Journal: Annales des Télécommunications

Volume 64, Issue 9-10

593 -- 594Gérard Lachapelle, Nel Samama, Masato Takahashi. Foreword
595 -- 599Nel Samama. Positioning and telecommunications in the world
601 -- 614Daniele Borio, Gérard Lachapelle. A non-coherent architecture for GNSS digital tracking loops
615 -- 623Rolland Fleury, Mercedes Clemente, Françoise Carvalho, Patrick Lassudrie-Duchesne. Modelling of ionospheric high-order errors for new generation GNSS
625 -- 638André Gilloire, Hervé Sizun. RFI mitigation of GNSS signals for radio astronomy: problems and current techniques
639 -- 649Mirjana Simic, Predrag V. Pejovic. A probabilistic approach to determine mobile station location with application in cellular networks
651 -- 664Frederic Lassabe, Philippe Canalda, Pascal Chatonnay, François Spies. Indoor Wi-Fi positioning: techniques and systems
665 -- 676Milos Borenovic, Aleksandar Neskovic. Positioning in WLAN environment by use of artificial neural networks and space partitioning
677 -- 691Mohammad Reza HeidariNezhad, Zuriati Zukarnain, Nur Izura Udzir, Mohamed Othman. Mobility support across hybrid IP-based wireless environment: review of concepts, solutions, and related issues
693 -- 704Neila El Heni, Xavier Lagrange. Analytical evaluation of multicast packet delivery and user-clustering schemes in high-speed cellular networks

Volume 64, Issue 7-8

415 -- 417Christophe Moy, Linda Doyle, Yukitoshi Sanada. Foreword - cognitive radio: from equipment to networks
419 -- 441Joseph Mitola III. Cognitive radio architecture evolution: annals of telecommunications
443 -- 462Nicolas Colson, Apostolos A. Kountouris, Armelle Wautier, Lionel Husson. A generic cognitive framework for supervising the radio dynamic reconfiguration
463 -- 482Loïg Godard, Christophe Moy, Jacques Palicot. An executable meta-model of a hierarchical and distributed architecture management for cognitive radio equipments
483 -- 501Panagiotis Demestichas. Enhanced network selections in a cognitive wireless B3G world
503 -- 534Christian Doerr, Dirk Grunwald, Douglas C. Sicker. Local control of cognitive radio networks
535 -- 543Duminda Thilakawardana, Klaus Moessner. Traffic modelling and forecasting using genetic algorithms for next-generation cognitive radio applications
545 -- 555Behrouz Maham, Are Hjørungnes, Mérouane Debbah. Power allocations in minimum-energy SER-constrained cooperative networks
557 -- 572Qinghai Xiao, Yunzhou Li, Ming Zhao 0001, Shidong Zhou, Jing Wang 0001. An optimal OSA approach based on channel-usage estimate under collision probability constraint in cognitive radio systems
573 -- 592T. Charles Clancy. Dynamic spectrum access using the interference temperature model

Volume 64, Issue 5-6

269 -- 270Omar Cherkaoui, Masum Z. Hasan, Guy Pujolle. Foreword
271 -- 276James Roberts. The clean-slate approach to future Internet design: a survey of research initiatives
277 -- 288Mohamed Boucadair, Panos Georgatsos, Ning Wang, David P. Griffin, George Pavlou, Michael P. Howarth, A. J. Elizondo. The AGAVE approach for network virtualization: differentiated services delivery
289 -- 303Fernando Rodríguez-Haro, Felix Freitag, Leandro Navarro. Enhancing virtual environments with QoS aware resource management
305 -- 323Fermín Galán Márquez, David Fernández, Walter Fuertes, Miguel Gómez, Jorge E. López de Vergara. Scenario-based virtual network infrastructure management in research and educational testbeds with VNUML
325 -- 338Ting-Chao Hou, Ming-Chieh Chan, Chien-Tse Yu. Using tunneling techniques to realize virtual routers
339 -- 347Imen Limam Bedhiaf, Omar Cherkaoui, Guy Pujolle. Third-generation virtualized architecture for the MVNO context
349 -- 357Moussa Lefouili, Kamel Kerroum, Khalil El Khamlichi Drissi. Hybrid approach for modeling transient EM fields generated by large earthing systems
359 -- 367Yann Gaudeau, Jean-Marie Moureaux. Lossy compression of volumetric medical images with 3D dead-zone lattice vector quantization
369 -- 379Boulbaba Ben Amor, Hassen Drira, Lahoucine Ballihi, Anuj Srivastava, Mohamed Daoudi. An experimental illustration of 3D facial shape analysis under facial expressions
381 -- 390Romain Tavenard, Laurent Amsaleg, Guillaume Gravier. Model-based similarity estimation of multidimensional temporal sequences
391 -- 400Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal. MPLS security: an approach for unicast and multicast environments
401 -- 413Md. Abdul Hamid, M. Abdullah-Al-Wadud, Choong Seon Hong, Oksam Chae, Sungwon Lee. A robust security scheme for wireless mesh enterprise networks

Volume 64, Issue 3-4

175 -- 185Emmanuel Lavinal, Noëmie Simoni, Meng Song, Bertrand Mathieu. A next-generation service overlay architecture
187 -- 196Emmanuel Bertin, Noël Crespi. Service business processes for the next generation of services: a required step to achieve service convergence
197 -- 214Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Vincent Hourdin, Daniel Cheung-Foo-Wo, Eric Callegari, Michel Riveill. WComp middleware for ubiquitous computing: Aspects and composite event-based Web services
215 -- 224Emmanuel Lochin, Pascal Anelli. TCP throughput guarantee in the DiffServ Assured Forwarding service: what about the results?
225 -- 237Vitalio Alfonso Reguera, Evelio M. G. Fernandez, Félix F. Álvarez Paliza, Walter Godoy Jr., Eduardo P. Ribeiro. Quality of service for voice over IP in networks with congestion avoidance
239 -- 246Jahangir Dadkhah Chimeh, Mohammad Hakkak, Paeiz Azmi, Hamidreza Bakhshi. Internet connection with UMTS
247 -- 257M. V. S. N. Prasad, P. K. Dalela. Some experimental investigation of the effect of railway tunnels on mobile communications in Western India
259 -- 268F. S. Al-kamali, Moawad I. Dessouky, B. M. Sallam, Fathi E. Abd El-Samie. An efficient receiver scheme for downlink ZP-CDMA

Volume 64, Issue 11-12

705 -- 721Md. Abdur Razzaque, Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Choong Seon Hong. Aggregated traffic flow weight controlled hierarchical MAC protocol for wireless sensor networks
723 -- 734Md. Abdul Hamid, Choong Seon Hong. Energy conserving security mechanisms for wireless sensor networks
735 -- 744Cheng-Chi Lee, Tsung-Hung Lin, Chwei-Shyong Tsai. A new authenticated group key agreement in a mobile environment
745 -- 751Daniela G. Tarniceriu, Lucian Trifina, Valeriu Munteanu. About minimum distance for QPP interleavers
753 -- 762Hassan Zareian, Vahid Tabataba Vakili. Analytical EVM, BER, and TD performances of the OFDM systems in the presence of jointly nonlinear distortion and IQ imbalance
763 -- 776Anca Fluerasu, Christine Letrou. Gaussian beam launching for 3D physical modeling of propagation channels
777 -- 791Kuo-Chung Chu, Lun-Ping Hung, Frank Yeong-Sung Lin. Adaptive channel reservation for call admission control to support prioritized soft handoff calls in a cellular CDMA system
793 -- 799Alexandra Ligia Onofrei Balan, Nicolae Dumitru Alexandru. Improved Nyquist filter characteristics using spline interpolation
801 -- 813Benjamin Mathon, Patrick Bas, François Cayre, Benoît Macq. Comparison of secure spread-spectrum modulations applied to still image watermarking

Volume 64, Issue 1-2

1 -- 4Gordon S. Blair, Thierry Coupaye, Jean-Bernard Stefani. Component-based architecture: the Fractal initiative
5 -- 24Françoise Baude, Denis Caromel, Cédric Dalmasso, Marco Danelutto, Vladimir Getov, Ludovic Henrio, Christian Pérez. GCM: a grid extension to Fractal for autonomous distributed components
25 -- 43Tomás Barros, Rabéa Ameur-Boulifa, Antonio Cansado, Ludovic Henrio, Eric Madelaine. Behavioural models for distributed Fractal components
45 -- 63Pierre-Charles David, Thomas Ledoux, Marc Léger, Thierry Coupaye. FPath and FScript: Language support for navigation and reliable reconfiguration of Fractal architectures
65 -- 79Romain Rouvoy, Philippe Merle. Leveraging component-based software engineering with Fraclet
81 -- 100Nabila Salmi, Patrice Moreaux, Malika Ioualalen. Performance evaluation of Fractal component-based systems
101 -- 120Bruno Dillenseger. CLIF, a framework based on Fractal for flexible, distributed load testing
121 -- 146Marc Lacoste, Tahar Jarboui, Ruan He. A component-based policy-neutral architecture for kernel-level access control
147 -- 153Jyoteesh Malhotra, Ajay K. Sharma, R. S. Kaler. On the performance analysis of wireless receiver using generalized-gamma fading model
155 -- 169Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar. XeNA: an access negotiation framework using XACML