classify 18 gene
659 populations. In the second part, we will demonstrate that several
660 statistical features characterizing different gene populations (in
661 particular the YRY(N)6YRY preferential occurrence and the periodicities)
662 can be retrieved from a simple Markov model based on the mixing of
663 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
664 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
665 and YRY(N)3. Several properties are identified and prove in particular
666 that the oligonucleotide mixing is an independent process and that
667 several different features are functions of a unique parameter. In
668 the third part, the return of the model to the reality shows a strong
669 correlation between reality and simulation concerning the presence
670 of a large alternating purine/pyrimidine stretches and of periodicities.
671 It also contributes to a greater understanding of biological reality,
672 e.g. the presence or the absence of large alternating purine/pyrimidine
673 stretches can be explained as being a simple consequence of the mixing
674 of two particular oligonucleotides. Finally, we believe that such
675 an approach is the first step toward a unified model of DNA sequence
676 evolution allowing the molecular understanding of both the origin
677 of life and the actual biological reality.},
678 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
679 Unité Associée CNRS No 822, France.},
680 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
683 medline-pst = {ppublish},
686 timestamp = {2011.05.05}
689 @ARTICLE{Arques1993a,
690 author = {D. G. Arquès and C. J. Michel and K. Orieux},
691 title = {Identification and simulation of new non-random statistical properties
692 common to different populations of eukaryotic non-coding genes.},
693 journal = {J Theor Biol},
699 abstract = {The autocorrelation function analysing the occurrence probability
700 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
701 two periodicities modulo 2, 3 and the preferential occurrence of
702 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
703 = cytosine or thymine, N = R or Y). These non-random genetic statistical
704 properties can be simulated by an independent mixing of the three
705 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
706 The problem investigated in this study is whether new properties
707 can be identified in genes with other autocorrelation functions and
708 also simulated with an oligonucleotide mixing model. The two autocorrelation
709 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
710 and YYY(N)iYYY simultaneously identify three new non-random genetic
711 statistical properties: a short linear decrease, local maxima for
712 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
713 Furthermore, these properties are common to three different populations
714 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
715 (see section 2). These three non-random properties can also be simulated
716 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
717 YYYRYRYYY and large alternating R/Y series. The short linear decrease
718 is a result of R8 and Y8, the local maxima for i identical to 3[6],
719 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
720 large alternating R/Y series (section 3). The biological meaning
721 of these results and their relation to the previous oligonucleotide
722 mixing model are presented in the Discussion.},
723 doi = {10.1006/jtbi.1993.1059},
724 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
725 d'Informatique de Besançon, France.},
726 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
727 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
729 medline-pst = {ppublish},
731 pii = {S0022-5193(83)71059-3},
733 timestamp = {2011.05.05},
734 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
738 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
739 title = {On the inadequacy of the logistic map for cryptographic applications},
740 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
745 owner = {christophe},
746 timestamp = {2010.03.01}
749 @MISC{Backofen99algorithmicapproach,
750 author = {R. Backofen and S. Will and P. Clote},
751 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
756 @INPROCEEDINGS{bcgr11:ip,
757 author = {Bahi, Jacques M. and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
758 and Richard, Adrien},
759 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
760 Boolean Discrete-Time Dynamical Systems},
761 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
766 address = {Oslo, Norway},
770 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
776 author = {Bahi, Jacques M. and Guyeux, Christophe},
777 title = {Hash Functions Using Chaotic Iterations},
778 journal = {Journal of Algorithms \& Computational Technology},
784 doi = {10.1260/1748-3018.4.2.167},
785 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
790 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
793 @INPROCEEDINGS{guyeux10ter,
794 author = {Bahi, Jacques M. and Guyeux, Christophe},
795 title = {A new chaos-based watermarking algorithm},
796 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
799 address = {Athens, Greece},
801 publisher = {SciTePress},
803 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
808 @INPROCEEDINGS{bgc11:ip,
809 author = {Bahi, Jacques M. and Guyeux, Christophe and Cote, Nathalie},
810 title = {Chaos of Protein Folding},
811 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
814 address = {San Jose, California, United States},
818 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
823 @INPROCEEDINGS{guyeux10bis,
824 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
825 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
827 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
830 address = {Venice-Mestre, Italy},
833 doi = {10.1109/SENSORCOMM.2010.76},
834 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
837 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
840 @INPROCEEDINGS{guyeuxVictoria,
841 author = {Bahi, Jacques M. and Guyeux, Christophe and Makhoul, Abdallah},
842 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
843 versus Watermarking Approach},
844 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
847 series = {Lecture Notes in ICST},
849 address = {Victoria, Canada},
852 doi = {10.1007/978-3-642-17994-5_23},
853 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
856 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
859 @INPROCEEDINGS{bgs11:ip,
860 author = {Bahi, Jacques M. and Guyeux, Christophe and Salomon, Michel},
861 title = {Building a Chaotic Proven Neural Network},
862 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
866 address = {Maldives, Maldives},
869 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
874 @INPROCEEDINGS{bgw10:ip,
875 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
876 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
878 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
883 address = {Sanya, China},
886 doi = {10.1007/978-3-642-16515-3_26},
887 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
890 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
893 @INPROCEEDINGS{bgw09:ip,
894 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
895 title = {A novel pseudo-random generator based on discrete chaotic iterations},
896 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
899 address = {Cannes, France},
902 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
907 @INPROCEEDINGS{bmg10:onp,
908 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
909 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
910 Networks for critical applications},
911 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
912 et Applications Critiques de Surveillance},
914 address = {Bayonne, France},
916 note = {Communication orale},
918 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
923 @INPROCEEDINGS{guyeuxBayonne,
924 author = {Bahi, Jacques M. and Makhoul, Abdallah and Guyeux, Christophe},
925 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
926 Networks for critical applications},
927 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
928 et Applications Critiques de Surveillance},
930 address = {Bayonne, France},
932 note = {Communication orale},
939 author = {Bahi, Jacques M. and Salomon, Michel},
940 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
941 Lifetime of {MANETs}},
942 journal = {Computer Networks Journal},
945 note = {Accepted manuscript. To appear},
948 impact-factor = {1.201},
951 publisher = {Elsevier}
955 author = {J. M. Bahi},
956 title = {Boolean totally asynchronous iterations},
957 journal = {Int. Journal of Mathematical Algorithms},
962 timestamp = {17/02/2008}
965 @ARTICLE{Bahi2000bis,
966 author = {Jacques M. Bahi},
967 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
968 journal = {Journal of Parallel and Distributed Computing},
973 timestamp = {2009.01.10}
977 author = {J. M. Bahi},
978 title = {Parallel synchronous chaotic iterations for singular linear systems},
979 journal = {Parallel Algorithms and Applications},
984 timestamp = {17/02/2008}
988 author = {Jacques M. Bahi},
989 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
990 journal = {Comptes Rendus de l'Academie des Sciences},
992 volume = {t. 326, serie 1},
993 pages = {1421--1425},
995 timestamp = {2009.01.18}
999 author = {Jacques M. Bahi},
1000 title = {Méthodes itératives dans des espaces produits. Application au calcul
1002 school = {Université de Franche-Comté},
1004 type = {Habilitation à diriger des recherches},
1005 owner = {christophe},
1006 timestamp = {2010.08.24}
1010 author = {Jacques M. Bahi},
1011 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1012 Simulation numérique sur des exemples de circuits électriques},
1013 school = {Université de Franche-Comté},
1015 owner = {christophe},
1016 timestamp = {2010.08.24}
1020 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1021 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1023 journal = {IEEE Transactions on Neural Networks},
1030 timestamp = {2009.12.04}
1034 author = {J.~M. Bahi and S. Contassot-Vivier},
1035 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1037 journal = {IEEE Transactions on Neural Networks},
1040 pages = {1353-1363},
1042 timestamp = {2009.02.14}
1045 @TECHREPORT{bcgg10:ir,
1046 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1047 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1048 for {S}ynchronous {I}terations},
1049 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1052 type = {Research Report},
1053 number = {RR2010-04},
1055 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1059 author = {Bahi, Jacques M. and Guyeux, Christophe},
1060 title = {Hash Functions Using Chaotic Iterations},
1061 journal = {Journal of Algorithms \& Computational Technology},
1066 classement = {ACLNI},
1067 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1069 impact-factor = {#},
1074 @INPROCEEDINGS{guyeux10,
1075 author = {Bahi, Jacques M. and Guyeux, Christophe},
1076 title = {Topological chaos and chaotic iterations, application to Hash functions},
1077 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1080 address = {Barcelona, Spain},
1082 note = {Best paper award},
1083 classement = {ACTI},
1084 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1090 author = {Jacques M. Bahi and Christophe Guyeux},
1091 title = {A chaos-based approach for information hiding security.},
1092 howpublished = {arXiv},
1095 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1099 author = {Jacques M. Bahi and Christophe Guyeux},
1100 title = {A watermarking algorithm satisfying topological chaos properties},
1103 volume = {abs/0810.4713},
1104 bibsource = {DBLP, http://dblp.uni-trier.de},
1105 ee = {http://arxiv.org/abs/0810.4713}
1109 author = {Jacques M. Bahi and Christophe Guyeux},
1110 title = {Chaotic iterations and topological chaos},
1112 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1113 Miranker [5] and Miellou [9] in a numerical analysis context, and
1114 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1115 dynamical systems framework. In both cases, the objective was to
1116 derive conditions of convergence of such iterations to a fixed state.
1117 In this paper, a new point of view is presented, the goal here is
1118 to derive conditions under which chaotic iterations admit a chaotic
1119 behaviour in a rigorous mathematical sense. Contrary to what has
1120 been studied in the literature, convergence is not desired. More
1121 precisely, we establish in this paper a link between the concept
1122 of chaotic iterations on a finite set and the notion of topological
1123 chaos [8], [6], [7]. We are motivated by concrete applications of
1124 our approach, such as the use of chaotic boolean iterations in the
1125 computer security field. Indeed, the concept of chaos is used in
1126 many areas of data security without real rigorous theoretical foundations,
1127 and without using the fundamental properties that allow chaos. The
1128 wish of this paper is to bring a bit more mathematical rigour in
1130 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1132 comments = {6 pages},
1133 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1134 oai2identifier = {0810.3154},
1136 timestamp = {2008.10.23},
1137 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1140 @ARTICLE{arxivRNNchaos,
1141 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1142 title = {Building a Chaotic Proved Neural Network},
1145 volume = {abs/1101.4351},
1146 ee = {http://arxiv.org/abs/1101.4351}
1149 @INPROCEEDINGS{guyeuxTaiwan10,
1150 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1151 title = {Improving random number generators by chaotic iterations. Application
1153 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1155 pages = {V13-643--V13-647},
1156 address = {Taiyuan, China},
1158 classement = {ACTI},
1159 doi = {10.1109/ICCASM.2010.5622199},
1160 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1163 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1167 author = {Jacques M Bahi and Christian J Michel},
1168 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1170 journal = {Bull Math Biol},
1176 abstract = {We develop here a new class of stochastic models of gene evolution
1177 in which a random subset of the 64 possible trinucleotides mutates
1178 at each evolutionary time t according to some time dependent substitution
1179 probabilities. Therefore, at each time t, the numbers and the types
1180 of mutable trinucleotides are unknown. Thus, the mutation matrix
1181 changes at each time t. This pseudochaotic model developed generalizes
1182 the standard model in which all the trinucleotides mutate at each
1183 time t. It determines the occurrence probabilities at time t of trinucleotides
1184 which pseudochaotically mutate according to 3 time dependent substitution
1185 parameters associated with the 3 trinucleotide sites. The main result
1186 proves that under suitable assumptions, this pseudochaotic model
1187 converges to a uniform probability vector identical to that of the
1188 standard model. Furthermore, an application of this pseudochaotic
1189 model allows an evolutionary study of the 3 circular codes identified
1190 in both eukaryotic and prokaryotic genes. A circular code is a particular
1191 set of trinucleotides whose main property is the retrieval of the
1192 frames in genes locally, i.e., anywhere in genes and particularly
1193 without start codons, and automatically with a window of a few nucleotides.
1194 After a certain evolutionary time and with particular time dependent
1195 functions for the 3 substitution parameters, precisely an exponential
1196 decrease in the 1st and 2nd trinucleotide sites and an exponential
1197 increase in the 3rd one, this pseudochaotic model retrieves the main
1198 statistical properties of the 3 circular codes observed in genes.
1199 Furthermore, it leads to a circular code asymmetry stronger than
1200 the standard model (nonpseudochaotic) and, therefore, to a better
1201 correlation with the genes.},
1202 doi = {10.1007/s11538-008-9376-4},
1203 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1204 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1205 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1208 medline-pst = {ppublish},
1211 timestamp = {2011.05.05},
1212 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1216 author = {Jacques M Bahi and Christian J Michel},
1217 title = {A stochastic model of gene evolution with chaotic mutations.},
1218 journal = {J Theor Biol},
1224 abstract = {We develop here a new class of stochastic models of gene evolution
1225 in which the mutations are chaotic, i.e. a random subset of the 64
1226 possible trinucleotides mutates at each evolutionary time t according
1227 to some substitution probabilities. Therefore, at each time t, the
1228 numbers and the types of mutable trinucleotides are unknown. Thus,
1229 the mutation matrix changes at each time t. The chaotic model developed
1230 generalizes the standard model in which all the trinucleotides mutate
1231 at each time t. It determines the occurrence probabilities at time
1232 t of trinucleotides which chaotically mutate according to three substitution
1233 parameters associated with the three trinucleotide sites. Two theorems
1234 prove that this chaotic model has a probability vector at each time
1235 t and that it converges to a uniform probability vector identical
1236 to that of the standard model. Furthermore, four applications of
1237 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1238 and with a particular strategy for the three stop codons) allow an
1239 evolutionary study of the three circular codes identified in both
1240 eukaryotic and prokaryotic genes. A circular code is a particular
1241 set of trinucleotides whose main property is the retrieval of the
1242 frames in genes locally, i.e. anywhere in genes and particularly
1243 without start codons, and automatically with a window of a few nucleotides.
1244 After a certain evolutionary time and with particular values for
1245 the three substitution parameters, the chaotic models retrieve the
1246 main statistical properties of the three circular codes observed
1247 in genes. These applications also allow an evolutionary comparison
1248 between the standard and chaotic models.},
1249 doi = {10.1016/j.jtbi.2008.07.028},
1250 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1251 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1252 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1253 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1254 Stochastic Processes; Time},
1256 medline-pst = {ppublish},
1258 pii = {S0022-5193(08)00395-0},
1260 timestamp = {2011.05.05},
1261 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1264 @ARTICLE{Bahi2008bis,
1265 author = {Bahi, J. M. and Michel, C. J.},
1266 title = {A stochastic model of gene evolution with chaotic mutations},
1267 journal = {Journal of Theoretical Biology},
1272 timestamp = {2009.01.10}
1276 author = {Jacques M Bahi and Christian J Michel},
1277 title = {A stochastic gene evolution model with time dependent mutations.},
1278 journal = {Bull Math Biol},
1284 abstract = {We develop here a new class of gene evolution models in which the
1285 nucleotide mutations are time dependent. These models allow to study
1286 nonlinear gene evolution by accelerating or decelerating the mutation
1287 rates at different evolutionary times. They generalize the previous
1288 ones which are based on constant mutation rates. The stochastic model
1289 developed in this class determines at some time t the occurrence
1290 probabilities of trinucleotides mutating according to 3 time dependent
1291 substitution parameters associated with the 3 trinucleotide sites.
1292 Therefore, it allows to simulate the evolution of the circular code
1293 recently observed in genes. By varying the class of function for
1294 the substitution parameters, 1 among 12 models retrieves after mutation
1295 the statistical properties of the observed circular code in the 3
1296 frames of actual genes. In this model, the mutation rate in the 3rd
1297 trinucleotide site increases during gene evolution while the mutation
1298 rates in the 1st and 2nd sites decrease. This property agrees with
1299 the actual degeneracy of the genetic code. This approach can easily
1300 be generalized to study evolution of motifs of various lengths, e.g.,
1301 dicodons, etc., with time dependent mutations.},
1302 doi = {10.1016/j.bulm.2003.10.004},
1303 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1304 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1305 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1306 genetics; Models, Genetic; Mutation; Stochastic Processes},
1308 medline-pst = {ppublish},
1310 pii = {S0092824003001174},
1312 timestamp = {2011.05.05},
1313 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1317 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1318 title = {On Devaney's Definition of Chaos},
1319 journal = {Amer. Math. Monthly},
1325 timestamp = {27/01/2008}
1329 author = {E. Barker and A. Roginsky},
1330 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1331 of Cryptographic Algorithms and Key Sizes},
1333 owner = {christophe},
1334 timestamp = {2010.08.18}
1338 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1339 title = {A general framework for robust watermarking security},
1340 journal = {Signal Processing},
1343 pages = {2069-2084},
1345 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1346 bibsource = {DBLP, http://dblp.uni-trier.de},
1347 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1349 timestamp = {2009.06.30}
1353 author = {Baudet, G\'{e}rard M.},
1354 title = {Asynchronous Iterative Methods for Multiprocessors},
1360 address = {New York, NY, USA},
1361 doi = {http://doi.acm.org/10.1145/322063.322067},
1367 author = {Didier El Baz},
1368 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1369 : étude théorique, mise en œuvre, et application},
1370 school = {Institut national polytechnique de Toulouse},
1372 type = {Habilitation à diriger des recherches},
1373 owner = {christophe},
1374 timestamp = {2010.08.24}
1378 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1379 title = {Contention awareness and fault-tolerant scheduling for precedence
1380 constrained tasks in heterogeneous systems},
1381 journal = {Parallel Computing},
1387 doi = {10.1016/j.parco.2008.11.001},
1390 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1393 @INPROCEEDINGS{bhr08b:bl,
1394 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1395 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1397 booktitle = {IPDPS'08},
1400 publisher = {IEEE Computer Society Press},
1406 @INPROCEEDINGS{Berger98,
1407 author = {Berger, Bonnie and Leighton, Tom},
1408 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1409 booktitle = {Proceedings of the second annual international conference on Computational
1412 series = {RECOMB '98},
1414 address = {New York, NY, USA},
1417 isbn = {0-89791-976-9},
1418 location = {New York, New York, United States},
1423 title = {Parallel and distributed computation: numerical methods},
1424 publisher = {Prentice-Hall, Inc.},
1426 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1427 address = {Upper Saddle River, NJ, USA},
1428 isbn = {0-13-648700-9}
1431 @MISC{Bertsekas88paralleland,
1432 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1433 title = {Parallel and distributed iterative algorithms: a selective survey},
1438 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1439 title = {On Li-Yorke pairs},
1443 timestamp = {2008.01.02}
1447 author = {F. Blanchard and B. Host and S. Ruette},
1448 title = {Asymptotic pairs in positive-entropy systems},
1450 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1453 timestamp = {2008.01.02}
1457 author = {Dan Boneh and Matt Franklin},
1458 title = {Identity-Based Encryption from the {Weil} Pairing},
1459 journal = {SIAM J. of Computing},
1464 note = {Extended abstract in Crypto'01}
1467 @INCOLLECTION{boneh,
1468 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1469 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1472 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1473 We present a homomorphic public key encryption scheme that allows
1474 the public evaluation of ψ given an encryption of the variables x
1475 1,..., x n. In other words, given the encryption of the bits x 1,...,
1476 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1477 we can evaluate quadratic multi-variate polynomials on ciphertexts
1478 provided the resulting value falls within a small set. We present
1479 a number of applications of the system: 1 In a database of size n,
1480 the total communication in the basic step of the Kushilevitz-Ostrovsky
1481 PIR protocol is reduced from to . 2 An efficient election system
1482 based on homomorphic encryption where voters do not need to include
1483 non-interactive zero knowledge proofs that their ballots are valid.
1484 The election system is proved secure without random oracles but still
1485 efficient. 3 A protocol for universally verifiable computation.},
1486 citeulike-article-id = {2719460},
1487 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1488 journal = {Theory of Cryptography},
1489 keywords = {homomorphic, pairings},
1490 posted-at = {2008-04-25 21:53:15},
1492 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1496 author = {Bonneau, Richard and Baker, David},
1497 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1498 journal = {Annual Review of Biophysics and Biomolecular Structure},
1503 doi = {10.1146/annurev.biophys.30.1.173}
1507 author = {R. Bowen},
1508 title = {Entropy for group endomorphisms and homogeneous spaces},
1509 journal = {Trans. Amer. Math. Soc.},
1514 timestamp = {15/02/2008}
1518 author = {R. Bowen},
1519 title = {Periodic points and measures for Axiom A diffeomorphisms},
1520 journal = {Trans. Amer. Math. Soc.},
1525 timestamp = {15/02/2008}
1528 @ARTICLE{Braxenthaler97,
1529 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1531 title = {Chaos in protein dynamics},
1532 journal = {Proteins-structure Function and Bioinformatics},
1536 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1540 @INPROCEEDINGS{Brumley03remotetiming,
1541 author = {David Brumley and Dan Boneh},
1542 title = {Remote Timing Attacks are Practical},
1543 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1548 @ARTICLE{Bohm1991375,
1549 author = {Gerald Böhm},
1550 title = {Protein folding and deterministic chaos: Limits of protein folding
1551 simulations and calculations},
1552 journal = {Chaos, Solitons \& Fractals},
1555 pages = {375 - 382},
1557 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1559 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1562 @INCOLLECTION{Cachin2004,
1563 author = {Cachin, Christian},
1564 title = {An Information-Theoretic Model for Steganography},
1565 booktitle = {Information Hiding},
1566 publisher = {Springer Berlin / Heidelberg},
1569 series = {Lecture Notes in Computer Science},
1571 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1576 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1578 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1579 wireless sensor networks.},
1580 journal = {Computer Communication journal (29)},
1585 @ARTICLE{CarletCZ98,
1586 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1587 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1588 journal = {Des. Codes Cryptography},
1593 bibsource = {DBLP, http://dblp.uni-trier.de}
1596 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1597 author = {Claude Castelluccia},
1598 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1599 booktitle = {MobiQuitous},
1602 publisher = {IEEE Computer Society}
1606 author = {Cayre, F. and Bas, P.},
1607 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1608 journal = {IEEE Transactions on Information Forensics and Security},
1613 doi = {10.1109/TIFS.2007.916006},
1615 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1616 security, watermarking, Kerckhoffs-based embedding security classes,
1617 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1618 steganography security, watermark-only-attack, watermarking, Security,
1619 spread-spectrum (SS) watermarking},
1621 timestamp = {2009.06.29}
1625 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1626 title = {Watermarking security: theory and practice},
1627 journal = {IEEE Transactions on Signal Processing},
1630 pages = {3976--3987},
1632 doi = {10.1109/TSP.2005.855418},
1634 keywords = {blind source separation, cryptography, watermarking, Fisher information
1635 matrix, blind source separation, cryptanalysis, information theory,
1636 spread spectrum techniques, substitutive scheme, watermarking security,
1637 Blind source separation, Fisher information matrix, equivocation,
1638 security, watermarking},
1640 timestamp = {2009.06.29}
1643 @ARTICLE{Chajakis91,
1644 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1645 title = {Synchronous and asynchronous implementations of relaxation algorithms
1646 for nonlinear network optimization},
1647 journal = {Parallel Comput.},
1652 address = {Amsterdam, The Netherlands, The Netherlands},
1653 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1655 publisher = {Elsevier Science Publishers B. V.}
1659 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1661 title = {SIA: Secure information aggregation in sensor networks},
1662 journal = {J. Comput. Secur.},
1667 address = {Amsterdam, The Netherlands, The Netherlands},
1669 publisher = {IOS Press}
1672 @ARTICLE{Chandramouli06,
1673 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1674 title = {Battery power-aware encryption},
1675 journal = {ACM transactions on information and system security},
1678 owner = {christophe},
1679 timestamp = {2010.07.31}
1683 author = {Pascale Charpin},
1684 title = {A description of some extended cyclic codes with application to Reed-Solomon
1686 journal = {Discrete Mathematics},
1691 bibsource = {DBLP, http://dblp.uni-trier.de},
1692 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1696 author = {D. Chazan and W. Miranker},
1697 title = {Chaotic relaxation},
1698 journal = {Linear algebra and its applications},
1702 timestamp = {2008.05.22}
1706 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1707 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1708 homomorphism scheme},
1709 journal = {Inf. Process. Lett.},
1714 address = {Amsterdam, The Netherlands, The Netherlands},
1715 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1717 publisher = {Elsevier North-Holland, Inc.}
1720 @MISC{Cheon03acryptanalysis,
1721 author = {Jung Hee Cheon and Hyun Soo Nam},
1722 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1728 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1729 title = {Secure encrypted-data aggregation for wireless sensor networks},
1730 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1733 pages = {1048-1059},
1737 @ARTICLE{Chivian2005,
1738 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1739 Jack and Rohl, Carol A. and Baker, David},
1740 title = {Prediction of CASP6 structures using automated robetta protocols},
1741 journal = {Proteins},
1747 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1748 alignment ensemble},
1749 owner = {christophe},
1750 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1751 timestamp = {2011.01.22},
1752 url = {http://dx.doi.org/10.1002/prot.20733}
1756 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1757 title = {Chaos-based multipurpose image watermarking algorithm},
1758 journal = {Wuhan University Journal of Natural Sciences},
1761 pages = {1675-1678},
1762 note = {10.1007/BF02831848},
1763 abstract = {To achieve the goal of image content authentication and copyright
1764 protection simultaneously, this paper presents a novel image dual
1765 watermarking method based on chaotic map. Firstly, the host image
1766 was split into many nonoverlapping small blocks, and the block-wise
1767 discrete cosine transform (DCT) is computed. Secondly, the robust
1768 watermarks, shuffled by the chaotic sequences, are embedded in the
1769 DC coefficients of blocks to achieve the goal of copyright protection.
1770 The semi-fragile watermarks, generated by chaotic map, are embedded
1771 in the AC coefficients of blocks to obtain the aim of image authentication.
1772 Both of them can be extracted without the original image. Simulation
1773 results demonstrate the effectiveness of our algorithm in terms of
1774 robustness and fragility.},
1775 affiliation = {Central South University School of Information Science and Engineering
1776 410083 Changsha, Hunan China},
1779 keyword = {Mathematics, general},
1780 publisher = {Wuhan University, co-published with Springer},
1781 url = {http://dx.doi.org/10.1007/BF02831848}
1784 @ARTICLE{Conley1978,
1785 author = {C. Conley},
1786 title = {Isolated invariant sets and the Morse index},
1787 journal = {CBMS Regional Conference. AMS.},
1791 timestamp = {2008.01.02}
1795 author = {Philippe Cornu and André Smolarz},
1796 title = {Image characterization by texture},
1797 journal = {Traitement du signal},
1801 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1803 timestamp = {2008.05.12}
1806 @INPROCEEDINGS{Cox99,
1807 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1808 title = {Watermarking as Communications With Side Information},
1809 booktitle = {Proceedings of the IEEE},
1811 pages = {1127--1141},
1812 owner = {christophe},
1813 timestamp = {2010.03.06}
1816 @ARTICLE{Cox97securespread,
1817 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1819 title = {Secure spread spectrum watermarking for multimedia},
1820 journal = {IEEE Transactions on Image Processing},
1823 pages = {1673--1687}
1827 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1828 title = {Video Compression with Random Neural Networks},
1829 journal = {Neural Networks for Identification, Control, and Robotics, International
1834 address = {Los Alamitos, CA, USA},
1835 isbn = {0-8186-7456-3},
1836 publisher = {IEEE Computer Society}
1839 @INPROCEEDINGS{Crescenzi98,
1840 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1841 and Piccolboni, Antonio and Yannakakis, Mihalis},
1842 title = {On the complexity of protein folding (extended abstract)},
1843 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1845 series = {STOC '98},
1847 address = {New York, NY, USA},
1850 isbn = {0-89791-962-9},
1851 location = {Dallas, Texas, United States},
1856 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1857 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1858 journal = {Chaos, Solitons and Fractals},
1863 timestamp = {2008.10.07}
1867 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1868 title = {Processor-Dependent Malware... and codes},
1870 comment = {arXiv:1011.1638},
1871 eprint = {arXiv:1011.1638}
1875 title = {An Introduction to Chaotic Dynamical Systems},
1876 publisher = {Addison-Wesley},
1878 author = {Devaney, Robert L.},
1879 address = {Redwood City, CA},
1884 author = {Whitfield Diffie and Martin E. Hellman},
1885 title = {New Directions in Cryptography},
1886 journal = {IEEE Transactions on Information Theory},
1891 date = {November 1976},
1893 timestamp = {2009.06.30},
1894 url = {citeseer.ist.psu.edu/diffie76new.html}
1897 @INCOLLECTION{Dijk10,
1898 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1900 title = {Fully Homomorphic Encryption over the Integers},
1901 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1902 publisher = {Springer Berlin / Heidelberg},
1904 editor = {Gilbert, Henri},
1906 series = {Lecture Notes in Computer Science},
1908 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1909 elementary modular arithmetic. We use Gentry’s technique to construct
1910 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1911 scheme. However, instead of using ideal lattices over a polynomial
1912 ring, our bootstrappable encryption scheme merely uses addition and
1913 multiplication over the integers. The main appeal of our scheme is
1914 the conceptual simplicity. We reduce the security of our scheme to
1915 finding an approximate integer gcd – i.e., given a list of integers
1916 that are near-multiples of a hidden integer, output that hidden integer.
1917 We investigate the hardness of this task, building on earlier work
1918 of Howgrave-Graham.},
1919 affiliation = {MIT CSAIL}
1923 author = {Dill, KA},
1924 title = {Theory for the folding and stability of globular proteins.},
1925 journal = {Biochemistry},
1931 abstract = {Using lattice statistical mechanics, we develop theory to account
1932 for the folding of a heteropolymer molecule such as a protein to
1933 the globular and soluble state. Folding is assumed to be driven by
1934 the association of solvophobic monomers to avoid solvent and opposed
1935 by the chain configurational entropy. Theory predicts a phase transition
1936 as a function of temperature or solvent character. Molecules that
1937 are too short or too long or that have too few solvophobic residues
1938 are predicted not to fold. Globular molecules should have a largely
1939 solvophobic core, but there is an entropic tendency for some residues
1940 to be "out of place", particularly in small molecules. For long chains,
1941 molecules comprised of globular domains are predicted to be thermodynamically
1942 more stable than spherical molecules. The number of accessible conformations
1943 in the globular state is calculated to be an exceedingly small fraction
1944 of the number available to the random coil. Previous estimates of
1945 this number, which have motivated kinetic theories of folding, err
1946 by many tens of orders of magnitude.},
1947 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
1948 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
1949 owner = {christophe},
1950 timestamp = {2011.01.22},
1951 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
1955 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
1956 Thomas, PD and Chan, HS},
1957 title = {Principles of protein folding--a perspective from simple exact models.},
1958 journal = {Protein Sci},
1961 pages = {561-602--},
1964 abstract = {General principles of protein structure, stability, and folding kinetics
1965 have recently been explored in computer simulations of simple exact
1966 lattice models. These models represent protein chains at a rudimentary
1967 level, but they involve few parameters, approximations, or implicit
1968 biases, and they allow complete explorations of conformational and
1969 sequence spaces. Such simulations have resulted in testable predictions
1970 that are sometimes unanticipated: The folding code is mainly binary
1971 and delocalized throughout the amino acid sequence. The secondary
1972 and tertiary structures of a protein are specified mainly by the
1973 sequence of polar and nonpolar monomers. More specific interactions
1974 may refine the structure, rather than dominate the folding code.
1975 Simple exact models can account for the properties that characterize
1976 protein folding: two-state cooperativity, secondary and tertiary
1977 structures, and multistage folding kinetics--fast hydrophobic collapse
1978 followed by slower annealing. These studies suggest the possibility
1979 of creating "foldable" chain molecules other than proteins. The encoding
1980 of a unique compact chain conformation may not require amino acids;
1981 it may require only the ability to synthesize specific monomer sequences
1982 in which at least one monomer type is solvent-averse.},
1983 address = {Department of Pharmaceutical Chemistry, University of California,
1984 San Francisco 94143-1204, USA.},
1985 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
1986 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
1987 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
1988 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
1989 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
1990 owner = {christophe},
1991 timestamp = {2011.01.22},
1992 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
1995 @INPROCEEDINGS{Dobbertin96,
1996 author = {Dobbertin, Hans},
1997 title = {Cryptanalysis of MD4},
1998 booktitle = {Proceedings of the Third International Workshop on Fast Software
2002 address = {London, UK},
2003 publisher = {Springer-Verlag},
2004 isbn = {3-540-60865-6}
2007 @INPROCEEDINGS{DomingoFerrer2002,
2008 author = {Domingo-Ferrer, Josep},
2009 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2010 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2014 address = {London, UK},
2015 publisher = {Springer-Verlag},
2016 isbn = {3-540-44270-7}
2019 @ARTICLE{Dubchak1995,
2020 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2021 title = {Prediction of protein folding class using global description of amino
2023 journal = {Proc Natl Acad Sci U S A},
2026 pages = {8700--8704},
2029 __markedentry = {[guyeux]},
2030 abstract = {We present a method for predicting protein folding class based on
2031 global protein chain description and a voting process. Selection
2032 of the best descriptors was achieved by a computer-simulated neural
2033 network trained on a data base consisting of 83 folding classes.
2034 Protein-chain descriptors include overall composition, transition,
2035 and distribution of amino acid attributes, such as relative hydrophobicity,
2036 predicted secondary structure, and predicted solvent exposure. Cross-validation
2037 testing was performed on 15 of the largest classes. The test shows
2038 that proteins were assigned to the correct class (correct positive
2039 prediction) with an average accuracy of 71.7\%, whereas the inverse
2040 prediction of proteins as not belonging to a particular class (correct
2041 negative prediction) was 90-95\% accurate. When tested on 254 structures
2042 used in this study, the top two predictions contained the correct
2043 class in 91\% of the cases.},
2044 institution = {Department of Chemistry, University of California, Berkeley 94720,
2046 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2047 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2048 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2049 Reproducibility of Results; Solvents},
2051 medline-pst = {ppublish},
2054 timestamp = {2011.07.18}
2058 title = {Real analysis and probability},
2059 publisher = {Cambridge University Press},
2060 author = {Richard M. Dudley},
2063 timestamp = {2008.01.02}
2067 author = {El Tarazi, Mouhamed Nabih},
2068 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2069 journal = {Numerische Mathematik},
2073 note = {10.1007/BF01405568},
2074 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2078 keyword = {Mathematics and Statistics},
2079 publisher = {Springer Berlin / Heidelberg},
2080 url = {http://dx.doi.org/10.1007/BF01405568}
2084 author = {El Tarazi, Mouhamed Nabih},
2085 title = {Some convergence results for asynchronous algorithms},
2086 journal = {Numerische Mathematik},
2090 note = {10.1007/BF01407866},
2091 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2092 Box 5969 Kuwait Kuwait},
2095 keyword = {Mathematics and Statistics},
2096 publisher = {Springer Berlin / Heidelberg},
2097 url = {http://dx.doi.org/10.1007/BF01407866}
2101 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2102 title = {A secure digital signature algorithm based on elliptic curve and
2104 journal = {Circuits Systems Signal Processing},
2106 volume = {24, No. 5},
2109 timestamp = {2009.01.16}
2112 @BOOK{Feigenbaum1908,
2113 title = {Universal behavior in nonlinear systems},
2114 publisher = {Los Alamos Science},
2116 author = {Feigenbaum},
2118 timestamp = {2008.01.02}
2121 @ARTICLE{Felsenstein1980,
2122 author = {J. Felsenstein},
2123 title = {A view of population genetics.},
2124 journal = {Science},
2130 doi = {10.1126/science.208.4449.1253},
2132 medline-pst = {ppublish},
2134 pii = {208/4449/1253},
2136 timestamp = {2011.05.05},
2137 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2141 title = {Les virus informatiques : techniques virales et antivirales avancées},
2143 editor = {Springer},
2144 author = {Eric Filiol},
2145 owner = {christophe},
2146 timestamp = {2010.10.13}
2149 @INPROCEEDINGS{FiliolBlackHat,
2150 author = {Eric Filiol},
2151 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2152 booktitle = {Black Hat},
2154 owner = {christophe},
2155 timestamp = {2010.11.28}
2158 @PHDTHESIS{Formenti2003,
2159 author = {Enrico Formenti},
2160 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2161 school = {Université de Provence},
2164 timestamp = {2008.01.02}
2167 @PHDTHESIS{Formenti1998,
2168 author = {Enrico Formenti},
2169 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2171 school = {\'Ecole Normale Supérieure de Lyon},
2173 optmonth = {Octobre},
2175 timestamp = {2008.01.02}
2179 author = {Gabriel Frey and Christian J Michel},
2180 title = {Identification of circular codes in bacterial genomes and their use
2181 in a factorization method for retrieving the reading frames of genes.},
2182 journal = {Comput Biol Chem},
2188 abstract = {We developed a statistical method that allows each trinucleotide to
2189 be associated with a unique frame among the three possible ones in
2190 a (protein coding) gene. An extensive gene study in 175 complete
2191 bacterial genomes based on this statistical approach resulted in
2192 identification of 72 new circular codes. Finding a circular code
2193 enables an immediate retrieval of the reading frame locally anywhere
2194 in a gene. No knowledge of location of the start codon is required
2195 and a short window of only a few nucleotides is sufficient for automatic
2196 retrieval. We have therefore developed a factorization method (that
2197 explores previously found circular codes) for retrieving the reading
2198 frames of bacterial genes. Its principle is new and easy to understand.
2199 Neither complex treatment nor specific information on the nucleotide
2200 sequences is necessary. Moreover, the method can be used for short
2201 regions in nucleotide sequences (less than 25 nucleotides in protein
2202 coding genes). Selected additional properties of circular codes and
2203 their possible biological consequences are also discussed.},
2204 doi = {10.1016/j.compbiolchem.2005.11.001},
2205 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2206 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2207 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2208 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2209 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2210 Statistical; Reading Frames},
2212 medline-pst = {ppublish},
2214 pii = {S1476-9271(05)00111-8},
2216 timestamp = {2011.05.05},
2217 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2221 author = {Gabriel Frey and Christian J Michel},
2222 title = {An analytical model of gene evolution with six mutation parameters:
2223 an application to archaeal circular codes.},
2224 journal = {Comput Biol Chem},
2230 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2231 mutation matrix 64 x 64 with six substitution parameters associated
2232 with the transitions and transversions in the three trinucleotide
2233 sites. It generalizes the previous models based on the nucleotide
2234 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2235 x 64 with three parameters. It determines at some time t the exact
2236 occurrence probabilities of trinucleotides mutating randomly according
2237 to six substitution parameters. An application of this model allows
2238 an evolutionary study of the common circular code COM and the 15
2239 archaeal circular codes X which have been recently identified in
2240 several archaeal genomes. The main property of a circular code is
2241 the retrieval of the reading frames in genes, both locally, i.e.
2242 anywhere in genes and in particular without a start codon, and automatically
2243 with a window of a few nucleotides. In genes, the circular code is
2244 superimposed on the traditional genetic one. Very unexpectedly, the
2245 evolutionary model demonstrates that the archaeal circular codes
2246 can derive from the common circular code subjected to random substitutions
2247 with particular values for six substitutions parameters. It has a
2248 strong correlation with the statistical observations of three archaeal
2249 codes in actual genes. Furthermore, the properties of these substitution
2250 rates allow proposal of an evolutionary classification of the 15
2251 archaeal codes into three main classes according to this model. In
2252 almost all the cases, they agree with the actual degeneracy of the
2253 genetic code with substitutions more frequent in the third trinucleotide
2254 site and with transitions more frequent that transversions in any
2255 trinucleotide site.},
2256 doi = {10.1016/j.compbiolchem.2005.09.001},
2257 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2258 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2259 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2260 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2261 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2263 medline-pst = {ppublish},
2265 pii = {S1476-9271(05)00083-6},
2267 timestamp = {2011.05.05},
2268 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2271 @INPROCEEDINGS{fgb11:ip,
2272 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2273 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2274 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2277 address = {Sevilla, Spain},
2280 classement = {ACTI},
2281 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2287 author = {Alain Frisch},
2288 title = {Entropie topologique et définition du chaos},
2290 note = {Rapport de tipe},
2291 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2292 keywords = {Chaos, Entropie Topologique, Tipe},
2294 timestamp = {2008.01.02},
2295 url = {http://alain.frisch.fr/math.html}
2299 author = {Alain Frisch},
2300 title = {Entropie topologique et définition du chaos},
2302 note = {[En ligne; Page disponible le 12-août-2010]},
2303 url = {\url{http://alain.frisch.fr/math.html}}
2306 @ARTICLE{Frommer97asynchronousweighted,
2307 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2308 title = {Asynchronous Weighted Additive Schwarz Methods},
2309 journal = {Electronic Transactions on Numerical Analysis},
2315 @MISC{Frommer94asynchronoustwo-stage,
2316 author = {Andreas Frommer and Daniel B. Szyld},
2317 title = {Asynchronous Two-Stage Iterative Methods},
2322 title = {Introduction to Chaos and Coherence},
2323 publisher = {IOP Publishing},
2325 author = {J. Frøyland},
2327 timestamp = {2008.01.02}
2331 author = {T. Furon},
2332 title = {Security analysis},
2334 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2336 timestamp = {2009.06.30}
2340 author = {Furon, Teddy and Bas, Patrick},
2341 title = {Broken arrows},
2342 journal = {EURASIP J. Inf. Secur.},
2346 address = {New York, NY, United States},
2347 doi = {http://dx.doi.org/10.1155/2008/597040},
2349 owner = {christophe},
2350 publisher = {Hindawi Publishing Corp.},
2351 timestamp = {2010.03.06}
2354 @ARTICLE{P1150442004,
2355 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2356 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2358 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2364 owner = {christophe},
2365 timestamp = {2010.03.07}
2368 @INPROCEEDINGS{Gentry09,
2369 author = {Gentry, Craig},
2370 title = {Fully homomorphic encryption using ideal lattices},
2371 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2375 address = {New York, NY, USA},
2377 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2378 isbn = {978-1-60558-506-2},
2379 location = {Bethesda, MD, USA}
2382 @INPROCEEDINGS{Girao04,
2383 author = {J. Girao and M. Schneider and D. Westhoff},
2384 title = {CDA: Concealed data aggregation in wireless sensor networks},
2385 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2387 owner = {christophe},
2388 timestamp = {2010.07.31}
2391 @CONFERENCE{Gotsman88,
2392 author = {C. Gotsman and D. Lehmann and E. Shamir},
2393 title = {Asynchronous Dynamics of Random Boolean Networks},
2394 booktitle = {San Diego '88 Neural Networks Conference},
2397 timestamp = {30/03/2008}
2400 @ARTICLE{Guckenheimer1979,
2401 author = {J. Guckenheimer},
2402 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2403 journal = {Comm. Math. Phys.},
2405 optpages = {133-160},
2407 timestamp = {2008.01.02}
2411 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2413 publisher = {Springer Verlag},
2415 author = {J. Guckenheimer and P. Holmes},
2417 timestamp = {2008.01.02}
2420 @ARTICLE{Guo20093201,
2421 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2422 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2424 journal = {Physics Letters A},
2427 pages = {3201 - 3206},
2429 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2430 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2431 in parallel computing environment. We show how to devise forgery
2432 attacks on Xiao's scheme with differential cryptanalysis and give
2433 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2434 we discuss the problem of weak keys in the scheme and demonstrate
2435 how to utilize weak keys to construct collision.},
2437 keywords = {Cryptanalysis}
2440 @PHDTHESIS{GuyeuxThese10,
2441 author = {Christophe Guyeux},
2442 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2443 en s\'{e}curit\'{e} informatique},
2444 school = {Universit\'{e} de Franche-Comt\'{e}},
2446 owner = {christophe},
2447 timestamp = {2010.12.21}
2451 author = {Guyeux, Christophe and Bahi, Jacques},
2452 title = {\'Etude topologique de l'\'etalement de spectre},
2453 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2458 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2463 @INPROCEEDINGS{bg10:ip,
2464 author = {Guyeux, Christophe and Bahi, Jacques},
2465 title = {An improved watermarking algorithm for Internet applications},
2466 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2469 address = {Valencia, Spain},
2471 classement = {ACTI},
2472 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2477 @INPROCEEDINGS{gfb10:ip,
2478 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2479 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2480 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2481 Multimedia Signal Processing},
2484 address = {Darmstadt, Germany},
2486 classement = {ACTI},
2487 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2493 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2494 title = {A more secure information hiding scheme than spread-spectrum obtained
2496 journal = {arXiv 0032565},
2499 timestamp = {2010.04.30}
2503 title = {Guide to Elliptic Curve Cryptography},
2504 publisher = {Springer Professional Computing},
2506 editor = {Springer},
2507 author = {D. Hankerson and A. Menezes and S. Vanstone},
2508 owner = {christophe},
2509 timestamp = {2010.07.31}
2512 @ARTICLE{Hasegawa1985,
2513 author = {M. Hasegawa and H. Kishino and T. Yano},
2514 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2516 journal = {J Mol Evol},
2521 abstract = {A new statistical method for estimating divergence dates of species
2522 from DNA sequence data by a molecular clock approach is developed.
2523 This method takes into account effectively the information contained
2524 in a set of DNA sequence data. The molecular clock of mitochondrial
2525 DNA (mtDNA) was calibrated by setting the date of divergence between
2526 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2527 years ago), when the extinction of dinosaurs occurred. A generalized
2528 least-squares method was applied in fitting a model to mtDNA sequence
2529 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2530 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2531 second of each pair of numbers is the standard deviation) for the
2532 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2533 respectively, from the line leading to humans. Although there is
2534 some uncertainty in the clock, this dating may pose a problem for
2535 the widely believed hypothesis that the pipedal creature Australopithecus
2536 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2537 and at Hadar in Ethiopia, was ancestral to man and evolved after
2538 the human-ape splitting. Another likelier possibility is that mtDNA
2539 was transferred through hybridization between a proto-human and a
2540 proto-chimpanzee after the former had developed bipedalism.},
2541 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2542 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2543 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2546 medline-pst = {ppublish},
2549 timestamp = {2011.05.05}
2553 title = {A First Course in Discrete Dynamical Systems},
2554 publisher = {Springer-Verlag},
2556 author = {R. Homlgren},
2559 timestamp = {2008.01.02}
2562 @INCOLLECTION{Hoque09,
2563 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2564 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2565 Low Resolution Model: A Review},
2566 booktitle = {Biomedical Data and Applications},
2567 publisher = {Springer Berlin Heidelberg},
2569 editor = {Sidhu, Amandeep and Dillon, Tharam},
2571 series = {Studies in Computational Intelligence},
2573 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2576 @CONFERENCE{Houmansadr09,
2577 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2578 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2579 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2581 owner = {christophe},
2582 timestamp = {2010.03.07}
2586 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2587 title = {Secure encrypted-data aggregation for wireless sensor networks},
2588 journal = {Wireless Networks},
2589 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2590 aggregation scheme for wireless sensor networks. Our design for data
2591 aggregation eliminates redundant sensor readings without using encryption
2592 and maintains data secrecy and privacy during transmission. Conventional
2593 aggregation functions operate when readings are received in plaintext.
2594 If readings are encrypted, aggregation requires decryption creating
2595 extra overhead and key management issues. In contrast to conventional
2596 schemes, our proposed scheme provides security and privacy, and duplicate
2597 instances of original readings will be aggregated into a single packet.
2598 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2599 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2600 experiments show that our proposed aggregation method significantly
2601 reduces communication overhead and can be practically implemented
2602 in on-the-shelf sensor platforms.},
2603 citeulike-article-id = {4499496},
2604 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2605 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2606 doi = {10.1007/s11276-009-0177-y},
2607 posted-at = {2009-05-10 09:55:44},
2608 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2612 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2613 title = {Secure encrypted-data aggregation for wireless sensor networks},
2614 journal = {Wirel. Netw.},
2619 address = {Hingham, MA, USA},
2620 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2622 publisher = {Kluwer Academic Publishers}
2626 author = {W. Huang and X. Ye},
2627 title = {Homeomorphisms with the whole compacta being scrambled sets},
2628 journal = {Ergod. Th. Dynam. Systems},
2634 timestamp = {2008.01.02}
2637 @ARTICLE{Hurley1982,
2638 author = {M. Hurley},
2639 title = {Attractors, persistence and density of their bassin},
2640 journal = {Transactions of AMS},
2642 optpages = {247-271},
2645 timestamp = {2008.01.02}
2648 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2649 author = {Islam, Md. Kamrul and Chetty, Madhu},
2650 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2651 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2652 in Artificial Intelligence},
2656 address = {Berlin, Heidelberg},
2657 publisher = {Springer-Verlag},
2659 isbn = {978-3-642-10438-1},
2660 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2661 Pair-wise-interchange, Schema preservation, Tabu Search},
2662 location = {Melbourne, Australia},
2666 @PHDTHESIS{Jacquemard77,
2667 author = {C. Jacquemard},
2668 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2669 school = {Université de Franche-Comté},
2671 owner = {christophe},
2672 timestamp = {2010.08.25}
2676 title = {{Evolution of Protein Molecules}},
2677 publisher = {Academy Press},
2679 editor = {Munro, H. N.},
2680 author = {Jukes, T. H. and Cantor, C. R.},
2681 booktitle = {Evolution of Protein Molecules},
2682 citeulike-article-id = {1673661},
2683 keywords = {compbio, fresco},
2684 posted-at = {2007-09-19 06:23:18},
2688 @INPROCEEDINGS{Kalker2001,
2689 author = {Kalker, T.},
2690 title = {Considerations on watermarking security},
2693 abstract = {In this paper we address the usually implicit assumption that digital
2694 watermarking has as its main target copyright and copy protection
2695 applications. From these target applications a great many conclusions
2696 are drawn about the required security of a watermarking system, and
2697 in fact, a considerably percentage of the watermarking literature
2698 has this very topic as its main focus of attention. In this paper
2699 we take a step back, and try to do a more careful analysis of the
2700 'watermarking-is-for-security-applications' paradigm. The intention
2701 of this paper is to discuss the meaning of the concept security in
2702 the context of watermarking, and try to show that one has to be careful
2703 in using analogies from the related field of cryptography},
2704 citeulike-article-id = {1226513},
2705 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2706 keywords = {security, wateramarking},
2708 posted-at = {2007-04-14 14:30:06},
2710 timestamp = {2009.06.30}
2713 @ARTICLE{Kerckhoffs83,
2714 author = {Kerckhoffs, Auguste},
2715 title = {La cryptographie militaire},
2716 journal = {Journal des sciences militaires},
2721 abstract = {pp. 161–191, Feb. 1883.},
2722 citeulike-article-id = {505508},
2723 keywords = {cryptography, master},
2725 posted-at = {2006-02-15 04:49:15},
2727 timestamp = {2009.06.30}
2731 author = {Kimura, Motoo},
2732 title = {A simple method for estimating evolutionary rates of base substitutions
2733 through comparative studies of nucleotide sequences},
2734 journal = {Journal of Molecular Evolution},
2738 note = {10.1007/BF01731581},
2739 affiliation = {National Institute of Genetics 411 Mishima Japan},
2742 keyword = {Biomedical and Life Sciences},
2743 publisher = {Springer New York},
2744 url = {http://dx.doi.org/10.1007/BF01731581}
2749 title = {Chaos Without Nonperiodicity},
2750 journal = {Amer. Math. Monthly},
2754 timestamp = {27/01/2008}
2757 @PHDTHESIS{Knudsen1994a,
2758 author = {C. Knudsen},
2759 title = {Aspects of noninvertible dynamics and chaos},
2760 school = {Technical University of Denmark},
2763 timestamp = {2008.01.02}
2767 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2768 title = {Discrete Chaos - I: Theory},
2769 journal = {IEEE Trans. on Circuits Systems},
2772 pages = {1300-1309},
2773 owner = {christophe},
2774 timestamp = {2010.10.10}
2777 @INPROCEEDINGS{Kocher95cryptanalysisof,
2778 author = {Paul C. Kocher},
2779 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2780 Timing Attacks (Extended Abstract)},
2781 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2785 publisher = {Springer-Verlag}
2788 @ARTICLE{Kullback1951,
2789 author = {Kullback, Solomon and Leibler, Richard A.},
2790 title = {On Information and Sufficiency},
2791 journal = {The Annals of Mathematical Statistics},
2796 citeulike-article-id = {3245942},
2797 keywords = {file-import-08-09-12},
2799 posted-at = {2008-09-12 14:30:37},
2801 timestamp = {2009.06.29}
2805 author = {Eshter Ledoux},
2806 title = {Introduction à la théorie du chaos},
2808 note = {[En ligne; Page disponible le 12-août-2010]},
2809 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2813 title = {Analyse en dimension finie},
2814 publisher = {Masson},
2820 timestamp = {2008.01.02}
2824 author = {A.K. Lenstra and E.R. Verheul},
2825 title = {Selecting Cryptographic Key Sizes},
2826 journal = {Jour. of the International Association for Cryptologic Research},
2834 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2835 title = {What the Frog's Eye Tells the Frog's Brain},
2836 journal = {Proceedings of the IRE},
2841 owner = {christophe},
2842 timestamp = {2010.12.21}
2846 author = {T. Y. Li and J. A. Yorke},
2847 title = {Period three implies chaos},
2848 journal = {Amer. Math. Monthly},
2854 timestamp = {27/01/2008}
2858 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2859 title = {A novel Hash algorithm construction based on chaotic neural network},
2860 journal = {Neural Computing and Applications},
2863 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2866 keyword = {Computer Science},
2867 publisher = {Springer London}
2870 @INPROCEEDINGS{Lin09,
2871 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2872 title = {Cooperative secure data aggregation in sensor networks using elliptic
2873 curve based cryptosystems},
2874 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2875 design, visualization, and engineering},
2878 address = {Berlin, Heidelberg},
2879 publisher = {Springer-Verlag},
2880 isbn = {3-642-04264-3, 978-3-642-04264-5},
2881 location = {Luxembourg, Luxembourg}
2884 @INPROCEEDINGS{Liu2008,
2885 author = {Liu, An and Ning, Peng},
2886 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2887 Wireless Sensor Networks},
2888 booktitle = {7th International Conference on Information Processing in Sensor
2889 Networks (IPSN 2008)},
2893 citeulike-article-id = {3041699},
2894 howpublished = {SPOTS Track},
2896 posted-at = {2008-07-25 05:25:05},
2900 @ARTICLE{Liu2007bis,
2901 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2902 title = {An image fragile watermark scheme based on chaotic image pattern
2904 journal = {Applied Mathematics and Computation},
2909 timestamp = {2008.10.07}
2912 @INPROCEEDINGS{Liu07,
2913 author = {Liu, Zhen and Xi, Lifeng},
2914 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2915 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2916 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2917 of the 11th International Conference},
2920 address = {Berlin, Heidelberg},
2921 publisher = {Springer-Verlag},
2922 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
2923 isbn = {978-3-540-74826-7},
2924 location = {Vietri sul Mare, Italy}
2928 author = {Zhen Liu and Lifeng Xi},
2929 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2935 timestamp = {11/04/2008}
2938 @ARTICLE{Lubachevsky86,
2939 author = {Lubachevsky, Boris and Mitra, Debasis},
2940 title = {A chaotic asynchronous algorithm for computing the fixed point of
2941 a nonnegative matrix of unit spectral radius},
2947 address = {New York, NY, USA},
2948 doi = {http://doi.acm.org/10.1145/4904.4801},
2954 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
2955 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
2956 journal = {{N}ature },
2962 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
2963 bench-top platform to study a wide range of nonlinear dynamic systems,
2964 from ultrastable clocks to complex chaotic devices.},
2965 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
2966 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
2967 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
2968 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
2969 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
2970 audience = {internationale },
2972 doi = {10.1038/465041a },
2973 hal_id = {hal-00517696},
2974 language = {{A}nglais},
2975 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
2978 @INPROCEEDINGS{Mahoney00,
2979 author = {Mahoney, Matthew V.},
2980 title = {Fast Text Compression with Neural Networks},
2981 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
2982 Research Society Conference},
2985 publisher = {AAAI Press},
2987 isbn = {1-57735-113-4},
2991 @INPROCEEDINGS{msp10:bl,
2992 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
2993 title = {Risk Management in Intrusion Detection Applications with Wireless
2994 Video Sensor Networks},
2995 booktitle = {WCNC'10 IEEE Int. Conf.},
2998 address = {Sydney, Australia},
3007 author = {H.S. Malvar and D. Florêncio},
3008 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3009 journal = {IEEE Trans. Signal Proceeding},
3013 owner = {christophe},
3014 timestamp = {2010.03.07}
3017 @ARTICLE{Marsaglia2003,
3018 author = {G. Marsaglia},
3019 title = {Xorshift RNGs},
3020 journal = {Journal of Statistical Software},
3025 timestamp = {2009.10.28}
3028 @ARTICLE{Marsaglia1996,
3029 author = {G. Marsaglia},
3030 title = {DIEHARD: a battery of tests of randomness.},
3031 journal = {http://stat.fsu.edu/~geo/diehard.html},
3034 timestamp = {2009.11.09}
3037 @ARTICLE{Simard07testu01:a,
3038 author = {Richard Simard and Université De Montréal},
3039 title = {TestU01: A C library for empirical testing of random number generators},
3040 journal = {ACM Transactions on Mathematical Software},
3045 @ARTICLE{DefiningChaos,
3046 author = {M. Martelli and M. Dang and T. Seph},
3047 title = {Defining chaos},
3048 journal = {Mathematics Magazine},
3052 owner = {christophe},
3053 timestamp = {2010.08.11}
3056 @ARTICLE{Michel2007c,
3057 author = {Christian J Michel},
3058 title = {An analytical model of gene evolution with 9 mutation parameters:
3059 an application to the amino acids coded by the common circular code.},
3060 journal = {Bull Math Biol},
3066 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3067 mutation matrix 64 x 64 with nine substitution parameters associated
3068 with the three types of substitutions in the three trinucleotide
3069 sites. It generalizes the previous models based on the nucleotide
3070 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3071 x 64 with three and six parameters. It determines at some time t
3072 the exact occurrence probabilities of trinucleotides mutating randomly
3073 according to these nine substitution parameters. An application of
3074 this model allows an evolutionary study of the common circular code
3075 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3076 amino acids. The main property of this code [Formula: see text] is
3077 the retrieval of the reading frames in genes, both locally, i.e.
3078 anywhere in genes and in particular without a start codon, and automatically
3079 with a window of a few nucleotides. However, since its identification
3080 in 1996, amino acid information coded by [Formula: see text] has
3081 never been studied. Very unexpectedly, this evolutionary model demonstrates
3082 that random substitutions in this code [Formula: see text] and with
3083 particular values for the nine substitutions parameters retrieve
3084 after a certain time of evolution a frequency distribution of these
3085 12 amino acids very close to the one coded by the actual genes.},
3086 doi = {10.1007/s11538-006-9147-z},
3087 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3088 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3089 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3090 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3091 Molecular; Models, Genetic; Prokaryotic Cells},
3093 medline-pst = {ppublish},
3096 timestamp = {2011.05.05},
3097 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3101 author = {J.-C. Miellou},
3102 title = {Algorithmes de relaxation chaotique \`{a} retards},
3108 timestamp = {2008.05.22}
3111 @ARTICLE{Miellou75b,
3112 author = {Miellou, J.-C.},
3113 title = {Itérations chaotiques à retards, étude de la convergence dans le
3114 cas d'espaces partiellement ordonnés},
3115 journal = {C.R.A.S. Paris},
3119 owner = {christophe},
3120 timestamp = {2010.08.17}
3124 author = {Jean-Claude Miellou and Pierre Spitéri},
3125 title = {Un critère de convergence pour des méthodes générales de point fixe},
3126 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3131 owner = {christophe},
3132 timestamp = {2010.10.13}
3136 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3137 title = {A comparative study of chaotic and white noise signals in digital
3139 journal = {Chaos, Solitons and Fractals},
3143 owner = {christophe},
3144 timestamp = {2010.03.01}
3147 @ARTICLE{Nakashima2003,
3148 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3149 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3151 journal = {IEEE Transactions on Multimedia},
3153 note = {Accepted for future publication Multimedia}
3156 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3157 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3159 title = {SVD-Based Ghost Circuitry Detection},
3160 booktitle = {Information Hiding},
3161 publisher = {Springer Berlin / Heidelberg},
3163 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3165 series = {Lecture Notes in Computer Science},
3167 note = {10.1007/978-3-642-04431-1_16},
3168 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3169 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3172 @INPROCEEDINGS{Perez-Hernandez09,
3173 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3174 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3175 title = {Parallel particle swarm optimization applied to the protein folding
3177 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3180 series = {GECCO '09},
3181 pages = {1791--1792},
3182 address = {New York, NY, USA},
3185 isbn = {978-1-60558-325-9},
3186 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3187 parallelization, swarm intelligence},
3188 location = {Montreal, Qu\&\#233;bec, Canada},
3192 @PHDTHESIS{Pellegrin1986,
3193 author = {D. Pellegrin},
3194 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3195 school = {Grenoble},
3198 timestamp = {2008.05.22}
3202 author = {F. Peng and S.-S. Qiu and M. Long},
3203 title = {One way Hash function construction based on two-dimensional hyperchaotic
3205 journal = {Acta Phys. Sinici.},
3210 timestamp = {2009.01.16}
3213 @INPROCEEDINGS{Perez06,
3214 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3215 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3217 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3219 editor = {Edward J. Delp and Ping W. Wong},
3220 address = {San Jose, California, USA},
3222 organization = {SPIE},
3224 timestamp = {2009.06.30}
3227 @INPROCEEDINGS{Perez-Freire06,
3228 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3229 and Fernando Perez-Gonzalez},
3230 title = {Watermarking Security: a Survey},
3231 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3234 timestamp = {2009.06.29}
3237 @PROCEEDINGS{Peter07,
3238 title = {On Concealed Data Aggregation for WSNs},
3240 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3241 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3243 citeulike-article-id = {2281643},
3244 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3245 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3246 doi = {10.1109/CCNC.2007.45},
3247 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3251 posted-at = {2008-01-23 19:36:19},
3253 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3257 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3258 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3259 Networks for Critical Surveillance Applications},
3260 journal = {Journal of Network and Computer Applications},
3265 note = {Accepted manuscript. To appear},
3266 classement = {ACLI},
3268 impact-factor = {1.111},
3270 isi-acro = {J NETW COMPU APPL},
3271 publisher = {Springer}
3275 author = {Edgar Alan Poe},
3276 title = {The Raven},
3279 note = {American Museum (Baltimore)},
3280 owner = {christophe},
3281 timestamp = {2010.11.23}
3284 @ARTICLE{Perez-Freire2006:Security,
3285 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3287 title = {Security of lattice-based data hiding against the known message attack},
3288 journal = {IEEE Trans. on Information Forensics and Security},
3295 timestamp = {2009.12.06}
3298 @MISC{Quisquater02sidechannel,
3299 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3301 title = {Side Channel Cryptanalysis},
3305 @ARTICLE{Raynal2001,
3306 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3307 title = {Evaluation automatique des méthodes de tatouage},
3308 journal = {Traitement du signal},
3313 timestamp = {2008.05.21}
3317 author = {Vincent Rijmen and Elisabeth Oswald},
3318 title = {Update on SHA-1},
3319 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3321 note = {\url{http://eprint.iacr.org/}}
3325 title = {Discrete Iterations, a Metric Study},
3326 publisher = {Springer-Verlag},
3328 editor = {Berlin Heidelberg New-York},
3329 author = {François Robert},
3331 series = {Series in Computational Mathematics}
3335 title = {Discrete Iterations: A Metric Study},
3337 editor = {Springer-Verlag},
3338 author = {F. Robert},
3340 series = {Springer Series in Computational Mathematics},
3342 timestamp = {17/02/2008}
3346 author = {Rudenko, O. and Snytkin, M.},
3347 title = {Image compression based on the neural network art},
3348 journal = {Cybernetics and Systems Analysis},
3352 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3355 keyword = {Computer Science},
3356 publisher = {Springer New York}
3359 @PHDTHESIS{Ruette2001,
3360 author = {Sylvie Ruette},
3361 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3362 mesures d'entropie maximale},
3363 school = {Université d'Aix-Marseille II},
3365 optmonth = {Novembre},
3367 timestamp = {2008.01.02}
3370 @MASTERSTHESIS{Saulnier02,
3371 author = {Boris Saulnier},
3372 title = {Entropie topologique},
3373 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3375 owner = {christophe},
3376 timestamp = {2010.08.12}
3379 @ARTICLE{Schmitz2001,
3380 author = {Roland Schmitz},
3381 title = {Use of chaotic dynamical systems in cryptography},
3382 journal = {Journal of Franklin Institute},
3387 timestamp = {17/02/2008}
3391 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3392 publisher = {Hermann},
3395 author = {Laurent Schwartz},
3396 owner = {christophe},
3397 timestamp = {2010.09.15}
3401 author = {Shannon, Claude E.},
3402 title = {Communication Theory of Secrecy Systems},
3403 journal = {Bell Systems Technical Journal},
3407 citeulike-article-id = {507362},
3408 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3409 theory\_cryptography},
3411 posted-at = {2006-02-16 23:24:09},
3413 timestamp = {2009.06.29}
3416 @ARTICLE{Shmygelska05,
3417 author = {Shmygelska, Alena and Hoos, Holger},
3418 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3419 polar protein folding problem},
3420 journal = {BMC Bioinformatics},
3425 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3426 computational molecular biology and biochemical physics. Various
3427 optimisation methods have been applied to formulations of the ab-initio
3428 folding problem that are based on reduced models of protein structure,
3429 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3430 and hybrid approaches. In our work, we have introduced an ant colony
3431 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3432 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3433 from its amino acid sequence under a widely studied, conceptually
3434 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3435 (HP) model.RESULTS:We present an improvement of our previous ACO
3436 algorithm for the 2D HP model and its extension to the 3D HP model.
3437 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3438 than previous state-of-the-art algorithms on sequences whose native
3439 conformations do not contain structural nuclei (parts of the native
3440 fold that predominantly consist of local interactions) at the ends,
3441 but rather in the middle of the sequence, and that it generally finds
3442 a more diverse set of native conformations.CONCLUSIONS:The application
3443 of ACO to this bioinformatics problem compares favourably with specialised,
3444 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3445 our empirical results indicate that our rather simple ACO algorithm
3446 scales worse with sequence length but usually finds a more diverse
3447 ensemble of native states. Therefore the development of ACO algorithms
3448 for more complex and realistic models of protein structure holds
3449 significant promise.},
3450 doi = {10.1186/1471-2105-6-30},
3452 pubmedid = {15710037}
3455 @OTHER{Shmygelska2005Feb,
3456 __markedentry = {[christophe]},
3457 abstract = {Abstract Background The protein folding problem is a fundamental problems
3458 in computational molecular biology and biochemical physics. Various
3459 optimisation methods have been applied to formulations of the ab-initio
3460 folding problem that are based on reduced models of protein structure,
3461 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3462 and hybrid approaches. In our work, we have introduced an ant colony
3463 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3464 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3465 from its amino acid sequence under a widely studied, conceptually
3466 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3467 (HP) model. Results We present an improvement of our previous ACO
3468 algorithm for the 2D HP model and its extension to the 3D HP model.
3469 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3470 than previous state-of-the-art algorithms on sequences whose native
3471 conformations do not contain structural nuclei (parts of the native
3472 fold that predominantly consist of local interactions) at the ends,
3473 but rather in the middle of the sequence, and that it generally finds
3474 a more diverse set of native conformations. Conclusions The application
3475 of ACO to this bioinformatics problem compares favourably with specialised,
3476 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3477 our empirical results indicate that our rather simple ACO algorithm
3478 scales worse with sequence length but usually finds a more diverse
3479 ensemble of native states. Therefore the development of ACO algorithms
3480 for more complex and realistic models of protein structure holds
3481 significant promise.},
3482 author = {Shmygelska, Alena and Hoos, Holger H},
3483 journal = {BMC Bioinformatics. 2005 Feb 14},
3485 owner = {christophe},
3487 timestamp = {2011.01.24},
3488 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3489 polar protein folding problem},
3495 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3496 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3497 Their Roles in Cryptography and Pseudo-Random Coding},
3498 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3503 owner = {christophe},
3504 timestamp = {2010.03.06}
3507 @INPROCEEDINGS{Simmons83,
3508 author = {Gustavus J. Simmons},
3509 title = {The Prisoners' Problem and the Subliminal Channel},
3510 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3513 bibsource = {DBLP, http://dblp.uni-trier.de},
3515 timestamp = {2009.06.29}
3518 @ARTICLE{Solak2004389,
3519 author = {Ercan Solak},
3520 title = {On the security of a class of discrete-time chaotic cryptosystems},
3521 journal = {Physics Letters A},
3524 pages = {389 - 395},
3526 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3528 keywords = {Communication using chaos},
3530 timestamp = {2009.12.12},
3531 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3534 @PHDTHESIS{Spiteri74,
3535 author = {Pierre Spitéri},
3536 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3537 systemes differentiels non lineaires},
3538 school = {Université de Franche-Comté},
3540 owner = {christophe},
3541 timestamp = {2010.10.13}
3545 title = {Does God Play Dices ?: the mathematics of chaos},
3546 publisher = {Penguin},
3548 author = {Ian Stewart},
3550 timestamp = {2008.01.02}
3554 title = {Cryptography: Theory and Practice, Second Edition},
3555 publisher = {{Chapman \& Hall/CRC}},
3557 author = {Stinson, Douglas R.},
3559 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3560 a mathematically intensive examination of cryptography, including
3561 ciphers, the Data Encryption Standard (DES), public key cryptography,
3562 one-way hash functions, and digital signatures. Stinson's explication
3563 of "zero-sum proofs"--a process by which one person lets another
3564 person know that he or she has a password without actually revealing
3565 any information--is especially good.<P> If you are new to the math
3566 behind cryptography but want to tackle it, the author covers all
3567 of the required background to understand the real mathematics here.
3568 <I>Cryptography</I> includes extensive exercises with each chapter
3569 and makes an ideal introduction for any math-literate person willing
3570 to get acquainted with this material.} {<P>Major advances over the
3571 last five years precipitated this major revision of the bestselling
3572 Cryptography: Theory and Practice. With more than 40 percent new
3573 or updated material, the second edition now provides an even more
3574 comprehensive treatment of modern cryptography. It focuses on the
3575 new Advanced Encryption Standards and features an entirely new chapter
3576 on that subject. Another new chapter explores the applications of
3577 secret sharing schemes, including ramp schemes, visual cryptography,
3578 threshold cryptography, and broadcast encryption. This is an ideal
3579 introductory text for both computer science and mathematics students
3580 and a valuable reference for professionals.</P>}},
3581 citeulike-article-id = {2401855},
3583 howpublished = {Hardcover},
3584 isbn = {1584882069},
3585 keywords = {security},
3586 posted-at = {2008-02-20 08:28:49},
3588 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3591 @INPROCEEDINGS{Takana90,
3592 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3593 title = {Embedding Secret Information into a Dithered Multi-level Image},
3594 booktitle = {IEEE Military Communications Conference},
3596 owner = {christophe},
3597 timestamp = {2010.08.05}
3600 @PHDTHESIS{ElTarazi81,
3601 author = {M. N. El Tarazi},
3602 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3603 et asynchrones en analyse numérique},
3604 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3607 owner = {christophe},
3608 timestamp = {2010.08.17}
3611 @INPROCEEDINGS{Unger93,
3612 author = {Unger, Ron and Moult, John},
3613 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3614 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3617 address = {San Francisco, CA, USA},
3618 publisher = {Morgan Kaufmann Publishers Inc.},
3620 isbn = {1-55860-299-2},
3624 @MISC{Van93electronicwater,
3625 author = {Tirkel Rankin Van},
3626 title = {Electronic Water Mark},
3630 @ARTICLE{Venkatesan2007397,
3631 author = {R.C. Venkatesan},
3632 title = {Encryption of covert information into multiple statistical distributions},
3633 journal = {Physics Letters A},
3636 pages = {397 - 404},
3638 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3640 keywords = {Statistical encryption/decryption},
3642 timestamp = {2009.12.12},
3643 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3647 author = {G. Voyatzis and I. Pitas},
3648 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3649 journal = {Proceedings of IEEE ICIP},
3653 owner = {christophe},
3654 timestamp = {2010.03.06}
3657 @INCOLLECTION{Wagner03,
3658 author = {Wagner, David},
3659 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3660 booktitle = {Information Security},
3661 publisher = {Springer Berlin, Heidelberg},
3664 series = {Lecture Notes in Computer Science},
3666 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3667 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3668 affiliation = {University of California, Berkeley USA}
3671 @INPROCEEDINGS{Wagner03cryptanalysisof,
3672 author = {David Wagner},
3673 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3674 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3679 @ARTICLE{Wang_ellipticcurve,
3680 author = {Haodong Wang and Bo Sheng and Qun Li},
3681 title = {Elliptic curve cryptography-based access control in sensor networks},
3682 journal = {Int. J. Security and Networks}
3685 @INPROCEEDINGS{wbg10:ip,
3686 author = {Wang, Qianxue and Bahi, Jacques M. and Guyeux, Christophe and Fang,
3688 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3690 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3693 address = {Valencia, Spain},
3695 publisher = {IEEE Computer Society Press},
3696 note = {Best Paper award},
3697 classement = {ACTI},
3698 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3704 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3705 title = {One-way hash function construction based on the extended chaotic
3707 journal = {Acta Phys. Sinici.},
3709 volume = {52, No. 11},
3710 pages = {2737--2742},
3712 timestamp = {2009.01.16}
3716 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3717 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3718 Networks: Encryption, Key Distribution, and Routing Adaptation},
3719 journal = {IEEE Transactions on Mobile Computing},
3722 pages = {1417--1431},
3724 address = {Piscataway, NJ, USA},
3725 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3727 publisher = {IEEE Educational Activities Department}
3731 author = {Wikipédia},
3732 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3734 note = {[En ligne; Page disponible le 9-septembre-2010]},
3735 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3739 author = {Wikipédia},
3740 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3742 note = {[En ligne; Page disponible le 9-août-2010]},
3743 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3747 author = {Wikipédia},
3748 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3750 note = {[En ligne; Page disponible le 8-août-2010]},
3751 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3755 author = {Wikipédia},
3756 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3758 note = {[En ligne; Page disponible le 5-août-2010]},
3759 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3762 @MISC{wiki:Kerkhoffs,
3763 author = {Wikipédia},
3764 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3766 note = {[En ligne; Page disponible le 20-août-2010]},
3767 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3770 @MISC{wiki:sarkovskii,
3771 author = {Wikipédia},
3772 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3774 note = {[En ligne; Page disponible le 8-août-2010]},
3775 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3778 @MISC{wiki:steganographie,
3779 author = {Wikipédia},
3780 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3782 note = {[En ligne; Page disponible le 5-août-2010]},
3783 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3786 @MISC{wiki:tatouage,
3787 author = {Wikipédia},
3788 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3790 note = {[En ligne; Page disponible le 5-août-2010]},
3791 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3794 @MISC{wiki:testsHypothese,
3795 author = {Wikipédia},
3796 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3798 note = {[En ligne; Page disponible le 5-août-2010]},
3799 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3803 author = {Xianyong Wu and Zhi-Hong Guan},
3804 title = {A novel digital watermark algorithm based on chaotic maps},
3805 journal = {Physics Letters A},
3808 pages = {403 - 406},
3810 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3812 keywords = {Watermarking},
3813 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3816 @INPROCEEDINGS{Wu2007,
3817 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3818 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3819 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3823 address = {Berlin, Heidelberg},
3824 publisher = {Springer-Verlag},
3825 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3826 isbn = {978-3-540-72392-9},
3827 location = {Nanjing, China}
3830 @ARTICLE{Xiao20092288,
3831 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3832 title = {Parallel keyed hash function construction based on chaotic neural
3834 journal = {Neurocomputing},
3837 pages = {2288 - 2296},
3839 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3840 in Intelligent Systems Designn (ISDA 2007)},
3841 abstract = {Recently, various hash functions based on chaos or neural networks
3842 were proposed. Nevertheless, none of them works efficiently in parallel
3843 computing environment. In this paper, an algorithm for parallel keyed
3844 hash function construction based on chaotic neural network is proposed.
3845 The mechanism of changeable-parameter and self-synchronization establishes
3846 a close relation between the hash value bit and message, and the
3847 algorithm structure ensures the uniform sensitivity of the hash value
3848 to the message blocks at different positions. The proposed algorithm
3849 can satisfy the performance requirements of hash function. These
3850 properties make it a promising choice for hashing on parallel computing
3853 keywords = {Chaotic neural network}
3856 @ARTICLE{Xiao20094346,
3857 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3858 title = {Improving the security of a parallel keyed hash function based on
3860 journal = {Physics Letters A},
3863 pages = {4346 - 4353},
3866 keywords = {Hash function},
3868 timestamp = {2009.12.12}
3871 @ARTICLE{Xiao20102254,
3872 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3873 title = {A chaos-based hash function with both modification detection and
3874 localization capabilities},
3875 journal = {Communications in Nonlinear Science and Numerical Simulation},
3878 pages = {2254 - 2261},
3880 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3881 Nevertheless, none of them can realize modification localization.
3882 In this paper, a hash function with both modification detection and
3883 localization capabilities is proposed, which can also support the
3884 parallel processing mode. By using the mechanism of changeable-parameter
3885 and self-synchronization, the keystream can establish a close relation
3886 with the algorithm key, the content, and the order of each message
3887 unit. Theoretical analysis and computer simulation indicate that
3888 the proposed algorithm can satisfy the performance requirements of
3891 keywords = {Hash function}
3894 @INPROCEEDINGS{Yu06,
3895 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3896 title = {A Study on the Security of Privacy Homomorphism},
3897 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3898 Technology: New Generations},
3901 address = {Washington, DC, USA},
3902 publisher = {IEEE Computer Society},
3903 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3904 isbn = {0-7695-2497-4}
3907 @ARTICLE{Zhang2008658,
3908 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3909 title = {Secure data aggregation in wireless sensor networks: A watermark
3910 based authentication supportive approach},
3911 journal = {Pervasive and Mobile Computing},
3914 pages = {658 - 680},
3916 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3918 keywords = {Wireless sensor networks},
3919 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
3923 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
3924 title = {TASSER: An automated method for the prediction of protein tertiary
3925 structures in CASP6},
3926 journal = {Proteins},
3932 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
3933 owner = {christophe},
3934 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
3935 timestamp = {2011.01.22},
3936 url = {http://dx.doi.org/10.1002/prot.20724}
3939 @ARTICLE{Zhou1997429,
3940 author = {Chang-song Zhou and Tian-lun Chen},
3941 title = {Extracting information masked by chaos and contaminated with noise:
3942 Some considerations on the security of communication approaches using
3944 journal = {Physics Letters A},
3947 pages = {429 - 435},
3950 keywords = {Communication},
3952 timestamp = {2009.12.12}
3956 author = {Zhou, Huai-bei and Wang, Lu},
3957 title = {Chaos in Biomolecular Dynamics},
3958 journal = {The Journal of Physical Chemistry},
3961 pages = {8101-8105},
3963 doi = {10.1021/jp953409x}
3966 @PROCEEDINGS{DBLP:conf/iwdw/2005,
3967 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
3969 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
3971 series = {Lecture Notes in Computer Science},
3972 address = {Siena, Italy},
3973 publisher = {Springer},
3974 month = {September 15-17},
3975 bibsource = {DBLP, http://dblp.uni-trier.de},
3977 isbn = {3-540-28768-X},
3979 timestamp = {2009.06.29}
3982 @PROCEEDINGS{DBLP:conf/ih/2006,
3983 title = {IH 2006: Information Hiding, 8th International Workshop},
3985 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
3988 series = {Lecture Notes in Computer Science},
3989 address = {Alexandria, VA, USA},
3990 publisher = {Springer},
3992 bibsource = {DBLP, http://dblp.uni-trier.de},
3993 booktitle = {Information Hiding},
3994 isbn = {978-3-540-74123-7},
3996 timestamp = {2009.06.29}
3999 @PROCEEDINGS{DBLP:conf/ih/2007,
4000 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
4001 France, June 11-13, 2007, Revised Selected Papers},
4003 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
4006 series = {Lecture Notes in Computer Science},
4007 publisher = {Springer},
4008 bibsource = {DBLP, http://dblp.uni-trier.de},
4009 booktitle = {Information Hiding},
4010 isbn = {978-3-540-77369-6},
4012 timestamp = {2009.06.29}
4015 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4016 title = {Computational Science and Its Applications - ICCSA 2006, International
4017 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4019 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4020 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4021 Mun and Hyunseung Choo},
4023 series = {Lecture Notes in Computer Science},
4024 publisher = {Springer},
4025 bibsource = {DBLP, http://dblp.uni-trier.de},
4026 booktitle = {ICCSA (1)},
4027 isbn = {3-540-34070-X}
4030 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4031 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4032 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4033 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4035 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4036 publisher = {SciTePress},
4037 bibsource = {DBLP, http://dblp.uni-trier.de},
4038 booktitle = {SECRYPT},
4039 isbn = {978-989-8425-18-8}
4042 @BOOK{Katzenbeisser00,
4043 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4044 publisher = {Artech House, Inc.},
4046 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4047 address = {Norwood, MA, USA},
4051 @PROCEEDINGS{DBLP:conf/ih/1999,
4052 title = {IH'99: 3rd International Workshop on Information Hiding},
4054 editor = {Andreas Pfitzmann},
4056 series = {Lecture Notes in Computer Science},
4057 address = {Dresden, Germany},
4058 publisher = {Springer},
4059 month = {September 29 - October 1.},
4060 bibsource = {DBLP, http://dblp.uni-trier.de},
4061 booktitle = {Information Hiding},
4062 isbn = {3-540-67182-X},
4064 timestamp = {2009.06.29}
4067 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4068 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4069 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4071 editor = {Bimal K. Roy and Eiji Okamoto},
4073 series = {Lecture Notes in Computer Science},
4074 publisher = {Springer},
4075 bibsource = {DBLP, http://dblp.uni-trier.de},
4076 booktitle = {INDOCRYPT},
4077 isbn = {3-540-41452-5}
4080 @BOOK{DBLP:reference/icsec/2010,
4081 title = {Handbook of Information and Communication Security},
4082 publisher = {Springer},
4084 editor = {Peter P. Stavroulakis and Mark Stamp},
4085 bibsource = {DBLP, http://dblp.uni-trier.de},
4086 booktitle = {Handbook of Information and Communication Security},
4087 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4088 isbn = {978-3-642-04116-7}
4091 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4092 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4093 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4096 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4098 series = {Lecture Notes in Computer Science},
4099 publisher = {Springer},
4100 bibsource = {DBLP, http://dblp.uni-trier.de},
4101 booktitle = {ISNN (2)},
4102 isbn = {3-540-22843-8}
4105 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4106 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4107 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4109 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4111 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4112 and Telecommunications Engineering},
4113 publisher = {Springer},
4114 bibsource = {DBLP, http://dblp.uni-trier.de},
4115 booktitle = {ADHOCNETS},
4116 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4117 isbn = {978-3-642-17993-8}
4122 timestamp = {2011.03.29}
4126 title = {Delicious social bookmarking, http://delicious.com/},
4127 comment = {http://delicious.com/},
4129 url = {http://delicious.com/}
4133 title = {The Frick Collection, http://www.frick.org/},
4134 comment = {http://www.frick.org/},
4136 url = {http://www.frick.org/}
4140 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4141 2010, Barcelona, Spain, 18-23 July 2010},
4144 bibsource = {DBLP, http://dblp.uni-trier.de},
4145 booktitle = {IEEE Congress on Evolutionary Computation}
4148 @PROCEEDINGS{DBLP:conf/cec/2010,
4149 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4150 2010, Barcelona, Spain, 18-23 July 2010},
4153 bibsource = {DBLP, http://dblp.uni-trier.de},
4154 booktitle = {IEEE Congress on Evolutionary Computation}
4157 @PROCEEDINGS{DBLP:conf/date/2010,
4158 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4162 bibsource = {DBLP, http://dblp.uni-trier.de},
4166 @PROCEEDINGS{DBLP:conf/cse/2009,
4167 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4168 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4170 publisher = {IEEE Computer Society},
4171 bibsource = {DBLP, http://dblp.uni-trier.de},
4175 @PROCEEDINGS{DBLP:conf/icumt/2009,
4176 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4177 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4180 bibsource = {DBLP, http://dblp.uni-trier.de},
4184 @PROCEEDINGS{DBLP:conf/focs/2008,
4185 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4186 2008, October 25-28, 2008, Philadelphia, PA, USA},
4188 publisher = {IEEE Computer Society},
4189 bibsource = {DBLP, http://dblp.uni-trier.de},
4193 @comment{jabref-meta: selector_publisher:}
4195 @comment{jabref-meta: selector_author:}
4197 @comment{jabref-meta: selector_journal:}
4199 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4204 @InProceedings{Pang:2008:cec,
4205 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4206 title = "Generating Massive High-Quality Random Numbers using
4208 booktitle = "2008 IEEE World Congress on Computational
4211 editor = "Jun Wang",
4212 address = "Hong Kong",
4213 organization = "IEEE Computational Intelligence Society",
4214 publisher = "IEEE Press",
4218 @Article{LEcuyerS07,
4219 title = "Test{U01}: {A} {C} library for empirical testing of
4220 random number generators",
4221 author = "Pierre L'Ecuyer and Richard J. Simard",
4222 journal = "ACM Trans. Math. Softw",
4226 bibdate = "2007-11-06",
4228 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4229 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4233 author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov},
4234 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4235 journal = {J. Phys. Chem. B},
4239 pages = {5278--5288},
4244 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4245 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4247 @InProceedings{conf/fpga/ThomasHL09,
4248 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4249 parallel processor arrays for random number
4251 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4252 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4253 Symposium on Field Programmable Gate Arrays, {FPGA}
4254 2009, Monterey, California, {USA}, February 22-24,
4256 bibdate = "2010-06-29",
4259 editor = "Paul Chow and Peter Y. K. Cheung",
4260 ISBN = "978-1-60558-410-2",
4262 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4267 @InProceedings{Jenkins96,
4270 booktitle = "IWFSE: International Workshop on Fast Software
4277 title = {Cuda cublas library},
4279 Note = {Version 4.0},
4284 title = {Curand library},
4286 Note = {Version 4.0},
4292 author = {Lenore Blum and Manuel Blum and Michael Shub},
4293 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4294 journal = {SIAM Journal on Computing},