


default search action
Annales des Télécommunications, Volume 69
Volume 69, Numbers 1-2, February 2014
- Maryline Laurent

, Sara Foresti
, Heng Xu:
Privacy-aware electronic society. 1-2 - Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi

, Djamal Benslimane:
Privacy query rewriting algorithm instrumented by a privacy-aware access control model. 3-19 - Anna Cinzia Squicciarini

, Federica Paci
, Smitha Sundareswaran:
PriMa: a comprehensive approach to privacy protection in social network sites. 21-36 - Joaquim Marques

, Carlos Serrão
:
Improving user content privacy on social networks using rights management systems. 37-45 - Sophie Chabridon

, Romain Laborde
, Thierry Desprats, Arnaud Oglaza, Pierrick Marie, Samer Machara Marquez:
A survey on addressing privacy together with quality of context for context management in the Internet of Things. 47-62 - Lukasz Olejnik, Claude Castelluccia, Artur Janc:

On the uniqueness of Web browsing history patterns. 63-74 - Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly:

Privacy concerns in assisted living technologies. 75-88 - Antoine Coutrot, Nathalie Guyader, Gelu Ionescu, Alice Caplier:

Video viewing: do auditory salient events capture visual attention? 89-97 - Fred Harris, Elettra Venosa, Xiaofei Chen, Chris Dick:

An efficient channelizer tree for portable software defined radios. 99-110 - Tien Anh Le, Hang Nguyen:

Human perception-based distributed architecture for scalable video conferencing services: theoretical models and performance. 111-121 - Vladimir Slavkovic, Aleksandar Neskovic, Natasa Neskovic:

Microcell prediction model based on support vector machine algorithm. 123-129
Volume 69, Numbers 3-4, April 2014
- Abdelhamid Mellouk, Latifa Oukhellou

, Lei Shu
, Glenn Shafer:
Belief functions and uncertainty management in networks and telecommunication. 131-133 - Mustapha Réda Senouci

, Abdelhamid Mellouk, Mohamed Abdelkrim Senouci, Latifa Oukhellou
:
Belief functions in telecommunications and network technologies: an overview. 135-145 - Frédéric Launay

, Patrick Coirault
:
A second-order Markov model to synchronize a quasi-chaotic sequence: application of synchronization and decoding problem with belief propagation. 147-154 - Hongtao Shi, Gang Liang, Hai Wang:

A novel traffic identification approach based on multifractal analysis and combined neural network. 155-169 - Faouzi Sebbak

, Farid Benhammadi, Abdelghani Chibani, Yacine Amirat, Aïcha Mokhtari:
Dempster-Shafer theory-based human activity recognition in smart home environments. 171-184 - Mira Bou Farah, David Mercier

, Eric Lefèvre
, François Delmotte:
A high-level application using belief functions for exchanging and managing uncertain events on the road in vehicular ad hoc networks. 185-199 - Ahmed Loutfi, Mohammed Elkoutbi, Jalel Ben-Othman, Abdellatif Kobbane

:
An energy aware algorithm for OLSR clustering. 201-207 - Nadeem Javaid

, Ayesha Bibi, Akmal Javaid, Zahoor Ali Khan
, K. Latif, M. Ishfaq:
Investigating quality routing link metrics in Wireless Multi-hop Networks. 209-217 - Mohammad Abdullah-Al-Wadud

, Md. Abdul Hamid
:
A fault-tolerant structural health monitoring protocol using wireless sensor networks. 219-228 - Pierre-Jean Bouvet

, Maryline Hélard:
Optimal space-time coding under iterative processing. 229-238 - Sangki Ko, Kwangsue Chung:

A handover-aware seamless video streaming scheme in heterogeneous wireless networks. 239-250
Volume 69, Numbers 5-6, June 2014
- Lucian Trifina

, Daniela G. Tarniceriu
:
Improved method for searching interleavers from a certain set using Garello's method with applications for the LTE standard. 251-272 - Shaohui Wang, Zhijie Han

, Sujuan Liu, Dan-wei Chen:
Security analysis of two lightweight RFID authentication protocols. 273-282 - Géza Geleji, Harry G. Perros:

Jitter analysis of an IPP tagged traffic stream in an {IPP, M}/M/1 queue. 283-294 - Sébastien Lalléchère

, Pierre Bonnet, Françoise Paladian:
Electrical stochastic modeling of cell for bio-electromagnetic compatibility applications. 295-308 - Nikola Zaric

, Srdjan Stankovic, Zdravko Uskokovic:
Hardware realization of the robust time-frequency distributions. 309-320 - Leïla Nasraoui

, Leïla Najjar Atallah, Mohamed Siala:
Performance evaluation of an efficient reduced-complexity time synchronization approach for OFDM systems. 321-330 - Ricardo Uribe Lobello, Florence Denis, Florent Dupont

:
Adaptive surface extraction from anisotropic volumetric data: contouring on generalized octrees. 331-343
Volume 69, Numbers 7-8, August 2014
- Wojciech Mazurczyk

, Krzysztof Szczypiorski
, Hui Tian
:
Network forensics and challenges for cybersecurity. 345-346 - Do-Hoon Kim, Jungbean Lee, Young-Gab Kim

, Byungsik Yoon, Hoh Peter In:
3G IP Multimedia Subsystem based framework for lawful interception. 347-361 - Robert Filasiak, Maciej Grzenda, Marcin Luckner

, Pawel Zawistowski
:
On the testing of network cyber threat detection methods on spam example. 363-377 - Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu:

Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics. 379-389 - Tsu-Yang Wu

, Tung-Tso Tsai, Yuh-Min Tseng:
Efficient searchable ID-based encryption with a designated server. 391-402 - Weiwei Liu

, Guangjie Liu, Yuewei Dai:
Syndrome trellis codes based on minimal span generator matrix. 403-416 - Steffen Wendzel

, Jörg Keller:
Hidden and under control - A survey and outlook on covert channel-internal control protocols. 417-430 - Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:

Adaptive JPEG steganography with new distortion function. 431-440 - Xinpeng Zhang, Chuan Qin

, Liquan Shen:
Efficient wet paper embedding for steganography with multilayer construction. 441-447 - Artur Janicki

, Wojciech Mazurczyk
, Krzysztof Szczypiorski
:
Steganalysis of transcoding steganography. 449-460 - Songbin Li, Haojiang Deng, Hui Tian

, Qiongxing Dai:
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream. 461-473
Volume 69, Numbers 9-10, October 2014
- Ashish Singh

, Jamshed Ahmed Ansari, Kamakshi Kumari, Anurag Mishra, Mohammad Aneesh
:
Compact notch loaded half disk patch antenna for dualband operation. 475-483 - Mohammad Aazam

, Eui-Nam Huh:
Impact of ipv4-ipv6 coexistence in cloud virtualization environment. 485-496 - Wided Hadj Alouane, Noureddine Hamdi, Soumaya Meherzi:

Semi-blind amplify-and-forward in two-way relaying networks. 497-508 - Salehin Kibria, Mohammad Tariqul Islam

, Baharudin Yatim, Rezaul Azim
:
A modified PSO technique using heterogeneous boundary conditions for broadband compact microstrip antenna designing. 509-514 - Anirban Chatterjee, Gautam Kumar Mahanti

:
Combination of fast Fourier transform and self-adaptive differential evolution algorithm for synthesis of phase-only reconfigurable rectangular array antenna. 515-527 - Jorge Ortín

, Paloma García-Dúcar, Fernando Gutiérrez, Antonio Valdovinos:
An efficiently implementable maximum likelihood decoding algorithm for tailbiting codes. 529-537 - Mireille Sarkiss

, Mohamed Kamoun
:
On the energy efficiency of base station cooperation under limited backhaul capacity. 539-551 - Jasurbek Khodjaev, Byeongyun Chang, Jonghun Lee:

Robust antenna array calibration and accurate angle estimation based on least trimmed squares. 553-557 - Yipeng Liu, Qun Wan:

Compressive slow-varying wideband power spectrum sensing for cognitive radio. 559-567
Volume 69, Numbers 11-12, December 2014
- Loic Dubois, William Puech

, Jacques Blanc-Talon:
Smart selective encryption of H.264/AVC videos using confidentiality metrics. 569-583 - Kyung-Ah Shim:

On the security of verifiably encrypted signature schemes in a multi-user setting. 585-591 - Xiaobo Tan, Hang Zhang, Jian Hu:

A hybrid architecture of cognitive decision engine based on particle swarm optimization algorithms and case database. 593-605 - Oluwumi Adetan, Thomas Joachim Odhiambo Afullo

:
Raindrop size distribution and rainfall attenuation modeling in equatorial and subtropical Africa: the critical diameters. 607-619 - Vidhyacharan Bhaskar, Barnali Dutta:

Ergodic and outage capacity maximization of cognitive radio networks in cooperative relay environment using optimal power allocation. 621-632 - Jun-Jiat Tiang, Mohammad Tariqul Islam

, Norbahiah Misran
, Jit Singh Mandeep:
Design of a dual-band microstrip antenna using particle swarm optimization with curve fitting. 633-640 - Ikhlas Selmi, Nel Samama:

Indoor positioning with GPS and GLONASS-like signals use of new codes and a repealite-based infrastructure in a typical museum building. 641-655

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














