Journal: Annales des Télécommunications

Volume 69, Issue 9-10

475 -- 483Ashish Singh, Jamshed Aslam Ansari, Kamakshi Kumari, Anurag Mishra, Mohammad Aneesh. Compact notch loaded half disk patch antenna for dualband operation
485 -- 496Mohammad Aazam, Eui-nam Huh. Impact of ipv4-ipv6 coexistence in cloud virtualization environment
497 -- 508Wided Hadj Alouane, Noureddine Hamdi, Soumaya Meherzi. Semi-blind amplify-and-forward in two-way relaying networks
509 -- 514S. Kibria, Mohammad Tariqul Islam, Baharudin Yatim, Rezaul Azim. A modified PSO technique using heterogeneous boundary conditions for broadband compact microstrip antenna designing
515 -- 527Anirban Chatterjee, Gautam Kumar Mahanti. Combination of fast Fourier transform and self-adaptive differential evolution algorithm for synthesis of phase-only reconfigurable rectangular array antenna
529 -- 537Jorge Ortín, Paloma Garcia Ducar, Fernando Gutiérrez, Antonio Valdovinos. An efficiently implementable maximum likelihood decoding algorithm for tailbiting codes
539 -- 551Mireille Sarkiss, Mohamed Kamoun. On the energy efficiency of base station cooperation under limited backhaul capacity
553 -- 557J. Khodjaev, B.-Y. Chang, J. H. Lee. Robust antenna array calibration and accurate angle estimation based on least trimmed squares
559 -- 567Yipeng Liu, Qun Wan. Compressive slow-varying wideband power spectrum sensing for cognitive radio

Volume 69, Issue 7-8

345 -- 346Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian. Network forensics and challenges for cybersecurity
347 -- 361Do-Hoon Kim, Jungbean Lee, Young-Gab Kim, Byungsik Yoon, Hoh Peter In. 3G IP Multimedia Subsystem based framework for lawful interception
363 -- 377Robert Filasiak, Maciej Grzenda, Marcin Luckner, Pawel Zawistowski. On the testing of network cyber threat detection methods on spam example
379 -- 389Bo-Chao Cheng, Guo-Tan Liao, Hsu-Chen Huang, Ping-Hai Hsu. Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics
391 -- 402Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng. Efficient searchable ID-based encryption with a designated server
403 -- 416Weiwei Liu, Guangjie Liu, Yuewei Dai. Syndrome trellis codes based on minimal span generator matrix
417 -- 430Steffen Wendzel, Jörg Keller. Hidden and under control - A survey and outlook on covert channel-internal control protocols
431 -- 440Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen. Adaptive JPEG steganography with new distortion function
441 -- 447Xinpeng Zhang, Chuan Qin, Liquan Shen. Efficient wet paper embedding for steganography with multilayer construction
449 -- 460Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski. Steganalysis of transcoding steganography
461 -- 473Songbin Li, Haojiang Deng, Hui Tian, Qiongxing Dai. Steganalysis of prediction mode modulated data-hiding algorithms in H.264/AVC video stream

Volume 69, Issue 5-6

251 -- 272Lucian Trifina, Daniela G. Tarniceriu. Improved method for searching interleavers from a certain set using Garello's method with applications for the LTE standard
273 -- 282Shao-hui Wang, Zhijie Han, Sujuan Liu, Dan-wei Chen. Security analysis of two lightweight RFID authentication protocols
283 -- 294Géza Geleji, Harry G. Perros. Jitter analysis of an IPP tagged traffic stream in an {IPP, M}/M/1 queue
295 -- 308Sébastien Lalléchère, Pierre Bonnet, Françoise Paladian. Electrical stochastic modeling of cell for bio-electromagnetic compatibility applications
309 -- 320Nikola Zaric, Srdjan Stankovic, Zdravko Uskokovic. Hardware realization of the robust time-frequency distributions
321 -- 330Leïla Nasraoui, Leïla Najjar Atallah, Mohamed Siala. Performance evaluation of an efficient reduced-complexity time synchronization approach for OFDM systems
331 -- 343Ricardo Uribe Lobello, Florence Denis, Florent Dupont. Adaptive surface extraction from anisotropic volumetric data: contouring on generalized octrees

Volume 69, Issue 3-4

131 -- 133Abdelhamid Mellouk, Latifa Oukhellou, Lei Shu, Glenn Shafer. Belief functions and uncertainty management in networks and telecommunication
135 -- 145Mustapha Réda Senouci, Abdelhamid Mellouk, Mohamed Abdelkrim Senouci, Latifa Oukhellou. Belief functions in telecommunications and network technologies: an overview
147 -- 154Frédéric Launay, Patrick Coirault. A second-order Markov model to synchronize a quasi-chaotic sequence: application of synchronization and decoding problem with belief propagation
155 -- 169Hongtao Shi, Gang Liang, Hai Wang. A novel traffic identification approach based on multifractal analysis and combined neural network
171 -- 184Faouzi Sebbak, Farid Benhammadi, Abdelghani Chibani, Yacine Amirat, Aïcha Mokhtari. Dempster-Shafer theory-based human activity recognition in smart home environments
185 -- 199Mira Bou Farah, David Mercier, Eric Lefèvre, François Delmotte. A high-level application using belief functions for exchanging and managing uncertain events on the road in vehicular ad hoc networks
201 -- 207Ahmed Loutfi, Mohammed Elkoutbi, Jalel Ben-Othman, Abdellatif Kobbane. An energy aware algorithm for OLSR clustering
209 -- 217Nadeem Javaid, Ayesha Bibi, Akmal Javaid, Z. A. Khan, K. Latif, M. Ishfaq. Investigating quality routing link metrics in Wireless Multi-hop Networks
219 -- 228Mohammad Abdullah-Al-Wadud, Md. Abdul Hamid. A fault-tolerant structural health monitoring protocol using wireless sensor networks
229 -- 238Pierre-Jean Bouvet, Maryline Hélard. Optimal space-time coding under iterative processing
239 -- 250Sangki Ko, Kwangsue Chung. A handover-aware seamless video streaming scheme in heterogeneous wireless networks

Volume 69, Issue 11-12

569 -- 583Loic Dubois, William Puech, Jacques Blanc-Talon. Smart selective encryption of H.264/AVC videos using confidentiality metrics
585 -- 591Kyung-Ah Shim. On the security of verifiably encrypted signature schemes in a multi-user setting
593 -- 605Xiaobo Tan, Hang Zhang, Jian Hu. A hybrid architecture of cognitive decision engine based on particle swarm optimization algorithms and case database
607 -- 619O. Adetan, T. J. Afullo. Raindrop size distribution and rainfall attenuation modeling in equatorial and subtropical Africa: the critical diameters
621 -- 632Vidhyacharan Bhaskar, Barnali Dutta. Ergodic and outage capacity maximization of cognitive radio networks in cooperative relay environment using optimal power allocation
633 -- 640Jun-Jiat Tiang, Mohammad Tariqul Islam, Norbahiah Misran, Jit Singh Mandeep. Design of a dual-band microstrip antenna using particle swarm optimization with curve fitting
641 -- 655Ikhlas Selmi, Nel Samama. Indoor positioning with GPS and GLONASS-like signals use of new codes and a repealite-based infrastructure in a typical museum building

Volume 69, Issue 1-2

1 -- 2Maryline Laurent, Sara Foresti, Heng Xu. Privacy-aware electronic society
3 -- 19Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi, Djamal Benslimane. Privacy query rewriting algorithm instrumented by a privacy-aware access control model
21 -- 36Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran. PriMa: a comprehensive approach to privacy protection in social network sites
37 -- 45Joaquim Marques, Carlos Serrão. Improving user content privacy on social networks using rights management systems
47 -- 62Sophie Chabridon, Romain Laborde, Thierry Desprats, Arnaud Oglaza, Pierrick Marie, Samer Machara Marquez. A survey on addressing privacy together with quality of context for context management in the Internet of Things
63 -- 74Lukasz Olejnik, Claude Castelluccia, Artur Janc. On the uniqueness of Web browsing history patterns
75 -- 88Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly. Privacy concerns in assisted living technologies
89 -- 97Antoine Coutrot, Nathalie Guyader, Gelu Ionescu, Alice Caplier. Video viewing: do auditory salient events capture visual attention?
99 -- 110Fred Harris, Elettra Venosa, Xiaofei Chen, Chris Dick. An efficient channelizer tree for portable software defined radios
111 -- 121Tien Anh Le, Hang Nguyen. Human perception-based distributed architecture for scalable video conferencing services: theoretical models and performance
123 -- 129Vladimir Slavkovic, Aleksandar Neskovic, Natasa Neskovic. Microcell prediction model based on support vector machine algorithm