Thèse présentée pour l'obtention du diplôme de Docteur de Télécom & Management SudParis
暂无分享,去创建一个
[1] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[2] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[3] Khaled Shuaib,et al. Measured delay distribution in a Wireless Mesh Network test-bed , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.
[4] B. Mohar. THE LAPLACIAN SPECTRUM OF GRAPHS y , 1991 .
[5] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[6] Mohamed Abid,et al. Efficient identity-based authentication for IMS based services access , 2009, MoMM.
[7] Minos N. Garofalakis,et al. MashMaker: mashups for the masses , 2007, SIGMOD '07.
[8] Marcelo Bagnulo,et al. Shim6: Level 3 Multihoming Shim Protocol for IPv6 , 2009, RFC.
[9] Satoru Iwata,et al. A combinatorial, strongly polynomial-time algorithm for minimizing submodular functions , 2000, STOC '00.
[10] S. Kanade,et al. Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.
[11] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[12] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[13] Yong Yu,et al. Exploring social annotations for the semantic web , 2006, WWW '06.
[14] Jason I. Hong,et al. Marmite: Towards End-User Programming for the Web , 2007, IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007).
[15] David E. Goldberg,et al. Genetic Algorithms with Sharing for Multimodalfunction Optimization , 1987, ICGA.
[16] Ying Zou,et al. An automatic approach for ontology-driven service composition , 2009, 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA).
[17] Jonathan Trevor. Doing the Mobile Mash , 2008, Computer.
[18] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[19] M. Dolores Gallego,et al. User acceptance model of open source software , 2008, Comput. Hum. Behav..
[20] T. Saaty,et al. Ranking by Eigenvector Versus Other Methods in the Analytic Hierarchy Process , 1998 .
[21] David E. Goldberg,et al. A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.
[22] Michael W. Shapiro. Self-Healing in Modern Operating Systems , 2004, ACM Queue.
[23] M. Stoer. Design of Survivable Networks , 1993 .
[24] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[25] Wang Qingxian. The application of elliptic curves cryptography in embedded systems , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).
[26] Lothar Thiele,et al. An evolutionary algorithm for multiobjective optimization: the strength Pareto approach , 1998 .
[27] Jim Gray,et al. Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.
[28] Hung-Yuan Chung,et al. A self-learning fuzzy logic controller using genetic algorithms with reinforcements , 1997, IEEE Trans. Fuzzy Syst..
[29] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[30] Stephen P. Boyd,et al. Upper bounds on algebraic connectivity via convex optimization , 2006 .
[31] Felix C. Freiling,et al. DREAM: Distributed Reliable Event-Based Application Management , 2004, Web Dynamics.
[32] Yannick Chevalier,et al. A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols , 2004 .
[33] Stanislav Kurkovsky,et al. Using principles of pervasive computing to design m-commerce applications , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[34] Eric Gamess,et al. Easy-SEND: A Didactic Implementation of the Secure Neighbor Discovery Protocol for IPv6 , 2009 .
[35] Satoru Iwata,et al. A combinatorial strongly polynomial algorithm for minimizing submodular functions , 2001, JACM.
[36] R. Merris. A note on Laplacian graph eigenvalues , 1998 .
[37] Umar Saif,et al. A Case for Goal-oriented Programming Semantics , 2003 .
[38] B. Roy,et al. L'aide multicritère à la décision , 1989 .
[39] François Michaud,et al. Planning for Concurrent Action Executions Under Action Duration Uncertainty Using Dynamically Generated Bayesian Networks , 2010, ICAPS.
[40] V. Nikiforov. Bounds on graph eigenvalues I , 2006, math/0602027.
[41] Romeo Rizzi. A simple minimum T-cut algorithm , 2003, Discret. Appl. Math..
[42] Kathrin Klamroth. Discrete Multiobjective Optimization , 2009, EMO.
[43] Ali Ridha Mahjoub,et al. (1,2)-Survivable Networks: Facets and Branch&Cut , 2004 .
[44] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[45] Cesare Pautasso,et al. Restful web services vs. "big"' web services: making the right architectural decision , 2008, WWW.
[46] Michael Ogrinz,et al. Mashup Patterns: Designs and Examples for the Modern Enterprise , 2009 .
[47] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[48] Victor Fajardo,et al. Diameter Base Protocol , 2003, RFC.
[49] A. Berman,et al. Algebraic connectivity of trees with a pendant edge of infinite weight. , 2005 .
[50] Gregory D. Abowd,et al. The Georgia Tech aware home , 2008, CHI Extended Abstracts.
[51] Miroslaw Malek,et al. Current solutions for Web service composition , 2004, IEEE Internet Computing.
[52] Alan Mink,et al. Multimodal biometrics: issues in design and testing , 2003, ICMI '03.
[53] S. Pati,et al. THE THIRD SMALLEST EIGENVALUE OF THE LAPLACIAN MATRIX , 2001 .
[54] Ravindra B. Bapat,et al. On distance matrices and Laplacians , 2005 .
[55] Radu Marculescu,et al. Real-Time Anonymous Routing for Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[56] Amit P. Sheth,et al. Services Mashups: The New Generation of Web Applications , 2008, IEEE Internet Computing.
[57] Charles Gouin-Vallerand,et al. Macro and micro context-awareness for autonomic pervasive computing , 2010, iiWAS.
[58] Ren-Hung Hwang,et al. MTSP: Multi-hop Time Synchronization Protocol for IEEE 802.11 Wireless Ad Hoc Network , 2006, WASA.
[59] Chin-Chen Chang,et al. The design of e-traveler's check with efficiency and mutual authentication , 2009, ICUIMC '09.
[60] Allen B. MacKenzie,et al. Cognitive networks: adaptation and learning to achieve end-to-end performance objectives , 2006, IEEE Communications Magazine.
[61] James Z. Wang,et al. A novel self-configuration mechanism for heterogeneous P2P networks , 2004 .
[62] Pekka Nikander. Enhancing Privacy with Shared Pseudo Random Sequences , 2005, Security Protocols Workshop.
[63] Bart Jacobs,et al. Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.
[64] William Mark,et al. Turning Pervasive Computing Into Mediated Spaces , 1999, IBM Syst. J..
[65] Ryan W. Thomas,et al. Cognitive networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[66] Jens Vygen,et al. The Book Review Column1 , 2020, SIGACT News.
[67] Prasad Calyam,et al. Performance Measurement and Analysis of H.323 Traffic , 2004, PAM.
[68] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[69] Alex Waibel,et al. Readings in speech recognition , 1990 .
[70] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2005, Mob. Networks Appl..
[71] A. Schrijver. On the History of Combinatorial Optimization (Till 1960) , 2005 .
[72] Jin Song Dong,et al. Semantic Space: an infrastructure for smart spaces , 2004, IEEE Pervasive Computing.
[73] Wolfgang Trumler,et al. AMUN - autonomic middleware for ubiquitous environments applied to the smart doorplate project , 2004, International Conference on Autonomic Computing, 2004. Proceedings..
[74] Vincent M. Stanford,et al. Wearable Computing Goes Live in Industry , 2002, IEEE Pervasive Comput..
[75] S. Gauthier,et al. Development of a functional measure for persons with Alzheimer's disease: the disability assessment for dementia. , 1999, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.
[76] Lu Yan,et al. A Formal Model of Context-Awareness and Context-Dependency , 2006, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM'06).
[77] Juan-José Salazar-González. The Steiner cycle polytope , 2003 .
[78] Dragan Stevanović. Bounding the largest eigenvalue of trees in terms of the largest vertex degree , 2003 .
[79] Hani Hagras,et al. Type-2 Fuzzy Logic Controllers: A Way Forward for Fuzzy Systems in Real World Environments , 2008, WCCI.
[80] Richard Ferri. The OSCAR revolution , 2002 .
[81] Jari Arkko,et al. Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.
[82] René Mayrhofer,et al. A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[83] Sam Ruby,et al. RESTful Web Services , 2007 .
[84] Amos Fiat,et al. Batch RSA , 1989, Journal of Cryptology.
[85] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[86] Michael S. Hsiao,et al. Cognitive Radio and Networking Research at Virginia Tech , 2009, Proceedings of the IEEE.
[87] Alexander Schrijver,et al. A Combinatorial Algorithm Minimizing Submodular Functions in Strongly Polynomial Time , 2000, J. Comb. Theory B.
[88] Dritan Nace,et al. Assigning spare capacities in mesh survivable networks , 2000, Telecommun. Syst..
[89] Miguel A. Garcia-Martin,et al. The 3G IP multimedia subsystem IMS - merging the internet and the cellular worlds (2. ed.) , 2006 .
[90] David B. Leake,et al. Introspective reasoning for index refinement in case-based reasoning , 2001, J. Exp. Theor. Artif. Intell..
[91] Xiao-Dong Zhang,et al. On the Laplacian eigenvalues of a graph , 1998 .
[92] Daniele Braga,et al. Mashing Up Search Services , 2008, IEEE Internet Computing.
[93] Donald B. Johnson,et al. Elliptic curve DSA (ECSDA): an enhanced DSA , 1998 .
[94] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[95] Amit P. Sheth,et al. SA-REST: Semantically Interoperable and Easier-to-Use Services and Mashups , 2007, IEEE Internet Computing.
[96] Ivan Tirado. IP Multimedia Subsystem (IMS) signaling core security , 2008, InfoSecCD2008 2008.
[97] Fabio Casati,et al. Understanding Mashup Development , 2008, IEEE Internet Computing.
[98] Abdallah M'hamed,et al. An Authentication Architecture Dedicated to Dependent People in Smart Environments , 2007, ICOST.
[99] L. Lovász,et al. Geometric Algorithms and Combinatorial Optimization , 1981 .
[100] Abhishek Roy,et al. QM2RP: A QoS-Based Mobile Multicast Routing Protocol Using Multi-Objective Genetic Algorithm , 2004, Wirel. Networks.
[101] Kalyanmoy Deb,et al. Multi-objective optimization using evolutionary algorithms , 2001, Wiley-Interscience series in systems and optimization.
[102] Chao Wang,et al. Linear Time Algorithms to the Minimum All-Ones Problem for Unicyclic and Bicyclic Graphs , 2004, Electron. Notes Discret. Math..
[103] Anne H. H. Ngu,et al. QoS-aware middleware for Web services composition , 2004, IEEE Transactions on Software Engineering.
[104] S. Folstein,et al. "Mini-mental state". A practical method for grading the cognitive state of patients for the clinician. , 1975, Journal of psychiatric research.
[105] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[106] Charles Gouin-Vallerand,et al. A Software Self-Organizing Middleware for Smart Spaces Based on Fuzzy Logic , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).
[107] Koen De Bosschere,et al. Towards an Extensible Context Ontology for Ambient Intelligence , 2004, EUSAI.
[108] Shengbiao Hu. The largest eigenvalue of unicyclic graphs , 2007, Discret. Math..
[109] Dirk Oliver Theis,et al. Odd minimum cut sets and b-matchings revisited , 2006, SIAM J. Discret. Math..
[110] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[111] Jock D. Mackinlay,et al. The information visualizer, an information workspace , 1991, CHI.
[112] Anthony LaMarca,et al. Practical Lessons from Place Lab , 2006, IEEE Pervasive Computing.
[113] Pierre Chardaire. Hierarchical Two Level Location Problems , 1999 .
[114] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[115] Yong Yu,et al. An Unsupervised Model for Exploring Hierarchical Semantics from Social Annotations , 2007, ISWC/ASWC.
[116] Slobodan K. Simić,et al. On the Largest Eigenvalue of Unicyclic Graphs , 1987 .
[117] Larry Rudolph,et al. Project Oxygen: Pervasive, Human-Centric Computing - An Initial Experience , 2001, CAiSE.
[118] Alessandro Bassi,et al. The Internet Backplane Protocol: a study in resource sharing , 2003, Future Gener. Comput. Syst..
[119] Rajarshi Das,et al. Autonomic multi-agent management of power and performance in data centers , 2008, AAMAS.
[120] N. Abreu. Old and new results on algebraic connectivity of graphs , 2007 .
[121] Fan Chung,et al. Spectral Graph Theory , 1996 .
[122] Claudio Bettini,et al. Loosely coupling ontological reasoning with an efficient middleware for context-awareness , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[123] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[124] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[125] Bernard Roy,et al. Aide multicritère à la décision : méthodes et cas , 1993 .
[126] Simon R. Saunders,et al. Antennas and Propagation for Wireless Communication Systems , 1999 .
[127] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[128] Joseph Mitola,et al. Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .
[129] Anand Ranganathan,et al. Towards fault tolerance pervasive computing , 2005, IEEE Technology and Society Magazine.
[130] H. Van Dyke Parunak,et al. Stigmergic learning for self-organizing mobile ad-hoc networks (MANET's) , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[131] Mei Lu,et al. Lower bounds of the Laplacian spectrum of graphs based on diameter , 2007 .
[132] M. R. Rao,et al. Odd Minimum Cut-Sets and b-Matchings , 1982, Math. Oper. Res..
[133] Feng Tian,et al. On the spectral radius of unicyclic graphs with perfect matchings , 2003 .
[134] Alexander K. Kelmans,et al. On the distribution of eigenvalues of graphs , 1999, Discret. Math..
[135] Florent Bersani. EAP shared key methods: a tentative synthesis of those proposed so far , 2004 .
[136] Doheon Lee,et al. Fuzzy branching temporal logic , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[137] Rishab Nithyanand. A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..
[138] Harry Chen,et al. SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[139] Paolo Falcarin,et al. Service Creation in the SPICE Service Platform , 2006 .
[140] Anil K. Jain,et al. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[141] Jeffrey D. Ullman,et al. NP-Complete Scheduling Problems , 1975, J. Comput. Syst. Sci..
[142] Noël Crespi,et al. User-centric Services and Service Composition, a Survey , 2008, 2008 32nd Annual IEEE Software Engineering Workshop.
[143] Chang Liu,et al. An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software , 2007, Communications of the IIMA.
[144] Mor Naaman,et al. HT06, tagging paper, taxonomy, Flickr, academic article, to read , 2006, HYPERTEXT '06.
[145] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[146] Nitesh Saxena,et al. DEVICE PAIRING USING UNIDIRECTIONAL PHYSICAL CHANNELS , 2008 .
[147] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[148] J. Bauchet. Archipel : un framework objet pour une approche ubiquitaire de l'assistance cognitive , 2008 .
[149] R. Yarlagadda,et al. Hadamard matrix analysis and synthesis: with applications to communications and signal/image processing , 1996 .
[150] Yong-Liang Pan,et al. Sharp upper bounds for the Laplacian graph eigenvalues , 2002 .
[151] Gérard Cornuéjols,et al. A matching problem with side conditions , 1980, Discret. Math..
[152] Emile H. L. Aarts,et al. Ambient intelligence: a multimedia perspective , 2004, IEEE MultiMedia.
[153] Weishan Zhang,et al. Semantic Web Based Self-Management for a Pervasive Service Middleware , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems.
[154] Hiroaki Ikeda,et al. Selection of display devices used at man-machine interfaces based on human factors , 2004, IEEE Transactions on Industrial Electronics.
[155] Jong Sik Lee,et al. Ontology-Based Intelligent Agent for Grid Resource Management , 2009, ICCCI.
[156] Roy H. Campbell,et al. Autonomic pervasive computing based on planning , 2004 .
[157] Robert M. Gray,et al. Toeplitz and Circulant Matrices: A Review , 2005, Found. Trends Commun. Inf. Theory.
[158] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[159] Armin Fügenschuh,et al. Computational Integer Programming and Cutting Planes , 2005 .
[160] Diego Calvanese,et al. The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.
[161] Michel Minoux,et al. Graphes et algorithmes , 1995 .
[162] M. Fiedler. Algebraic connectivity of graphs , 1973 .
[163] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[164] David P. Williamson,et al. A general approximation technique for constrained forest problems , 1992, SODA '92.
[165] Andrzej P. Wierzbicki,et al. The Use of Reference Objectives in Multiobjective Optimization , 1979 .
[166] David C. Plummer,et al. Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware , 1982, RFC.
[167] David R. Morse,et al. Enhanced Reality Fieldwork: the Context Aware Archaeological Assistant , 1997 .
[168] Bradley J. Rhodes,et al. Margin notes: building a contextually aware associative memory , 2000, IUI '00.
[169] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[170] Luciano Baresi,et al. Self-healing BPEL processes with Dynamo and the JBoss rule engine , 2007, ESSPE '07.
[171] Rui Li,et al. Towards effective browsing of large scale social annotations , 2007, WWW '07.
[172] Y. Tao,et al. Using UTAUT to explore the behavior of 3G mobile communication users , 2007, 2007 IEEE International Conference on Industrial Engineering and Engineering Management.
[173] Jonathan Wood,et al. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures , 2006, IWSEC.
[174] G. Nemhauser,et al. Integer Programming , 2020 .
[175] Shahram Latifi,et al. On Embedding Rings into a Star-Related Network , 1997, Inf. Sci..
[176] Jack Edmonds,et al. Matching: A Well-Solved Class of Integer Linear Programs , 2001, Combinatorial Optimization.
[177] Olaf Drögehorn,et al. Professional and end-user-driven service creation in the SPICE platform , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[178] Inmaculada Rodríguez Martín,et al. The Ring Star Problem: Polyhedral analysis and exact algorithm , 2004, Networks.
[179] B. Abdulrazak,et al. Enabling a Plug-and-play integration of smart environments , 2006, 2006 2nd International Conference on Information & Communication Technologies.
[180] Eugene L. Lawler,et al. Traveling Salesman Problem , 2016 .
[181] Fulvio Corno,et al. DogOnt - Ontology Modeling for Intelligent Domotic Environments , 2008, SEMWEB.
[182] Yeong-Nan Yeh,et al. On the nullity and the matching number of unicyclic graphs , 2009 .
[183] Martine Labbé,et al. A branch and cut algorithm for hub location problems with single assignment , 2005, Math. Program..
[184] Panos Markopoulos,et al. Powerful and consistent analysis of likert-type rating scales , 2010, CHI.
[185] Bessam Abdulrazak,et al. Approaching context-awareness for open intelligent space , 2008, MoMM.
[186] Martin Grötschel,et al. On the symmetric travelling salesman problem II: Lifting theorems and facets , 1979, Math. Program..
[187] Luís Gouveia,et al. Designing reliable tree networks with two cable technologies , 1998, Eur. J. Oper. Res..
[188] Mechthild Stoer,et al. A simple min-cut algorithm , 1997, JACM.
[189] Jeffrey O. Kephart,et al. Research challenges of autonomic computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[190] Wei Sun,et al. Towards Service Composition Based on Mashup , 2007, 2007 IEEE Congress on Services (Services 2007).
[191] Gregory D. Abowd,et al. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..
[192] Jong Wook Han,et al. Security Framework for Home Network: Authentication, Authorization, and Security Policy , 2007, PAKDD Workshops.
[193] Walid Ben-Ameur,et al. Internet Routing and Related Topology Issues , 2003, SIAM J. Discret. Math..
[194] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[195] C. Monma,et al. Methods for Designing Communications Networks with Certain Two-Connected Survivability Constraints , 1989, Oper. Res..
[196] David M. Chess. Security in autonomic computing , 2005, CARN.
[197] Tony Cheneau,et al. ECC public key and signature support in Cryptographically Generated Addresses (CGA) and in the Secure Neighbor Discovery (SEND) , 2010 .
[198] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[199] Yuqing Zhang,et al. A new provably secure authentication and key agreement protocol for SIP using ECC , 2009, Comput. Stand. Interfaces.
[200] Alfred Menezes,et al. Elliptic curve cryptosystems and their implementation , 1993, Journal of Cryptology.
[201] W. B. Ameur. Constrained length connectivity and survivable networks , 2000 .
[202] Martin Grötschel,et al. On the symmetric travelling salesman problem I: Inequalities , 1979, Math. Program..
[203] Frances M. T. Brazier,et al. Using Semantic Web Technology for Self-Management of Distributed Object-Oriented Systems , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).
[204] R. Schoof. Journal de Theorie des Nombres de Bordeaux 7 (1995), 219{254 , 2022 .
[205] K. Das. The Laplacian spectrum of a graph , 2004 .
[206] Mahmoud Ghorbel. Abstract service model for adaptive provision in ambient assistive living , 2008 .
[207] Gene Tsudik,et al. Universally Composable RFID Identification and Authentication Protocols , 2009, TSEC.
[208] Jeffrey O. Kephart,et al. Building Effective Multivendor Autonomic Computing Systems , 2006, IEEE Distributed Systems Online.
[209] Eric Bouillet,et al. A Folksonomy-Based Model of Web Services for Discovery and Automatic Composition , 2008, 2008 IEEE International Conference on Services Computing.
[210] M. Martin,et al. Context Awareness in Future Life Scenarios: Impact on Service Provisioning Platforms , 2005 .
[211] Ibrahim Sogukpinar,et al. SIP Authentication Scheme using ECDH , 2007 .
[212] William R. Pulleyblank,et al. On cycle cones and polyhedra , 1989 .
[213] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[214] Kalyanmoy Deb,et al. Reference point based multi-objective optimization using evolutionary algorithms , 2006, GECCO.
[215] Sylvain Giroux,et al. User needs identification for a smart cognitive assistant based on participatory design , 2010 .
[216] Marcelo Bagnulo,et al. Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs) , 2007, RFC.
[217] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[218] Gregory D. Abowd,et al. Providing architectural support for building context-aware applications , 2000 .
[219] C. Nugent,et al. Healthcare technologies for older people: What do physicians think? , 2006 .
[220] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[221] K. Das. SHARP UPPER BOUNDS ON THE SPECTRAL RADIUS OF THE LAPLACIAN MATRIX OF GRAPHS , 2005 .
[222] Hélène Pigot,et al. Interactive Calendar to Help Maintain Social Interactions for Elderly People and People with Mild Cognitive Impairments , 2009, ICOST.
[223] Mounir Mokhtari,et al. A distributed approach for assistive service provision in pervasive environment , 2006, WMASH '06.
[224] Thomas L. Saaty,et al. DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .
[225] Sylvain Giroux,et al. Indoors Pervasive Computing and Outdoors Mobile Computing for Cognitive Assistance and Telemonitoring , 2004, ICCHP.
[226] Xavier Gandibleux,et al. Martins' algorithm revisited for multi-objective shortest path problems with a MaxMin cost function , 2006, 4OR.
[227] E. Martins. On a multicriteria shortest path problem , 1984 .
[228] B. Mohar. Some applications of Laplace eigenvalues of graphs , 1997 .
[229] Salvatore Marano,et al. A biobjective optimization model for routing in mobile ad hoc networks , 2009 .
[230] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[231] Mitsuru Matsui,et al. Performance Analysis and Parallel Implementation of Dedicated Hash Functions , 2002, EUROCRYPT.
[232] Angelos D. Keromytis,et al. Just fast keying: Key agreement in a hostile internet , 2004, TSEC.
[233] Ali Ridha Mahjoub,et al. On survivable network polyhedra , 2005, Discret. Math..
[234] Hugo Liu,et al. ConceptNet — A Practical Commonsense Reasoning Tool-Kit , 2004 .
[235] Preben D. Vestergaard,et al. The number of independent sets in unicyclic graphs , 2005, Discret. Appl. Math..
[236] Adam Ouorou,et al. Robust Capacity Assignment in Telecommunications , 2006, Comput. Manag. Sci..
[237] Nick Moore,et al. Optimistic Duplicate Address Detection (DAD) for IPv6 , 2006, RFC.
[238] J. P. Grossman. An eigenvalue bound for the Laplacian of a graph , 2005, Discret. Math..
[239] Siyuan Ma,et al. Taxonomy and an Ontology for Grid Metrics , 2008, The Third ChinaGrid Annual Conference (chinagrid 2008).
[240] Georg Mayer,et al. The IMS: IP Multimedia Concepts and Services , 2004 .
[241] Kinkar Ch. Das,et al. An improved upper bound for Laplacian graph eigenvalues , 2003 .
[242] Mary Czerwinski,et al. The New EasyLiving Project at Microsoft Research , 1998 .
[243] R. Merris. Laplacian matrices of graphs: a survey , 1994 .
[244] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[245] Wolfgang Trumler,et al. Self-configuration Via Cooperative Social Behavior , 2006, ATC.
[246] Henri Fayol. Administration industrielle et générale , 1999 .
[247] Craig Metz,et al. A One-Time Password System , 1996, RFC.
[248] Gregory D. Abowd,et al. The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.
[249] Kalyanmoy Deb,et al. Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms , 1994, Evolutionary Computation.
[250] D. Cvetkovic,et al. Spectra of Graphs: Theory and Applications , 1997 .
[251] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[252] I. Reed,et al. Polynomial Codes Over Certain Finite Fields , 1960 .
[253] S. Ungar,et al. Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).
[254] Gerard J. Chang,et al. The number of maximal independent sets in connected triangle-free graphs , 1999 .
[255] Mohamed Abid,et al. Integrating identity-based cryptography in IMS service authentication , 2009, ArXiv.
[256] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[257] Joo-Hwee Lim,et al. Home Photo Content Modeling for Personalized Event-Based Retrieval , 2003, IEEE Multim..
[258] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[259] Gregor Schiele,et al. BASE - a micro-broker-based middleware for pervasive computing , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[260] Rajarshi Das,et al. Achieving Self-Management via Utility Functions , 2007, IEEE Internet Computing.
[261] Pekka Nikander,et al. Delegation of Signalling Rights , 2002, Security Protocols Workshop.
[262] Khaled Masmoudi,et al. An on-demand key establishment protocol for MANETs , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[263] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[264] Douglas Stebila,et al. Performance analysis of elliptic curve cryptography for SSL , 2002, WiSE '02.
[265] Luc Steels,et al. Augmenting Navigation for Collaborative Tagging with Emergent Semantics , 2006, International Semantic Web Conference.
[266] Alf Zugenmaier. FLASCHE - A Mechanism Providing Anonymity for Mobile Users , 2004, Privacy Enhancing Technologies.
[267] Thomas Narten,et al. Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.
[268] Deborah L. McGuinness,et al. OWL Web ontology language overview , 2004 .
[269] William J. Cook,et al. Combinatorial optimization , 1997 .
[270] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[271] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[272] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[273] William C. Mann,et al. The Gator Tech Smart House: a programmable pervasive space , 2005, Computer.
[274] Johan J. Lukkien,et al. An architecture for self-organization in pervasive systems , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).
[275] Z. Obrenovic,et al. Modeling multimodal human-computer interaction , 2004, Computer.
[276] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.
[277] Patrice C. Roy,et al. A Hybrid Plan Recognition Model for Alzheimer's Patients: Interleaved-Erroneous Dilemma , 2007, 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07).
[278] Muhammad Sher,et al. Secure Service Provisioning (SSP) framework for IP Multimedia Subsystem (IMS) , 2008 .
[279] Ching-Lai Hwang,et al. Multiple attribute decision making : an introduction , 1995 .
[280] Mihalis Yannakakis,et al. Edge-Deletion Problems , 1981, SIAM J. Comput..
[281] René Peeters,et al. The maximum edge biclique problem is NP-complete , 2003, Discret. Appl. Math..
[282] M. Inzitari,et al. Gait speed at usual pace as a predictor of adverse outcomes in community-dwelling older people an International Academy on Nutrition and Aging (IANA) Task Force , 2009, The journal of nutrition, health & aging.
[283] Branko Grünbaum,et al. Graphs of polyhedra; polyhedra as graphs , 2007, Discret. Math..
[284] Deborah Estrin,et al. Advances in network simulation , 2000, Computer.
[285] Jon Crowcroft,et al. Quality-of-Service Routing for Supporting Multimedia Applications , 1996, IEEE J. Sel. Areas Commun..
[286] Mohamed Abid,et al. Towards a secure E-passport protocol based on biometrics , 2009 .
[287] P. Papalambros,et al. A NOTE ON WEIGHTED CRITERIA METHODS FOR COMPROMISE SOLUTIONS IN MULTI-OBJECTIVE OPTIMIZATION , 1996 .
[288] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[289] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[290] David Levine,et al. PICO: A Middleware Framework for Pervasive Computing , 2003, IEEE Pervasive Comput..
[291] Reinhard Diestel,et al. Graph Theory , 1997 .
[292] Roy H. Campbell,et al. Application polymorphism for autonomic ubiquitous computing , 2005, Multiagent Grid Syst..
[293] Sylvain Giroux,et al. Pervasive behavior tracking for cognitive assistance , 2008, PETRA '08.
[294] Kaisa Miettinen,et al. Nonlinear multiobjective optimization , 1998, International series in operations research and management science.
[295] Bernadette Dorizzi,et al. Iris based authentication mechanism for e-Passports , 2010, 2010 2nd International Workshop on Security and Communication Networks (IWSCN).
[296] Vladimir Stantchev,et al. Enabling Autonomous Self-Optimisation in Service-Oriented Systems , 2008, SJTU-TUB Joint Workshop.
[297] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[298] Philippe Vincke,et al. Multicriteria Decision-Aid , 1992 .
[299] Yuan Hong,et al. A Sharp Upper Bound of the Spectral Radius of Graphs , 2001, J. Comb. Theory, Ser. B.
[300] S. Bellovin. Defending Against Sequence Number Attacks , 1996 .
[301] Bessam Abdulrazak,et al. Towards a universal ontology for smart environments , 2009, iiWAS.
[302] Ji-Ming Guo. On the Laplacian spectral radius of a tree , 2003 .
[303] Francesco Furfari,et al. DomoML-env: an ontology for Human Home Interaction , 2005, SWAP.
[304] Paul L. Krapivsky,et al. Unicyclic Components in Random Graphs , 2004, ArXiv.
[305] Benjamin Satzger,et al. Towards Trustworthy Self-optimization for Distributed Systems , 2009, SEUS.
[306] T. Ross. Fuzzy Logic with Engineering Applications , 1994 .
[307] Maryline Laurent-Maknavicius,et al. Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU , 2010, Comput. Secur..
[308] Gabriel Montenegro,et al. IPv6 Opportunistic Encryption , 2002 .
[309] Kinkar Chandra Das,et al. Some new bounds on the spectral radius of graphs , 2004, Discret. Math..
[310] Jon Piesing,et al. The DVB Multimedia Home Platform (MHP) and Related Specifications , 2006, Proceedings of the IEEE.
[311] Sylvain Giroux,et al. A semantic approach for accessible services delivery in a smart environment , 2009, Int. J. Web Grid Serv..
[312] Charles Gouin-Vallerand,et al. A self-configuration middleware for smart spaces , 2009 .
[313] Josef Hadar,et al. Rules for Ordering Uncertain Prospects , 1969 .
[314] F. Tian,et al. Bounds of Laplacian spectrum of graphs based on the domination number , 2005 .
[315] Shigeo Tsujii,et al. Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures , 2004, International Journal of Information Security.
[316] Dragos Cvetkovic,et al. On graphs whose second largest eigenvalue does not exceed (sqrt(5)-1)/2 , 1995, Discret. Math..
[317] Francesco Maffioli,et al. Solving the Two-Connected Network with Bounded Meshes Problem , 2000, Oper. Res..
[318] Shu-Guang Guo,et al. The spectral radius of unicyclic and bicyclic graphs with n vertices and k pendant vertices , 2005 .
[319] Abdelsalam Helal. Programming pervasive spaces , 2005, IEEE Pervasive Comput..
[320] Calton Pu,et al. Approaches for service deployment , 2005, IEEE Internet Computing.
[321] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[322] Mark Weiser. The computer for the 21st century , 1991 .
[323] Alessandro Bassi,et al. Towards an IPv6-Based Security Framework for Distributed Storage Resources , 2003, Communications and Multimedia Security.
[324] Wai Chee Shiu,et al. On the second largest Laplacian eigenvalues of graphs , 2005 .
[325] Ali Ridha Mahjoub,et al. Two-edge connected spanning subgraphs and polyhedra , 1994, Math. Program..
[326] Djamal Zeghlache,et al. TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[327] Michel X. Goemans,et al. Minimizing submodular functions over families of sets , 1995, Comb..
[328] Gregor Schiele,et al. PCOM - a component system for pervasive computing , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[329] Stephen E. Deering,et al. IP Version 6 Addressing Architecture , 1995, RFC.
[330] Daniel C. Halbert,et al. Programming by Example , 2010, Encyclopedia of Machine Learning.
[331] Malik Jahan Khan,et al. Enabling Self-Configuration in Autonomic Systems Using Case-Based Reasoning with Improved Efficiency , 2008, Fourth International Conference on Autonomic and Autonomous Systems (ICAS'08).
[332] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[333] Georgios Petrou,et al. An approach to robust network design in telecommunications , 2007, RAIRO Oper. Res..
[334] Christof Bornhövd,et al. CREAM: An Infrastructure for Distributed, Heterogeneous Event-Based Applications , 2003, OTM.
[335] L. Lamont,et al. A Simplified Approach to Multicast Forwarding Gateways in MANET , 2007, 2007 4th International Symposium on Wireless Communication Systems.
[336] Yaoping Hou,et al. Unicyclic graphs with exactly two main eigenvalues , 2006, Appl. Math. Lett..
[337] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[338] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[339] Tim Kerins,et al. An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..
[340] Fethi Calisir,et al. The relation of interface usability characteristics, perceived usefulness, and perceived ease of use to end-user satisfaction with enterprise resource planning (ERP) systems , 2004, Comput. Hum. Behav..
[341] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[342] Jack Edmonds,et al. Maximum matching and a polyhedron with 0,1-vertices , 1965 .
[343] E. Michael Maximilien,et al. A framework and ontology for dynamic Web services selection , 2004, IEEE Internet Computing.
[344] Ryuji Wakikawa,et al. Network Mobility (NEMO) Basic Support Protocol , 2005, RFC.
[345] Yaoping Hou,et al. Unicyclic graphs with maximal energy , 2002 .
[346] George J. Klir,et al. Fuzzy sets and fuzzy logic - theory and applications , 1995 .
[347] Weimin Huang,et al. Health and wellness monitoring through wearable and ambient sensors: exemplars from home-based care of elderly with mild dementia , 2010, Ann. des Télécommunications.
[348] Roman Beck,et al. Assimilation of Enterprise Mashup Systems − The Impact on Changes in Work Processes , 2009 .
[349] Bojan Mohar,et al. Eigenvalues, diameter, and mean distance in graphs , 1991, Graphs Comb..
[350] Muhammad Sher,et al. Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks , 2006, Q2SWinet '06.
[351] Jinlong Shu,et al. A sharp upper bound on the largest eigenvalue of the Laplacian matrix of a graph , 2002 .
[352] Michel Minoux,et al. Networks synthesis and optimum network design problems: Models, solution methods and applications , 1989, Networks.
[353] Demetres D. Kouvatsos,et al. Performance Modelling and Evaluation of Handover Mechanism in IP Multimedia Subsystems , 2008, 2008 Third International Conference on Systems and Networks Communications.
[354] Anne Setämaa-Kärkkäinen,et al. Best compromise solution for a new multiobjective scheduling problem , 2006, Comput. Oper. Res..
[355] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[356] Marco Laumanns,et al. SPEA2: Improving the Strength Pareto Evolutionary Algorithm For Multiobjective Optimization , 2002 .
[357] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[358] Ali Ridha Mahjoub,et al. Steiner k-Edge Connected Subgraph Polyhedra , 2000, J. Comb. Optim..
[359] Jan Camenisch,et al. Batch Verification of Short Signatures , 2007, EUROCRYPT.
[360] Sumi Helal,et al. The Gator Tech Smart House: enabling technologies and lessons learned , 2009 .
[361] Dominique de Caen,et al. An upper bound on the sum of squares of degrees in a graph , 1998, Discret. Math..
[362] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[363] Gabriel Montenegro,et al. Securing group management in IPv6 with cryptographically generated addresses , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[364] Peter C. Fishburn,et al. Utility theory for decision making , 1970 .
[365] K. Egoh,et al. A Multi-Criteria Receiver-Side Relay Election Approach in Wireless Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[366] J. R. Rao,et al. Fuzzy set theoretic approach of assigning weights to objectives in multieriteria decision making , 1989 .
[367] David Blackman. Debian Package Management, Part 1: A User's Guide , 2000 .
[368] R. Merris. Laplacian graph eigenvectors , 1998 .
[369] Dritan Nace,et al. On a resource-constrained scheduling problem with application to distributed systems reconfiguration , 2007, Eur. J. Oper. Res..
[370] Eli Biham,et al. TIGER: A Fast New Hash Function , 1996, FSE.
[371] Serge Vaudenay,et al. E-Passport Threats , 2007, IEEE Security & Privacy.
[372] Peter J. Fleming,et al. Genetic Algorithms for Multiobjective Optimization: FormulationDiscussion and Generalization , 1993, ICGA.
[373] Jun-Hyeong Do,et al. Intention reading is essential in human-friendly interfaces for the elderly and the handicapped , 2005, IEEE Transactions on Industrial Electronics.
[374] M. Valla,et al. Mashing-up integrated location, social networks and recommendations: the POI Radar , 2009, 2009 13th International Conference on Intelligence in Next Generation Networks.
[375] Benjamin Satzger,et al. Adaptive Self-optimization in Distributed Dynamic Environments , 2007, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007).
[376] Kalyanmoy Deb,et al. A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimisation: NSGA-II , 2000, PPSN.
[377] Katarina Stanoevska-Slabeva,et al. Enterprise Mashups: Design Principles towards the Long Tail of User Needs , 2008, 2008 IEEE International Conference on Services Computing.
[378] Mohamed Abid,et al. Fuzzy biometric authentication in Home Networks for personalized users’ access , 2008, 2008 International Conference on Telecommunications.
[379] Huaxiong Wang,et al. An On-Line Secure E-Passport Protocol , 2008, ISPEC.
[380] Oscar Díaz,et al. Providing Personalized Mashups Within the Context of Existing Web Applications , 2007, WISE.
[381] Maryline Laurent,et al. Usage and performance of cryptographically generated addresses , 2008 .
[382] R. Marler,et al. The weighted sum method for multi-objective optimization: new insights , 2010 .
[383] Y. Amghar,et al. Enhancing Web Service Discovery by Using Collaborative Tagging System , 2008, 2008 4th International Conference on Next Generation Web Services Practices.
[384] Adam Duffy,et al. A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..
[385] Charles Gouin-Vallerand,et al. A standard ontology for smart spaces , 2010, Int. J. Web Grid Serv..
[386] Daniel S. Weld,et al. Programming by Demonstration , 2021, Computer Vision.
[387] Michael C. Richardson,et al. Opportunistic Encryption using the Internet Key Exchange (IKE) , 2005, RFC.
[388] Alfred Burton Marsh. Matching algorithms. , 1979 .
[389] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[390] Juan C. Dueñas,et al. Deployment in dynamic environments , 2004, ArXiv.
[391] Ravi Kumar,et al. Visualizing tags over time , 2006, WWW '06.
[392] Charles Gouin-Vallerand,et al. Managing and Deployment of Applications with OSGi in the Context of Smart Home , 2007 .
[393] Jakob Nielsen,et al. Measuring usability: preference vs. performance , 1994, CACM.
[394] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[395] Froduald Kabanza,et al. History checking of temporal fuzzy logic formulas for monitoring behavior-based mobile robots , 2000, Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000.
[396] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[397] Jang-Ping Sheu,et al. A Clock Synchronization Algorithm for Multihop Wireless Ad Hoc Networks , 2007, Wirel. Pers. Commun..
[398] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[399] Mohamed Abid,et al. Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[400] Hisao Ishibuchi,et al. Incorporation of decision maker's preference into evolutionary multiobjective optimization algorithms , 2006, GECCO '06.
[401] Chung-Ming Huang,et al. One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).
[402] Charles Gouin-Vallerand,et al. Toward a Self-Configuration Middleware for Smart Spaces , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[403] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[404] Lotfi A. Zadeh,et al. Optimality and non-scalar-valued performance criteria , 1963 .
[405] Zhaoyun Ding,et al. A Web Service Discovery Method Based on Tag , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[406] Mary Beth Rosson,et al. What’s in a mashup? And why? Studying the perceptions of web-active end users , 2008, 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.
[407] Ernest Foo,et al. A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography , 2006 .
[408] Ali Ridha Mahjoub,et al. On a composition of independence systems by circuit identification , 1991, J. Comb. Theory, Ser. B.
[409] Nan Zang. Mashups for the web-active user , 2008, 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.
[410] Paul Lamere,et al. Social Tagging and Music Information Retrieval , 2008 .