default search action
Annales des Télécommunications, Volume 69
Volume 69, Numbers 1-2, February 2014
- Maryline Laurent, Sara Foresti, Heng Xu:
Privacy-aware electronic society. 1-2 - Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi, Djamal Benslimane:
Privacy query rewriting algorithm instrumented by a privacy-aware access control model. 3-19 - Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran:
PriMa: a comprehensive approach to privacy protection in social network sites. 21-36 - Joaquim Marques, Carlos Serrão:
Improving user content privacy on social networks using rights management systems. 37-45 - Sophie Chabridon, Romain Laborde, Thierry Desprats, Arnaud Oglaza, Pierrick Marie, Samer Machara Marquez:
A survey on addressing privacy together with quality of context for context management in the Internet of Things. 47-62 - Lukasz Olejnik, Claude Castelluccia, Artur Janc:
On the uniqueness of Web browsing history patterns. 63-74 - Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly:
Privacy concerns in assisted living technologies. 75-88 - Antoine Coutrot, Nathalie Guyader, Gelu Ionescu, Alice Caplier:
Video viewing: do auditory salient events capture visual attention? 89-97 - Fred Harris, Elettra Venosa, Xiaofei Chen, Chris Dick:
An efficient channelizer tree for portable software defined radios. 99-110 - Tien Anh Le, Hang Nguyen:
Human perception-based distributed architecture for scalable video conferencing services: theoretical models and performance. 111-121 - Vladimir Slavkovic, Aleksandar Neskovic, Natasa Neskovic:
Microcell prediction model based on support vector machine algorithm. 123-129
Volume 69, Numbers 3-4, April 2014
- Abdelhamid Mellouk, Latifa Oukhellou, Lei Shu, Glenn Shafer:
Belief functions and uncertainty management in networks and telecommunication. 131-133 - Mustapha Réda Senouci, Abdelhamid Mellouk, Mohamed Abdelkrim Senouci, Latifa Oukhellou:
Belief functions in telecommunications and network technologies: an overview. 135-145 - Frédéric Launay, Patrick Coirault:
A second-order Markov model to synchronize a quasi-chaotic sequence: application of synchronization and decoding problem with belief propagation. 147-154 - Hongtao Shi, Gang Liang, Hai Wang:
A novel traffic identification approach based on multifractal analysis and combined neural network. 155-169 - Faouzi Sebbak, Farid Benhammadi, Abdelghani Chibani, Yacine Amirat, Aïcha Mokhtari:
Dempster-Shafer theory-based human activity recognition in smart home environments. 171-184 - Mira Bou Farah, David Mercier, Eric Lefèvre, François Delmotte:
A high-level application using belief functions for exchanging and managing uncertain events on the road in vehicular ad hoc networks. 185-199 - Ahmed Loutfi, Mohammed Elkoutbi, Jalel Ben-Othman, Abdellatif Kobbane:
An energy aware algorithm for OLSR clustering. 201-207 - Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Zahoor Ali Khan, K. Latif, M. Ishfaq:
Investigating quality routing link metrics in Wireless Multi-hop Networks. 209-217 - Mohammad Abdullah-Al-Wadud, Md. Abdul Hamid:
A fault-tolerant structural health monitoring protocol using wireless sensor networks. 219-228 - Pierre-Jean Bouvet, Maryline Hélard:
Optimal space-time coding under iterative processing. 229-238 - Sangki Ko, Kwangsue Chung:
A handover-aware seamless video streaming scheme in heterogeneous wireless networks. 239-250
Volume 69, Numbers 5-6, June 2014
- Lucian Trifina, Daniela G. Tarniceriu:
Improved method for searching interleavers from a certain set using Garello's method with applications for the LTE standard. 251-272 - Shaohui Wang, Zhijie Han, Sujuan Liu, Dan-wei Chen:
Security analysis of two lightweight RFID authentication protocols. 273-282 - Géza Geleji, Harry G. Perros:
Jitter analysis of an IPP tagged traffic stream in an {IPP, M}/M/1 queue. 283-294 - Sébastien Lalléchère, Pierre Bonnet, Françoise Paladian:
Electrical stochastic modeling of cell for bio-electromagnetic compatibility applications. 295-308 - Nikola Zaric, Srdjan Stankovic, Zdravko Uskokovic:
Hardware realization of the robust time-frequency distributions. 309-320 - Leïla Nasraoui, Leïla Najjar Atallah, Mohamed Siala:
Performance evaluation of an efficient reduced-complexity time synchronization approach for OFDM systems. 321-330 - Ricardo Uribe Lobello, Florence Denis, Florent Dupont:
Adaptive surface extraction from anisotropic volumetric data: contouring on generalized octrees. 331-343
Volume 69, Numbers 7-8, August 2014
- Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian:
Network forensics and challenges for cybersecurity. 345-346 - Do-Hoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In:
3G IP Multimedia Subsystem based framework for lawful interception. 347-361 - Robert Filasiak, Maciej Grzenda, Marcin Luckner, Pawel Zawistowski:
On the testing of network cyber threat detection methods on spam example. 363-377 - Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu:
Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics. 379-389 - Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng:
Efficient searchable ID-based encryption with a designated server. 391-402 - Weiwei Liu, Guangjie Liu, Yuewei Dai:
Syndrome trellis codes based on minimal span generator matrix. 403-416 - Steffen Wendzel, Jörg Keller:
Hidden and under control - A survey and outlook on covert channel-internal control protocols. 417-430 - Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:
Adaptive JPEG steganography with new distortion function. 431-440 - Xinpeng Zhang, Chuan Qin, Liquan Shen:
Efficient wet paper embedding for steganography with multilayer construction. 441-447 - Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of transcoding steganography. 449-460 - Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai:
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream. 461-473
Volume 69, Numbers 9-10, October 2014
- Ashish Singh, Jamshed Ahmed Ansari, Kamakshi Kumari, Anurag Mishra, Mohammad Aneesh:
Compact notch loaded half disk patch antenna for dualband operation. 475-483 - Mohammad Aazam, Eui-Nam Huh:
Impact of ipv4-ipv6 coexistence in cloud virtualization environment. 485-496 - Wided Hadj Alouane, Noureddine Hamdi, Soumaya Meherzi:
Semi-blind amplify-and-forward in two-way relaying networks. 497-508 - Salehin Kibria, Mohammad Tariqul Islam, Baharudin Yatim, Rezaul Azim:
A modified PSO technique using heterogeneous boundary conditions for broadband compact microstrip antenna designing. 509-514 - Anirban Chatterjee, Gautam Kumar Mahanti:
Combination of fast Fourier transform and self-adaptive differential evolution algorithm for synthesis of phase-only reconfigurable rectangular array antenna. 515-527 - Jorge Ortín, Paloma Garcia Ducar, Fernando Gutiérrez, Antonio Valdovinos:
An efficiently implementable maximum likelihood decoding algorithm for tailbiting codes. 529-537 - Mireille Sarkiss, Mohamed Kamoun:
On the energy efficiency of base station cooperation under limited backhaul capacity. 539-551 - Jasurbek Khodjaev, Byeongyun Chang, Jonghun Lee:
Robust antenna array calibration and accurate angle estimation based on least trimmed squares. 553-557 - Yipeng Liu, Qun Wan:
Compressive slow-varying wideband power spectrum sensing for cognitive radio. 559-567
Volume 69, Numbers 11-12, December 2014
- Loic Dubois, William Puech, Jacques Blanc-Talon:
Smart selective encryption of H.264/AVC videos using confidentiality metrics. 569-583 - Kyung-Ah Shim:
On the security of verifiably encrypted signature schemes in a multi-user setting. 585-591 - Xiaobo Tan, Hang Zhang, Jian Hu:
A hybrid architecture of cognitive decision engine based on particle swarm optimization algorithms and case database. 593-605 - Oluwumi Adetan, Thomas Joachim Odhiambo Afullo:
Raindrop size distribution and rainfall attenuation modeling in equatorial and subtropical Africa: the critical diameters. 607-619 - Vidhyacharan Bhaskar, Barnali Dutta:
Ergodic and outage capacity maximization of cognitive radio networks in cooperative relay environment using optimal power allocation. 621-632 - Jun-Jiat Tiang, Mohammad Tariqul Islam, Norbahiah Misran, Jit Singh Mandeep:
Design of a dual-band microstrip antenna using particle swarm optimization with curve fitting. 633-640 - Ikhlas Selmi, Nel Samama:
Indoor positioning with GPS and GLONASS-like signals use of new codes and a repealite-based infrastructure in a typical museum building. 641-655
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.