1 % This file was created with JabRef 2.7.
4 @INPROCEEDINGS{AdelsbachKS06,
5 author = {Andr{\'e} Adelsbach and Stefan Katzenbeisser and Ahmad-Reza Sadeghi},
6 title = {A Computational Model for Watermark Robustness},
7 booktitle = {Information Hiding},
10 bibsource = {DBLP, http://dblp.uni-trier.de},
11 crossref = {DBLP:conf/ih/2006},
12 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_10},
14 timestamp = {2009.06.29}
17 @INPROCEEDINGS{BattiatoCGG99,
18 author = {Sebastiano Battiato and Dario Catalano and Giovanni Gallo and Rosario
20 title = {Robust Watermarking for Images Based on Color Manipulation},
21 booktitle = {Information Hiding},
24 bibsource = {DBLP, http://dblp.uni-trier.de},
25 crossref = {DBLP:conf/ih/1999},
27 timestamp = {2009.06.29}
30 @INPROCEEDINGS{ComesanaPP05,
31 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
32 title = {The Return of the Sensitivity Attack},
36 bibsource = {DBLP, http://dblp.uni-trier.de},
37 crossref = {DBLP:conf/iwdw/2005},
38 ee = {http://dx.doi.org/10.1007/11551492_20},
40 timestamp = {2009.06.29}
43 @INPROCEEDINGS{ComesanaPP05bis,
44 author = {Pedro Comesa{\~n}a and Luis P{\'e}rez-Freire and Fernando P{\'e}rez-Gonz{\'a}lez},
45 title = {Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum
47 booktitle = {IH'05: Information Hiding Workshop},
50 publisher = {Lectures Notes in Computer Science, Springer-Verlag},
51 bibsource = {DBLP, http://dblp.uni-trier.de},
52 crossref = {DBLP:conf/ih/2005},
53 ee = {http://dx.doi.org/10.1007/11558859_12},
55 timestamp = {2009.06.30}
58 @INPROCEEDINGS{CongJQZ06,
59 author = {Jin Cong and Yan Jiang and Zhiguo Qu and Zhongmei Zhang},
60 title = {A Wavelet Packets Watermarking Algorithm Based on Chaos Encryption},
61 booktitle = {ICCSA (1)},
64 bibsource = {DBLP, http://dblp.uni-trier.de},
65 crossref = {DBLP:conf/iccsa/2006-1},
66 ee = {http://dx.doi.org/10.1007/11751540_100}
69 @INPROCEEDINGS{DBLP:conf/focs/DziembowskiP08,
70 author = {Stefan Dziembowski and Krzysztof Pietrzak},
71 title = {Leakage-Resilient Cryptography},
75 bibsource = {DBLP, http://dblp.uni-trier.de},
76 crossref = {DBLP:conf/focs/2008},
77 ee = {http://dx.doi.org/10.1109/FOCS.2008.56}
80 @INCOLLECTION{Filiol10,
81 author = {Eric Filiol},
82 title = {Viruses and Malware},
83 booktitle = {Handbook of Information and Communication Security},
86 bibsource = {DBLP, http://dblp.uni-trier.de},
87 crossref = {DBLP:reference/icsec/2010},
88 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4_34}
91 @INPROCEEDINGS{Filiol00,
92 author = {Eric Filiol},
93 title = {Decimation Attack of Stream Ciphers},
94 booktitle = {INDOCRYPT},
97 bibsource = {DBLP, http://dblp.uni-trier.de},
98 crossref = {DBLP:conf/indocrypt/2000},
99 ee = {http://link.springer.de/link/service/series/0558/bibs/1977/19770031.htm}
102 @INPROCEEDINGS{Furon05,
103 author = {Teddy Furon},
104 title = {A Survey of Watermarking Security},
108 bibsource = {DBLP, http://dblp.uni-trier.de},
109 crossref = {DBLP:conf/iwdw/2005},
110 ee = {http://dx.doi.org/10.1007/11551492_16},
112 timestamp = {2009.06.29}
115 @INPROCEEDINGS{DBLP:conf/cec/HiggsSHS10,
116 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
117 title = {Genetic algorithm feature-based resampling for protein structure
119 booktitle = {IEEE Congress on Evolutionary Computation},
122 bibsource = {DBLP, http://dblp.uni-trier.de},
123 crossref = {DBLP:conf/cec/2010},
124 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
127 @INPROCEEDINGS{Higgs2010,
128 author = {Trent Higgs and Bela Stantic and Tamjidul Hoque and Abdul Sattar},
129 title = {Genetic algorithm feature-based resampling for protein structure
131 booktitle = {IEEE Congress on Evolutionary Computation},
134 bibsource = {DBLP, http://dblp.uni-trier.de},
135 crossref = {DBLP:conf/cec/2010},
136 ee = {http://dx.doi.org/10.1109/CEC.2010.5586149}
139 @INPROCEEDINGS{DBLP:conf/cec/HorvathC10,
140 author = {Dragos Horvath and Camelia Chira},
141 title = {Simplified chain folding models as metaheuristic benchmark for tuning
142 real protein folding algorithms?},
143 booktitle = {IEEE Congress on Evolutionary Computation},
146 bibsource = {DBLP, http://dblp.uni-trier.de},
147 crossref = {DBLP:conf/cec/2010},
148 ee = {http://dx.doi.org/10.1109/CEC.2010.5585932}
151 @INPROCEEDINGS{DBLP:conf/cec/IslamC10,
152 author = {Md. Kamrul Islam and Madhu Chetty},
153 title = {Clustered memetic algorithm for protein structure prediction},
154 booktitle = {IEEE Congress on Evolutionary Computation},
157 bibsource = {DBLP, http://dblp.uni-trier.de},
158 crossref = {DBLP:conf/cec/2010},
159 ee = {http://dx.doi.org/10.1109/CEC.2010.5586187}
162 @INPROCEEDINGS{Ker06,
163 author = {Andrew D. Ker},
164 title = {Batch Steganography and Pooled Steganalysis},
165 booktitle = {Information Hiding},
168 bibsource = {DBLP, http://dblp.uni-trier.de},
169 crossref = {DBLP:conf/ih/2006},
170 ee = {http://dx.doi.org/10.1007/978-3-540-74124-4_18},
172 timestamp = {2009.06.29}
175 @INPROCEEDINGS{Lin2009,
176 author = {H.-Y. Lin and T.-C. Chiang},
177 title = {Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic
178 Curve Based Cryptosystems},
182 bibsource = {DBLP, http://dblp.uni-trier.de},
183 crossref = {DBLP:conf/cdve/2009},
184 ee = {http://dx.doi.org/10.1007/978-3-642-04265-2_58}
187 @INPROCEEDINGS{DBLP:conf/cse/MaimourPH09,
188 author = {Moufida Maimour and CongDuc Pham and Doan B. Hoang},
189 title = {A Congestion Control Framework for Handling Video Surveillance Traffics
191 booktitle = {CSE (2)},
194 bibsource = {DBLP, http://dblp.uni-trier.de},
195 crossref = {DBLP:conf/cse/2009},
196 ee = {http://dx.doi.org/10.1109/CSE.2009.200}
199 @INPROCEEDINGS{DBLP:conf/icumt/MakhoulSP09,
200 author = {Abdallah Makhoul and Rachid Saadi and CongDuc Pham},
201 title = {Coverage and adaptive scheduling algorithms for criticality management
202 on video wireless sensor networks},
206 bibsource = {DBLP, http://dblp.uni-trier.de},
207 crossref = {DBLP:conf/icumt/2009},
208 ee = {http://dx.doi.org/10.1109/ICUMT.2009.5345630}
211 @INPROCEEDINGS{Mittelholzer99,
212 author = {Thomas Mittelholzer},
213 title = {An Information-Theoretic Approach to Steganography and Watermarking},
214 booktitle = {Information Hiding},
217 bibsource = {DBLP, http://dblp.uni-trier.de},
218 crossref = {DBLP:conf/ih/1999},
220 timestamp = {2009.06.29}
223 @INPROCEEDINGS{PellegriniBA10,
224 author = {Andrea Pellegrini and Valeria Bertacco and Todd M. Austin},
225 title = {Fault-based attack of RSA authentication},
229 bibsource = {DBLP, http://dblp.uni-trier.de},
230 crossref = {DBLP:conf/date/2010},
231 ee = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5456933}
234 @INPROCEEDINGS{DBLP:conf/cec/Perez-HernandezRG10,
235 author = {Luis Germ{\'a}n P{\'e}rez-Hern{\'a}ndez and Katya Rodr\'{\i}guez-V{\'a}zquez
236 and Ram{\'o}n Gardu{\~n}o-Ju{\'a}rez},
237 title = {Estimation of 3D Protein Structure by means of parallel Particle
239 booktitle = {IEEE Congress on Evolutionary Computation},
242 bibsource = {DBLP, http://dblp.uni-trier.de},
243 crossref = {DBLP:conf/cec/2010},
244 ee = {http://dx.doi.org/10.1109/CEC.2010.5586549}
247 @INPROCEEDINGS{WangNHZH07,
248 author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and
250 title = {Robust and High Capacity Image Watermarking Based on Jointly Coding
251 and Embedding Optimization},
252 booktitle = {Information Hiding},
255 bibsource = {DBLP, http://dblp.uni-trier.de},
256 crossref = {DBLP:conf/ih/2007},
257 ee = {http://dx.doi.org/10.1007/978-3-540-77370-2_5},
259 timestamp = {2009.06.29}
262 @INPROCEEDINGS{Zhao04,
263 author = {Jian Zhao and Mingquan Zhou and Hongmei Xie and Jinye Peng and Xin
265 title = {A Novel Wavelet Image Watermarking Scheme Combined with Chaos Sequence
267 booktitle = {ISNN (2)},
270 bibsource = {DBLP, http://dblp.uni-trier.de},
271 crossref = {DBLP:conf/isnn/2004-2},
272 ee = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3174{\&}spage=663}
275 @INPROCEEDINGS{Acharya05securecomparison,
276 author = {Acharya, Mithun and Girao, Joao and Westhoff, Dirk},
277 title = {Secure Comparison of Encrypted Data in Wireless Sensor Networks},
278 booktitle = {WIOPT '05: Proceedings of the Third International Symposium on Modeling
279 and Optimization in Mobile, Ad Hoc, and Wireless Networks},
282 address = {Washington, DC, USA},
283 publisher = {IEEE Computer Society},
284 doi = {http://dx.doi.org/10.1109/WIOPT.2005.44},
285 isbn = {0-7695-2267-X}
288 @INPROCEEDINGS{Acimez07onthe,
289 author = {Onur Acıi\c{c}mez and \c{C}etin Kaya Ko\c{c} and Jean-Pierre Seifert},
290 title = {On the power of simple branch prediction analysis },
291 booktitle = {2007 ACM Symposium on Information, Computer and Communications Security
295 publisher = {ACM Press}
299 author = {R. L. Adler and A. G. Konheim and M. H. McAndrew},
300 title = {Topological entropy},
301 journal = {Trans. Amer. Math. Soc.},
306 timestamp = {2008.05.29}
309 @INPROCEEDINGS{Agrawal04,
310 author = {Agrawal, Rakesh and Kiernan, Jerry and Srikant, Ramakrishnan and
312 title = {Order preserving encryption for numeric data},
313 booktitle = {SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference
314 on Management of data},
317 address = {New York, NY, USA},
319 doi = {http://doi.acm.org/10.1145/1007568.1007632},
320 isbn = {1-58113-859-8},
321 location = {Paris, France}
324 @ARTICLE{Anfinsen20071973,
325 author = {Anfinsen, Christian B.},
326 title = {Principles that Govern the Folding of Protein Chains},
332 doi = {10.1126/science.181.4096.223},
333 eprint = {http://www.sciencemag.org/content/181/4096/223.full.pdf},
334 url = {http://www.sciencemag.org/content/181/4096/223.short}
338 author = {D. G. Arques and C. J. Michel},
339 title = {Analytical expression of the purine/pyrimidine autocorrelation function
340 after and before random mutations.},
341 journal = {Math Biosci},
347 abstract = {The mutation process is a classical evolutionary genetic process.
348 The type of mutations studied here is the random substitutions of
349 a purine base R (adenine or guanine) by a pyrimidine base Y (cytosine
350 or thymine) and reciprocally (transversions). The analytical expressions
351 derived allow us to analyze in genes the occurrence probabilities
352 of motifs and d-motifs (two motifs separated by any d bases) on the
353 R/Y alphabet under transversions. These motif probabilities can be
354 obtained after transversions (in the evolutionary sense; from the
355 past to the present) and, unexpectedly, also before transversions
356 (after back transversions, in the inverse evolutionary sense, from
357 the present to the past). This theoretical part in Section 2 is a
358 first generalization of a particular formula recently derived. The
359 application in Section 3 is based on the analytical expression giving
360 the autocorrelation function (the d-motif probabilities) before transversions.
361 It allows us to study primitive genes from actual genes. This approach
362 solves a biological problem. The protein coding genes of chloroplasts
363 and mitochondria have a preferential occurrence of the 6-motif YRY(N)6YRY
364 (maximum of the autocorrelation function for d = 6, N = R or Y) with
365 a periodicity modulo 3. The YRY(N)6YRY preferential occurrence without
366 the periodicity modulo 3 is also observed in the RNA coding genes
367 (ribosomal, transfer, and small nuclear RNA genes) and in the noncoding
368 genes (introns and 5' regions of eukaryotic nuclei). However, there
369 are two exceptions to this YRY(N)6YRY rule: the protein coding genes
370 of eukaryotic nuclei, and prokaryotes, where YRY(N)6YRY has the second
371 highest value after YRY(N)0YRY (YRYYRY) with a periodicity modulo
372 3. When we go backward in time with the analytical expression, the
373 protein coding genes of both eukaryotic nuclei and prokaryotes retrieve
374 the YRY(N)6YRY preferential occurrence with a periodicity modulo
375 3 after 0.2 back transversions per base. In other words, the actual
376 protein coding genes of chloroplasts and mitochondria are similar
377 to the primitive protein coding genes of eukaryotic nuclei and prokaryotes.
378 On the other hand, this application represents the first result concerning
379 the mutation process in the model of DNA sequence evolution we recently
380 proposed. According to this model, the actual genes on the R/Y alphabet
381 derive from two successive evolutionary genetic processes: an independent
382 mixing of a few nonrandom types of oligonucleotides leading to genes
383 called primitive followed by a mutation process in these primitive
384 genes.(ABSTRACT TRUNCATED AT 400 WORDS)},
385 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
387 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Mathematics; Models,
388 Genetic; Mutation; Probability; Proteins, genetics; Purines; Pyrimidines},
390 medline-pst = {ppublish},
392 pii = {0025-5564(94)90020-5},
394 timestamp = {2011.05.05}
398 author = {D. G. Arquès and J. P. Fallot and C. J. Michel},
399 title = {An evolutionary analytical model of a complementary circular code
400 simulating the protein coding genes, the 5' and 3' regions.},
401 journal = {Bull Math Biol},
407 abstract = {The self-complementary subset T0 = X0 [symbol: see text] ¿AAA, TTT¿
408 with X0 = ¿AAC, AAT, ACC, ATC, ATT, CAG, CTC, CTG, GAA, GAC, GAG,
409 GAT, GCC, GGC, GGT, GTA, GTC, GTT, TAC, TTC¿ of 22 trinucleotides
410 has a preferential occurrence in the frame 0 (reading frame established
411 by the ATG start trinucleotide) of protein (coding) genes of both
412 prokaryotes and eukaryotes. The subsets T1 = X1 [symbol: see text]
413 ¿CCC¿ and T2 = X2 [symbol: see text] ¿GGG¿ of 21 trinucleotides have
414 a preferential occurrence in the shifted frames 1 and 2 respectively
415 (frame 0 shifted by one and two nucleotides respectively in the 5'-3'
416 direction). T1 and T2 are complementary to each other. The subset
417 T0 contains the subset X0 which has the rarity property (6 x 10(-8)
418 to be a complementary maximal circular code with two permutated maximal
419 circular codes X1 and X2 in the frames 1 and 2 respectively. X0 is
420 called a C3 code. A quantitative study of these three subsets T0,
421 T1, T2 in the three frames 0, 1, 2 of protein genes, and the 5' and
422 3' regions of eukaryotes, shows that their occurrence frequencies
423 are constant functions of the trinucleotide positions in the sequences.
424 The frequencies of T0, T1, T2 in the frame 0 of protein genes are
425 49, 28.5 and 22.5\% respectively. In contrast, the frequencies of
426 T0, T1, T2 in the 5' and 3' regions of eukaryotes, are independent
427 of the frame. Indeed, the frequency of T0 in the three frames of
428 5' (respectively 3') regions is equal to 35.5\% (respectively 38\%)
429 and is greater than the frequencies T1 and T2, both equal to 32.25\%
430 (respectively 31\%) in the three frames. Several frequency asymmetries
431 unexpectedly observed (e.g. the frequency difference between T1 and
432 T2 in the frame 0), are related to a new property of the subset T0
433 involving substitutions. An evolutionary analytical model at three
434 parameters (p, q, t) based on an independent mixing of the 22 codons
435 (trinucleotides in frame 0) of T0 with equiprobability (1/22) followed
436 by t approximately 4 substitutions per codon according to the proportions
437 p approximately 0.1, q approximately 0.1 and r = 1 - p - q approximately
438 0.8 in the three codon sites respectively, retrieves the frequencies
439 of T0, T1, T2 observed in the three frames of protein genes and explains
440 these asymmetries. Furthermore, the same model (0.1, 0.1, t) after
441 t approximately 22 substitutions per codon, retrieves the statistical
442 properties observed in the three frames of the 5' and 3' regions.
443 The complex behaviour of these analytical curves is totally unexpected
444 and a priori difficult to imagine.},
445 doi = {10.1006/bulm.1997.0033},
446 institution = {Equipe de Biologie Théorique, Université de Marne la Vallée, Institut
447 Gaspard Monge, Noisy Le Grand, France. arques@univ-mlv.fr},
448 keywords = {Animals; Biological Evolution; Codon, genetics; Genetic Code; Humans;
449 Mammals; Models, Genetic; Probability; Proteins, genetics; Rodentia;
452 medline-pst = {ppublish},
454 pii = {S0092-8240(97)90033-1},
456 timestamp = {2011.05.05},
457 url = {http://dx.doi.org/10.1006/bulm.1997.0033}
461 author = {D. G. Arquès and C. J. Michel},
462 title = {Analytical expression of the purine/pyrimidine codon probability
463 after and before random mutations.},
464 journal = {Bull Math Biol},
467 pages = {1025--1038},
470 abstract = {Recently, we proposed a new model of DNA sequence evolution (Arquès
471 and Michel. 1990b. Bull. math. Biol. 52, 741-772) according to which
472 actual genes on the purine/pyrimidine (R/Y) alphabet (R = purine
473 = adenine or guanine, Y = pyrimidine = cytosine or thymine) are the
474 result of two successive evolutionary genetic processes: (i) a mixing
475 (independent) process of non-random oligonucleotides (words of base
476 length less than 10: YRY(N)6, YRYRYR and YRYYRY are so far identified;
477 N = R or Y) leading to primitive genes (words of several hundreds
478 of base length) and followed by (ii) a random mutation process, i.e.,
479 transformations of a base R (respectively Y) into the base Y (respectively
480 R) at random sites in these primitive genes. Following this model
481 the problem investigated here is the study of the variation of the
482 8 R/Y codon probabilities RRR, ..., YYY under random mutations. Two
483 analytical expressions solved here allow analysis of this variation
484 in the classical evolutionary sense (from the past to the present,
485 i.e., after random mutations), but also in the inverted evolutionary
486 sense (from the present to the past, i.e., before random mutations).
487 Different properties are also derived from these formulae. Finally,
488 a few applications of these formulae are presented. They prove the
489 proposition in Arquès and Michel (1990b. Bull. math. Biol. 52, 741-772),
490 Section 3.3.2, with the existence of a maximal mean number of random
491 mutations per base of the order 0.3 in the protein coding genes.
492 They also confirm the mixing process of oligonucleotides by excluding
493 the purine/pyrimidine contiguous and alternating tracts from the
494 formation process of primitive genes.},
495 institution = {Université de Franche-Comté, Besançon, France.},
496 keywords = {Base Sequence; Codon; DNA, chemistry/genetics; Mathematics; Models,
497 Genetic; Mutation; Probability; Purines; Pyrimidines},
499 medline-pst = {ppublish},
502 timestamp = {2011.05.05}
505 @ARTICLE{Arques1993b,
506 author = {D. G. Arquès and C. J. Michel},
507 title = {Identification and simulation of new non-random statistical properties
508 common to different eukaryotic gene subpopulations.},
509 journal = {Biochimie},
514 abstract = {The nucleotide distribution in protein coding genes, introns and transfer
515 RNA genes of eukaryotic subpopulations (primates, rodent and mammals)
516 is studied by autocorrelation functions. The autocorrelation function
517 analysing the occurrence probability of the i-motif YRY(N)iYRY (YRY-function)
518 in protein coding genes and transfer RNA genes of these three eukaryotic
519 subpopulations retrieves the preferential occurrence of YRY(N)6YRY
520 (R = purine = adenine or guanine, Y = pyrimidine = cytosine or thymine,
521 N = R or Y). The autocorrelation functions analysing the occurrence
522 probability of the i-motifs RRR(N)iRRR (RRR-function) and YYY(N)iYYY
523 (YYY-function) identify new non-random genetic statistical properties
524 in these three eukaryotic subpopulations, mainly: i) in their protein
525 coding genes: local maxima for i identical to 6 [12] (peaks for i
526 = 6, 18, 30, 42) with the RRR-function and local maxima for i identical
527 to 8 [10] (peaks for i = 8, 18, 28) with the YYY-function; and ii)
528 in their introns: local maxima for i identical to 3 [6] (peaks for
529 i = 3, 9, 15) and a short linear decrease followed by a large exponential
530 decrease both with the RRR- and YYY-functions. The non-random properties
531 identified in eukaryotic intron subpopulations are modelised with
532 a process of random insertions and deletions of nucleotides simulating
534 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
535 d'Informatique de Besançon, France.},
536 keywords = {Animals; Base Sequence; Data Interpretation, Statistical; Genes; Introns;
537 Mammals; Models, Genetic; Primates; Probability; Proteins, genetics;
538 RNA Editing; RNA, Transfer, genetics; Rodentia; Sequence Analysis,
541 medline-pst = {ppublish},
543 pii = {0300-9084(93)90173-P},
545 timestamp = {2011.05.05}
549 author = {D. G. Arquès and C. J. Michel},
550 title = {A simulation of the genetic periodicities modulo 2 and 3 with processes
551 of nucleotide insertions and deletions.},
552 journal = {J Theor Biol},
558 abstract = {Recently, a new genetic process termed RNA editing has been identified
559 showing insertions and deletions of nucleotides in particular RNA
560 molecules. On the other hand, there are a few non-random statistical
561 properties in genes: in particular, the periodicity modulo 3 (P3)
562 associated with an open reading frame, the periodicity modulo 2 (P2)
563 associated with alternating purine/pyrimidine stretches, the YRY(N)6YRY
564 preferential occurrence (R = purine = adenine or guanine, Y = pyrimidine
565 = cytosine or thymine, N = R or Y) representing a "code" of the DNA
566 helix pitch, etc. The problem investigated here is whether a process
567 of the type RNA editing can lead to the non-random statistical properties
568 commonly observed in genes. This paper will show in particular that:
569 The process of insertions and deletions of mononucleotides in the
570 initial sequence [YRY(N)3]* [series of YRY(N)3] can lead to the periodicity
571 modulo 2 (P2). The process of insertions and deletions of trinucleotides
572 in the initial sequence [YRY(N)6]* [series of YRY(N)6] can lead to
573 the periodicity modulo 3 (P3) and the YRY(N)6YRY preferential occurrence.
574 Furthermore, these two processes lead to a strong correlation with
575 the reality, namely the mononucleotide insertion/deletion process,
576 with the 5' eukaryotic regions and the trinucleotide insertion/deletion
577 process, with the eukaryotic protein coding genes.},
578 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
579 Unité Associée CNRS No 822, France.},
580 keywords = {Chromosome Deletion; Computer Simulation; Humans; Models, Genetic;
581 Mutagenesis, genetics; RNA, genetics},
583 medline-pst = {ppublish},
586 timestamp = {2011.05.05}
590 author = {D. G. Arquès and C. J. Michel},
591 title = {Periodicities in coding and noncoding regions of the genes.},
592 journal = {J Theor Biol},
598 abstract = {Gene population statistical studies of protein coding genes and introns
599 have identified two types of periodicities on the purine/pyrimidine
600 alphabet: (i) the modulo 3 periodicity or coding periodicity (periodicity
601 P3) in protein coding genes of eukaryotes, prokaryotes, viruses,
602 chloroplasts, mitochondria, plasmids and in introns of viruses and
603 mitochondria, and (ii) the modulo 2 periodicity (periodicity P2)
604 in the eukaryotic introns. The periodicity study is herein extended
605 to the 5' and 3' regions of eukaryotes, prokaryotes and viruses and
606 shows: (i) the periodicity P3 in the 5' and 3' regions of eukaryotes.
607 Therefore, these observations suggest a unitary and dynamic concept
608 for the genes as for a given genome, the 5' and 3' regions have the
609 genetic information for protein coding genes and for introns: (1)
610 In the eukaryotic genome, the 5' (P2 and P3) and 3' (P2 and P3) regions
611 have the information for protein coding genes (P3) and for introns
612 (P2). The intensity of P3 is high in 5' regions and weak in 3' regions,
613 while the intensity of P2 is weak in 5' regions and high in 3' regions.
614 (2) In the prokaryotic genome, the 5' (P3) and 3' (P3) regions have
615 the information for protein coding genes (P3). (3) In the viral genome,
616 the 5' (P3) and 3' (P3) regions have the information for protein
617 coding genes (P3) and for introns (P3). The absence of P2 in viral
618 introns (in opposition to eukaryotic introns) may be related to the
619 absence of P2 in 5' and 3' regions of viruses.},
620 institution = {Université de Franche-Comté, Unité Associée CNRS No. 822, Besançon,
622 keywords = {Animals; Base Sequence; Eukaryotic Cells; Genes; Introns; Prokaryotic
623 Cells; Purine Nucleotides; Pyrimidine Nucleotides; Repetitive Sequences,
624 Nucleic Acid; Viruses, genetics},
626 medline-pst = {ppublish},
629 timestamp = {2011.05.05}
632 @ARTICLE{Arques1990a,
633 author = {D. G. Arquès and C. J. Michel},
634 title = {A model of DNA sequence evolution.},
635 journal = {Bull Math Biol},
640 abstract = {Statistical studies of gene populations on the purine/pyrimidine alphabet
641 have shown that the mean occurrence probability of the i-motif YRY(N)iYRY
642 (R = purine, Y = pyrimidine, N = R or Y) is not uniform by varying
643 i in the range, but presents a maximum at i = 6 in the following
644 populations: protein coding genes of eukaryotes, prokaryotes, chloroplasts
645 and mitochondria, and also viral introns, ribosomal RNA genes and
646 transfer RNA genes (Arquès and Michel, 1987b, J. theor. Biol. 128,
647 457-461). From the "universality" of this observation, we suggested
648 that the oligonucleotide YRY(N)6 is a primitive one and that it has
649 a central function in DNA sequence evolution (Arquès and Michel,
650 1987b, J. theor. Biol. 128, 457-461). Following this idea, we introduce
651 a concept of a model of DNA sequence evolution which will be validated
652 according to a schema presented in three parts. In the first part,
653 using the last version of the gene database, the YRY(N)6YRY preferential
654 occurrence (maximum at i = 6) is confirmed for the populations mentioned
655 above and is extended to some newly analysed populations: chloroplast
656 introns, chloroplast 5' regions, mitochondrial 5' regions and small
657 nuclear RNA genes. On the other hand, the YRY(N)6YRY preferential
658 occurrence and periodicities are used in order to classify 18 gene
659 populations. In the second part, we will demonstrate that several
660 statistical features characterizing different gene populations (in
661 particular the YRY(N)6YRY preferential occurrence and the periodicities)
662 can be retrieved from a simple Markov model based on the mixing of
663 the two oligonucleotides YRY(N)6 and YRY(N)3 and based on the percentages
664 of RYR and YRY in the unspecified trinucleotides (N)3 of YRY(N)6
665 and YRY(N)3. Several properties are identified and prove in particular
666 that the oligonucleotide mixing is an independent process and that
667 several different features are functions of a unique parameter. In
668 the third part, the return of the model to the reality shows a strong
669 correlation between reality and simulation concerning the presence
670 of a large alternating purine/pyrimidine stretches and of periodicities.
671 It also contributes to a greater understanding of biological reality,
672 e.g. the presence or the absence of large alternating purine/pyrimidine
673 stretches can be explained as being a simple consequence of the mixing
674 of two particular oligonucleotides. Finally, we believe that such
675 an approach is the first step toward a unified model of DNA sequence
676 evolution allowing the molecular understanding of both the origin
677 of life and the actual biological reality.},
678 institution = {Université de Franche-Comté, Laboratoire d'Informatique de Besançon,
679 Unité Associée CNRS No 822, France.},
680 keywords = {Base Sequence; Biological Evolution; DNA, genetics; Genetics, Population;
683 medline-pst = {ppublish},
686 timestamp = {2011.05.05}
689 @ARTICLE{Arques1993a,
690 author = {D. G. Arquès and C. J. Michel and K. Orieux},
691 title = {Identification and simulation of new non-random statistical properties
692 common to different populations of eukaryotic non-coding genes.},
693 journal = {J Theor Biol},
699 abstract = {The autocorrelation function analysing the occurrence probability
700 of the i-motif YRY(N)iYRY in genes allows the identification of mainly
701 two periodicities modulo 2, 3 and the preferential occurrence of
702 the motif YRY(N)6YRY (R = purine = adenine or guanine, Y = pyrimidine
703 = cytosine or thymine, N = R or Y). These non-random genetic statistical
704 properties can be simulated by an independent mixing of the three
705 oligonucleotides YRYRYR, YRYYRY and YRY(N)6 (Arquès & Michel, 1990b).
706 The problem investigated in this study is whether new properties
707 can be identified in genes with other autocorrelation functions and
708 also simulated with an oligonucleotide mixing model. The two autocorrelation
709 functions analysing the occurrence probability of the i-motifs RRR(N)iRRR
710 and YYY(N)iYYY simultaneously identify three new non-random genetic
711 statistical properties: a short linear decrease, local maxima for
712 i identical to 3[6] (i = 3, 9, etc) and a large exponential decrease.
713 Furthermore, these properties are common to three different populations
714 of eukaryotic non-coding genes: 5' regions, introns and 3' regions
715 (see section 2). These three non-random properties can also be simulated
716 by an independent mixing of the four oligonucleotides R8, Y8, RRRYRYRRR,
717 YYYRYRYYY and large alternating R/Y series. The short linear decrease
718 is a result of R8 and Y8, the local maxima for i identical to 3[6],
719 of RRRYRYRRR and YYYRYRYYY, and the large exponential decrease, of
720 large alternating R/Y series (section 3). The biological meaning
721 of these results and their relation to the previous oligonucleotide
722 mixing model are presented in the Discussion.},
723 doi = {10.1006/jtbi.1993.1059},
724 institution = {Equipe de Biologie Théorique, Université de Franche-Comté, Laboratoire
725 d'Informatique de Besançon, France.},
726 keywords = {Animals; Biological Evolution; Genes, genetics; Models, Genetic; Models,
727 Statistical; Mutation, genetics; Oligonucleotides, genetics; Probability},
729 medline-pst = {ppublish},
731 pii = {S0022-5193(83)71059-3},
733 timestamp = {2011.05.05},
734 url = {http://dx.doi.org/10.1006/jtbi.1993.1059}
738 author = {David Arroyo and Gonzalo Alvarez and Veronica Fernandez},
739 title = {On the inadequacy of the logistic map for cryptographic applications},
740 journal = {X Reunión Española sobre Criptología y Seguridad de la Información
745 owner = {christophe},
746 timestamp = {2010.03.01}
749 @MISC{Backofen99algorithmicapproach,
750 author = {R. Backofen and S. Will and P. Clote},
751 title = {Algorithmic Approach To Quantifying The Hydrophobic Force Contribution
756 @INPROCEEDINGS{bcgr11:ip,
757 author = {Bahi, Jacques and Couchot, Jean-fran\c{c}ois and Guyeux, Christophe
758 and Richard, Adrien},
759 title = {On the Link Between Strongly Connected Iteration Graphs and Chaotic
760 Boolean Discrete-Time Dynamical Systems},
761 booktitle = {FCT'11, 18th Int. Symp. on Fundamentals of Computation Theory},
766 address = {Oslo, Norway},
770 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
776 author = {Bahi, Jacques and Guyeux, Christophe},
777 title = {Hash Functions Using Chaotic Iterations},
778 journal = {Journal of Algorithms \& Computational Technology},
784 doi = {10.1260/1748-3018.4.2.167},
785 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
790 url = {http://dx.doi.org/10.1260/1748-3018.4.2.167}
793 @INPROCEEDINGS{guyeux10ter,
794 author = {Bahi, Jacques and Guyeux, Christophe},
795 title = {A new chaos-based watermarking algorithm},
796 booktitle = {SECRYPT'10, Int. conf. on security and cryptography},
799 address = {Athens, Greece},
801 publisher = {SciTePress},
803 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
808 @INPROCEEDINGS{bgc11:ip,
809 author = {Bahi, Jacques and Guyeux, Christophe and Cote, Nathalie},
810 title = {Chaos of Protein Folding},
811 booktitle = {IJCNN 2011, Int. Joint Conf. on Neural Networks},
814 address = {San Jose, California, United States},
818 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
823 @INPROCEEDINGS{guyeux10bis,
824 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
825 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
827 booktitle = {SENSORCOMM'10, 4-th Int. Conf. on Sensor Technologies and Applications},
830 address = {Venice-Mestre, Italy},
833 doi = {10.1109/SENSORCOMM.2010.76},
834 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
837 url = {http://dx.doi.org/10.1109/SENSORCOMM.2010.76}
840 @INPROCEEDINGS{guyeuxVictoria,
841 author = {Bahi, Jacques and Guyeux, Christophe and Makhoul, Abdallah},
842 title = {Secure Data Aggregation in Wireless Sensor Networks. Homomorphism
843 versus Watermarking Approach},
844 booktitle = {ADHOCNETS 2010, 2nd Int. Conf. on Ad Hoc Networks},
847 series = {Lecture Notes in ICST},
849 address = {Victoria, Canada},
852 doi = {10.1007/978-3-642-17994-5_23},
853 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
856 url = {http://dx.doi.org/10.1007/978-3-642-17994-5_23}
859 @INPROCEEDINGS{bgs11:ip,
860 author = {Bahi, Jacques and Guyeux, Christophe and Salomon, Michel},
861 title = {Building a Chaotic Proven Neural Network},
862 booktitle = {ICCANS 2011, IEEE Int. Conf. on Computer Applications and Network
866 address = {Maldives, Maldives},
869 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
874 @INPROCEEDINGS{bgw10:ip,
875 author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue},
876 title = {A Pseudo Random Numbers Generator Based on Chaotic Iterations. Application
878 booktitle = {WISM 2010, Int. Conf. on Web Information Systems and Mining},
883 address = {Sanya, China},
886 doi = {10.1007/978-3-642-16515-3_26},
887 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
890 url = {http://dx.doi.org/10.1007/978-3-642-16515-3_26}
893 @INPROCEEDINGS{bgw09:ip,
894 author = {Bahi, Jacques and Guyeux, Christophe and Wang, Qianxue},
895 title = {A novel pseudo-random generator based on discrete chaotic iterations},
896 booktitle = {INTERNET'09, 1-st Int. Conf. on Evolving Internet},
899 address = {Cannes, France},
902 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
907 @INPROCEEDINGS{bmg10:onp,
908 author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe},
909 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
910 Networks for critical applications},
911 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
912 et Applications Critiques de Surveillance},
914 address = {Bayonne, France},
916 note = {Communication orale},
918 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
923 @INPROCEEDINGS{guyeuxBayonne,
924 author = {Bahi, Jacques and Makhoul, Abdallah and Guyeux, Christophe},
925 title = {Efficient and Robust Secure Aggregation of Encrypted Data in Sensor
926 Networks for critical applications},
927 booktitle = {RESSACS, Journ\'ee th\'ematique PHC/ResCom sur RESeaux de capteurS
928 et Applications Critiques de Surveillance},
930 address = {Bayonne, France},
932 note = {Communication orale},
939 author = {Bahi, Jacques and Salomon, Michel},
940 title = {A Decentralized Energy-based Diffusion Algorithm to Increase the
941 Lifetime of {MANETs}},
942 journal = {Computer Networks Journal},
945 note = {Accepted manuscript. To appear},
948 impact-factor = {1.201},
951 publisher = {Elsevier}
955 author = {J. M. Bahi},
956 title = {Boolean totally asynchronous iterations},
957 journal = {Int. Journal of Mathematical Algorithms},
962 timestamp = {17/02/2008}
965 @ARTICLE{Bahi2000bis,
966 author = {Jacques M. Bahi},
967 title = {Asynchronous iterative algorithms for nonexpansive linear systems},
968 journal = {Journal of Parallel and Distributed Computing},
973 timestamp = {2009.01.10}
977 author = {J. M. Bahi},
978 title = {Parallel synchronous chaotic iterations for singular linear systems},
979 journal = {Parallel Algorithms and Applications},
984 timestamp = {17/02/2008}
988 author = {Jacques M. Bahi},
989 title = {Algorithmes paralleles asynchrones pour les systemes singuliers},
990 journal = {Comptes Rendus de l'Academie des Sciences},
992 volume = {t. 326, serie 1},
993 pages = {1421--1425},
995 timestamp = {2009.01.18}
999 author = {Jacques M. Bahi},
1000 title = {Méthodes itératives dans des espaces produits. Application au calcul
1002 school = {Université de Franche-Comté},
1004 type = {Habilitation à diriger des recherches},
1005 owner = {christophe},
1006 timestamp = {2010.08.24}
1010 author = {Jacques M. Bahi},
1011 title = {Algorithmes asynchrones pour des systèmes différentiels-algébriques.
1012 Simulation numérique sur des exemples de circuits électriques},
1013 school = {Université de Franche-Comté},
1015 owner = {christophe},
1016 timestamp = {2010.08.24}
1020 author = {Jacques M. Bahi and Sylvain Contassot-Vivier},
1021 title = {Basins of attraction in fully asynchronous discrete-time discrete-state
1023 journal = {IEEE Transactions on Neural Networks},
1030 timestamp = {2009.12.04}
1034 author = {J.~M. Bahi and S. Contassot-Vivier},
1035 title = {Stability of fully asynchronous discrete-time discrete state dynamic
1037 journal = {IEEE Transactions on Neural Networks},
1040 pages = {1353-1363},
1042 timestamp = {2009.02.14}
1045 @TECHREPORT{bcgg10:ir,
1046 author = {Bahi, J. M. and Couchot, J.-F. and Grasset, O. and Guyeux, C.},
1047 title = {{D}iscrete {D}ynamical {S}ystems: {N}ecessary {D}ivergence {C}onditions
1048 for {S}ynchronous {I}terations},
1049 institution = {LIFC - Laboratoire d'{I}nformatique de l'{U}niversit\'{e} de {F}ranche
1052 type = {Research Report},
1053 number = {RR2010-04},
1055 pdf = {/~publis/papers/pub/2010/RR2010-04.pdf}
1059 author = {Bahi, Jacques M. and Guyeux, Christophe},
1060 title = {Hash Functions Using Chaotic Iterations},
1061 journal = {Journal of Algorithms \& Computational Technology},
1066 classement = {ACLNI},
1067 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1069 impact-factor = {#},
1074 @INPROCEEDINGS{guyeux10,
1075 author = {Bahi, Jacques M. and Guyeux, Christophe},
1076 title = {Topological chaos and chaotic iterations, application to Hash functions},
1077 booktitle = {WCCI'10, IEEE World Congress on Computational Intelligence},
1080 address = {Barcelona, Spain},
1082 note = {Best paper award},
1083 classement = {ACTI},
1084 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1090 author = {Jacques M. Bahi and Christophe Guyeux},
1091 title = {A chaos-based approach for information hiding security.},
1092 howpublished = {arXiv},
1095 institution = {Computer Science Laboratory LIFC, University of Franche-Comte, France}
1099 author = {Jacques M. Bahi and Christophe Guyeux},
1100 title = {A watermarking algorithm satisfying topological chaos properties},
1103 volume = {abs/0810.4713},
1104 bibsource = {DBLP, http://dblp.uni-trier.de},
1105 ee = {http://arxiv.org/abs/0810.4713}
1109 author = {Jacques M. Bahi and Christophe Guyeux},
1110 title = {Chaotic iterations and topological chaos},
1112 abstract = {Chaotic iterations have been introduced on the one hand by Chazan,
1113 Miranker [5] and Miellou [9] in a numerical analysis context, and
1114 on the other hand by Robert [11] and Pellegrin [10] in the discrete
1115 dynamical systems framework. In both cases, the objective was to
1116 derive conditions of convergence of such iterations to a fixed state.
1117 In this paper, a new point of view is presented, the goal here is
1118 to derive conditions under which chaotic iterations admit a chaotic
1119 behaviour in a rigorous mathematical sense. Contrary to what has
1120 been studied in the literature, convergence is not desired. More
1121 precisely, we establish in this paper a link between the concept
1122 of chaotic iterations on a finite set and the notion of topological
1123 chaos [8], [6], [7]. We are motivated by concrete applications of
1124 our approach, such as the use of chaotic boolean iterations in the
1125 computer security field. Indeed, the concept of chaos is used in
1126 many areas of data security without real rigorous theoretical foundations,
1127 and without using the fundamental properties that allow chaos. The
1128 wish of this paper is to bring a bit more mathematical rigour in
1130 citeseerurl = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1132 comments = {6 pages},
1133 eprint = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}},
1134 oai2identifier = {0810.3154},
1136 timestamp = {2008.10.23},
1137 url = {\href{http://arxiv.org/abs/0810.3154v1}{arXiv:0810.3154}}
1140 @ARTICLE{arxivRNNchaos,
1141 author = {Jacques M. Bahi and Christophe Guyeux and Michel Salomon},
1142 title = {Building a Chaotic Proved Neural Network},
1145 volume = {abs/1101.4351},
1146 ee = {http://arxiv.org/abs/1101.4351}
1149 @INPROCEEDINGS{guyeuxTaiwan10,
1150 author = {Bahi, Jacques M. and Guyeux, Christophe and Wang, Qianxue},
1151 title = {Improving random number generators by chaotic iterations. Application
1153 booktitle = {ICCASM 2010, Int. Conf. on Computer Application and System Modeling},
1155 pages = {V13-643--V13-647},
1156 address = {Taiyuan, China},
1158 classement = {ACTI},
1159 doi = {10.1109/ICCASM.2010.5622199},
1160 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
1163 url = {http://dx.doi.org/10.1109/ICCASM.2010.5622199}
1167 author = {Jacques M Bahi and Christian J Michel},
1168 title = {A stochastic model of gene evolution with time dependent pseudochaotic
1170 journal = {Bull Math Biol},
1176 abstract = {We develop here a new class of stochastic models of gene evolution
1177 in which a random subset of the 64 possible trinucleotides mutates
1178 at each evolutionary time t according to some time dependent substitution
1179 probabilities. Therefore, at each time t, the numbers and the types
1180 of mutable trinucleotides are unknown. Thus, the mutation matrix
1181 changes at each time t. This pseudochaotic model developed generalizes
1182 the standard model in which all the trinucleotides mutate at each
1183 time t. It determines the occurrence probabilities at time t of trinucleotides
1184 which pseudochaotically mutate according to 3 time dependent substitution
1185 parameters associated with the 3 trinucleotide sites. The main result
1186 proves that under suitable assumptions, this pseudochaotic model
1187 converges to a uniform probability vector identical to that of the
1188 standard model. Furthermore, an application of this pseudochaotic
1189 model allows an evolutionary study of the 3 circular codes identified
1190 in both eukaryotic and prokaryotic genes. A circular code is a particular
1191 set of trinucleotides whose main property is the retrieval of the
1192 frames in genes locally, i.e., anywhere in genes and particularly
1193 without start codons, and automatically with a window of a few nucleotides.
1194 After a certain evolutionary time and with particular time dependent
1195 functions for the 3 substitution parameters, precisely an exponential
1196 decrease in the 1st and 2nd trinucleotide sites and an exponential
1197 increase in the 3rd one, this pseudochaotic model retrieves the main
1198 statistical properties of the 3 circular codes observed in genes.
1199 Furthermore, it leads to a circular code asymmetry stronger than
1200 the standard model (nonpseudochaotic) and, therefore, to a better
1201 correlation with the genes.},
1202 doi = {10.1007/s11538-008-9376-4},
1203 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1204 90016, Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1205 keywords = {Evolution, Molecular; Genes; Models, Genetic; Mutation; Stochastic
1208 medline-pst = {ppublish},
1211 timestamp = {2011.05.05},
1212 url = {http://dx.doi.org/10.1007/s11538-008-9376-4}
1216 author = {Jacques M Bahi and Christian J Michel},
1217 title = {A stochastic model of gene evolution with chaotic mutations.},
1218 journal = {J Theor Biol},
1224 abstract = {We develop here a new class of stochastic models of gene evolution
1225 in which the mutations are chaotic, i.e. a random subset of the 64
1226 possible trinucleotides mutates at each evolutionary time t according
1227 to some substitution probabilities. Therefore, at each time t, the
1228 numbers and the types of mutable trinucleotides are unknown. Thus,
1229 the mutation matrix changes at each time t. The chaotic model developed
1230 generalizes the standard model in which all the trinucleotides mutate
1231 at each time t. It determines the occurrence probabilities at time
1232 t of trinucleotides which chaotically mutate according to three substitution
1233 parameters associated with the three trinucleotide sites. Two theorems
1234 prove that this chaotic model has a probability vector at each time
1235 t and that it converges to a uniform probability vector identical
1236 to that of the standard model. Furthermore, four applications of
1237 this chaotic model (with a uniform random strategy for the 64 trinucleotides
1238 and with a particular strategy for the three stop codons) allow an
1239 evolutionary study of the three circular codes identified in both
1240 eukaryotic and prokaryotic genes. A circular code is a particular
1241 set of trinucleotides whose main property is the retrieval of the
1242 frames in genes locally, i.e. anywhere in genes and particularly
1243 without start codons, and automatically with a window of a few nucleotides.
1244 After a certain evolutionary time and with particular values for
1245 the three substitution parameters, the chaotic models retrieve the
1246 main statistical properties of the three circular codes observed
1247 in genes. These applications also allow an evolutionary comparison
1248 between the standard and chaotic models.},
1249 doi = {10.1016/j.jtbi.2008.07.028},
1250 institution = {LIFC-EA 4157, Université de Franche-Comté, IUT de Belfort, BP 527,
1251 90016 Belfort Cedex, France. jacques.bahi@univ-fcomte.fr},
1252 keywords = {Animals; Computer Simulation; DNA, Circular, genetics; Evolution,
1253 Molecular; Genetic Code; Models, Genetic; Mutation; Nonlinear Dynamics;
1254 Stochastic Processes; Time},
1256 medline-pst = {ppublish},
1258 pii = {S0022-5193(08)00395-0},
1260 timestamp = {2011.05.05},
1261 url = {http://dx.doi.org/10.1016/j.jtbi.2008.07.028}
1264 @ARTICLE{Bahi2008bis,
1265 author = {Bahi, J. M. and Michel, C. J.},
1266 title = {A stochastic model of gene evolution with chaotic mutations},
1267 journal = {Journal of Theoretical Biology},
1272 timestamp = {2009.01.10}
1276 author = {Jacques M Bahi and Christian J Michel},
1277 title = {A stochastic gene evolution model with time dependent mutations.},
1278 journal = {Bull Math Biol},
1284 abstract = {We develop here a new class of gene evolution models in which the
1285 nucleotide mutations are time dependent. These models allow to study
1286 nonlinear gene evolution by accelerating or decelerating the mutation
1287 rates at different evolutionary times. They generalize the previous
1288 ones which are based on constant mutation rates. The stochastic model
1289 developed in this class determines at some time t the occurrence
1290 probabilities of trinucleotides mutating according to 3 time dependent
1291 substitution parameters associated with the 3 trinucleotide sites.
1292 Therefore, it allows to simulate the evolution of the circular code
1293 recently observed in genes. By varying the class of function for
1294 the substitution parameters, 1 among 12 models retrieves after mutation
1295 the statistical properties of the observed circular code in the 3
1296 frames of actual genes. In this model, the mutation rate in the 3rd
1297 trinucleotide site increases during gene evolution while the mutation
1298 rates in the 1st and 2nd sites decrease. This property agrees with
1299 the actual degeneracy of the genetic code. This approach can easily
1300 be generalized to study evolution of motifs of various lengths, e.g.,
1301 dicodons, etc., with time dependent mutations.},
1302 doi = {10.1016/j.bulm.2003.10.004},
1303 institution = {LIFC - FRE CNRS 2661, IUT de Belfort, Université de Franche-Comté,
1304 BP 527, 90016 Belfort Cédex, France. bahi@iut-bm.univ-fcomte.fr},
1305 keywords = {Codon, genetics; Evolution, Molecular; Genes, genetics; Genetic Code,
1306 genetics; Models, Genetic; Mutation; Stochastic Processes},
1308 medline-pst = {ppublish},
1310 pii = {S0092824003001174},
1312 timestamp = {2011.05.05},
1313 url = {http://dx.doi.org/10.1016/j.bulm.2003.10.004}
1317 author = {J. Banks and J. Brooks and G. Cairns and P. Stacey},
1318 title = {On Devaney's Definition of Chaos},
1319 journal = {Amer. Math. Monthly},
1325 timestamp = {27/01/2008}
1329 author = {E. Barker and A. Roginsky},
1330 title = {DRAFT NIST Special Publication 800-131 Recommendation for the Transitioning
1331 of Cryptographic Algorithms and Key Sizes},
1333 owner = {christophe},
1334 timestamp = {2010.08.18}
1338 author = {Mauro Barni and Franco Bartolini and Teddy Furon},
1339 title = {A general framework for robust watermarking security},
1340 journal = {Signal Processing},
1343 pages = {2069-2084},
1345 note = {Special issue on Security of Data Hiding Technologies, invited paper},
1346 bibsource = {DBLP, http://dblp.uni-trier.de},
1347 ee = {http://dx.doi.org/10.1016/S0165-1684(03)00168-3},
1349 timestamp = {2009.06.30}
1353 author = {Baudet, G\'{e}rard M.},
1354 title = {Asynchronous Iterative Methods for Multiprocessors},
1360 address = {New York, NY, USA},
1361 doi = {http://doi.acm.org/10.1145/322063.322067},
1367 author = {Didier El Baz},
1368 title = {Contribution à l'algorithmique parallèle. Le concept d'asynchronisme
1369 : étude théorique, mise en œuvre, et application},
1370 school = {Institut national polytechnique de Toulouse},
1372 type = {Habilitation à diriger des recherches},
1373 owner = {christophe},
1374 timestamp = {2010.08.24}
1378 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1379 title = {Contention awareness and fault-tolerant scheduling for precedence
1380 constrained tasks in heterogeneous systems},
1381 journal = {Parallel Computing},
1387 doi = {10.1016/j.parco.2008.11.001},
1390 url = {http://dx.doi.org/10.1016/j.parco.2008.11.001}
1393 @INPROCEEDINGS{bhr08b:bl,
1394 author = {Benoit, Anne and Hakem, Mourad and Robert, Yves},
1395 title = {Fault tolerant scheduling of precedence task graphs on heterogeneous
1397 booktitle = {IPDPS'08},
1400 publisher = {IEEE Computer Society Press},
1406 @INPROCEEDINGS{Berger98,
1407 author = {Berger, Bonnie and Leighton, Tom},
1408 title = {Protein folding in the hydrophobic-hydrophilic (HP) is NP-complete},
1409 booktitle = {Proceedings of the second annual international conference on Computational
1412 series = {RECOMB '98},
1414 address = {New York, NY, USA},
1417 isbn = {0-89791-976-9},
1418 location = {New York, New York, United States},
1423 title = {Parallel and distributed computation: numerical methods},
1424 publisher = {Prentice-Hall, Inc.},
1426 author = {Bertsekas, Dimitri P. and Tsitsiklis, John N.},
1427 address = {Upper Saddle River, NJ, USA},
1428 isbn = {0-13-648700-9}
1431 @MISC{Bertsekas88paralleland,
1432 author = {Dimitri P. Bertsekas and John N. Tsitsiklis},
1433 title = {Parallel and distributed iterative algorithms: a selective survey},
1438 author = {F. Blanchard and E. Glasner and S. Kolyada and A.Maass},
1439 title = {On Li-Yorke pairs},
1443 timestamp = {2008.01.02}
1447 author = {F. Blanchard and B. Host and S. Ruette},
1448 title = {Asymptotic pairs in positive-entropy systems},
1450 optannote = {to appear in Ergod. Th. Dynam. Sys.},
1453 timestamp = {2008.01.02}
1457 author = {Dan Boneh and Matt Franklin},
1458 title = {Identity-Based Encryption from the {Weil} Pairing},
1459 journal = {SIAM J. of Computing},
1464 note = {Extended abstract in Crypto'01}
1467 @INCOLLECTION{boneh,
1468 author = {Boneh, Dan and Goh, Eu-Jin and Nissim, Kobbi},
1469 title = {Evaluating 2-DNF Formulas on Ciphertexts},
1472 abstract = {Let ψ be a 2-DNF formula on boolean variables x 1,..., x n ∈ {0,1}.
1473 We present a homomorphic public key encryption scheme that allows
1474 the public evaluation of ψ given an encryption of the variables x
1475 1,..., x n. In other words, given the encryption of the bits x 1,...,
1476 x n, anyone can create the encryption of ψ( x 1,..., x n). More generally,
1477 we can evaluate quadratic multi-variate polynomials on ciphertexts
1478 provided the resulting value falls within a small set. We present
1479 a number of applications of the system: 1 In a database of size n,
1480 the total communication in the basic step of the Kushilevitz-Ostrovsky
1481 PIR protocol is reduced from to . 2 An efficient election system
1482 based on homomorphic encryption where voters do not need to include
1483 non-interactive zero knowledge proofs that their ballots are valid.
1484 The election system is proved secure without random oracles but still
1485 efficient. 3 A protocol for universally verifiable computation.},
1486 citeulike-article-id = {2719460},
1487 citeulike-linkout-0 = {http://www.springerlink.com/content/wtt5caxkr94laxkg},
1488 journal = {Theory of Cryptography},
1489 keywords = {homomorphic, pairings},
1490 posted-at = {2008-04-25 21:53:15},
1492 url = {http://www.springerlink.com/content/wtt5caxkr94laxkg}
1496 author = {Bonneau, Richard and Baker, David},
1497 title = {AB INITIO PROTEIN STRUCTURE PREDICTION: Progress and Prospects},
1498 journal = {Annual Review of Biophysics and Biomolecular Structure},
1503 doi = {10.1146/annurev.biophys.30.1.173}
1507 author = {R. Bowen},
1508 title = {Entropy for group endomorphisms and homogeneous spaces},
1509 journal = {Trans. Amer. Math. Soc.},
1514 timestamp = {15/02/2008}
1518 author = {R. Bowen},
1519 title = {Periodic points and measures for Axiom A diffeomorphisms},
1520 journal = {Trans. Amer. Math. Soc.},
1525 timestamp = {15/02/2008}
1528 @ARTICLE{Braxenthaler97,
1529 author = {Michael Braxenthaler and R. Ron Unger and Ditza Auerbach and John
1531 title = {Chaos in protein dynamics},
1532 journal = {Proteins-structure Function and Bioinformatics},
1536 doi = {10.1002/(SICI)1097-0134(199712)29:4<417::AID-PROT2>3.3.CO;2-O},
1540 @INPROCEEDINGS{Brumley03remotetiming,
1541 author = {David Brumley and Dan Boneh},
1542 title = {Remote Timing Attacks are Practical},
1543 booktitle = {Proceedings of the 12th USENIX Security Symposium},
1548 @ARTICLE{Bohm1991375,
1549 author = {Gerald Böhm},
1550 title = {Protein folding and deterministic chaos: Limits of protein folding
1551 simulations and calculations},
1552 journal = {Chaos, Solitons \& Fractals},
1555 pages = {375 - 382},
1557 doi = {DOI: 10.1016/0960-0779(91)90028-8},
1559 url = {http://www.sciencedirect.com/science/article/B6TJ4-46CBXVT-1X/2/370489c218e4c2732cd9b620ef50c696}
1562 @INCOLLECTION{Cachin2004,
1563 author = {Cachin, Christian},
1564 title = {An Information-Theoretic Model for Steganography},
1565 booktitle = {Information Hiding},
1566 publisher = {Springer Berlin / Heidelberg},
1569 series = {Lecture Notes in Computer Science},
1571 affiliation = {MIT Laboratory for Computer Science 545 Technology Square Cambridge
1576 author = {H. Cam and S. Ozdemir and P. Nair and D. Muthuavinashinappan and
1578 title = {ESPDA: Energy-efficient secure pattern based data aggregation for
1579 wireless sensor networks.},
1580 journal = {Computer Communication journal (29)},
1585 @ARTICLE{CarletCZ98,
1586 author = {Claude Carlet and Pascale Charpin and Victor Zinoviev},
1587 title = {Codes, Bent Functions and Permutations Suitable For DES-like Cryptosystems},
1588 journal = {Des. Codes Cryptography},
1593 bibsource = {DBLP, http://dblp.uni-trier.de}
1596 @INPROCEEDINGS{Castelluccia05efficientaggregation,
1597 author = {Claude Castelluccia},
1598 title = {Efficient aggregation of encrypted data in wireless sensor networks},
1599 booktitle = {MobiQuitous},
1602 publisher = {IEEE Computer Society}
1606 author = {Cayre, F. and Bas, P.},
1607 title = {Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding},
1608 journal = {IEEE Transactions on Information Forensics and Security},
1613 doi = {10.1109/TIFS.2007.916006},
1615 keywords = {cryptography, random sequences, spread spectrum communication, telecommunication
1616 security, watermarking, Kerckhoffs-based embedding security classes,
1617 WOA Data Hiding, pseudorandom sequences, spread-spectrum techniques,
1618 steganography security, watermark-only-attack, watermarking, Security,
1619 spread-spectrum (SS) watermarking},
1621 timestamp = {2009.06.29}
1625 author = {Cayre, F. and Fontaine, C. and Furon, T.},
1626 title = {Watermarking security: theory and practice},
1627 journal = {IEEE Transactions on Signal Processing},
1630 pages = {3976--3987},
1632 doi = {10.1109/TSP.2005.855418},
1634 keywords = {blind source separation, cryptography, watermarking, Fisher information
1635 matrix, blind source separation, cryptanalysis, information theory,
1636 spread spectrum techniques, substitutive scheme, watermarking security,
1637 Blind source separation, Fisher information matrix, equivocation,
1638 security, watermarking},
1640 timestamp = {2009.06.29}
1643 @ARTICLE{Chajakis91,
1644 author = {Chajakis, Emmanuel D. and Zenios, Stavros A.},
1645 title = {Synchronous and asynchronous implementations of relaxation algorithms
1646 for nonlinear network optimization},
1647 journal = {Parallel Comput.},
1652 address = {Amsterdam, The Netherlands, The Netherlands},
1653 doi = {http://dx.doi.org/10.1016/S0167-8191(05)80072-9},
1655 publisher = {Elsevier Science Publishers B. V.}
1659 author = {Chan, Haowen and Perrig, Adrian and Przydatek, Bartosz and Song,
1661 title = {SIA: Secure information aggregation in sensor networks},
1662 journal = {J. Comput. Secur.},
1667 address = {Amsterdam, The Netherlands, The Netherlands},
1669 publisher = {IOS Press}
1672 @ARTICLE{Chandramouli06,
1673 author = {R. Chandramouli and S. Bapatla and K.P. Subbalakshmi},
1674 title = {Battery power-aware encryption},
1675 journal = {ACM transactions on information and system security},
1678 owner = {christophe},
1679 timestamp = {2010.07.31}
1683 author = {Pascale Charpin},
1684 title = {A description of some extended cyclic codes with application to Reed-Solomon
1686 journal = {Discrete Mathematics},
1691 bibsource = {DBLP, http://dblp.uni-trier.de},
1692 ee = {http://dx.doi.org/10.1016/0012-365X(85)90019-6}
1696 author = {D. Chazan and W. Miranker},
1697 title = {Chaotic relaxation},
1698 journal = {Linear algebra and its applications},
1702 timestamp = {2008.05.22}
1706 author = {Cheon, Jung Hee and Kim, Woo-Hwan and Nam, Hyun Soo},
1707 title = {Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy
1708 homomorphism scheme},
1709 journal = {Inf. Process. Lett.},
1714 address = {Amsterdam, The Netherlands, The Netherlands},
1715 doi = {http://dx.doi.org/10.1016/j.ipl.2005.09.016},
1717 publisher = {Elsevier North-Holland, Inc.}
1720 @MISC{Cheon03acryptanalysis,
1721 author = {Jung Hee Cheon and Hyun Soo Nam},
1722 title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
1728 author = {R.C.C. Cheung and N.J. Telle and W. Luk and P.Y.K. Cheung},
1729 title = {Secure encrypted-data aggregation for wireless sensor networks},
1730 journal = {IEEE Trans. on Very Large Scale Integration Systems},
1733 pages = {1048-1059},
1737 @ARTICLE{Chivian2005,
1738 author = {Chivian, Dylan and Kim, David E. and Malmström, Lars and Schonbrun,
1739 Jack and Rohl, Carol A. and Baker, David},
1740 title = {Prediction of CASP6 structures using automated robetta protocols},
1741 journal = {Proteins},
1747 keywords = {Rosetta, fragment assembly, de novo modeling, homology modeling, parametric
1748 alignment ensemble},
1749 owner = {christophe},
1750 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
1751 timestamp = {2011.01.22},
1752 url = {http://dx.doi.org/10.1002/prot.20733}
1756 author = {Congxu, Zhu and Xuefeng, Liao and Zhihua, Li},
1757 title = {Chaos-based multipurpose image watermarking algorithm},
1758 journal = {Wuhan University Journal of Natural Sciences},
1761 pages = {1675-1678},
1762 note = {10.1007/BF02831848},
1763 abstract = {To achieve the goal of image content authentication and copyright
1764 protection simultaneously, this paper presents a novel image dual
1765 watermarking method based on chaotic map. Firstly, the host image
1766 was split into many nonoverlapping small blocks, and the block-wise
1767 discrete cosine transform (DCT) is computed. Secondly, the robust
1768 watermarks, shuffled by the chaotic sequences, are embedded in the
1769 DC coefficients of blocks to achieve the goal of copyright protection.
1770 The semi-fragile watermarks, generated by chaotic map, are embedded
1771 in the AC coefficients of blocks to obtain the aim of image authentication.
1772 Both of them can be extracted without the original image. Simulation
1773 results demonstrate the effectiveness of our algorithm in terms of
1774 robustness and fragility.},
1775 affiliation = {Central South University School of Information Science and Engineering
1776 410083 Changsha, Hunan China},
1779 keyword = {Mathematics, general},
1780 publisher = {Wuhan University, co-published with Springer},
1781 url = {http://dx.doi.org/10.1007/BF02831848}
1784 @ARTICLE{Conley1978,
1785 author = {C. Conley},
1786 title = {Isolated invariant sets and the Morse index},
1787 journal = {CBMS Regional Conference. AMS.},
1791 timestamp = {2008.01.02}
1795 author = {Philippe Cornu and André Smolarz},
1796 title = {Image characterization by texture},
1797 journal = {Traitement du signal},
1801 file = {:/home/guyeux/Documents/Bibliotheque/These/Watermarking/Caractérisation d'images par textures associées.pdf:PDF},
1803 timestamp = {2008.05.12}
1806 @INPROCEEDINGS{Cox99,
1807 author = {Ingemar Cox and Matt L. Miller and Andrew L. Mckellips},
1808 title = {Watermarking as Communications With Side Information},
1809 booktitle = {Proceedings of the IEEE},
1811 pages = {1127--1141},
1812 owner = {christophe},
1813 timestamp = {2010.03.06}
1816 @ARTICLE{Cox97securespread,
1817 author = {Ingemar J. Cox and Senior Member and Joe Kilian and F. Thomson Leighton
1819 title = {Secure spread spectrum watermarking for multimedia},
1820 journal = {IEEE Transactions on Image Processing},
1823 pages = {1673--1687}
1827 author = {Christopher Cramer and Erol Gelenbe and Hakan Bakircioglu},
1828 title = {Video Compression with Random Neural Networks},
1829 journal = {Neural Networks for Identification, Control, and Robotics, International
1834 address = {Los Alamitos, CA, USA},
1835 isbn = {0-8186-7456-3},
1836 publisher = {IEEE Computer Society}
1839 @INPROCEEDINGS{Crescenzi98,
1840 author = {Crescenzi, Pierluigi and Goldman, Deborah and Papadimitriou, Christos
1841 and Piccolboni, Antonio and Yannakakis, Mihalis},
1842 title = {On the complexity of protein folding (extended abstract)},
1843 booktitle = {Proceedings of the thirtieth annual ACM symposium on Theory of computing},
1845 series = {STOC '98},
1847 address = {New York, NY, USA},
1850 isbn = {0-89791-962-9},
1851 location = {Dallas, Texas, United States},
1856 author = {Zhao Dawei and Chen Guanrong and Liu Wenbo},
1857 title = {A chaos-based robust wavelet-domain watermarking algorithm},
1858 journal = {Chaos, Solitons and Fractals},
1863 timestamp = {2008.10.07}
1867 author = {Anthony Desnos and Robert Erra and Eric Filiol},
1868 title = {Processor-Dependent Malware... and codes},
1870 comment = {arXiv:1011.1638},
1871 eprint = {arXiv:1011.1638}
1875 title = {An Introduction to Chaotic Dynamical Systems},
1876 publisher = {Addison-Wesley},
1878 author = {Devaney, Robert L.},
1879 address = {Redwood City, CA},
1884 author = {Whitfield Diffie and Martin E. Hellman},
1885 title = {New Directions in Cryptography},
1886 journal = {IEEE Transactions on Information Theory},
1891 date = {November 1976},
1893 timestamp = {2009.06.30},
1894 url = {citeseer.ist.psu.edu/diffie76new.html}
1897 @INCOLLECTION{Dijk10,
1898 author = {van Dijk, Marten and Gentry, Craig and Halevi, Shai and Vaikuntanathan,
1900 title = {Fully Homomorphic Encryption over the Integers},
1901 booktitle = {Advances in Cryptology – EUROCRYPT 2010},
1902 publisher = {Springer Berlin / Heidelberg},
1904 editor = {Gilbert, Henri},
1906 series = {Lecture Notes in Computer Science},
1908 abstract = {We construct a simple fully homomorphic encryption scheme, using only
1909 elementary modular arithmetic. We use Gentry’s technique to construct
1910 a fully homomorphic scheme from a bootstrappable somewhat homomorphic
1911 scheme. However, instead of using ideal lattices over a polynomial
1912 ring, our bootstrappable encryption scheme merely uses addition and
1913 multiplication over the integers. The main appeal of our scheme is
1914 the conceptual simplicity. We reduce the security of our scheme to
1915 finding an approximate integer gcd – i.e., given a list of integers
1916 that are near-multiples of a hidden integer, output that hidden integer.
1917 We investigate the hardness of this task, building on earlier work
1918 of Howgrave-Graham.},
1919 affiliation = {MIT CSAIL}
1923 author = {Dill, KA},
1924 title = {Theory for the folding and stability of globular proteins.},
1925 journal = {Biochemistry},
1931 abstract = {Using lattice statistical mechanics, we develop theory to account
1932 for the folding of a heteropolymer molecule such as a protein to
1933 the globular and soluble state. Folding is assumed to be driven by
1934 the association of solvophobic monomers to avoid solvent and opposed
1935 by the chain configurational entropy. Theory predicts a phase transition
1936 as a function of temperature or solvent character. Molecules that
1937 are too short or too long or that have too few solvophobic residues
1938 are predicted not to fold. Globular molecules should have a largely
1939 solvophobic core, but there is an entropic tendency for some residues
1940 to be "out of place", particularly in small molecules. For long chains,
1941 molecules comprised of globular domains are predicted to be thermodynamically
1942 more stable than spherical molecules. The number of accessible conformations
1943 in the globular state is calculated to be an exceedingly small fraction
1944 of the number available to the random coil. Previous estimates of
1945 this number, which have motivated kinetic theories of folding, err
1946 by many tens of orders of magnitude.},
1947 comment = {Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't, P.H.S.,},
1948 keywords = {Mathematics, Models, Chemical, Polymers, Protein Conformation},
1949 owner = {christophe},
1950 timestamp = {2011.01.22},
1951 url = {http://ukpmc.ac.uk/abstract/MED/3986190}
1955 author = {Dill, KA and Bromberg, S and Yue, K and Fiebig, KM and Yee, DP and
1956 Thomas, PD and Chan, HS},
1957 title = {Principles of protein folding--a perspective from simple exact models.},
1958 journal = {Protein Sci},
1961 pages = {561-602--},
1964 abstract = {General principles of protein structure, stability, and folding kinetics
1965 have recently been explored in computer simulations of simple exact
1966 lattice models. These models represent protein chains at a rudimentary
1967 level, but they involve few parameters, approximations, or implicit
1968 biases, and they allow complete explorations of conformational and
1969 sequence spaces. Such simulations have resulted in testable predictions
1970 that are sometimes unanticipated: The folding code is mainly binary
1971 and delocalized throughout the amino acid sequence. The secondary
1972 and tertiary structures of a protein are specified mainly by the
1973 sequence of polar and nonpolar monomers. More specific interactions
1974 may refine the structure, rather than dominate the folding code.
1975 Simple exact models can account for the properties that characterize
1976 protein folding: two-state cooperativity, secondary and tertiary
1977 structures, and multistage folding kinetics--fast hydrophobic collapse
1978 followed by slower annealing. These studies suggest the possibility
1979 of creating "foldable" chain molecules other than proteins. The encoding
1980 of a unique compact chain conformation may not require amino acids;
1981 it may require only the ability to synthesize specific monomer sequences
1982 in which at least one monomer type is solvent-averse.},
1983 address = {Department of Pharmaceutical Chemistry, University of California,
1984 San Francisco 94143-1204, USA.},
1985 comment = {Review,Research Support, Non-U.S. Gov't,Research Support, U.S. Gov't,
1986 Non-P.H.S.,Research Support, U.S. Gov't, P.H.S.,},
1987 keywords = {Amino Acid Sequence, Biological Evolution, Hydrogen Bonding, Models,
1988 Molecular, Molecular Sequence Data, Mutation, Protein Conformation,
1989 Protein Denaturation, Protein Folding, Temperature, Thermodynamics},
1990 owner = {christophe},
1991 timestamp = {2011.01.22},
1992 url = {http://ukpmc.ac.uk/abstract/MED/7613459}
1995 @INPROCEEDINGS{Dobbertin96,
1996 author = {Dobbertin, Hans},
1997 title = {Cryptanalysis of MD4},
1998 booktitle = {Proceedings of the Third International Workshop on Fast Software
2002 address = {London, UK},
2003 publisher = {Springer-Verlag},
2004 isbn = {3-540-60865-6}
2007 @INPROCEEDINGS{DomingoFerrer2002,
2008 author = {Domingo-Ferrer, Josep},
2009 title = {A Provably Secure Additive and Multiplicative Privacy Homomorphism},
2010 booktitle = {ISC '02: Proceedings of the 5th International Conference on Information
2014 address = {London, UK},
2015 publisher = {Springer-Verlag},
2016 isbn = {3-540-44270-7}
2019 @ARTICLE{Dubchak1995,
2020 author = {I. Dubchak and I. Muchnik and S. R. Holbrook and S. H. Kim},
2021 title = {Prediction of protein folding class using global description of amino
2023 journal = {Proc Natl Acad Sci U S A},
2026 pages = {8700--8704},
2029 __markedentry = {[guyeux]},
2030 abstract = {We present a method for predicting protein folding class based on
2031 global protein chain description and a voting process. Selection
2032 of the best descriptors was achieved by a computer-simulated neural
2033 network trained on a data base consisting of 83 folding classes.
2034 Protein-chain descriptors include overall composition, transition,
2035 and distribution of amino acid attributes, such as relative hydrophobicity,
2036 predicted secondary structure, and predicted solvent exposure. Cross-validation
2037 testing was performed on 15 of the largest classes. The test shows
2038 that proteins were assigned to the correct class (correct positive
2039 prediction) with an average accuracy of 71.7\%, whereas the inverse
2040 prediction of proteins as not belonging to a particular class (correct
2041 negative prediction) was 90-95\% accurate. When tested on 254 structures
2042 used in this study, the top two predictions contained the correct
2043 class in 91\% of the cases.},
2044 institution = {Department of Chemistry, University of California, Berkeley 94720,
2046 keywords = {Amino Acid Sequence; Amino Acids, chemistry; Computer Simulation;
2047 Databases, Factual; Models, Chemical; Neural Networks (Computer);
2048 Protein Folding; Protein Structure, Secondary; Proteins, chemistry/classification;
2049 Reproducibility of Results; Solvents},
2051 medline-pst = {ppublish},
2054 timestamp = {2011.07.18}
2058 title = {Real analysis and probability},
2059 publisher = {Cambridge University Press},
2060 author = {Richard M. Dudley},
2063 timestamp = {2008.01.02}
2067 author = {El Tarazi, Mouhamed Nabih},
2068 title = {Algorithmes mixtes asynchrones. Etude de convergence monotone},
2069 journal = {Numerische Mathematik},
2073 note = {10.1007/BF01405568},
2074 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2078 keyword = {Mathematics and Statistics},
2079 publisher = {Springer Berlin / Heidelberg},
2080 url = {http://dx.doi.org/10.1007/BF01405568}
2084 author = {El Tarazi, Mouhamed Nabih},
2085 title = {Some convergence results for asynchronous algorithms},
2086 journal = {Numerische Mathematik},
2090 note = {10.1007/BF01407866},
2091 affiliation = {Department of Mathematics, Faculty of Science Kuwait University P.O.
2092 Box 5969 Kuwait Kuwait},
2095 keyword = {Mathematics and Statistics},
2096 publisher = {Springer Berlin / Heidelberg},
2097 url = {http://dx.doi.org/10.1007/BF01407866}
2101 author = {Peng Fei and Qiu Shui-Sheng and Long Min},
2102 title = {A secure digital signature algorithm based on elliptic curve and
2104 journal = {Circuits Systems Signal Processing},
2106 volume = {24, No. 5},
2109 timestamp = {2009.01.16}
2112 @BOOK{Feigenbaum1908,
2113 title = {Universal behavior in nonlinear systems},
2114 publisher = {Los Alamos Science},
2116 author = {Feigenbaum},
2118 timestamp = {2008.01.02}
2121 @ARTICLE{Felsenstein1980,
2122 author = {J. Felsenstein},
2123 title = {A view of population genetics.},
2124 journal = {Science},
2130 doi = {10.1126/science.208.4449.1253},
2132 medline-pst = {ppublish},
2134 pii = {208/4449/1253},
2136 timestamp = {2011.05.05},
2137 url = {http://dx.doi.org/10.1126/science.208.4449.1253}
2141 title = {Les virus informatiques : techniques virales et antivirales avancées},
2143 editor = {Springer},
2144 author = {Eric Filiol},
2145 owner = {christophe},
2146 timestamp = {2010.10.13}
2149 @INPROCEEDINGS{FiliolBlackHat,
2150 author = {Eric Filiol},
2151 title = {Passive and Active Leakage of Secret Data from Non Networked Computer},
2152 booktitle = {Black Hat},
2154 owner = {christophe},
2155 timestamp = {2010.11.28}
2158 @PHDTHESIS{Formenti2003,
2159 author = {Enrico Formenti},
2160 title = {De l'algorithmique du chaos dans les systèmes dynamiques discrets},
2161 school = {Université de Provence},
2164 timestamp = {2008.01.02}
2167 @PHDTHESIS{Formenti1998,
2168 author = {Enrico Formenti},
2169 title = {Automates cellulaires et chaos : de la vision topologique à la vision
2171 school = {\'Ecole Normale Supérieure de Lyon},
2173 optmonth = {Octobre},
2175 timestamp = {2008.01.02}
2179 author = {Gabriel Frey and Christian J Michel},
2180 title = {Identification of circular codes in bacterial genomes and their use
2181 in a factorization method for retrieving the reading frames of genes.},
2182 journal = {Comput Biol Chem},
2188 abstract = {We developed a statistical method that allows each trinucleotide to
2189 be associated with a unique frame among the three possible ones in
2190 a (protein coding) gene. An extensive gene study in 175 complete
2191 bacterial genomes based on this statistical approach resulted in
2192 identification of 72 new circular codes. Finding a circular code
2193 enables an immediate retrieval of the reading frame locally anywhere
2194 in a gene. No knowledge of location of the start codon is required
2195 and a short window of only a few nucleotides is sufficient for automatic
2196 retrieval. We have therefore developed a factorization method (that
2197 explores previously found circular codes) for retrieving the reading
2198 frames of bacterial genes. Its principle is new and easy to understand.
2199 Neither complex treatment nor specific information on the nucleotide
2200 sequences is necessary. Moreover, the method can be used for short
2201 regions in nucleotide sequences (less than 25 nucleotides in protein
2202 coding genes). Selected additional properties of circular codes and
2203 their possible biological consequences are also discussed.},
2204 doi = {10.1016/j.compbiolchem.2005.11.001},
2205 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2206 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2207 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2208 keywords = {Base Sequence; Computational Biology; Genes, Bacterial; Genome, Bacterial;
2209 Genomics, statistics /&/ numerical data; Models, Genetic; Models,
2210 Statistical; Reading Frames},
2212 medline-pst = {ppublish},
2214 pii = {S1476-9271(05)00111-8},
2216 timestamp = {2011.05.05},
2217 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.11.001}
2221 author = {Gabriel Frey and Christian J Michel},
2222 title = {An analytical model of gene evolution with six mutation parameters:
2223 an application to archaeal circular codes.},
2224 journal = {Comput Biol Chem},
2230 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
2231 mutation matrix 64 x 64 with six substitution parameters associated
2232 with the transitions and transversions in the three trinucleotide
2233 sites. It generalizes the previous models based on the nucleotide
2234 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
2235 x 64 with three parameters. It determines at some time t the exact
2236 occurrence probabilities of trinucleotides mutating randomly according
2237 to six substitution parameters. An application of this model allows
2238 an evolutionary study of the common circular code COM and the 15
2239 archaeal circular codes X which have been recently identified in
2240 several archaeal genomes. The main property of a circular code is
2241 the retrieval of the reading frames in genes, both locally, i.e.
2242 anywhere in genes and in particular without a start codon, and automatically
2243 with a window of a few nucleotides. In genes, the circular code is
2244 superimposed on the traditional genetic one. Very unexpectedly, the
2245 evolutionary model demonstrates that the archaeal circular codes
2246 can derive from the common circular code subjected to random substitutions
2247 with particular values for six substitutions parameters. It has a
2248 strong correlation with the statistical observations of three archaeal
2249 codes in actual genes. Furthermore, the properties of these substitution
2250 rates allow proposal of an evolutionary classification of the 15
2251 archaeal codes into three main classes according to this model. In
2252 almost all the cases, they agree with the actual degeneracy of the
2253 genetic code with substitutions more frequent in the third trinucleotide
2254 site and with transitions more frequent that transversions in any
2255 trinucleotide site.},
2256 doi = {10.1016/j.compbiolchem.2005.09.001},
2257 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
2258 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
2259 67400 Illkirch, France. frey@dpt-info.u-strasbg.fr},
2260 keywords = {Archaea, genetics; DNA, Circular; Evolution, Molecular; Genetic Code;
2261 Genome, Archaeal; Models, Genetic; Mutation; Trinucleotide Repeats},
2263 medline-pst = {ppublish},
2265 pii = {S1476-9271(05)00083-6},
2267 timestamp = {2011.05.05},
2268 url = {http://dx.doi.org/10.1016/j.compbiolchem.2005.09.001}
2271 @INPROCEEDINGS{fgb11:ip,
2272 author = {Friot, Nicolas and Guyeux, Christophe and Bahi, Jacques},
2273 title = {Chaotic Iterations for Steganography - Stego-security and chaos-security},
2274 booktitle = {SECRYPT'2011, Int. Conf. on Security and Cryptography},
2277 address = {Sevilla, Spain},
2280 classement = {ACTI},
2281 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2287 author = {Alain Frisch},
2288 title = {Entropie topologique et définition du chaos},
2290 note = {Rapport de tipe},
2291 file = {Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:Chaos/Tipe_Entropie Topologique et Definition du Chaos (Alain Frisch).ps:PDF},
2292 keywords = {Chaos, Entropie Topologique, Tipe},
2294 timestamp = {2008.01.02},
2295 url = {http://alain.frisch.fr/math.html}
2299 author = {Alain Frisch},
2300 title = {Entropie topologique et définition du chaos},
2302 note = {[En ligne; Page disponible le 12-août-2010]},
2303 url = {\url{http://alain.frisch.fr/math.html}}
2306 @ARTICLE{Frommer97asynchronousweighted,
2307 author = {Andreas Frommer and Hartmut Schwandt and Daniel and Daniel B. Szyld},
2308 title = {Asynchronous Weighted Additive Schwarz Methods},
2309 journal = {Electronic Transactions on Numerical Analysis},
2315 @MISC{Frommer94asynchronoustwo-stage,
2316 author = {Andreas Frommer and Daniel B. Szyld},
2317 title = {Asynchronous Two-Stage Iterative Methods},
2322 title = {Introduction to Chaos and Coherence},
2323 publisher = {IOP Publishing},
2325 author = {J. Frøyland},
2327 timestamp = {2008.01.02}
2331 author = {T. Furon},
2332 title = {Security analysis},
2334 note = {European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5},
2336 timestamp = {2009.06.30}
2340 author = {Furon, Teddy and Bas, Patrick},
2341 title = {Broken arrows},
2342 journal = {EURASIP J. Inf. Secur.},
2346 address = {New York, NY, United States},
2347 doi = {http://dx.doi.org/10.1155/2008/597040},
2349 owner = {christophe},
2350 publisher = {Hindawi Publishing Corp.},
2351 timestamp = {2010.03.06}
2354 @ARTICLE{P1150442004,
2355 author = {G.S.El-Taweel and H.M. Onsi and M.Samy and M.G. Darwish},
2356 title = {Secure and Non-Blind Watermarking Scheme for Color Images Based on
2358 journal = {ICGST International Journal on Graphics, Vision and Image Processing},
2364 owner = {christophe},
2365 timestamp = {2010.03.07}
2368 @INPROCEEDINGS{Gentry09,
2369 author = {Gentry, Craig},
2370 title = {Fully homomorphic encryption using ideal lattices},
2371 booktitle = {STOC '09: Proceedings of the 41st annual ACM symposium on Theory
2375 address = {New York, NY, USA},
2377 doi = {http://doi.acm.org/10.1145/1536414.1536440},
2378 isbn = {978-1-60558-506-2},
2379 location = {Bethesda, MD, USA}
2382 @INPROCEEDINGS{Girao04,
2383 author = {J. Girao and M. Schneider and D. Westhoff},
2384 title = {CDA: Concealed data aggregation in wireless sensor networks},
2385 booktitle = {Proceedings of the ACM Workshop on Wireless Security},
2387 owner = {christophe},
2388 timestamp = {2010.07.31}
2391 @CONFERENCE{Gotsman88,
2392 author = {C. Gotsman and D. Lehmann and E. Shamir},
2393 title = {Asynchronous Dynamics of Random Boolean Networks},
2394 booktitle = {San Diego '88 Neural Networks Conference},
2397 timestamp = {30/03/2008}
2400 @ARTICLE{Guckenheimer1979,
2401 author = {J. Guckenheimer},
2402 title = {Sensitive dependence to initial conditions for one-dimensional maps},
2403 journal = {Comm. Math. Phys.},
2405 optpages = {133-160},
2407 timestamp = {2008.01.02}
2411 title = {Nonlinear oscillations, dynamical systems, and bifurcations of vector
2413 publisher = {Springer Verlag},
2415 author = {J. Guckenheimer and P. Holmes},
2417 timestamp = {2008.01.02}
2420 @ARTICLE{Guo20093201,
2421 author = {Wei Guo and Xiaoming Wang and Dake He and Yang Cao},
2422 title = {Cryptanalysis on a parallel keyed hash function based on chaotic
2424 journal = {Physics Letters A},
2427 pages = {3201 - 3206},
2429 abstract = {This Letter analyzes the security of a novel parallel keyed hash function
2430 based on chaotic maps, proposed by Xiao et al. to improve the efficiency
2431 in parallel computing environment. We show how to devise forgery
2432 attacks on Xiao's scheme with differential cryptanalysis and give
2433 the experiment results of two kinds of forgery attacks firstly. Furthermore,
2434 we discuss the problem of weak keys in the scheme and demonstrate
2435 how to utilize weak keys to construct collision.},
2437 keywords = {Cryptanalysis}
2440 @PHDTHESIS{GuyeuxThese10,
2441 author = {Christophe Guyeux},
2442 title = {Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e}
2443 en s\'{e}curit\'{e} informatique},
2444 school = {Universit\'{e} de Franche-Comt\'{e}},
2446 owner = {christophe},
2447 timestamp = {2010.12.21}
2451 author = {Guyeux, Christophe and Bahi, Jacques},
2452 title = {\'Etude topologique de l'\'etalement de spectre},
2453 howpublished = {Journ\'ees Codes et St\'eganographie, \'Ecoles Militaires de Saint-Cyr,
2458 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2463 @INPROCEEDINGS{bg10:ip,
2464 author = {Guyeux, Christophe and Bahi, Jacques},
2465 title = {An improved watermarking algorithm for Internet applications},
2466 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
2469 address = {Valencia, Spain},
2471 classement = {ACTI},
2472 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2477 @INPROCEEDINGS{gfb10:ip,
2478 author = {Guyeux, Christophe and Friot, Nicolas and Bahi, Jacques},
2479 title = {Chaotic iterations versus Spread-spectrum: chaos and stego security},
2480 booktitle = {IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and
2481 Multimedia Signal Processing},
2484 address = {Darmstadt, Germany},
2486 classement = {ACTI},
2487 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
2493 author = {Christophe Guyeux and Nicolas Friot and Jacques M. Bahi},
2494 title = {A more secure information hiding scheme than spread-spectrum obtained
2496 journal = {arXiv 0032565},
2499 timestamp = {2010.04.30}
2503 title = {Guide to Elliptic Curve Cryptography},
2504 publisher = {Springer Professional Computing},
2506 editor = {Springer},
2507 author = {D. Hankerson and A. Menezes and S. Vanstone},
2508 owner = {christophe},
2509 timestamp = {2010.07.31}
2512 @ARTICLE{Hasegawa1985,
2513 author = {M. Hasegawa and H. Kishino and T. Yano},
2514 title = {Dating of the human-ape splitting by a molecular clock of mitochondrial
2516 journal = {J Mol Evol},
2521 abstract = {A new statistical method for estimating divergence dates of species
2522 from DNA sequence data by a molecular clock approach is developed.
2523 This method takes into account effectively the information contained
2524 in a set of DNA sequence data. The molecular clock of mitochondrial
2525 DNA (mtDNA) was calibrated by setting the date of divergence between
2526 primates and ungulates at the Cretaceous-Tertiary boundary (65 million
2527 years ago), when the extinction of dinosaurs occurred. A generalized
2528 least-squares method was applied in fitting a model to mtDNA sequence
2529 data, and the clock gave dates of 92.3 +/- 11.7, 13.3 +/- 1.5, 10.9
2530 +/- 1.2, 3.7 +/- 0.6, and 2.7 +/- 0.6 million years ago (where the
2531 second of each pair of numbers is the standard deviation) for the
2532 separation of mouse, gibbon, orangutan, gorilla, and chimpanzee,
2533 respectively, from the line leading to humans. Although there is
2534 some uncertainty in the clock, this dating may pose a problem for
2535 the widely believed hypothesis that the pipedal creature Australopithecus
2536 afarensis, which lived some 3.7 million years ago at Laetoli in Tanzania
2537 and at Hadar in Ethiopia, was ancestral to man and evolved after
2538 the human-ape splitting. Another likelier possibility is that mtDNA
2539 was transferred through hybridization between a proto-human and a
2540 proto-chimpanzee after the former had developed bipedalism.},
2541 keywords = {Animals; Biological Evolution; DNA, Mitochondrial, genetics; Genes;
2542 Haplorhini, genetics; Humans; Mathematics; Models, Genetic; Nucleic
2543 Acid Hybridization; Primates, genetics; Proteins, genetics; Species
2546 medline-pst = {ppublish},
2549 timestamp = {2011.05.05}
2553 title = {A First Course in Discrete Dynamical Systems},
2554 publisher = {Springer-Verlag},
2556 author = {R. Homlgren},
2559 timestamp = {2008.01.02}
2562 @INCOLLECTION{Hoque09,
2563 author = {Hoque, Md. and Chetty, Madhu and Sattar, Abdul},
2564 title = {Genetic Algorithm in Ab Initio Protein Structure Prediction Using
2565 Low Resolution Model: A Review},
2566 booktitle = {Biomedical Data and Applications},
2567 publisher = {Springer Berlin Heidelberg},
2569 editor = {Sidhu, Amandeep and Dillon, Tharam},
2571 series = {Studies in Computational Intelligence},
2573 affiliation = {IIIS, Griffith University, Nathan, QLD-4111 Australia}
2576 @CONFERENCE{Houmansadr09,
2577 author = {A. Houmansadr and N. Kiyavash and N. Borisov},
2578 title = {Rainbow: A robust and invisible non-blind watermark for network flows},
2579 booktitle = {NDSS’09: 16th Annual Network and Distributed System Security Symposium},
2581 owner = {christophe},
2582 timestamp = {2010.03.07}
2586 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J.},
2587 title = {Secure encrypted-data aggregation for wireless sensor networks},
2588 journal = {Wireless Networks},
2589 abstract = {Abstract\ \ This paper proposes a secure encrypted-data
2590 aggregation scheme for wireless sensor networks. Our design for data
2591 aggregation eliminates redundant sensor readings without using encryption
2592 and maintains data secrecy and privacy during transmission. Conventional
2593 aggregation functions operate when readings are received in plaintext.
2594 If readings are encrypted, aggregation requires decryption creating
2595 extra overhead and key management issues. In contrast to conventional
2596 schemes, our proposed scheme provides security and privacy, and duplicate
2597 instances of original readings will be aggregated into a single packet.
2598 Our scheme is resilient to known-plaintext attacks, chosen-plaintext
2599 attacks, ciphertext-only attacks and man-in-the-middle attacks. Our
2600 experiments show that our proposed aggregation method significantly
2601 reduces communication overhead and can be practically implemented
2602 in on-the-shelf sensor platforms.},
2603 citeulike-article-id = {4499496},
2604 citeulike-linkout-0 = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2605 citeulike-linkout-1 = {http://www.springerlink.com/content/g573138072642u63},
2606 doi = {10.1007/s11276-009-0177-y},
2607 posted-at = {2009-05-10 09:55:44},
2608 url = {http://dx.doi.org/10.1007/s11276-009-0177-y}
2612 author = {Huang, Shih-I and Shieh, Shiuhpyng and Tygar, J. D.},
2613 title = {Secure encrypted-data aggregation for wireless sensor networks},
2614 journal = {Wirel. Netw.},
2619 address = {Hingham, MA, USA},
2620 doi = {http://dx.doi.org/10.1007/s11276-009-0177-y},
2622 publisher = {Kluwer Academic Publishers}
2626 author = {W. Huang and X. Ye},
2627 title = {Homeomorphisms with the whole compacta being scrambled sets},
2628 journal = {Ergod. Th. Dynam. Systems},
2634 timestamp = {2008.01.02}
2637 @ARTICLE{Hurley1982,
2638 author = {M. Hurley},
2639 title = {Attractors, persistence and density of their bassin},
2640 journal = {Transactions of AMS},
2642 optpages = {247-271},
2645 timestamp = {2008.01.02}
2648 @INPROCEEDINGS{Islam:2009:NMA:1695134.1695181,
2649 author = {Islam, Md. Kamrul and Chetty, Madhu},
2650 title = {Novel Memetic Algorithm for Protein Structure Prediction},
2651 booktitle = {Proceedings of the 22nd Australasian Joint Conference on Advances
2652 in Artificial Intelligence},
2656 address = {Berlin, Heidelberg},
2657 publisher = {Springer-Verlag},
2659 isbn = {978-3-642-10438-1},
2660 keywords = {Guided search space, Memetic Algorithm, Modified fitness function,
2661 Pair-wise-interchange, Schema preservation, Tabu Search},
2662 location = {Melbourne, Australia},
2666 @PHDTHESIS{Jacquemard77,
2667 author = {C. Jacquemard},
2668 title = {Contribution à l'étude d'algorithmes à convergence monotone},
2669 school = {Université de Franche-Comté},
2671 owner = {christophe},
2672 timestamp = {2010.08.25}
2676 title = {{Evolution of Protein Molecules}},
2677 publisher = {Academy Press},
2679 editor = {Munro, H. N.},
2680 author = {Jukes, T. H. and Cantor, C. R.},
2681 booktitle = {Evolution of Protein Molecules},
2682 citeulike-article-id = {1673661},
2683 keywords = {compbio, fresco},
2684 posted-at = {2007-09-19 06:23:18},
2688 @INPROCEEDINGS{Kalker2001,
2689 author = {Kalker, T.},
2690 title = {Considerations on watermarking security},
2693 abstract = {In this paper we address the usually implicit assumption that digital
2694 watermarking has as its main target copyright and copy protection
2695 applications. From these target applications a great many conclusions
2696 are drawn about the required security of a watermarking system, and
2697 in fact, a considerably percentage of the watermarking literature
2698 has this very topic as its main focus of attention. In this paper
2699 we take a step back, and try to do a more careful analysis of the
2700 'watermarking-is-for-security-applications' paradigm. The intention
2701 of this paper is to discuss the meaning of the concept security in
2702 the context of watermarking, and try to show that one has to be careful
2703 in using analogies from the related field of cryptography},
2704 citeulike-article-id = {1226513},
2705 journal = {2001 IEEE Fourth Workshop on Multimedia Signal Processing},
2706 keywords = {security, wateramarking},
2708 posted-at = {2007-04-14 14:30:06},
2710 timestamp = {2009.06.30}
2713 @ARTICLE{Kerckhoffs83,
2714 author = {Kerckhoffs, Auguste},
2715 title = {La cryptographie militaire},
2716 journal = {Journal des sciences militaires},
2721 abstract = {pp. 161–191, Feb. 1883.},
2722 citeulike-article-id = {505508},
2723 keywords = {cryptography, master},
2725 posted-at = {2006-02-15 04:49:15},
2727 timestamp = {2009.06.30}
2731 author = {Kimura, Motoo},
2732 title = {A simple method for estimating evolutionary rates of base substitutions
2733 through comparative studies of nucleotide sequences},
2734 journal = {Journal of Molecular Evolution},
2738 note = {10.1007/BF01731581},
2739 affiliation = {National Institute of Genetics 411 Mishima Japan},
2742 keyword = {Biomedical and Life Sciences},
2743 publisher = {Springer New York},
2744 url = {http://dx.doi.org/10.1007/BF01731581}
2749 title = {Chaos Without Nonperiodicity},
2750 journal = {Amer. Math. Monthly},
2754 timestamp = {27/01/2008}
2757 @PHDTHESIS{Knudsen1994a,
2758 author = {C. Knudsen},
2759 title = {Aspects of noninvertible dynamics and chaos},
2760 school = {Technical University of Denmark},
2763 timestamp = {2008.01.02}
2767 author = {L. Kocarev and J. Szczepanski and J.M. Amigo and I. Tomovski},
2768 title = {Discrete Chaos - I: Theory},
2769 journal = {IEEE Trans. on Circuits Systems},
2772 pages = {1300-1309},
2773 owner = {christophe},
2774 timestamp = {2010.10.10}
2777 @INPROCEEDINGS{Kocher95cryptanalysisof,
2778 author = {Paul C. Kocher},
2779 title = {Cryptanalysis of Diffie-Hellman, RSA, DSS, and Other Systems Using
2780 Timing Attacks (Extended Abstract)},
2781 booktitle = {Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology
2785 publisher = {Springer-Verlag}
2788 @ARTICLE{Kullback1951,
2789 author = {Kullback, Solomon and Leibler, Richard A.},
2790 title = {On Information and Sufficiency},
2791 journal = {The Annals of Mathematical Statistics},
2796 citeulike-article-id = {3245942},
2797 keywords = {file-import-08-09-12},
2799 posted-at = {2008-09-12 14:30:37},
2801 timestamp = {2009.06.29}
2805 author = {Eshter Ledoux},
2806 title = {Introduction à la théorie du chaos},
2808 note = {[En ligne; Page disponible le 12-août-2010]},
2809 url = {\url{http://www.nux.be/eledoux/mem/node1.html}}
2813 title = {Analyse en dimension finie},
2814 publisher = {Masson},
2820 timestamp = {2008.01.02}
2824 author = {A.K. Lenstra and E.R. Verheul},
2825 title = {Selecting Cryptographic Key Sizes},
2826 journal = {Jour. of the International Association for Cryptologic Research},
2834 author = {Lettvin, J.Y. and Maturana, H.R. and McCulloch, W.S. and Pitts, W.H.},
2835 title = {What the Frog's Eye Tells the Frog's Brain},
2836 journal = {Proceedings of the IRE},
2841 owner = {christophe},
2842 timestamp = {2010.12.21}
2846 author = {T. Y. Li and J. A. Yorke},
2847 title = {Period three implies chaos},
2848 journal = {Amer. Math. Monthly},
2854 timestamp = {27/01/2008}
2858 author = {Li, Yantao and Deng, Shaojiang and Xiao, Di},
2859 title = {A novel Hash algorithm construction based on chaotic neural network},
2860 journal = {Neural Computing and Applications},
2863 affiliation = {Chongqing University College of Computer Science 400044 Chongqing
2866 keyword = {Computer Science},
2867 publisher = {Springer London}
2870 @INPROCEEDINGS{Lin09,
2871 author = {Lin, Hua-Yi and Chiang, Tzu-Chiang},
2872 title = {Cooperative secure data aggregation in sensor networks using elliptic
2873 curve based cryptosystems},
2874 booktitle = {CDVE'09: Proceedings of the 6th international conference on Cooperative
2875 design, visualization, and engineering},
2878 address = {Berlin, Heidelberg},
2879 publisher = {Springer-Verlag},
2880 isbn = {3-642-04264-3, 978-3-642-04264-5},
2881 location = {Luxembourg, Luxembourg}
2884 @INPROCEEDINGS{Liu2008,
2885 author = {Liu, An and Ning, Peng},
2886 title = {TinyECC: A Configurable Library for Elliptic Curve Cryptography in
2887 Wireless Sensor Networks},
2888 booktitle = {7th International Conference on Information Processing in Sensor
2889 Networks (IPSN 2008)},
2893 citeulike-article-id = {3041699},
2894 howpublished = {SPOTS Track},
2896 posted-at = {2008-07-25 05:25:05},
2900 @ARTICLE{Liu2007bis,
2901 author = {Shao-Hui Liu and Hong-Xun Yao and Wen Gao and Yong-Liang Liu},
2902 title = {An image fragile watermark scheme based on chaotic image pattern
2904 journal = {Applied Mathematics and Computation},
2909 timestamp = {2008.10.07}
2912 @INPROCEEDINGS{Liu07,
2913 author = {Liu, Zhen and Xi, Lifeng},
2914 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2915 booktitle = {KES '07: Knowledge-Based Intelligent Information and Engineering
2916 Systems and the XVII Italian Workshop on Neural Networks on Proceedings
2917 of the 11th International Conference},
2920 address = {Berlin, Heidelberg},
2921 publisher = {Springer-Verlag},
2922 doi = {http://dx.doi.org/10.1007/978-3-540-74827-4_26},
2923 isbn = {978-3-540-74826-7},
2924 location = {Vietri sul Mare, Italy}
2928 author = {Zhen Liu and Lifeng Xi},
2929 title = {Image Information Hiding Encryption Using Chaotic Sequence},
2935 timestamp = {11/04/2008}
2938 @ARTICLE{Lubachevsky86,
2939 author = {Lubachevsky, Boris and Mitra, Debasis},
2940 title = {A chaotic asynchronous algorithm for computing the fixed point of
2941 a nonnegative matrix of unit spectral radius},
2947 address = {New York, NY, USA},
2948 doi = {http://doi.acm.org/10.1145/4904.4801},
2954 author = {{L}arger, {L}. and {D}udley, {J}.{M}.},
2955 title = { {N}onlinear dynamics {O}ptoelectronic chaos},
2956 journal = {{N}ature },
2962 abstract = {{O}ptoelectronic circuits with delayed feedback provide a convenient
2963 bench-top platform to study a wide range of nonlinear dynamic systems,
2964 from ultrastable clocks to complex chaotic devices.},
2965 affiliation = {{F}ranche-{C}omt{\'e} {\'E}lectronique {M}{\'e}canique, {T}hermique
2966 et {O}ptique - {S}ciences et {T}echnologies - {FEMTO}-{ST} - {CNRS}
2967 : {UMR}6174 - {U}niversit{\'e} de {F}ranche-{C}omt{\'e} - {U}niversit{\'e}
2968 de {T}echnologie de {B}elfort-{M}ontbeliard - {E}cole {N}ationale
2969 {S}up{\'e}rieure de {M}{\'e}canique et des {M}icrotechniques },
2970 audience = {internationale },
2972 doi = {10.1038/465041a },
2973 hal_id = {hal-00517696},
2974 language = {{A}nglais},
2975 url = {http://hal.archives-ouvertes.fr/hal-00517696/en/}
2978 @INPROCEEDINGS{Mahoney00,
2979 author = {Mahoney, Matthew V.},
2980 title = {Fast Text Compression with Neural Networks},
2981 booktitle = {Proceedings of the Thirteenth International Florida Artificial Intelligence
2982 Research Society Conference},
2985 publisher = {AAAI Press},
2987 isbn = {1-57735-113-4},
2991 @INPROCEEDINGS{msp10:bl,
2992 author = {Makhoul, Abdallah and Saadi, Rachid and Pham, Congduc},
2993 title = {Risk Management in Intrusion Detection Applications with Wireless
2994 Video Sensor Networks},
2995 booktitle = {WCNC'10 IEEE Int. Conf.},
2998 address = {Sydney, Australia},
3007 author = {H.S. Malvar and D. Florêncio},
3008 title = {Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking},
3009 journal = {IEEE Trans. Signal Proceeding},
3013 owner = {christophe},
3014 timestamp = {2010.03.07}
3017 @ARTICLE{Marsaglia2003,
3018 author = {G. Marsaglia},
3019 title = {Xorshift RNGs},
3020 journal = {Journal of Statistical Software},
3025 timestamp = {2009.10.28}
3028 @ARTICLE{Marsaglia1996,
3029 author = {G. Marsaglia},
3030 title = {DIEHARD: a battery of tests of randomness.},
3031 journal = {http://stat.fsu.edu/~geo/diehard.html},
3034 timestamp = {2009.11.09}
3037 @ARTICLE{DefiningChaos,
3038 author = {M. Martelli and M. Dang and T. Seph},
3039 title = {Defining chaos},
3040 journal = {Mathematics Magazine},
3044 owner = {christophe},
3045 timestamp = {2010.08.11}
3048 @ARTICLE{Michel2007c,
3049 author = {Christian J Michel},
3050 title = {An analytical model of gene evolution with 9 mutation parameters:
3051 an application to the amino acids coded by the common circular code.},
3052 journal = {Bull Math Biol},
3058 abstract = {We develop here an analytical evolutionary model based on a trinucleotide
3059 mutation matrix 64 x 64 with nine substitution parameters associated
3060 with the three types of substitutions in the three trinucleotide
3061 sites. It generalizes the previous models based on the nucleotide
3062 mutation matrices 4 x 4 and the trinucleotide mutation matrix 64
3063 x 64 with three and six parameters. It determines at some time t
3064 the exact occurrence probabilities of trinucleotides mutating randomly
3065 according to these nine substitution parameters. An application of
3066 this model allows an evolutionary study of the common circular code
3067 [Formula: see text] of eukaryotes and prokaryotes and its 12 coded
3068 amino acids. The main property of this code [Formula: see text] is
3069 the retrieval of the reading frames in genes, both locally, i.e.
3070 anywhere in genes and in particular without a start codon, and automatically
3071 with a window of a few nucleotides. However, since its identification
3072 in 1996, amino acid information coded by [Formula: see text] has
3073 never been studied. Very unexpectedly, this evolutionary model demonstrates
3074 that random substitutions in this code [Formula: see text] and with
3075 particular values for the nine substitutions parameters retrieve
3076 after a certain time of evolution a frequency distribution of these
3077 12 amino acids very close to the one coded by the actual genes.},
3078 doi = {10.1007/s11538-006-9147-z},
3079 institution = {Equipe de Bioinformatique Théorique, LSIIT (UMR CNRS-ULP 7005), Université
3080 Louis Pasteur de Strasbourg, Pôle API, Boulevard Sébastien Brant,
3081 67400 Illkirch, France. michel@dpt-info.u-strasbg.fr},
3082 keywords = {Amino Acids, genetics; Codon, genetics; Eukaryotic Cells; Evolution,
3083 Molecular; Models, Genetic; Prokaryotic Cells},
3085 medline-pst = {ppublish},
3088 timestamp = {2011.05.05},
3089 url = {http://dx.doi.org/10.1007/s11538-006-9147-z}
3093 author = {J.-C. Miellou},
3094 title = {Algorithmes de relaxation chaotique \`{a} retards},
3100 timestamp = {2008.05.22}
3103 @ARTICLE{Miellou75b,
3104 author = {Miellou, J.-C.},
3105 title = {Itérations chaotiques à retards, étude de la convergence dans le
3106 cas d'espaces partiellement ordonnés},
3107 journal = {C.R.A.S. Paris},
3111 owner = {christophe},
3112 timestamp = {2010.08.17}
3116 author = {Jean-Claude Miellou and Pierre Spitéri},
3117 title = {Un critère de convergence pour des méthodes générales de point fixe},
3118 journal = {Rairo -- Modélisation mathématique et analyse numérique},
3123 owner = {christophe},
3124 timestamp = {2010.10.13}
3128 author = {Aidan Mooney and John G. Keating and Ioannis Pitas},
3129 title = {A comparative study of chaotic and white noise signals in digital
3131 journal = {Chaos, Solitons and Fractals},
3135 owner = {christophe},
3136 timestamp = {2010.03.01}
3139 @ARTICLE{Nakashima2003,
3140 author = {Nakashima, Y. and Tachibana, R. and Babaguchi, N.},
3141 title = {Watermarked Movie Soundtrack Finds the Position of the Camcorder
3143 journal = {IEEE Transactions on Multimedia},
3145 note = {Accepted for future publication Multimedia}
3148 @INCOLLECTION{springerlink:10.1007/978-3-642-04431-1_16,
3149 author = {Nelson, Michael and Nahapetian, Ani and Koushanfar, Farinaz and Potkonjak,
3151 title = {SVD-Based Ghost Circuitry Detection},
3152 booktitle = {Information Hiding},
3153 publisher = {Springer Berlin / Heidelberg},
3155 editor = {Katzenbeisser, Stefan and Sadeghi, Ahmad-Reza},
3157 series = {Lecture Notes in Computer Science},
3159 note = {10.1007/978-3-642-04431-1_16},
3160 affiliation = {Computer Science Department, UCLA, Los Angeles, CA 90095, USA},
3161 url = {http://dx.doi.org/10.1007/978-3-642-04431-1_16}
3164 @INPROCEEDINGS{Perez-Hernandez09,
3165 author = {P\'{e}rez-Hern\'{a}ndez, Luis Germ\'{a}n and Rodr\'{\i}guez-V\'{a}zquez,
3166 Katya and Gardu\~{n}o-Ju\'{a}rez, Ram\'{o}n},
3167 title = {Parallel particle swarm optimization applied to the protein folding
3169 booktitle = {Proceedings of the 11th Annual conference on Genetic and evolutionary
3172 series = {GECCO '09},
3173 pages = {1791--1792},
3174 address = {New York, NY, USA},
3177 isbn = {978-1-60558-325-9},
3178 keywords = {bioinformatics, biology and chemistry, combinatorial optimization,
3179 parallelization, swarm intelligence},
3180 location = {Montreal, Qu\&\#233;bec, Canada},
3184 @PHDTHESIS{Pellegrin1986,
3185 author = {D. Pellegrin},
3186 title = {Algorithmique discr\`{e}te et r\'{e}seaux d'automates},
3187 school = {Grenoble},
3190 timestamp = {2008.05.22}
3194 author = {F. Peng and S.-S. Qiu and M. Long},
3195 title = {One way Hash function construction based on two-dimensional hyperchaotic
3197 journal = {Acta Phys. Sinici.},
3202 timestamp = {2009.01.16}
3205 @INPROCEEDINGS{Perez06,
3206 author = {Luis Perez-Freire and F. Pérez-gonzalez and Pedro Comesaña},
3207 title = {Secret Dither Estimation in Lattice-Quantization Data Hiding: A Set-Membership
3209 booktitle = {Security, Steganography, and Watermarking of Multimedia Contents},
3211 editor = {Edward J. Delp and Ping W. Wong},
3212 address = {San Jose, California, USA},
3214 organization = {SPIE},
3216 timestamp = {2009.06.30}
3219 @INPROCEEDINGS{Perez-Freire06,
3220 author = {Luis Perez-Freire and Pedro Comesana and Juan Ramon Troncoso-Pastoriza
3221 and Fernando Perez-Gonzalez},
3222 title = {Watermarking Security: a Survey},
3223 booktitle = {LNCS Transactions on Data Hiding and Multimedia Security},
3226 timestamp = {2009.06.29}
3229 @PROCEEDINGS{Peter07,
3230 title = {On Concealed Data Aggregation for WSNs},
3232 author = {Peter, Steffen and Piotrowski, Krzysztof and Langendoerfer, Peter},
3233 booktitle = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3235 citeulike-article-id = {2281643},
3236 citeulike-linkout-0 = {http://dx.doi.org/10.1109/CCNC.2007.45},
3237 citeulike-linkout-1 = {http://ieeexplore.ieee.org/xpls/abs\_all.jsp?arnumber=4199133},
3238 doi = {10.1109/CCNC.2007.45},
3239 journal = {Consumer Communications and Networking Conference, 2007. CCNC 2007.
3243 posted-at = {2008-01-23 19:36:19},
3245 url = {http://dx.doi.org/10.1109/CCNC.2007.45}
3249 author = {Pham, Congduc and Makhoul, Abdallah and Saadi, Rachid},
3250 title = {Risk-based Adaptive Scheduling in Randomly Deployed Video Sensor
3251 Networks for Critical Surveillance Applications},
3252 journal = {Journal of Network and Computer Applications},
3257 note = {Accepted manuscript. To appear},
3258 classement = {ACLI},
3260 impact-factor = {1.111},
3262 isi-acro = {J NETW COMPU APPL},
3263 publisher = {Springer}
3267 author = {Edgar Alan Poe},
3268 title = {The Raven},
3271 note = {American Museum (Baltimore)},
3272 owner = {christophe},
3273 timestamp = {2010.11.23}
3276 @ARTICLE{Perez-Freire2006:Security,
3277 author = {L. P{\'e}rez-Freire and F. P{\'e}rez-González and T. Furon and P.
3279 title = {Security of lattice-based data hiding against the known message attack},
3280 journal = {IEEE Trans. on Information Forensics and Security},
3287 timestamp = {2009.12.06}
3290 @MISC{Quisquater02sidechannel,
3291 author = {J-J. Quisquater and D. Samyde and Université Catholique De Louvain
3293 title = {Side Channel Cryptanalysis},
3297 @ARTICLE{Raynal2001,
3298 author = {Frédéric Raynal and Fabien A. P. Petitcolas and Caroline Fontaine},
3299 title = {Evaluation automatique des méthodes de tatouage},
3300 journal = {Traitement du signal},
3305 timestamp = {2008.05.21}
3309 author = {Vincent Rijmen and Elisabeth Oswald},
3310 title = {Update on SHA-1},
3311 howpublished = {Cryptology ePrint Archive, Report 2005/010},
3313 note = {\url{http://eprint.iacr.org/}}
3317 title = {Discrete Iterations, a Metric Study},
3318 publisher = {Springer-Verlag},
3320 editor = {Berlin Heidelberg New-York},
3321 author = {François Robert},
3323 series = {Series in Computational Mathematics}
3327 title = {Discrete Iterations: A Metric Study},
3329 editor = {Springer-Verlag},
3330 author = {F. Robert},
3332 series = {Springer Series in Computational Mathematics},
3334 timestamp = {17/02/2008}
3338 author = {Rudenko, O. and Snytkin, M.},
3339 title = {Image compression based on the neural network art},
3340 journal = {Cybernetics and Systems Analysis},
3344 affiliation = {Kharkov National University of Radio Electronics Kharkov Ukraine},
3347 keyword = {Computer Science},
3348 publisher = {Springer New York}
3351 @PHDTHESIS{Ruette2001,
3352 author = {Sylvie Ruette},
3353 title = {Chaos en dynamique topologique, en particulier sur l'intervalle,
3354 mesures d'entropie maximale},
3355 school = {Université d'Aix-Marseille II},
3357 optmonth = {Novembre},
3359 timestamp = {2008.01.02}
3362 @MASTERSTHESIS{Saulnier02,
3363 author = {Boris Saulnier},
3364 title = {Entropie topologique},
3365 school = {DEA Sémantique, Preuves et Langages, Paris 7},
3367 owner = {christophe},
3368 timestamp = {2010.08.12}
3371 @ARTICLE{Schmitz2001,
3372 author = {Roland Schmitz},
3373 title = {Use of chaotic dynamical systems in cryptography},
3374 journal = {Journal of Franklin Institute},
3379 timestamp = {17/02/2008}
3383 title = {Analyse: topologie g\'{e}n\'{e}rale et analyse fonctionnelle},
3384 publisher = {Hermann},
3387 author = {Laurent Schwartz},
3388 owner = {christophe},
3389 timestamp = {2010.09.15}
3393 author = {Shannon, Claude E.},
3394 title = {Communication Theory of Secrecy Systems},
3395 journal = {Bell Systems Technical Journal},
3399 citeulike-article-id = {507362},
3400 keywords = {master, secrecy\_systems, teoria-informacao, theory\_communication,
3401 theory\_cryptography},
3403 posted-at = {2006-02-16 23:24:09},
3405 timestamp = {2009.06.29}
3408 @ARTICLE{Shmygelska05,
3409 author = {Shmygelska, Alena and Hoos, Holger},
3410 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3411 polar protein folding problem},
3412 journal = {BMC Bioinformatics},
3417 abstract = {BACKGROUND:The protein folding problem is a fundamental problems in
3418 computational molecular biology and biochemical physics. Various
3419 optimisation methods have been applied to formulations of the ab-initio
3420 folding problem that are based on reduced models of protein structure,
3421 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3422 and hybrid approaches. In our work, we have introduced an ant colony
3423 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3424 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3425 from its amino acid sequence under a widely studied, conceptually
3426 simple model - the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3427 (HP) model.RESULTS:We present an improvement of our previous ACO
3428 algorithm for the 2D HP model and its extension to the 3D HP model.
3429 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3430 than previous state-of-the-art algorithms on sequences whose native
3431 conformations do not contain structural nuclei (parts of the native
3432 fold that predominantly consist of local interactions) at the ends,
3433 but rather in the middle of the sequence, and that it generally finds
3434 a more diverse set of native conformations.CONCLUSIONS:The application
3435 of ACO to this bioinformatics problem compares favourably with specialised,
3436 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3437 our empirical results indicate that our rather simple ACO algorithm
3438 scales worse with sequence length but usually finds a more diverse
3439 ensemble of native states. Therefore the development of ACO algorithms
3440 for more complex and realistic models of protein structure holds
3441 significant promise.},
3442 doi = {10.1186/1471-2105-6-30},
3444 pubmedid = {15710037}
3447 @OTHER{Shmygelska2005Feb,
3448 __markedentry = {[christophe]},
3449 abstract = {Abstract Background The protein folding problem is a fundamental problems
3450 in computational molecular biology and biochemical physics. Various
3451 optimisation methods have been applied to formulations of the ab-initio
3452 folding problem that are based on reduced models of protein structure,
3453 including Monte Carlo methods, Evolutionary Algorithms, Tabu Search
3454 and hybrid approaches. In our work, we have introduced an ant colony
3455 optimisation (ACO) algorithm to address the non-deterministic polynomial-time
3456 hard (NP-hard) combinatorial problem of predicting a protein's conformation
3457 from its amino acid sequence under a widely studied, conceptually
3458 simple model – the 2-dimensional (2D) and 3-dimensional (3D) hydrophobic-polar
3459 (HP) model. Results We present an improvement of our previous ACO
3460 algorithm for the 2D HP model and its extension to the 3D HP model.
3461 We show that this new algorithm, dubbed ACO-HPPFP-3, performs better
3462 than previous state-of-the-art algorithms on sequences whose native
3463 conformations do not contain structural nuclei (parts of the native
3464 fold that predominantly consist of local interactions) at the ends,
3465 but rather in the middle of the sequence, and that it generally finds
3466 a more diverse set of native conformations. Conclusions The application
3467 of ACO to this bioinformatics problem compares favourably with specialised,
3468 state-of-the-art methods for the 2D and 3D HP protein folding problem;
3469 our empirical results indicate that our rather simple ACO algorithm
3470 scales worse with sequence length but usually finds a more diverse
3471 ensemble of native states. Therefore the development of ACO algorithms
3472 for more complex and realistic models of protein structure holds
3473 significant promise.},
3474 author = {Shmygelska, Alena and Hoos, Holger H},
3475 journal = {BMC Bioinformatics. 2005 Feb 14},
3477 owner = {christophe},
3479 timestamp = {2011.01.24},
3480 title = {An ant colony optimisation algorithm for the 2D and 3D hydrophobic
3481 polar protein folding problem},
3487 author = {Li Shujun and Li Qi and Li Wenmin and Mou Xuanqin and Cai Yuanlong},
3488 title = {Statistical Properties of Digital Piecewise Linear Chaotic Maps and
3489 Their Roles in Cryptography and Pseudo-Random Coding},
3490 journal = {Proceedings of the 8th IMA International Conference on Cryptography
3495 owner = {christophe},
3496 timestamp = {2010.03.06}
3499 @INPROCEEDINGS{Simmons83,
3500 author = {Gustavus J. Simmons},
3501 title = {The Prisoners' Problem and the Subliminal Channel},
3502 booktitle = {Advances in Cryptology, Proc. CRYPTO'83},
3505 bibsource = {DBLP, http://dblp.uni-trier.de},
3507 timestamp = {2009.06.29}
3510 @ARTICLE{Solak2004389,
3511 author = {Ercan Solak},
3512 title = {On the security of a class of discrete-time chaotic cryptosystems},
3513 journal = {Physics Letters A},
3516 pages = {389 - 395},
3518 doi = {DOI: 10.1016/j.physleta.2003.11.008},
3520 keywords = {Communication using chaos},
3522 timestamp = {2009.12.12},
3523 url = {http://www.sciencedirect.com/science/article/B6TVM-4B22RC9-2/2/99a0af737c9b6ba8af47ae4d3c7a326d}
3526 @PHDTHESIS{Spiteri74,
3527 author = {Pierre Spitéri},
3528 title = {Contribution à l'étude de la stabilite au sens de liapounov de certains
3529 systemes differentiels non lineaires},
3530 school = {Université de Franche-Comté},
3532 owner = {christophe},
3533 timestamp = {2010.10.13}
3537 title = {Does God Play Dices ?: the mathematics of chaos},
3538 publisher = {Penguin},
3540 author = {Ian Stewart},
3542 timestamp = {2008.01.02}
3546 title = {Cryptography: Theory and Practice, Second Edition},
3547 publisher = {{Chapman \& Hall/CRC}},
3549 author = {Stinson, Douglas R.},
3551 abstract = {{Douglas R. Stinson's <I>Cryptography: Theory and Practice</I> is
3552 a mathematically intensive examination of cryptography, including
3553 ciphers, the Data Encryption Standard (DES), public key cryptography,
3554 one-way hash functions, and digital signatures. Stinson's explication
3555 of "zero-sum proofs"--a process by which one person lets another
3556 person know that he or she has a password without actually revealing
3557 any information--is especially good.<P> If you are new to the math
3558 behind cryptography but want to tackle it, the author covers all
3559 of the required background to understand the real mathematics here.
3560 <I>Cryptography</I> includes extensive exercises with each chapter
3561 and makes an ideal introduction for any math-literate person willing
3562 to get acquainted with this material.} {<P>Major advances over the
3563 last five years precipitated this major revision of the bestselling
3564 Cryptography: Theory and Practice. With more than 40 percent new
3565 or updated material, the second edition now provides an even more
3566 comprehensive treatment of modern cryptography. It focuses on the
3567 new Advanced Encryption Standards and features an entirely new chapter
3568 on that subject. Another new chapter explores the applications of
3569 secret sharing schemes, including ramp schemes, visual cryptography,
3570 threshold cryptography, and broadcast encryption. This is an ideal
3571 introductory text for both computer science and mathematics students
3572 and a valuable reference for professionals.</P>}},
3573 citeulike-article-id = {2401855},
3575 howpublished = {Hardcover},
3576 isbn = {1584882069},
3577 keywords = {security},
3578 posted-at = {2008-02-20 08:28:49},
3580 url = {http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20\&path=ASIN/1584882069}
3583 @INPROCEEDINGS{Takana90,
3584 author = {K. Tanaka and Y. Nakamura and K. Matsui},
3585 title = {Embedding Secret Information into a Dithered Multi-level Image},
3586 booktitle = {IEEE Military Communications Conference},
3588 owner = {christophe},
3589 timestamp = {2010.08.05}
3592 @PHDTHESIS{ElTarazi81,
3593 author = {M. N. El Tarazi},
3594 title = {Contraction et ordre partiel pour l'étude d'algorithmes synchrones
3595 et asynchrones en analyse numérique},
3596 school = {Faculté des Sciences et Techniques de l'Université de Franche-Comté,
3599 owner = {christophe},
3600 timestamp = {2010.08.17}
3603 @INPROCEEDINGS{Unger93,
3604 author = {Unger, Ron and Moult, John},
3605 title = {Genetic Algorithm for 3D Protein Folding Simulations},
3606 booktitle = {Proceedings of the 5th International Conference on Genetic Algorithms},
3609 address = {San Francisco, CA, USA},
3610 publisher = {Morgan Kaufmann Publishers Inc.},
3612 isbn = {1-55860-299-2},
3616 @MISC{Van93electronicwater,
3617 author = {Tirkel Rankin Van},
3618 title = {Electronic Water Mark},
3622 @ARTICLE{Venkatesan2007397,
3623 author = {R.C. Venkatesan},
3624 title = {Encryption of covert information into multiple statistical distributions},
3625 journal = {Physics Letters A},
3628 pages = {397 - 404},
3630 doi = {DOI: 10.1016/j.physleta.2007.05.117},
3632 keywords = {Statistical encryption/decryption},
3634 timestamp = {2009.12.12},
3635 url = {http://www.sciencedirect.com/science/article/B6TVM-4P4FV2M-1/2/cd11a2ec144526e3c4552d2a7e7906cc}
3639 author = {G. Voyatzis and I. Pitas},
3640 title = {Chaotic watermarks for embedding in the spatial digital image domain},
3641 journal = {Proceedings of IEEE ICIP},
3645 owner = {christophe},
3646 timestamp = {2010.03.06}
3649 @INCOLLECTION{Wagner03,
3650 author = {Wagner, David},
3651 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3652 booktitle = {Information Security},
3653 publisher = {Springer Berlin, Heidelberg},
3656 series = {Lecture Notes in Computer Science},
3658 abstract = {We use linear algebra to show that an algebraic privacy homomorphism
3659 proposed by Domingo-Ferrer is insecure for some parameter settings.},
3660 affiliation = {University of California, Berkeley USA}
3663 @INPROCEEDINGS{Wagner03cryptanalysisof,
3664 author = {David Wagner},
3665 title = {Cryptanalysis of an Algebraic Privacy Homomorphism},
3666 booktitle = {Proc. Sixth Information Security Conf. (ISC03},
3671 @ARTICLE{Wang_ellipticcurve,
3672 author = {Haodong Wang and Bo Sheng and Qun Li},
3673 title = {Elliptic curve cryptography-based access control in sensor networks},
3674 journal = {Int. J. Security and Networks}
3677 @INPROCEEDINGS{wbg10:ip,
3678 author = {Wang, Qianxue and Bahi, Jacques and Guyeux, Christophe and Fang,
3680 title = {Randomness quality of {CI} chaotic generators. Application to Internet
3682 booktitle = {INTERNET'2010. The 2nd Int. Conf. on Evolving Internet},
3685 address = {Valencia, Spain},
3687 publisher = {IEEE Computer Society Press},
3688 note = {Best Paper award},
3689 classement = {ACTI},
3690 domainehal = {INFO:INFO_DC, INFO:INFO_CR, INFO:INFO_MO},
3696 author = {X. M. Wang and J. S. Zhang and W. F. Zhang},
3697 title = {One-way hash function construction based on the extended chaotic
3699 journal = {Acta Phys. Sinici.},
3701 volume = {52, No. 11},
3702 pages = {2737--2742},
3704 timestamp = {2009.01.16}
3708 author = {Westhoff, Dirk and Girao, Joao and Acharya, Mithun},
3709 title = {Concealed Data Aggregation for Reverse Multicast Traffic in Sensor
3710 Networks: Encryption, Key Distribution, and Routing Adaptation},
3711 journal = {IEEE Transactions on Mobile Computing},
3714 pages = {1417--1431},
3716 address = {Piscataway, NJ, USA},
3717 doi = {http://dx.doi.org/10.1109/TMC.2006.144},
3719 publisher = {IEEE Educational Activities Department}
3723 author = {Wikipédia},
3724 title = {Exposant de Lyapunov -- Site web d'André Lévesque},
3726 note = {[En ligne; Page disponible le 9-septembre-2010]},
3727 url = {\url{http://math.cmaisonneuve.qc.ca/alevesque/chaos_fract/Lyapunov/Exposant.html}}
3731 author = {Wikipédia},
3732 title = {Espace complet --- Wikipédia{,} l'encyclopédie libre},
3734 note = {[En ligne; Page disponible le 9-août-2010]},
3735 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Espace_complet&oldid=52734266}}
3739 author = {Wikipédia},
3740 title = {Densité (mathématiques) --- Wikipédia{,} l'encyclopédie libre},
3742 note = {[En ligne; Page disponible le 8-août-2010]},
3743 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Densit%C3%A9_(math%C3%A9matiques)&oldid=53938121}}
3747 author = {Wikipédia},
3748 title = {Information de Fisher --- Wikipédia{,} l'encyclopédie libre},
3750 note = {[En ligne; Page disponible le 5-août-2010]},
3751 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Information_de_Fisher&oldid=52877871}}
3754 @MISC{wiki:Kerkhoffs,
3755 author = {Wikipédia},
3756 title = {Principe de Kerckhoffs --- Wikipédia{,} l'encyclopédie libre},
3758 note = {[En ligne; Page disponible le 20-août-2010]},
3759 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Principe_de_Kerckhoffs&oldid=52133114}}
3762 @MISC{wiki:sarkovskii,
3763 author = {Wikipédia},
3764 title = {Théorème de Sarkovskii --- Wikipédia{,} l'encyclopédie libre},
3766 note = {[En ligne; Page disponible le 8-août-2010]},
3767 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Th%C3%A9or%C3%A8me_de_Sarkovskii&oldid=54196167}}
3770 @MISC{wiki:steganographie,
3771 author = {Wikipédia},
3772 title = {Stéganographie --- Wikipédia{,} l'encyclopédie libre},
3774 note = {[En ligne; Page disponible le 5-août-2010]},
3775 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=St%C3%A9ganographie&oldid=54724435}}
3778 @MISC{wiki:tatouage,
3779 author = {Wikipédia},
3780 title = {Tatouage numérique --- Wikipédia{,} l'encyclopédie libre},
3782 note = {[En ligne; Page disponible le 5-août-2010]},
3783 url = {https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Tatouage_num%C3%A9rique&oldid=55484940}
3786 @MISC{wiki:testsHypothese,
3787 author = {Wikipédia},
3788 title = {Test d'hypothèse --- Wikipédia{,} l'encyclopédie libre},
3790 note = {[En ligne; Page disponible le 5-août-2010]},
3791 url = {\url{https://secure.wikimedia.org/wikipedia/fr/w/index.php?title=Test_d%27hypoth%C3%A8se&oldid=55344108}}
3795 author = {Xianyong Wu and Zhi-Hong Guan},
3796 title = {A novel digital watermark algorithm based on chaotic maps},
3797 journal = {Physics Letters A},
3800 pages = {403 - 406},
3802 doi = {DOI: 10.1016/j.physleta.2007.01.034},
3804 keywords = {Watermarking},
3805 url = {http://www.sciencedirect.com/science/article/B6TVM-4MY0MF3-8/2/0b4d1298fa84337d2e59b3fefe26f583}
3808 @INPROCEEDINGS{Wu2007,
3809 author = {Wu, Xianyong and Guan, Zhi-Hong and Wu, Zhengping},
3810 title = {A Chaos Based Robust Spatial Domain Watermarking Algorithm},
3811 booktitle = {ISNN '07: Proceedings of the 4th international symposium on Neural
3815 address = {Berlin, Heidelberg},
3816 publisher = {Springer-Verlag},
3817 doi = {http://dx.doi.org/10.1007/978-3-540-72393-6_15},
3818 isbn = {978-3-540-72392-9},
3819 location = {Nanjing, China}
3822 @ARTICLE{Xiao20092288,
3823 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3824 title = {Parallel keyed hash function construction based on chaotic neural
3826 journal = {Neurocomputing},
3829 pages = {2288 - 2296},
3831 note = {Lattice Computing and Natural Computing (JCIS 2007) / Neural Networks
3832 in Intelligent Systems Designn (ISDA 2007)},
3833 abstract = {Recently, various hash functions based on chaos or neural networks
3834 were proposed. Nevertheless, none of them works efficiently in parallel
3835 computing environment. In this paper, an algorithm for parallel keyed
3836 hash function construction based on chaotic neural network is proposed.
3837 The mechanism of changeable-parameter and self-synchronization establishes
3838 a close relation between the hash value bit and message, and the
3839 algorithm structure ensures the uniform sensitivity of the hash value
3840 to the message blocks at different positions. The proposed algorithm
3841 can satisfy the performance requirements of hash function. These
3842 properties make it a promising choice for hashing on parallel computing
3845 keywords = {Chaotic neural network}
3848 @ARTICLE{Xiao20094346,
3849 author = {Di Xiao and Xiaofeng Liao and Yong Wang},
3850 title = {Improving the security of a parallel keyed hash function based on
3852 journal = {Physics Letters A},
3855 pages = {4346 - 4353},
3858 keywords = {Hash function},
3860 timestamp = {2009.12.12}
3863 @ARTICLE{Xiao20102254,
3864 author = {Di Xiao and Frank Y. Shih and Xiaofeng Liao},
3865 title = {A chaos-based hash function with both modification detection and
3866 localization capabilities},
3867 journal = {Communications in Nonlinear Science and Numerical Simulation},
3870 pages = {2254 - 2261},
3872 abstract = {Recently, a variety of chaos-based hash functions have been proposed.
3873 Nevertheless, none of them can realize modification localization.
3874 In this paper, a hash function with both modification detection and
3875 localization capabilities is proposed, which can also support the
3876 parallel processing mode. By using the mechanism of changeable-parameter
3877 and self-synchronization, the keystream can establish a close relation
3878 with the algorithm key, the content, and the order of each message
3879 unit. Theoretical analysis and computer simulation indicate that
3880 the proposed algorithm can satisfy the performance requirements of
3883 keywords = {Hash function}
3886 @INPROCEEDINGS{Yu06,
3887 author = {Yu, Yu and Leiwo, Jussipekka and Premkumar, Benjamin},
3888 title = {A Study on the Security of Privacy Homomorphism},
3889 booktitle = {ITNG '06: Proceedings of the Third International Conference on Information
3890 Technology: New Generations},
3893 address = {Washington, DC, USA},
3894 publisher = {IEEE Computer Society},
3895 doi = {http://dx.doi.org/10.1109/ITNG.2006.19},
3896 isbn = {0-7695-2497-4}
3899 @ARTICLE{Zhang2008658,
3900 author = {Wei Zhang and Yonghe Liu and Sajal K. Das and Pradip De},
3901 title = {Secure data aggregation in wireless sensor networks: A watermark
3902 based authentication supportive approach},
3903 journal = {Pervasive and Mobile Computing},
3906 pages = {658 - 680},
3908 doi = {DOI: 10.1016/j.pmcj.2008.05.005},
3910 keywords = {Wireless sensor networks},
3911 url = {http://www.sciencedirect.com/science/article/B7MF1-4SKB3MD-1/2/b73948dcaa3eb63a2c21d09041882625}
3915 author = {Zhang, Yang and Arakaki, Adrian K. and Skolnick, Jeffrey},
3916 title = {TASSER: An automated method for the prediction of protein tertiary
3917 structures in CASP6},
3918 journal = {Proteins},
3924 keywords = {comparative modeling, threading, ab initio prediction, TASSER, PROSPECTOR_3},
3925 owner = {christophe},
3926 publisher = {Wiley Subscription Services, Inc., A Wiley Company},
3927 timestamp = {2011.01.22},
3928 url = {http://dx.doi.org/10.1002/prot.20724}
3931 @ARTICLE{Zhou1997429,
3932 author = {Chang-song Zhou and Tian-lun Chen},
3933 title = {Extracting information masked by chaos and contaminated with noise:
3934 Some considerations on the security of communication approaches using
3936 journal = {Physics Letters A},
3939 pages = {429 - 435},
3942 keywords = {Communication},
3944 timestamp = {2009.12.12}
3948 author = {Zhou, Huai-bei and Wang, Lu},
3949 title = {Chaos in Biomolecular Dynamics},
3950 journal = {The Journal of Physical Chemistry},
3953 pages = {8101-8105},
3955 doi = {10.1021/jp953409x}
3958 @PROCEEDINGS{DBLP:conf/iwdw/2005,
3959 title = {IWDW'05: 4th International Workshop on Digital Watermarking},
3961 editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim},
3963 series = {Lecture Notes in Computer Science},
3964 address = {Siena, Italy},
3965 publisher = {Springer},
3966 month = {September 15-17},
3967 bibsource = {DBLP, http://dblp.uni-trier.de},
3969 isbn = {3-540-28768-X},
3971 timestamp = {2009.06.29}
3974 @PROCEEDINGS{DBLP:conf/ih/2006,
3975 title = {IH 2006: Information Hiding, 8th International Workshop},
3977 editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil
3980 series = {Lecture Notes in Computer Science},
3981 address = {Alexandria, VA, USA},
3982 publisher = {Springer},
3984 bibsource = {DBLP, http://dblp.uni-trier.de},
3985 booktitle = {Information Hiding},
3986 isbn = {978-3-540-74123-7},
3988 timestamp = {2009.06.29}
3991 @PROCEEDINGS{DBLP:conf/ih/2007,
3992 title = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo,
3993 France, June 11-13, 2007, Revised Selected Papers},
3995 editor = {Teddy Furon and Fran\c{c}ois Cayre and Gwena{\"e}l J. Do{\"e}rr and
3998 series = {Lecture Notes in Computer Science},
3999 publisher = {Springer},
4000 bibsource = {DBLP, http://dblp.uni-trier.de},
4001 booktitle = {Information Hiding},
4002 isbn = {978-3-540-77369-6},
4004 timestamp = {2009.06.29}
4007 @PROCEEDINGS{DBLP:conf/iccsa/2006-1,
4008 title = {Computational Science and Its Applications - ICCSA 2006, International
4009 Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part I},
4011 editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih
4012 Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`a} and Youngsong
4013 Mun and Hyunseung Choo},
4015 series = {Lecture Notes in Computer Science},
4016 publisher = {Springer},
4017 bibsource = {DBLP, http://dblp.uni-trier.de},
4018 booktitle = {ICCSA (1)},
4019 isbn = {3-540-34070-X}
4022 @PROCEEDINGS{DBLP:conf/secrypt/2010,
4023 title = {SECRYPT 2010 - Proceedings of the International Conference on Security
4024 and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part
4025 of ICETE - The International Joint Conference on e-Business and Telecommunications},
4027 editor = {Sokratis K. Katsikas and Pierangela Samarati},
4028 publisher = {SciTePress},
4029 bibsource = {DBLP, http://dblp.uni-trier.de},
4030 booktitle = {SECRYPT},
4031 isbn = {978-989-8425-18-8}
4034 @BOOK{Katzenbeisser00,
4035 title = {Information Hiding Techniques for Steganography and Digital Watermarking},
4036 publisher = {Artech House, Inc.},
4038 editor = {Katzenbeisser, Stefan and Petitcolas, Fabien A.},
4039 address = {Norwood, MA, USA},
4043 @PROCEEDINGS{DBLP:conf/ih/1999,
4044 title = {IH'99: 3rd International Workshop on Information Hiding},
4046 editor = {Andreas Pfitzmann},
4048 series = {Lecture Notes in Computer Science},
4049 address = {Dresden, Germany},
4050 publisher = {Springer},
4051 month = {September 29 - October 1.},
4052 bibsource = {DBLP, http://dblp.uni-trier.de},
4053 booktitle = {Information Hiding},
4054 isbn = {3-540-67182-X},
4056 timestamp = {2009.06.29}
4059 @PROCEEDINGS{DBLP:conf/indocrypt/2000,
4060 title = {Progress in Cryptology - INDOCRYPT 2000, First International Conference
4061 in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
4063 editor = {Bimal K. Roy and Eiji Okamoto},
4065 series = {Lecture Notes in Computer Science},
4066 publisher = {Springer},
4067 bibsource = {DBLP, http://dblp.uni-trier.de},
4068 booktitle = {INDOCRYPT},
4069 isbn = {3-540-41452-5}
4072 @BOOK{DBLP:reference/icsec/2010,
4073 title = {Handbook of Information and Communication Security},
4074 publisher = {Springer},
4076 editor = {Peter P. Stavroulakis and Mark Stamp},
4077 bibsource = {DBLP, http://dblp.uni-trier.de},
4078 booktitle = {Handbook of Information and Communication Security},
4079 ee = {http://dx.doi.org/10.1007/978-3-642-04117-4},
4080 isbn = {978-3-642-04116-7}
4083 @PROCEEDINGS{DBLP:conf/isnn/2004-2,
4084 title = {Advances in Neural Networks - ISNN 2004, International Symposium
4085 on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
4088 editor = {Fuliang Yin and Jun Wang and Chengan Guo},
4090 series = {Lecture Notes in Computer Science},
4091 publisher = {Springer},
4092 bibsource = {DBLP, http://dblp.uni-trier.de},
4093 booktitle = {ISNN (2)},
4094 isbn = {3-540-22843-8}
4097 @PROCEEDINGS{DBLP:conf/adhocnets/2010,
4098 title = {Ad Hoc Networks - Second International Conference, ADHOCNETS 2010,
4099 Victoria, BC, Canada, August 18-20, 2010, Revised Selected Papers},
4101 editor = {Jun Zheng and David Simplot-Ryl and Victor C. M. Leung},
4103 series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
4104 and Telecommunications Engineering},
4105 publisher = {Springer},
4106 bibsource = {DBLP, http://dblp.uni-trier.de},
4107 booktitle = {ADHOCNETS},
4108 ee = {http://dx.doi.org/10.1007/978-3-642-17994-5},
4109 isbn = {978-3-642-17993-8}
4114 timestamp = {2011.03.29}
4118 title = {Delicious social bookmarking, http://delicious.com/},
4119 comment = {http://delicious.com/},
4121 url = {http://delicious.com/}
4125 title = {The Frick Collection, http://www.frick.org/},
4126 comment = {http://www.frick.org/},
4128 url = {http://www.frick.org/}
4132 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4133 2010, Barcelona, Spain, 18-23 July 2010},
4136 bibsource = {DBLP, http://dblp.uni-trier.de},
4137 booktitle = {IEEE Congress on Evolutionary Computation}
4140 @PROCEEDINGS{DBLP:conf/cec/2010,
4141 title = {Proceedings of the IEEE Congress on Evolutionary Computation, CEC
4142 2010, Barcelona, Spain, 18-23 July 2010},
4145 bibsource = {DBLP, http://dblp.uni-trier.de},
4146 booktitle = {IEEE Congress on Evolutionary Computation}
4149 @PROCEEDINGS{DBLP:conf/date/2010,
4150 title = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany,
4154 bibsource = {DBLP, http://dblp.uni-trier.de},
4158 @PROCEEDINGS{DBLP:conf/cse/2009,
4159 title = {Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational
4160 Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada},
4162 publisher = {IEEE Computer Society},
4163 bibsource = {DBLP, http://dblp.uni-trier.de},
4167 @PROCEEDINGS{DBLP:conf/icumt/2009,
4168 title = {Proceedings of the International Conference on Ultra Modern Telecommunications,
4169 ICUMT 2009, 12-14 October 2009, St. Petersburg, Russia},
4172 bibsource = {DBLP, http://dblp.uni-trier.de},
4176 @PROCEEDINGS{DBLP:conf/focs/2008,
4177 title = {49th Annual IEEE Symposium on Foundations of Computer Science, FOCS
4178 2008, October 25-28, 2008, Philadelphia, PA, USA},
4180 publisher = {IEEE Computer Society},
4181 bibsource = {DBLP, http://dblp.uni-trier.de},
4185 @comment{jabref-meta: selector_publisher:}
4187 @comment{jabref-meta: selector_author:}
4189 @comment{jabref-meta: selector_journal:}
4191 @comment{jabref-meta: selector_keywords:Chaos;Entropie Topologique;Tip
4196 @InProceedings{Pang:2008:cec,
4197 author = "Wai-Man Pang and Tien-Tsin Wong and Pheng-Ann Heng",
4198 title = "Generating Massive High-Quality Random Numbers using
4200 booktitle = "2008 IEEE World Congress on Computational
4203 editor = "Jun Wang",
4204 address = "Hong Kong",
4205 organization = "IEEE Computational Intelligence Society",
4206 publisher = "IEEE Press",
4210 @Article{LEcuyerS07,
4211 title = "Test{U01}: {A} {C} library for empirical testing of
4212 random number generators",
4213 author = "Pierre L'Ecuyer and Richard J. Simard",
4214 journal = "ACM Trans. Math. Softw",
4218 bibdate = "2007-11-06",
4220 http://dblp.uni-trier.de/db/journals/toms/toms33.html#LEcuyerS07",
4221 URL = "http://doi.acm.org/10.1145/1268776.1268777",
4225 author = {A. Zhmurov, K. Rybnikov, Y. Kholodov, and V. Barsegov},
4226 title = {Generation of Random Numbers on Graphics Processors: Forced Indentation In Silico of the Bacteriophage HK97},
4227 journal = {J. Phys. Chem. B},
4231 pages = {5278--5288},
4236 @comment {regarder : Pseudo-Random Number Generation for Brownian Dynamics and Dissipative Particle Dynamics Simulations on GPU Devices}
4237 @comment {CL Phillips, JA Anderson… - Journal of Computational Physics, 2011 - Elsevier}
4239 @InProceedings{conf/fpga/ThomasHL09,
4240 title = "A comparison of {CPU}s, {GPU}s, {FPGA}s, and massively
4241 parallel processor arrays for random number
4243 author = "David B. Thomas and Lee W. Howes and Wayne Luk",
4244 booktitle = "Proceedings of the {ACM}/{SIGDA} 17th International
4245 Symposium on Field Programmable Gate Arrays, {FPGA}
4246 2009, Monterey, California, {USA}, February 22-24,
4248 bibdate = "2010-06-29",
4251 editor = "Paul Chow and Peter Y. K. Cheung",
4252 ISBN = "978-1-60558-410-2",
4254 URL = "http://doi.acm.org/10.1145/1508128.1508139",
4259 @InProceedings{Jenkins96,
4262 booktitle = "IWFSE: International Workshop on Fast Software
4269 title = {Cuda cublas library},
4271 Note = {Version 4.0},
4276 title = {Curand library},
4278 Note = {Version 4.0},
4284 author = {Lenore Blum and Manuel Blum and Michael Shub},
4285 title = {A Simple Unpredictable Pseudo-Random Number Generator},
4286 journal = {SIAM Journal on Computing},