Thèse présentée pour l'obtention du diplôme de Docteur de Télécom & Management SudParis

[1]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[2]  Alexander Schrijver,et al.  Combinatorial optimization. Polyhedra and efficiency. , 2003 .

[3]  Khaled Shuaib,et al.  Measured delay distribution in a Wireless Mesh Network test-bed , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[4]  B. Mohar THE LAPLACIAN SPECTRUM OF GRAPHS y , 1991 .

[5]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[6]  Mohamed Abid,et al.  Efficient identity-based authentication for IMS based services access , 2009, MoMM.

[7]  Minos N. Garofalakis,et al.  MashMaker: mashups for the masses , 2007, SIGMOD '07.

[8]  Marcelo Bagnulo,et al.  Shim6: Level 3 Multihoming Shim Protocol for IPv6 , 2009, RFC.

[9]  Satoru Iwata,et al.  A combinatorial, strongly polynomial-time algorithm for minimizing submodular functions , 2000, STOC '00.

[10]  S. Kanade,et al.  Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.

[11]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[12]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[13]  Yong Yu,et al.  Exploring social annotations for the semantic web , 2006, WWW '06.

[14]  Jason I. Hong,et al.  Marmite: Towards End-User Programming for the Web , 2007, IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007).

[15]  David E. Goldberg,et al.  Genetic Algorithms with Sharing for Multimodalfunction Optimization , 1987, ICGA.

[16]  Ying Zou,et al.  An automatic approach for ontology-driven service composition , 2009, 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA).

[17]  Jonathan Trevor Doing the Mobile Mash , 2008, Computer.

[18]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[19]  M. Dolores Gallego,et al.  User acceptance model of open source software , 2008, Comput. Hum. Behav..

[20]  T. Saaty,et al.  Ranking by Eigenvector Versus Other Methods in the Analytic Hierarchy Process , 1998 .

[21]  David E. Goldberg,et al.  A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.

[22]  Michael W. Shapiro Self-Healing in Modern Operating Systems , 2004, ACM Queue.

[23]  M. Stoer Design of Survivable Networks , 1993 .

[24]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[25]  Wang Qingxian The application of elliptic curves cryptography in embedded systems , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).

[26]  Lothar Thiele,et al.  An evolutionary algorithm for multiobjective optimization: the strength Pareto approach , 1998 .

[27]  Jim Gray,et al.  Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.

[28]  Hung-Yuan Chung,et al.  A self-learning fuzzy logic controller using genetic algorithms with reinforcements , 1997, IEEE Trans. Fuzzy Syst..

[29]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[30]  Stephen P. Boyd,et al.  Upper bounds on algebraic connectivity via convex optimization , 2006 .

[31]  Felix C. Freiling,et al.  DREAM: Distributed Reliable Event-Based Application Management , 2004, Web Dynamics.

[32]  Yannick Chevalier,et al.  A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols , 2004 .

[33]  Stanislav Kurkovsky,et al.  Using principles of pervasive computing to design m-commerce applications , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[34]  Eric Gamess,et al.  Easy-SEND: A Didactic Implementation of the Secure Neighbor Discovery Protocol for IPv6 , 2009 .

[35]  Satoru Iwata,et al.  A combinatorial strongly polynomial algorithm for minimizing submodular functions , 2001, JACM.

[36]  R. Merris A note on Laplacian graph eigenvalues , 1998 .

[37]  Umar Saif,et al.  A Case for Goal-oriented Programming Semantics , 2003 .

[38]  B. Roy,et al.  L'aide multicritère à la décision , 1989 .

[39]  François Michaud,et al.  Planning for Concurrent Action Executions Under Action Duration Uncertainty Using Dynamically Generated Bayesian Networks , 2010, ICAPS.

[40]  V. Nikiforov Bounds on graph eigenvalues I , 2006, math/0602027.

[41]  Romeo Rizzi A simple minimum T-cut algorithm , 2003, Discret. Appl. Math..

[42]  Kathrin Klamroth Discrete Multiobjective Optimization , 2009, EMO.

[43]  Ali Ridha Mahjoub,et al.  (1,2)-Survivable Networks: Facets and Branch&Cut , 2004 .

[44]  Peter E. Hart,et al.  Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.

[45]  Cesare Pautasso,et al.  Restful web services vs. "big"' web services: making the right architectural decision , 2008, WWW.

[46]  Michael Ogrinz,et al.  Mashup Patterns: Designs and Examples for the Modern Enterprise , 2009 .

[47]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[48]  Victor Fajardo,et al.  Diameter Base Protocol , 2003, RFC.

[49]  A. Berman,et al.  Algebraic connectivity of trees with a pendant edge of infinite weight. , 2005 .

[50]  Gregory D. Abowd,et al.  The Georgia Tech aware home , 2008, CHI Extended Abstracts.

[51]  Miroslaw Malek,et al.  Current solutions for Web service composition , 2004, IEEE Internet Computing.

[52]  Alan Mink,et al.  Multimodal biometrics: issues in design and testing , 2003, ICMI '03.

[53]  S. Pati,et al.  THE THIRD SMALLEST EIGENVALUE OF THE LAPLACIAN MATRIX , 2001 .

[54]  Ravindra B. Bapat,et al.  On distance matrices and Laplacians , 2005 .

[55]  Radu Marculescu,et al.  Real-Time Anonymous Routing for Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[56]  Amit P. Sheth,et al.  Services Mashups: The New Generation of Web Applications , 2008, IEEE Internet Computing.

[57]  Charles Gouin-Vallerand,et al.  Macro and micro context-awareness for autonomic pervasive computing , 2010, iiWAS.

[58]  Ren-Hung Hwang,et al.  MTSP: Multi-hop Time Synchronization Protocol for IEEE 802.11 Wireless Ad Hoc Network , 2006, WASA.

[59]  Chin-Chen Chang,et al.  The design of e-traveler's check with efficiency and mutual authentication , 2009, ICUIMC '09.

[60]  Allen B. MacKenzie,et al.  Cognitive networks: adaptation and learning to achieve end-to-end performance objectives , 2006, IEEE Communications Magazine.

[61]  James Z. Wang,et al.  A novel self-configuration mechanism for heterogeneous P2P networks , 2004 .

[62]  Pekka Nikander Enhancing Privacy with Shared Pseudo Random Sequences , 2005, Security Protocols Workshop.

[63]  Bart Jacobs,et al.  Crossing Borders: Security and Privacy Issues of the European e-Passport , 2006, IWSEC.

[64]  William Mark,et al.  Turning Pervasive Computing Into Mediated Spaces , 1999, IBM Syst. J..

[65]  Ryan W. Thomas,et al.  Cognitive networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[66]  Jens Vygen,et al.  The Book Review Column1 , 2020, SIGACT News.

[67]  Prasad Calyam,et al.  Performance Measurement and Analysis of H.323 Traffic , 2004, PAM.

[68]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[69]  Alex Waibel,et al.  Readings in speech recognition , 1990 .

[70]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2005, Mob. Networks Appl..

[71]  A. Schrijver On the History of Combinatorial Optimization (Till 1960) , 2005 .

[72]  Jin Song Dong,et al.  Semantic Space: an infrastructure for smart spaces , 2004, IEEE Pervasive Computing.

[73]  Wolfgang Trumler,et al.  AMUN - autonomic middleware for ubiquitous environments applied to the smart doorplate project , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[74]  Vincent M. Stanford,et al.  Wearable Computing Goes Live in Industry , 2002, IEEE Pervasive Comput..

[75]  S. Gauthier,et al.  Development of a functional measure for persons with Alzheimer's disease: the disability assessment for dementia. , 1999, The American journal of occupational therapy : official publication of the American Occupational Therapy Association.

[76]  Lu Yan,et al.  A Formal Model of Context-Awareness and Context-Dependency , 2006, Fourth IEEE International Conference on Software Engineering and Formal Methods (SEFM'06).

[77]  Juan-José Salazar-González The Steiner cycle polytope , 2003 .

[78]  Dragan Stevanović Bounding the largest eigenvalue of trees in terms of the largest vertex degree , 2003 .

[79]  Hani Hagras,et al.  Type-2 Fuzzy Logic Controllers: A Way Forward for Fuzzy Systems in Real World Environments , 2008, WCCI.

[80]  Richard Ferri The OSCAR revolution , 2002 .

[81]  Jari Arkko,et al.  Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) , 2002, RFC.

[82]  René Mayrhofer,et al.  A Human-Verifiable Authentication Protocol Using Visible Laser Light , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[83]  Sam Ruby,et al.  RESTful Web Services , 2007 .

[84]  Amos Fiat,et al.  Batch RSA , 1989, Journal of Cryptology.

[85]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[86]  Michael S. Hsiao,et al.  Cognitive Radio and Networking Research at Virginia Tech , 2009, Proceedings of the IEEE.

[87]  Alexander Schrijver,et al.  A Combinatorial Algorithm Minimizing Submodular Functions in Strongly Polynomial Time , 2000, J. Comb. Theory B.

[88]  Dritan Nace,et al.  Assigning spare capacities in mesh survivable networks , 2000, Telecommun. Syst..

[89]  Miguel A. Garcia-Martin,et al.  The 3G IP multimedia subsystem IMS - merging the internet and the cellular worlds (2. ed.) , 2006 .

[90]  David B. Leake,et al.  Introspective reasoning for index refinement in case-based reasoning , 2001, J. Exp. Theor. Artif. Intell..

[91]  Xiao-Dong Zhang,et al.  On the Laplacian eigenvalues of a graph , 1998 .

[92]  Daniele Braga,et al.  Mashing Up Search Services , 2008, IEEE Internet Computing.

[93]  Donald B. Johnson,et al.  Elliptic curve DSA (ECSDA): an enhanced DSA , 1998 .

[94]  Sharath Pankanti,et al.  An identity-authentication system using fingerprints , 1997, Proc. IEEE.

[95]  Amit P. Sheth,et al.  SA-REST: Semantically Interoperable and Easier-to-Use Services and Mashups , 2007, IEEE Internet Computing.

[96]  Ivan Tirado IP Multimedia Subsystem (IMS) signaling core security , 2008, InfoSecCD2008 2008.

[97]  Fabio Casati,et al.  Understanding Mashup Development , 2008, IEEE Internet Computing.

[98]  Abdallah M'hamed,et al.  An Authentication Architecture Dedicated to Dependent People in Smart Environments , 2007, ICOST.

[99]  L. Lovász,et al.  Geometric Algorithms and Combinatorial Optimization , 1981 .

[100]  Abhishek Roy,et al.  QM2RP: A QoS-Based Mobile Multicast Routing Protocol Using Multi-Objective Genetic Algorithm , 2004, Wirel. Networks.

[101]  Kalyanmoy Deb,et al.  Multi-objective optimization using evolutionary algorithms , 2001, Wiley-Interscience series in systems and optimization.

[102]  Chao Wang,et al.  Linear Time Algorithms to the Minimum All-Ones Problem for Unicyclic and Bicyclic Graphs , 2004, Electron. Notes Discret. Math..

[103]  Anne H. H. Ngu,et al.  QoS-aware middleware for Web services composition , 2004, IEEE Transactions on Software Engineering.

[104]  S. Folstein,et al.  "Mini-mental state". A practical method for grading the cognitive state of patients for the clinician. , 1975, Journal of psychiatric research.

[105]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[106]  Charles Gouin-Vallerand,et al.  A Software Self-Organizing Middleware for Smart Spaces Based on Fuzzy Logic , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[107]  Koen De Bosschere,et al.  Towards an Extensible Context Ontology for Ambient Intelligence , 2004, EUSAI.

[108]  Shengbiao Hu The largest eigenvalue of unicyclic graphs , 2007, Discret. Math..

[109]  Dirk Oliver Theis,et al.  Odd minimum cut sets and b-matchings revisited , 2006, SIAM J. Discret. Math..

[110]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[111]  Jock D. Mackinlay,et al.  The information visualizer, an information workspace , 1991, CHI.

[112]  Anthony LaMarca,et al.  Practical Lessons from Place Lab , 2006, IEEE Pervasive Computing.

[113]  Pierre Chardaire Hierarchical Two Level Location Problems , 1999 .

[114]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[115]  Yong Yu,et al.  An Unsupervised Model for Exploring Hierarchical Semantics from Social Annotations , 2007, ISWC/ASWC.

[116]  Slobodan K. Simić,et al.  On the Largest Eigenvalue of Unicyclic Graphs , 1987 .

[117]  Larry Rudolph,et al.  Project Oxygen: Pervasive, Human-Centric Computing - An Initial Experience , 2001, CAiSE.

[118]  Alessandro Bassi,et al.  The Internet Backplane Protocol: a study in resource sharing , 2003, Future Gener. Comput. Syst..

[119]  Rajarshi Das,et al.  Autonomic multi-agent management of power and performance in data centers , 2008, AAMAS.

[120]  N. Abreu Old and new results on algebraic connectivity of graphs , 2007 .

[121]  Fan Chung,et al.  Spectral Graph Theory , 1996 .

[122]  Claudio Bettini,et al.  Loosely coupling ontological reasoning with an efficient middleware for context-awareness , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[123]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.

[124]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[125]  Bernard Roy,et al.  Aide multicritère à la décision : méthodes et cas , 1993 .

[126]  Simon R. Saunders,et al.  Antennas and Propagation for Wireless Communication Systems , 1999 .

[127]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[128]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[129]  Anand Ranganathan,et al.  Towards fault tolerance pervasive computing , 2005, IEEE Technology and Society Magazine.

[130]  H. Van Dyke Parunak,et al.  Stigmergic learning for self-organizing mobile ad-hoc networks (MANET's) , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[131]  Mei Lu,et al.  Lower bounds of the Laplacian spectrum of graphs based on diameter , 2007 .

[132]  M. R. Rao,et al.  Odd Minimum Cut-Sets and b-Matchings , 1982, Math. Oper. Res..

[133]  Feng Tian,et al.  On the spectral radius of unicyclic graphs with perfect matchings , 2003 .

[134]  Alexander K. Kelmans,et al.  On the distribution of eigenvalues of graphs , 1999, Discret. Math..

[135]  Florent Bersani EAP shared key methods: a tentative synthesis of those proposed so far , 2004 .

[136]  Doheon Lee,et al.  Fuzzy branching temporal logic , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[137]  Rishab Nithyanand A Survey on the Evolution of Cryptographic Protocols in ePassports , 2009, IACR Cryptol. ePrint Arch..

[138]  Harry Chen,et al.  SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[139]  Paolo Falcarin,et al.  Service Creation in the SPICE Service Platform , 2006 .

[140]  Anil K. Jain,et al.  Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[141]  Jeffrey D. Ullman,et al.  NP-Complete Scheduling Problems , 1975, J. Comput. Syst. Sci..

[142]  Noël Crespi,et al.  User-centric Services and Service Composition, a Survey , 2008, 2008 32nd Annual IEEE Software Engineering Workshop.

[143]  Chang Liu,et al.  An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software , 2007, Communications of the IIMA.

[144]  Mor Naaman,et al.  HT06, tagging paper, taxonomy, Flickr, academic article, to read , 2006, HYPERTEXT '06.

[145]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[146]  Nitesh Saxena,et al.  DEVICE PAIRING USING UNIDIRECTIONAL PHYSICAL CHANNELS , 2008 .

[147]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[148]  J. Bauchet Archipel : un framework objet pour une approche ubiquitaire de l'assistance cognitive , 2008 .

[149]  R. Yarlagadda,et al.  Hadamard matrix analysis and synthesis: with applications to communications and signal/image processing , 1996 .

[150]  Yong-Liang Pan,et al.  Sharp upper bounds for the Laplacian graph eigenvalues , 2002 .

[151]  Gérard Cornuéjols,et al.  A matching problem with side conditions , 1980, Discret. Math..

[152]  Emile H. L. Aarts,et al.  Ambient intelligence: a multimedia perspective , 2004, IEEE MultiMedia.

[153]  Weishan Zhang,et al.  Semantic Web Based Self-Management for a Pervasive Service Middleware , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems.

[154]  Hiroaki Ikeda,et al.  Selection of display devices used at man-machine interfaces based on human factors , 2004, IEEE Transactions on Industrial Electronics.

[155]  Jong Sik Lee,et al.  Ontology-Based Intelligent Agent for Grid Resource Management , 2009, ICCCI.

[156]  Roy H. Campbell,et al.  Autonomic pervasive computing based on planning , 2004 .

[157]  Robert M. Gray,et al.  Toeplitz and Circulant Matrices: A Review , 2005, Found. Trends Commun. Inf. Theory.

[158]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[159]  Armin Fügenschuh,et al.  Computational Integer Programming and Cutting Planes , 2005 .

[160]  Diego Calvanese,et al.  The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.

[161]  Michel Minoux,et al.  Graphes et algorithmes , 1995 .

[162]  M. Fiedler Algebraic connectivity of graphs , 1973 .

[163]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[164]  David P. Williamson,et al.  A general approximation technique for constrained forest problems , 1992, SODA '92.

[165]  Andrzej P. Wierzbicki,et al.  The Use of Reference Objectives in Multiobjective Optimization , 1979 .

[166]  David C. Plummer,et al.  Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware , 1982, RFC.

[167]  David R. Morse,et al.  Enhanced Reality Fieldwork: the Context Aware Archaeological Assistant , 1997 .

[168]  Bradley J. Rhodes,et al.  Margin notes: building a contextually aware associative memory , 2000, IUI '00.

[169]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[170]  Luciano Baresi,et al.  Self-healing BPEL processes with Dynamo and the JBoss rule engine , 2007, ESSPE '07.

[171]  Rui Li,et al.  Towards effective browsing of large scale social annotations , 2007, WWW '07.

[172]  Y. Tao,et al.  Using UTAUT to explore the behavior of 3G mobile communication users , 2007, 2007 IEEE International Conference on Industrial Engineering and Engineering Management.

[173]  Jonathan Wood,et al.  IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures , 2006, IWSEC.

[174]  G. Nemhauser,et al.  Integer Programming , 2020 .

[175]  Shahram Latifi,et al.  On Embedding Rings into a Star-Related Network , 1997, Inf. Sci..

[176]  Jack Edmonds,et al.  Matching: A Well-Solved Class of Integer Linear Programs , 2001, Combinatorial Optimization.

[177]  Olaf Drögehorn,et al.  Professional and end-user-driven service creation in the SPICE platform , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[178]  Inmaculada Rodríguez Martín,et al.  The Ring Star Problem: Polyhedral analysis and exact algorithm , 2004, Networks.

[179]  B. Abdulrazak,et al.  Enabling a Plug-and-play integration of smart environments , 2006, 2006 2nd International Conference on Information & Communication Technologies.

[180]  Eugene L. Lawler,et al.  Traveling Salesman Problem , 2016 .

[181]  Fulvio Corno,et al.  DogOnt - Ontology Modeling for Intelligent Domotic Environments , 2008, SEMWEB.

[182]  Yeong-Nan Yeh,et al.  On the nullity and the matching number of unicyclic graphs , 2009 .

[183]  Martine Labbé,et al.  A branch and cut algorithm for hub location problems with single assignment , 2005, Math. Program..

[184]  Panos Markopoulos,et al.  Powerful and consistent analysis of likert-type rating scales , 2010, CHI.

[185]  Bessam Abdulrazak,et al.  Approaching context-awareness for open intelligent space , 2008, MoMM.

[186]  Martin Grötschel,et al.  On the symmetric travelling salesman problem II: Lifting theorems and facets , 1979, Math. Program..

[187]  Luís Gouveia,et al.  Designing reliable tree networks with two cable technologies , 1998, Eur. J. Oper. Res..

[188]  Mechthild Stoer,et al.  A simple min-cut algorithm , 1997, JACM.

[189]  Jeffrey O. Kephart,et al.  Research challenges of autonomic computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[190]  Wei Sun,et al.  Towards Service Composition Based on Mashup , 2007, 2007 IEEE Congress on Services (Services 2007).

[191]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[192]  Jong Wook Han,et al.  Security Framework for Home Network: Authentication, Authorization, and Security Policy , 2007, PAKDD Workshops.

[193]  Walid Ben-Ameur,et al.  Internet Routing and Related Topology Issues , 2003, SIAM J. Discret. Math..

[194]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[195]  C. Monma,et al.  Methods for Designing Communications Networks with Certain Two-Connected Survivability Constraints , 1989, Oper. Res..

[196]  David M. Chess Security in autonomic computing , 2005, CARN.

[197]  Tony Cheneau,et al.  ECC public key and signature support in Cryptographically Generated Addresses (CGA) and in the Secure Neighbor Discovery (SEND) , 2010 .

[198]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[199]  Yuqing Zhang,et al.  A new provably secure authentication and key agreement protocol for SIP using ECC , 2009, Comput. Stand. Interfaces.

[200]  Alfred Menezes,et al.  Elliptic curve cryptosystems and their implementation , 1993, Journal of Cryptology.

[201]  W. B. Ameur Constrained length connectivity and survivable networks , 2000 .

[202]  Martin Grötschel,et al.  On the symmetric travelling salesman problem I: Inequalities , 1979, Math. Program..

[203]  Frances M. T. Brazier,et al.  Using Semantic Web Technology for Self-Management of Distributed Object-Oriented Systems , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).

[204]  R. Schoof Journal de Theorie des Nombres de Bordeaux 7 (1995), 219{254 , 2022 .

[205]  K. Das The Laplacian spectrum of a graph , 2004 .

[206]  Mahmoud Ghorbel Abstract service model for adaptive provision in ambient assistive living , 2008 .

[207]  Gene Tsudik,et al.  Universally Composable RFID Identification and Authentication Protocols , 2009, TSEC.

[208]  Jeffrey O. Kephart,et al.  Building Effective Multivendor Autonomic Computing Systems , 2006, IEEE Distributed Systems Online.

[209]  Eric Bouillet,et al.  A Folksonomy-Based Model of Web Services for Discovery and Automatic Composition , 2008, 2008 IEEE International Conference on Services Computing.

[210]  M. Martin,et al.  Context Awareness in Future Life Scenarios: Impact on Service Provisioning Platforms , 2005 .

[211]  Ibrahim Sogukpinar,et al.  SIP Authentication Scheme using ECDH , 2007 .

[212]  William R. Pulleyblank,et al.  On cycle cones and polyhedra , 1989 .

[213]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[214]  Kalyanmoy Deb,et al.  Reference point based multi-objective optimization using evolutionary algorithms , 2006, GECCO.

[215]  Sylvain Giroux,et al.  User needs identification for a smart cognitive assistant based on participatory design , 2010 .

[216]  Marcelo Bagnulo,et al.  Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs) , 2007, RFC.

[217]  Xiaoyun Wang,et al.  Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.

[218]  Gregory D. Abowd,et al.  Providing architectural support for building context-aware applications , 2000 .

[219]  C. Nugent,et al.  Healthcare technologies for older people: What do physicians think? , 2006 .

[220]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[221]  K. Das SHARP UPPER BOUNDS ON THE SPECTRAL RADIUS OF THE LAPLACIAN MATRIX OF GRAPHS , 2005 .

[222]  Hélène Pigot,et al.  Interactive Calendar to Help Maintain Social Interactions for Elderly People and People with Mild Cognitive Impairments , 2009, ICOST.

[223]  Mounir Mokhtari,et al.  A distributed approach for assistive service provision in pervasive environment , 2006, WMASH '06.

[224]  Thomas L. Saaty,et al.  DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .

[225]  Sylvain Giroux,et al.  Indoors Pervasive Computing and Outdoors Mobile Computing for Cognitive Assistance and Telemonitoring , 2004, ICCHP.

[226]  Xavier Gandibleux,et al.  Martins' algorithm revisited for multi-objective shortest path problems with a MaxMin cost function , 2006, 4OR.

[227]  E. Martins On a multicriteria shortest path problem , 1984 .

[228]  B. Mohar Some applications of Laplace eigenvalues of graphs , 1997 .

[229]  Salvatore Marano,et al.  A biobjective optimization model for routing in mobile ad hoc networks , 2009 .

[230]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[231]  Mitsuru Matsui,et al.  Performance Analysis and Parallel Implementation of Dedicated Hash Functions , 2002, EUROCRYPT.

[232]  Angelos D. Keromytis,et al.  Just fast keying: Key agreement in a hostile internet , 2004, TSEC.

[233]  Ali Ridha Mahjoub,et al.  On survivable network polyhedra , 2005, Discret. Math..

[234]  Hugo Liu,et al.  ConceptNet — A Practical Commonsense Reasoning Tool-Kit , 2004 .

[235]  Preben D. Vestergaard,et al.  The number of independent sets in unicyclic graphs , 2005, Discret. Appl. Math..

[236]  Adam Ouorou,et al.  Robust Capacity Assignment in Telecommunications , 2006, Comput. Manag. Sci..

[237]  Nick Moore,et al.  Optimistic Duplicate Address Detection (DAD) for IPv6 , 2006, RFC.

[238]  J. P. Grossman An eigenvalue bound for the Laplacian of a graph , 2005, Discret. Math..

[239]  Siyuan Ma,et al.  Taxonomy and an Ontology for Grid Metrics , 2008, The Third ChinaGrid Annual Conference (chinagrid 2008).

[240]  Georg Mayer,et al.  The IMS: IP Multimedia Concepts and Services , 2004 .

[241]  Kinkar Ch. Das,et al.  An improved upper bound for Laplacian graph eigenvalues , 2003 .

[242]  Mary Czerwinski,et al.  The New EasyLiving Project at Microsoft Research , 1998 .

[243]  R. Merris Laplacian matrices of graphs: a survey , 1994 .

[244]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[245]  Wolfgang Trumler,et al.  Self-configuration Via Cooperative Social Behavior , 2006, ATC.

[246]  Henri Fayol Administration industrielle et générale , 1999 .

[247]  Craig Metz,et al.  A One-Time Password System , 1996, RFC.

[248]  Gregory D. Abowd,et al.  The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.

[249]  Kalyanmoy Deb,et al.  Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms , 1994, Evolutionary Computation.

[250]  D. Cvetkovic,et al.  Spectra of Graphs: Theory and Applications , 1997 .

[251]  George A. Miller,et al.  WordNet: A Lexical Database for English , 1995, HLT.

[252]  I. Reed,et al.  Polynomial Codes Over Certain Finite Fields , 1960 .

[253]  S. Ungar,et al.  Home network security , 2002, Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525).

[254]  Gerard J. Chang,et al.  The number of maximal independent sets in connected triangle-free graphs , 1999 .

[255]  Mohamed Abid,et al.  Integrating identity-based cryptography in IMS service authentication , 2009, ArXiv.

[256]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[257]  Joo-Hwee Lim,et al.  Home Photo Content Modeling for Personalized Event-Based Retrieval , 2003, IEEE Multim..

[258]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[259]  Gregor Schiele,et al.  BASE - a micro-broker-based middleware for pervasive computing , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[260]  Rajarshi Das,et al.  Achieving Self-Management via Utility Functions , 2007, IEEE Internet Computing.

[261]  Pekka Nikander,et al.  Delegation of Signalling Rights , 2002, Security Protocols Workshop.

[262]  Khaled Masmoudi,et al.  An on-demand key establishment protocol for MANETs , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[263]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[264]  Douglas Stebila,et al.  Performance analysis of elliptic curve cryptography for SSL , 2002, WiSE '02.

[265]  Luc Steels,et al.  Augmenting Navigation for Collaborative Tagging with Emergent Semantics , 2006, International Semantic Web Conference.

[266]  Alf Zugenmaier FLASCHE - A Mechanism Providing Anonymity for Mobile Users , 2004, Privacy Enhancing Technologies.

[267]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2001, RFC.

[268]  Deborah L. McGuinness,et al.  OWL Web ontology language overview , 2004 .

[269]  William J. Cook,et al.  Combinatorial optimization , 1997 .

[270]  Nalini K. Ratha,et al.  Biometric perils and patches , 2002, Pattern Recognit..

[271]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[272]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[273]  William C. Mann,et al.  The Gator Tech Smart House: a programmable pervasive space , 2005, Computer.

[274]  Johan J. Lukkien,et al.  An architecture for self-organization in pervasive systems , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).

[275]  Z. Obrenovic,et al.  Modeling multimodal human-computer interaction , 2004, Computer.

[276]  Stephen E. Deering,et al.  Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.

[277]  Patrice C. Roy,et al.  A Hybrid Plan Recognition Model for Alzheimer's Patients: Interleaved-Erroneous Dilemma , 2007, 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07).

[278]  Muhammad Sher,et al.  Secure Service Provisioning (SSP) framework for IP Multimedia Subsystem (IMS) , 2008 .

[279]  Ching-Lai Hwang,et al.  Multiple attribute decision making : an introduction , 1995 .

[280]  Mihalis Yannakakis,et al.  Edge-Deletion Problems , 1981, SIAM J. Comput..

[281]  René Peeters,et al.  The maximum edge biclique problem is NP-complete , 2003, Discret. Appl. Math..

[282]  M. Inzitari,et al.  Gait speed at usual pace as a predictor of adverse outcomes in community-dwelling older people an International Academy on Nutrition and Aging (IANA) Task Force , 2009, The journal of nutrition, health & aging.

[283]  Branko Grünbaum,et al.  Graphs of polyhedra; polyhedra as graphs , 2007, Discret. Math..

[284]  Deborah Estrin,et al.  Advances in network simulation , 2000, Computer.

[285]  Jon Crowcroft,et al.  Quality-of-Service Routing for Supporting Multimedia Applications , 1996, IEEE J. Sel. Areas Commun..

[286]  Mohamed Abid,et al.  Towards a secure E-passport protocol based on biometrics , 2009 .

[287]  P. Papalambros,et al.  A NOTE ON WEIGHTED CRITERIA METHODS FOR COMPROMISE SOLUTIONS IN MULTI-OBJECTIVE OPTIMIZATION , 1996 .

[288]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[289]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[290]  David Levine,et al.  PICO: A Middleware Framework for Pervasive Computing , 2003, IEEE Pervasive Comput..

[291]  Reinhard Diestel,et al.  Graph Theory , 1997 .

[292]  Roy H. Campbell,et al.  Application polymorphism for autonomic ubiquitous computing , 2005, Multiagent Grid Syst..

[293]  Sylvain Giroux,et al.  Pervasive behavior tracking for cognitive assistance , 2008, PETRA '08.

[294]  Kaisa Miettinen,et al.  Nonlinear multiobjective optimization , 1998, International series in operations research and management science.

[295]  Bernadette Dorizzi,et al.  Iris based authentication mechanism for e-Passports , 2010, 2010 2nd International Workshop on Security and Communication Networks (IWSCN).

[296]  Vladimir Stantchev,et al.  Enabling Autonomous Self-Optimisation in Service-Oriented Systems , 2008, SJTU-TUB Joint Workshop.

[297]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[298]  Philippe Vincke,et al.  Multicriteria Decision-Aid , 1992 .

[299]  Yuan Hong,et al.  A Sharp Upper Bound of the Spectral Radius of Graphs , 2001, J. Comb. Theory, Ser. B.

[300]  S. Bellovin Defending Against Sequence Number Attacks , 1996 .

[301]  Bessam Abdulrazak,et al.  Towards a universal ontology for smart environments , 2009, iiWAS.

[302]  Ji-Ming Guo On the Laplacian spectral radius of a tree , 2003 .

[303]  Francesco Furfari,et al.  DomoML-env: an ontology for Human Home Interaction , 2005, SWAP.

[304]  Paul L. Krapivsky,et al.  Unicyclic Components in Random Graphs , 2004, ArXiv.

[305]  Benjamin Satzger,et al.  Towards Trustworthy Self-optimization for Distributed Systems , 2009, SEUS.

[306]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[307]  Maryline Laurent-Maknavicius,et al.  Significantly improved performances of the cryptographically generated addresses thanks to ECC and GPGPU , 2010, Comput. Secur..

[308]  Gabriel Montenegro,et al.  IPv6 Opportunistic Encryption , 2002 .

[309]  Kinkar Chandra Das,et al.  Some new bounds on the spectral radius of graphs , 2004, Discret. Math..

[310]  Jon Piesing,et al.  The DVB Multimedia Home Platform (MHP) and Related Specifications , 2006, Proceedings of the IEEE.

[311]  Sylvain Giroux,et al.  A semantic approach for accessible services delivery in a smart environment , 2009, Int. J. Web Grid Serv..

[312]  Charles Gouin-Vallerand,et al.  A self-configuration middleware for smart spaces , 2009 .

[313]  Josef Hadar,et al.  Rules for Ordering Uncertain Prospects , 1969 .

[314]  F. Tian,et al.  Bounds of Laplacian spectrum of graphs based on the domination number , 2005 .

[315]  Shigeo Tsujii,et al.  Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures , 2004, International Journal of Information Security.

[316]  Dragos Cvetkovic,et al.  On graphs whose second largest eigenvalue does not exceed (sqrt(5)-1)/2 , 1995, Discret. Math..

[317]  Francesco Maffioli,et al.  Solving the Two-Connected Network with Bounded Meshes Problem , 2000, Oper. Res..

[318]  Shu-Guang Guo,et al.  The spectral radius of unicyclic and bicyclic graphs with n vertices and k pendant vertices , 2005 .

[319]  Abdelsalam Helal Programming pervasive spaces , 2005, IEEE Pervasive Comput..

[320]  Calton Pu,et al.  Approaches for service deployment , 2005, IEEE Internet Computing.

[321]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[322]  Mark Weiser The computer for the 21st century , 1991 .

[323]  Alessandro Bassi,et al.  Towards an IPv6-Based Security Framework for Distributed Storage Resources , 2003, Communications and Multimedia Security.

[324]  Wai Chee Shiu,et al.  On the second largest Laplacian eigenvalues of graphs , 2005 .

[325]  Ali Ridha Mahjoub,et al.  Two-edge connected spanning subgraphs and polyhedra , 1994, Math. Program..

[326]  Djamal Zeghlache,et al.  TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[327]  Michel X. Goemans,et al.  Minimizing submodular functions over families of sets , 1995, Comb..

[328]  Gregor Schiele,et al.  PCOM - a component system for pervasive computing , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[329]  Stephen E. Deering,et al.  IP Version 6 Addressing Architecture , 1995, RFC.

[330]  Daniel C. Halbert,et al.  Programming by Example , 2010, Encyclopedia of Machine Learning.

[331]  Malik Jahan Khan,et al.  Enabling Self-Configuration in Autonomic Systems Using Case-Based Reasoning with Improved Efficiency , 2008, Fourth International Conference on Autonomic and Autonomous Systems (ICAS'08).

[332]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[333]  Georgios Petrou,et al.  An approach to robust network design in telecommunications , 2007, RAIRO Oper. Res..

[334]  Christof Bornhövd,et al.  CREAM: An Infrastructure for Distributed, Heterogeneous Event-Based Applications , 2003, OTM.

[335]  L. Lamont,et al.  A Simplified Approach to Multicast Forwarding Gateways in MANET , 2007, 2007 4th International Symposium on Wireless Communication Systems.

[336]  Yaoping Hou,et al.  Unicyclic graphs with exactly two main eigenvalues , 2006, Appl. Math. Lett..

[337]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[338]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[339]  Tim Kerins,et al.  An Elliptic Curve Processor Suitable For RFID-Tags , 2006, IACR Cryptol. ePrint Arch..

[340]  Fethi Calisir,et al.  The relation of interface usability characteristics, perceived usefulness, and perceived ease of use to end-user satisfaction with enterprise resource planning (ERP) systems , 2004, Comput. Hum. Behav..

[341]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[342]  Jack Edmonds,et al.  Maximum matching and a polyhedron with 0,1-vertices , 1965 .

[343]  E. Michael Maximilien,et al.  A framework and ontology for dynamic Web services selection , 2004, IEEE Internet Computing.

[344]  Ryuji Wakikawa,et al.  Network Mobility (NEMO) Basic Support Protocol , 2005, RFC.

[345]  Yaoping Hou,et al.  Unicyclic graphs with maximal energy , 2002 .

[346]  George J. Klir,et al.  Fuzzy sets and fuzzy logic - theory and applications , 1995 .

[347]  Weimin Huang,et al.  Health and wellness monitoring through wearable and ambient sensors: exemplars from home-based care of elderly with mild dementia , 2010, Ann. des Télécommunications.

[348]  Roman Beck,et al.  Assimilation of Enterprise Mashup Systems − The Impact on Changes in Work Processes , 2009 .

[349]  Bojan Mohar,et al.  Eigenvalues, diameter, and mean distance in graphs , 1991, Graphs Comb..

[350]  Muhammad Sher,et al.  Secure access to IP multimedia services using generic bootstrapping architecture (GBA) for 3G & beyond mobile networks , 2006, Q2SWinet '06.

[351]  Jinlong Shu,et al.  A sharp upper bound on the largest eigenvalue of the Laplacian matrix of a graph , 2002 .

[352]  Michel Minoux,et al.  Networks synthesis and optimum network design problems: Models, solution methods and applications , 1989, Networks.

[353]  Demetres D. Kouvatsos,et al.  Performance Modelling and Evaluation of Handover Mechanism in IP Multimedia Subsystems , 2008, 2008 Third International Conference on Systems and Networks Communications.

[354]  Anne Setämaa-Kärkkäinen,et al.  Best compromise solution for a new multiobjective scheduling problem , 2006, Comput. Oper. Res..

[355]  Bart Preneel,et al.  RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.

[356]  Marco Laumanns,et al.  SPEA2: Improving the Strength Pareto Evolutionary Algorithm For Multiobjective Optimization , 2002 .

[357]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[358]  Ali Ridha Mahjoub,et al.  Steiner k-Edge Connected Subgraph Polyhedra , 2000, J. Comb. Optim..

[359]  Jan Camenisch,et al.  Batch Verification of Short Signatures , 2007, EUROCRYPT.

[360]  Sumi Helal,et al.  The Gator Tech Smart House: enabling technologies and lessons learned , 2009 .

[361]  Dominique de Caen,et al.  An upper bound on the sum of squares of degrees in a graph , 1998, Discret. Math..

[362]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[363]  Gabriel Montenegro,et al.  Securing group management in IPv6 with cryptographically generated addresses , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[364]  Peter C. Fishburn,et al.  Utility theory for decision making , 1970 .

[365]  K. Egoh,et al.  A Multi-Criteria Receiver-Side Relay Election Approach in Wireless Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[366]  J. R. Rao,et al.  Fuzzy set theoretic approach of assigning weights to objectives in multieriteria decision making , 1989 .

[367]  David Blackman Debian Package Management, Part 1: A User's Guide , 2000 .

[368]  R. Merris Laplacian graph eigenvectors , 1998 .

[369]  Dritan Nace,et al.  On a resource-constrained scheduling problem with application to distributed systems reconfiguration , 2007, Eur. J. Oper. Res..

[370]  Eli Biham,et al.  TIGER: A Fast New Hash Function , 1996, FSE.

[371]  Serge Vaudenay,et al.  E-Passport Threats , 2007, IEEE Security & Privacy.

[372]  Peter J. Fleming,et al.  Genetic Algorithms for Multiobjective Optimization: FormulationDiscussion and Generalization , 1993, ICGA.

[373]  Jun-Hyeong Do,et al.  Intention reading is essential in human-friendly interfaces for the elderly and the handicapped , 2005, IEEE Transactions on Industrial Electronics.

[374]  M. Valla,et al.  Mashing-up integrated location, social networks and recommendations: the POI Radar , 2009, 2009 13th International Conference on Intelligence in Next Generation Networks.

[375]  Benjamin Satzger,et al.  Adaptive Self-optimization in Distributed Dynamic Environments , 2007, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007).

[376]  Kalyanmoy Deb,et al.  A Fast Elitist Non-dominated Sorting Genetic Algorithm for Multi-objective Optimisation: NSGA-II , 2000, PPSN.

[377]  Katarina Stanoevska-Slabeva,et al.  Enterprise Mashups: Design Principles towards the Long Tail of User Needs , 2008, 2008 IEEE International Conference on Services Computing.

[378]  Mohamed Abid,et al.  Fuzzy biometric authentication in Home Networks for personalized users’ access , 2008, 2008 International Conference on Telecommunications.

[379]  Huaxiong Wang,et al.  An On-Line Secure E-Passport Protocol , 2008, ISPEC.

[380]  Oscar Díaz,et al.  Providing Personalized Mashups Within the Context of Existing Web Applications , 2007, WISE.

[381]  Maryline Laurent,et al.  Usage and performance of cryptographically generated addresses , 2008 .

[382]  R. Marler,et al.  The weighted sum method for multi-objective optimization: new insights , 2010 .

[383]  Y. Amghar,et al.  Enhancing Web Service Discovery by Using Collaborative Tagging System , 2008, 2008 4th International Conference on Next Generation Web Services Practices.

[384]  Adam Duffy,et al.  A Biometric Identity Based Signature Scheme , 2007, Int. J. Netw. Secur..

[385]  Charles Gouin-Vallerand,et al.  A standard ontology for smart spaces , 2010, Int. J. Web Grid Serv..

[386]  Daniel S. Weld,et al.  Programming by Demonstration , 2021, Computer Vision.

[387]  Michael C. Richardson,et al.  Opportunistic Encryption using the Internet Key Exchange (IKE) , 2005, RFC.

[388]  Alfred Burton Marsh Matching algorithms. , 1979 .

[389]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[390]  Juan C. Dueñas,et al.  Deployment in dynamic environments , 2004, ArXiv.

[391]  Ravi Kumar,et al.  Visualizing tags over time , 2006, WWW '06.

[392]  Charles Gouin-Vallerand,et al.  Managing and Deployment of Applications with OSGi in the Context of Smart Home , 2007 .

[393]  Jakob Nielsen,et al.  Measuring usability: preference vs. performance , 1994, CACM.

[394]  Randall J. Atkinson,et al.  IP Encapsulating Security Payload (ESP) , 1995, RFC.

[395]  Froduald Kabanza,et al.  History checking of temporal fuzzy logic formulas for monitoring behavior-based mobile robots , 2000, Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000.

[396]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[397]  Jang-Ping Sheu,et al.  A Clock Synchronization Algorithm for Multihop Wireless Ad Hoc Networks , 2007, Wirel. Pers. Commun..

[398]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[399]  Mohamed Abid,et al.  Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[400]  Hisao Ishibuchi,et al.  Incorporation of decision maker's preference into evolutionary multiobjective optimization algorithms , 2006, GECCO '06.

[401]  Chung-Ming Huang,et al.  One-Pass Authentication and Key Agreement Procedure in IP Multimedia Subsystem for UMTS , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[402]  Charles Gouin-Vallerand,et al.  Toward a Self-Configuration Middleware for Smart Spaces , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[403]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[404]  Lotfi A. Zadeh,et al.  Optimality and non-scalar-valued performance criteria , 1963 .

[405]  Zhaoyun Ding,et al.  A Web Service Discovery Method Based on Tag , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[406]  Mary Beth Rosson,et al.  What’s in a mashup? And why? Studying the perceptions of web-active end users , 2008, 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.

[407]  Ernest Foo,et al.  A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography , 2006 .

[408]  Ali Ridha Mahjoub,et al.  On a composition of independence systems by circuit identification , 1991, J. Comb. Theory, Ser. B.

[409]  Nan Zang Mashups for the web-active user , 2008, 2008 IEEE Symposium on Visual Languages and Human-Centric Computing.

[410]  Paul Lamere,et al.  Social Tagging and Music Information Retrieval , 2008 .