


default search action
Annales des Télécommunications, Volume 69
Volume 69, Numbers 1-2, February 2014
- Maryline Laurent
, Sara Foresti
, Heng Xu:
Privacy-aware electronic society. 1-2 - Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi
, Djamal Benslimane:
Privacy query rewriting algorithm instrumented by a privacy-aware access control model. 3-19 - Anna Cinzia Squicciarini
, Federica Paci
, Smitha Sundareswaran:
PriMa: a comprehensive approach to privacy protection in social network sites. 21-36 - Joaquim Marques
, Carlos Serrão
:
Improving user content privacy on social networks using rights management systems. 37-45 - Sophie Chabridon
, Romain Laborde
, Thierry Desprats, Arnaud Oglaza, Pierrick Marie, Samer Machara Marquez:
A survey on addressing privacy together with quality of context for context management in the Internet of Things. 47-62 - Lukasz Olejnik, Claude Castelluccia, Artur Janc:
On the uniqueness of Web browsing history patterns. 63-74 - Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly:
Privacy concerns in assisted living technologies. 75-88 - Antoine Coutrot, Nathalie Guyader, Gelu Ionescu, Alice Caplier:
Video viewing: do auditory salient events capture visual attention? 89-97 - Fred Harris, Elettra Venosa, Xiaofei Chen, Chris Dick:
An efficient channelizer tree for portable software defined radios. 99-110 - Tien Anh Le, Hang Nguyen:
Human perception-based distributed architecture for scalable video conferencing services: theoretical models and performance. 111-121 - Vladimir Slavkovic, Aleksandar Neskovic, Natasa Neskovic:
Microcell prediction model based on support vector machine algorithm. 123-129
Volume 69, Numbers 3-4, April 2014
- Abdelhamid Mellouk, Latifa Oukhellou
, Lei Shu
, Glenn Shafer:
Belief functions and uncertainty management in networks and telecommunication. 131-133 - Mustapha Réda Senouci
, Abdelhamid Mellouk, Mohamed Abdelkrim Senouci, Latifa Oukhellou
:
Belief functions in telecommunications and network technologies: an overview. 135-145 - Frédéric Launay
, Patrick Coirault
:
A second-order Markov model to synchronize a quasi-chaotic sequence: application of synchronization and decoding problem with belief propagation. 147-154 - Hongtao Shi, Gang Liang, Hai Wang:
A novel traffic identification approach based on multifractal analysis and combined neural network. 155-169 - Faouzi Sebbak
, Farid Benhammadi, Abdelghani Chibani, Yacine Amirat, Aïcha Mokhtari:
Dempster-Shafer theory-based human activity recognition in smart home environments. 171-184 - Mira Bou Farah, David Mercier
, Eric Lefèvre
, François Delmotte:
A high-level application using belief functions for exchanging and managing uncertain events on the road in vehicular ad hoc networks. 185-199 - Ahmed Loutfi, Mohammed Elkoutbi, Jalel Ben-Othman, Abdellatif Kobbane
:
An energy aware algorithm for OLSR clustering. 201-207 - Nadeem Javaid
, Ayesha Bibi, Akmal Javaid, Zahoor Ali Khan
, K. Latif, M. Ishfaq:
Investigating quality routing link metrics in Wireless Multi-hop Networks. 209-217 - Mohammad Abdullah-Al-Wadud
, Md. Abdul Hamid
:
A fault-tolerant structural health monitoring protocol using wireless sensor networks. 219-228 - Pierre-Jean Bouvet
, Maryline Hélard:
Optimal space-time coding under iterative processing. 229-238 - Sangki Ko, Kwangsue Chung:
A handover-aware seamless video streaming scheme in heterogeneous wireless networks. 239-250
Volume 69, Numbers 5-6, June 2014
- Lucian Trifina
, Daniela G. Tarniceriu
:
Improved method for searching interleavers from a certain set using Garello's method with applications for the LTE standard. 251-272 - Shaohui Wang, Zhijie Han
, Sujuan Liu, Dan-wei Chen:
Security analysis of two lightweight RFID authentication protocols. 273-282 - Géza Geleji, Harry G. Perros:
Jitter analysis of an IPP tagged traffic stream in an {IPP, M}/M/1 queue. 283-294 - Sébastien Lalléchère, Pierre Bonnet, Françoise Paladian:
Electrical stochastic modeling of cell for bio-electromagnetic compatibility applications. 295-308 - Nikola Zaric
, Srdjan Stankovic, Zdravko Uskokovic:
Hardware realization of the robust time-frequency distributions. 309-320 - Leïla Nasraoui
, Leïla Najjar Atallah, Mohamed Siala:
Performance evaluation of an efficient reduced-complexity time synchronization approach for OFDM systems. 321-330 - Ricardo Uribe Lobello, Florence Denis, Florent Dupont
:
Adaptive surface extraction from anisotropic volumetric data: contouring on generalized octrees. 331-343
Volume 69, Numbers 7-8, August 2014
- Wojciech Mazurczyk
, Krzysztof Szczypiorski
, Hui Tian
:
Network forensics and challenges for cybersecurity. 345-346 - Do-Hoon Kim, Jungbean Lee, Young-Gab Kim
, Byungsik Yoon, Hoh Peter In:
3G IP Multimedia Subsystem based framework for lawful interception. 347-361 - Robert Filasiak, Maciej Grzenda, Marcin Luckner
, Pawel Zawistowski
:
On the testing of network cyber threat detection methods on spam example. 363-377 - Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu:
Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics. 379-389 - Tsu-Yang Wu
, Tung-Tso Tsai, Yuh-Min Tseng:
Efficient searchable ID-based encryption with a designated server. 391-402 - Weiwei Liu
, Guangjie Liu, Yuewei Dai:
Syndrome trellis codes based on minimal span generator matrix. 403-416 - Steffen Wendzel
, Jörg Keller:
Hidden and under control - A survey and outlook on covert channel-internal control protocols. 417-430 - Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:
Adaptive JPEG steganography with new distortion function. 431-440 - Xinpeng Zhang, Chuan Qin
, Liquan Shen:
Efficient wet paper embedding for steganography with multilayer construction. 441-447 - Artur Janicki
, Wojciech Mazurczyk
, Krzysztof Szczypiorski
:
Steganalysis of transcoding steganography. 449-460 - Songbin Li, Haojiang Deng, Hui Tian
, Qiongxing Dai:
Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream. 461-473
Volume 69, Numbers 9-10, October 2014
- Ashish Singh
, Jamshed Ahmed Ansari, Kamakshi Kumari, Anurag Mishra, Mohammad Aneesh
:
Compact notch loaded half disk patch antenna for dualband operation. 475-483 - Mohammad Aazam
, Eui-Nam Huh:
Impact of ipv4-ipv6 coexistence in cloud virtualization environment. 485-496 - Wided Hadj Alouane, Noureddine Hamdi, Soumaya Meherzi:
Semi-blind amplify-and-forward in two-way relaying networks. 497-508 - Salehin Kibria, Mohammad Tariqul Islam
, Baharudin Yatim, Rezaul Azim
:
A modified PSO technique using heterogeneous boundary conditions for broadband compact microstrip antenna designing. 509-514 - Anirban Chatterjee, Gautam Kumar Mahanti
:
Combination of fast Fourier transform and self-adaptive differential evolution algorithm for synthesis of phase-only reconfigurable rectangular array antenna. 515-527 - Jorge Ortín
, Paloma Garcia Ducar, Fernando Gutiérrez, Antonio Valdovinos:
An efficiently implementable maximum likelihood decoding algorithm for tailbiting codes. 529-537 - Mireille Sarkiss, Mohamed Kamoun
:
On the energy efficiency of base station cooperation under limited backhaul capacity. 539-551 - Jasurbek Khodjaev, Byeongyun Chang, Jonghun Lee:
Robust antenna array calibration and accurate angle estimation based on least trimmed squares. 553-557 - Yipeng Liu, Qun Wan:
Compressive slow-varying wideband power spectrum sensing for cognitive radio. 559-567
Volume 69, Numbers 11-12, December 2014
- Loic Dubois, William Puech
, Jacques Blanc-Talon:
Smart selective encryption of H.264/AVC videos using confidentiality metrics. 569-583 - Kyung-Ah Shim:
On the security of verifiably encrypted signature schemes in a multi-user setting. 585-591 - Xiaobo Tan, Hang Zhang, Jian Hu:
A hybrid architecture of cognitive decision engine based on particle swarm optimization algorithms and case database. 593-605 - Oluwumi Adetan, Thomas Joachim Odhiambo Afullo
:
Raindrop size distribution and rainfall attenuation modeling in equatorial and subtropical Africa: the critical diameters. 607-619 - Vidhyacharan Bhaskar, Barnali Dutta:
Ergodic and outage capacity maximization of cognitive radio networks in cooperative relay environment using optimal power allocation. 621-632 - Jun-Jiat Tiang, Mohammad Tariqul Islam
, Norbahiah Misran
, Jit Singh Mandeep:
Design of a dual-band microstrip antenna using particle swarm optimization with curve fitting. 633-640 - Ikhlas Selmi, Nel Samama:
Indoor positioning with GPS and GLONASS-like signals use of new codes and a repealite-based infrastructure in a typical museum building. 641-655

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.