Directory
Publications
Seminars
Library
Login
Graduate School and Research Center In communication systems
EURECOM
Teaching
Research
Partners
Student Life
-
+
print
Home
›
Publications
All publications
2014 -
Confidence intervals for the shapley-shubik power index in Markovian games
2014 -
M2M traffic and models
2013 -
Multimedia metadata
2013 -
Dynamic resource allocation in heterogeneous networks
2013 -
Performance analysis of "on-the-spot" mobile data offloading
2013 -
CEDO: Content-centric dissemination algorithm for delay-tolerant networks
2013 -
Hypervisor memory forensics
2013 -
Crowd density map estimation based on feature tracks
2013 -
Privacy preserving similarity detection for data analysis
2013 -
Facial cosmetics database and impact analysis on automatic face recognition
2013 -
A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns
2013 -
STAC: Un outil pour vous aider à sécuriser vos applications
2013 -
A new multiclass SVM algorithm and its application to crowd density analysis using LBP features
2013 -
Reference monitors for security and interoperability in OAuth 2.0
2013 -
Gaussian half-duplex relay networks: Improved gap and a connection with the assignment problem
2013 -
Proxy mobile IPv6 for electric vehicle charging service: Use cases and analysis
2013 -
A team decisional beamforming approach for underlay cognitive radio networks
2013 -
A traffic light extension to cell transmission model for estimating urban traffic jam
2013 -
Efficient multicast content delivery over a distributed mobility management environment
2013 -
Elastic SIEM: elastic detector integrated with OSSIM
2013 -
Minimizing the effect of feedback delay in a multi-user system through adaptive feedback scheduling
2013 -
Physical layer design for next generation wireless communication
2013 -
Enhancing human detection using crowd density measures and an adaptive correction filter
2013 -
Traffic models for machine type communications
2013 -
Simple traffic modeling framework for MTC
2013 -
A new speaker verification spoofing countermeasure based on local binary patterns
2013 -
Using linguistic information to detect oerlapping seech
2013 -
Spoofing and countermeasures for automatic speaker verification
2013 -
NetDoFs of the MISO broadcast channel with delayed CSIT feedback for finite rate of innovation channel models
2013 -
Transport layer protocols and strategies for delay and disruption tolerant networks
2013 -
On the effectiveness of single and multiple base station sleep modes in cellular networks
2013 -
Secure alert tracking in supply chain
2013 -
Improving 802.11 fingerprinting of similar devices by cooperative fingerprinting
2013 -
Cooperative spectrum sensing and localization in cognitive radio systems using compressed sensing
2013 -
Modeling sleep mode gains in energy-aware networks
2013 -
Scalable data management systems: distribution, storage and processing of large amounts of data
2013 -
Distortion bounds and two-way protocols for one-shot transmission of correlated random variables
2013 -
Crowd density analysis using subspace learning on local binary pattern
2013 -
Tell me why? Ain't nothin' but a mistake ? Describing media item differences with media fragments uri and speech synthesis
2013 -
Improving video concept detection using uploader model
2013 -
Incentive mechanisms for internet congestion management: Fixed-budget rebate versus time-of-day pricing
2013 -
The role of phone numbers in understanding cyber-crime
2013 -
MISO broadcast channel with delayed and evolving CSIT
2013 -
Degrees of freedom of time-correlated broadcast channels with delayed CSIT: The MIMO case
2013 -
Distributed sensing and transmission of sporadic random samples
2013 -
On the degrees of freedom of the K-user time correlated broadcast channel with delayed CSIT
2013 -
Rate-reliability-complexity tradeoff for ML and lattice decoding of full-rate codes
2013 -
The capacity to within a constant gap of the Gaussian half-duplex relay channel
2013 -
The symmetric sum-capacity of the Gaussian Half-Duplex Causal Cognitive Interference Channel to within a constant gap
2013 -
On the fundamental feedback-vs-performance tradeoff over the MISO-BC with imperfect and delayed CSIT
2013 -
Searching segments of interest in single story web-videos
2013 -
Introducing motion information in dense feature classifiers
2013 -
Exploring intra-bow statistics for improving visual categorization
2013 -
Fusion methods for multimodal indexing of web data
2013 -
Contributions to spectrum sensing and cognitive radio systems
2013 -
Reflectance analysis based countermeasure technique to detect face mask attacks
2013 -
Crowd context-dependent privacy protection filters
2013 -
Survey, comparison and evaluation of cross platform mobile application development tools
2013 -
Bringing common criteria certification to web services
2013 -
Mobile cyber-physical systems for wireless vehicular communications: concepts, methodology and perspectives
2013 -
A simulator for data-intensive job scheduling
2013 -
Grab your favorite video fragment: Interact with a Kinect and discover enriched hypervideo
2013 -
To scan or not to scan: The effect of hannel heterogeneity on optimal scanning policies
2013 -
Shape and texture based countermeasure to protect face recognition systems against mask attacks
2013 -
Communications over the broadcast channel with limited and delayed feedback: Fundamental limits and novel encoders and decoders
2013 -
Acoustic echo cancellation for single-and dual-microphone devices: Application to mobile devices
2013 -
Leveraging from group classification for video concept detection
2013 -
MIMO BC with imperfect and delayed channel state information at the transmitter and receivers
2013 -
Rate loss analysis of transmitter cooperation with distributed CSIT
2013 -
Degrees of freedom of certain interference alignment schemes with distributed CSI
2013 -
On the performance of joint linear minimum mean squared error (LMMSE) filtering and parameter estimation
2013 -
Decontaminating pilots in massive MIMO systems
2013 -
Broadcasting user content over novel mobile networks
2013 -
A ray tracing algorithm using the discrete prolate spheroidal subspace
2013 -
The DoF of network MIMO with backhaul delays
2013 -
On the interference channel with causal cognition
2013 -
Gaussian half-duplex relay channels generalized degrees of freedom and constant gap result
2013 -
Who interrupted me? Analyzing the effect of PU activity on cognitive user performance
2013 -
QoE-aware traffic management for mobile video delivery
2013 -
Evaluation of jumboframes feasibility in LTE access networks
2013 -
Implementation and test of a DSRC prototype on OpenAirInterface SDR platform
2013 -
Toward the performance vs. feedback tradeoff for the two-user MISO broadcast channel
2013 -
Power monitor v2: Novel power saving Android application
2013 -
Analysis of pilot decontamination based on power control
2013 -
On the value of spectrum sharing among operators in multicell networks
2013 -
Degrees of freedom of downlink single - and multi-cell multi-user MIMO systems with location based CSIT
2013 -
Appropriate channel estimation for very large antenna arrays
2013 -
Optimal combining of instantaneous and statistical CSI in the SIMO interference channel
2013 -
Gaussian half-duplex relay networks: improved constant gap and connections with the assignment problem
2013 -
Energy efficiency and cloud radio network
2013 -
Novel methods for semantic and aesthetic multimedia retrieval
2013 -
Transport point à multipoints dans des réseaux sans fil multi-bandes
2013 -
Space time interference alignment scheme for the MIMO BC and IC with delayed CSIT and finite coherence time
2013 -
An architecture to aggregate heterogeneous and semantic sensed data
2013 -
On the vulnerability of face recognition systems to spoofing mask attacks
2013 -
Computer vision aided OFDM-based standards detection and classification technique for cognitive radio systems
2013 -
An experimental framework for the derivation of perceptually-optimal noise suppression functions
2013 -
Tracking and analyzing the 2013 Italian election
2013 -
Open-set semi-supervised audio-visual speaker recognition using co-training LDA and sparse representation classifiers
2013 -
SNARC - A semantic social news aggregator
2013 -
Voice activity detection based on a statistical semiparametric test
2013 -
Spoofing countermeasures to protect automatic speaker verification from voice conversion
2013 -
Inside the SCAM jungle: A closer look at 419 scam email operations
2013 -
Unsupervised TV program structuring
2013 -
Hybrid scheduling for event-driven simulation over heterogeneous computers
2013 -
A P2P based usage control enforcement scheme resilient to re-injection attacks
2013 -
Proxy mobile IPv6 for electric vehicle charging service: Use case and analysis
2013 -
MediaFinder: Collect, enrich and visualize media memes shared by the crowd
2013 -
Feedback and cooperation in interference-limited networks
2013 -
Multi-technology vehicular cooperative system based on software defined radio (SDR)
2013 -
Learning with the Web: Spotting named entities on the intersection of NERD and machine learning
2013 -
The role of web hosting providers in detecting compromised websites
2013 -
Enriching media fragments with named entities for video classification
2013 -
Live topic generation from event streams
2013 -
Dynamic rate allocation in Markovian quasi-static
2013 -
A machine-to-machine architecture to merge semantic sensor measurements
2013 -
The STAC (Security Toolbox: Attacks & Countermeasures) ontology
2013 -
Link abstraction for variable bandwidth with incremental redundancy HARQ in LTE
2013 -
Personalizing trending content in social media
2013 -
Energy-aware multiband communications in heterogeneous networks
2013 -
Signal classification in OFDM-based cognitive radio systems
2013 -
Practical size-based scheduling for MapReduce workloads
2013 -
Spoofing and countermeasures for speaker verification: a need for standard corpora, protocols and metrics
2013 -
On the gaussian interference channel with half-duplex causal cognition
2013 -
Parallel faceted browsing
2013 -
When publishing linked data requires more than just using a tool
2013 -
Countermeasure for the protection of face recognition systems against mask attacks
2013 -
Information diffusion in heterogeneous networks: The configuration model approach
2013 -
Semantic indexing and computational aesthetics: Interactions, bridges and boundaries doctoral symposium
2013 -
Heterogeneous features and model selection for event-based media classification
2013 -
WHERE2 Location aided communications
2013 -
Mimo broadcast and interference channels location based partial CSIT
2013 -
EventEnricher: a novel way to collect media illustrating events
2013 -
Direct modeling of image keypoints distribution through copula-based image signatures
2013 -
Troubleshooting slow webpage downloads
2013 -
Face recognition robust to occlusions
2013 -
Minimizing energy expenditure in smart devices
2013 -
Web performance analysis based on user experiences
2013 -
DistBack: A low-overhead distributed back-up architecture with Snapshot support
2013 -
Towards interoperable visualization applications over linked data
2013 -
Dynamic resource allocation for machine-type communications in LTE/LTE-A with contention-based access
2013 -
Packet aggregation for machine type communications in LTE with random access channel
2013 -
Towards practical channel reciprocity exploitation: Relative calibration in the presence of frequency offset
2013 -
Net degrees of freedom of recent schemes for the MISO BC with delayed CSIT and finite coherence time
2013 -
Impact of vehicular integration effects on the performance of DSRC communications
2013 -
Improving MU-MIMO performance in LTE-(Advanced) by efficiently exploiting feedback resources and through dynamic scheduling
2013 -
Performance optimization of multicast content delivery in a mobile environment based on PMIPv6
2013 -
DMM-based inter-domain mobility support for proxy mobile IPv6
2013 -
Design and implementation of spatial interweave LTE-TDD cognitive radio communication on an experimental platform
2013 -
Internet video delivery in youtube: From traffic measurements to quality of experience
2013 -
Precoding methods for the MISO broadcast channel with delayed CSIT
2013 -
Improving energy efficiency of femtocell network :LTE architecture with energy and congestion server (HeNB-ECS)
2013 -
Optimizing multicast content delivery over novel mobile networks
2013 -
Contributions to image processing for security applications
2013 -
Devices and wireless interface control in vehicular communications: an autonomous approach
2013 -
Blind pilot decontamination
2013 -
On the gaussian half-duplex relay channel
2013 -
Large scale system evaluations using PHY abstraction for LTE with OpenAirInterface
2013 -
Analysis and experimentation with a realistic traffic generation tool for emerging application scenarios
2013 -
Coordinator-master-worker model for efficient large scale network simulation
2013 -
Scalability demonstration of a large scale GPU-based
2013 -
ITETRIS: a modular simulation platform for the large scale evaluation of cooperative ITS applications
2013 -
The 2012 social event detection dataset
2013 -
Behind the scenes of online attacks: an analysis of exploitation behaviors on the web
2013 -
Trend makers and trend spotters in a mobile application
2013 -
Audio/visual recurrences and decision trees for unsupervised TV program structuring
2013 -
Spatial CSIT allocation policies for network MIMO channels
2013 -
The role of phone numbers in understanding cyber-crime
2013 -
SpamTracer: How stealthy are spammers?
2013 -
Information diffusion in heterogeneous networks: The configuration model approach
2013 -
HFSP: The Hadoop fair sojourn protocol
2013 -
Degrees-of-freedom region of the MISO broadcast channel with general mixed-CSIT
2013 -
Approximate sum-capacity of full-and half-duplex asymmetric interference channels with unilateral source cooperation
2013 -
Finite rate of innovation channel models and DoF of MIMO multiuser systems with delayed CSIT feedback
2013 -
Large scale system evaluations using PHY abstraction for LTE with OpenAirInterface
2013 -
Preface to the special issue on content-based multimedia indexing
2013 -
On the automatic online collection of training data for visual event modeling
2013 -
CSI sharing strategies for transmitter cooperation in wireless networks
2013 -
Distortion bounds and a protocol for one-shot transmission of correlated random variables on a non-coherent multiple-access channel
2013 -
A coordinated approach to channel estimation in large-scale multiple-antenna systems
2013 -
Investigating a junction-based multipath source routing algorithm for VANETs
2012 -
Advances in carrier aggregation and multi-user MIMO for LTE-advanced: Outcomes from SAMURAI project
2012 -
Characterization and management of popular content in KAD
2012 -
HiPoLDS: A hierarchical security policy language for distributed systems
2012 -
Control mechanisms for ITS cooperative safety applications
2012 -
HybridNN: An accurate and scalable network location service based on the inframetric model
2012 -
How to prevent AS hijacking attacks
2012 -
A game-theoretical approach for finding optimal strategies in an intruder classification game
2012 -
How much CSIT feedback is necessary for the multiuser MISO broadcast channels?
2012 -
Online non-negative convolutive pattern learning for speech signals
2012 -
Event-based social media data mining
2012 -
Accountability for cloud and other future internet services
2012 -
DISCLOSURE: Detecting botnet command and control servers through large-scale netflow analysis
2012 -
Analysis of the communication between colluding applications on modern smartphones
2012 -
Enabling trusted scheduling in embedded systems
2012 -
Towards network containment in malware analysis systems
2012 -
Low level crowd analysis using frame-wise normalized feature for people counting
2012 -
Secure HeNB network management based VPN IPSec
2012 -
On the impact of incentives in eMule, analysis and measurements of a popular file-sharing application
2012 -
Cooperative scheduling for coexisting body area networks
2012 -
Secure product tracking in supply chain
2012 -
Degrees of freedom in the MISO BC with delayed-CSIT and finite coherence time: Optimization of the number of users
2012 -
A general scalable and accurate decentralized level monitoring method for large-scale dynamic service provision in hybrid clouds
2012 -
Maximum entropy mixing time of circulant Markov processes
2012 -
HSPA radio access performance evaluation for online games and M2M applications traffic (TCP vs UDP)
2012 -
Methods for processing audio signals and circuit arrangements therefor
2012 -
Dice the TX power-improving awareness quality in VANETs by random transmit power selection
2012 -
Control of autonomous multimode terminals in heterogeneous and independent wireless environments
2012 -
EventMedia live: Exploring events connections in real-time to enhance content
2012 -
Real-time 3D face identification from a depth camera
2012 -
Creating enriched YouTube media fragments with NERD using timed-text
2012 -
Adding realtime coverage to the Google knowledge graph
2012 -
Comparing vocabularies for representing geographical features and their geometry
2012 -
PSP: Private and secure payment with RFID
2012 -
Optimizing vehicular communication resources: From vehicular connectivity to infrastructure deployment
2012 -
Security and privacy in automotive on-board networks
2012 -
Improving unreliable mobile GIS with swarm-based particle filters
2012 -
Computing the nash equilibria of intruder classification games
2012 -
An efficient LBP-based descriptor for facial depth images applied to gender recognition using RGB-D face data
2012 -
The DoF region of the multiple-antenna time correlated interference channel with delayed CSIT
2012 -
Interference alignment with incomplete CSIT sharing
2012 -
Visual analytics for BGP monitoring and prefix hijacking identification
2012 -
Dynamic power management for the iterative decoding of turbo codes
2012 -
Collection and analysis of multi-dimensional network data for opportunistic networking research
2012 -
Degrees of freedom of the network MIMO channel with distributed CSI
2012 -
Gathering training sample automatically for social event visual modeling
2012 -
EURECOM at TrecVid 2012: The light semantic indexing task
2012 -
Where is the interestingness? Retrieving appealing video scenes by learning Flickr-based graded judgments
2012 -
What fresh media are you looking for? Extracting media items from multiple social networks
2012 -
Hybrid CPU-GPU distributed framework for large scale mobile networks simulation
2012 -
Near optimal multicoloring for inter-cluster interference avoidance
2012 -
Flexible Front-End Processing for Software Defined Radio Applications using Application Specific Instruction-Set Processors
2012 -
Signal processing (mostly) for communications (mostly)
2012 -
Update delay: A new information-centric metric for a combined communication and application level reliability evaluation of CAM based Safety Applications
2012 -
Non-linear acoustic echo cancellation with loudspeaker modelling and pre-processing
2012 -
Enrichment of news show videos with multimodal semi-automatic analysis
2012 -
VisTracer: a visual analytics tool to investigate routing anomalies in traceroutes
2012 -
Markovian competitive and cooperative games with applications to communications
2012 -
Spammers operations: a multifaceted strategic analysis
2012 -
A demonstrator for parallel faceted browsing
2012 -
A combined spectrum sensing and terminals localization technique for cognitive radio networks
2012 -
Enhancing semantic features with compositional analysis for scene recognition
2012 -
Software defined radio architectures applied on car networks
2012 -
Social event detection at MediaEval 2012: Challenges, dataset and evaluation
2012 -
MediaEval 2012: Scrambling faces for flexible privacy preservation using image background self-similarities
2012 -
Multimedia content understanding: Bringing context to content
2012 -
Un modèle de trafic adapté à la volatilité de charge d'un service de vidéo à la demande: Identification, validation et application à la gestion dynamique de ressources
2012 -
Analysis of cognitive user performance under generic primary user activity
2012 -
Privacy risks in named data networking: what is the cost of performance?
2012 -
Can imperfect delayed CSIT be as useful as perfect delayed CSIT? DoF analysis and constructions for the BC
2012 -
How can we determine if a device is infected or not?
2012 -
Linked data methodologies for managing information about television content
2012 -
Inpainting of sparse occlusion in face recognition
2012 -
Probabilistic fusion of regional scores in 3D face recognition
2012 -
Design of wireless communication systems with imperfect channel state information
2012 -
Transmitter and receiver design for multi-antenna interfering systems
2012 -
The ambient adaptable living assistant is meeting its users
2012 -
Low complexity link abstraction for retransmission in LTE/LTE-advanced with IR-HARQ
2012 -
On the use of mutual information at bit level for accurate link abstraction in LTE with incremental redundancy H-ARQ
2012 -
Block based face recognition approach robust to nose alterations
2012 -
A requirements engineering driven approach to security architecture design for distributed embedded systems
2012 -
Enterprise networks: Modern techniques for analysis, measurement and performance improvement
2012 -
Implementation and validation of an IPv6 stack on ns-3 for iTETRIS
2012 -
Applying Common Criteria (CC) to Service Oriented Architectures (SOA)
2012 -
A compressive sampling approach for spectrum sensing and terminals localization in cognitive radio networks
2012 -
Subjective study of privacy filters in video surveillance
2012 -
Impact analysis of nose alterations on 2D and 3D face recognition
2012 -
Multiband TOA positioning technique using an UHF bandwidth availability model for cognitive radio
2012 -
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
2012 -
Automating privacy enforcement in cloud platforms
2012 -
Paying for piracy? An analysis of one-click hosters' controversial reward schemes
2012 -
Security and privacy in RFID systems
2012 -
Convolutive non-negative sparse coding and new features for speech overlap handling in speaker diarization
2012 -
Phone adaptive training for speaker diarization
2012 -
Spotting trends: The wisdom of the few
2012 -
Spoofing countermeasures for the protection of automatic speaker recognition systems against attacks with artificial signals
2012 -
IEEE 802.11p receiver design for software defined radio platforms
2012 -
Entropy based supervised merging for visual categorization
2012 -
Analyzing the impact of YouTube delivery policies on user experience
2012 -
Dual channel echo postfiltering for hands-free mobile terminals
2012 -
Blind audio source separation exploiting periodicity and spectral envelopes
2012 -
A measurement study of the Wuala on-line storage service
2012 -
Degrees of freedom of MISO broadcast channel with perfect delayed and imperfect current CSIT
2012 -
Parametric least squares estimation for nonlinear satellite channels
2012 -
Towards integrating quantize-map-forward relaying into LTE
2012 -
Biométrie faciale douce pour l'identification des individus
2012 -
The first workshop on pricing and incentives in networks (WPIN 2012)
2012 -
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols
2012 -
Sum rate maximization in the noisy MIMO interfering broadcast channel with partial CSIT via the expected weighted MSE
2012 -
Decontaminating pilots in cognitive massive MIMO networks
2012 -
Slow fading channel selection: A restless multi-armed bandit formulation
2012 -
Signal separation and classification algorithm for cognitive radio networks
2012 -
Software implementation of spatial interweave cognitive radio communication using OpenAirInterface platform
2012 -
MIMO interference alignment algorithms with hierarchical CSIT
2012 -
What can computer vision tell you about your weight?
2012 -
A new cross-domain approach to synchronized adaptive echo cancellation and echo postfiltering
2012 -
People counting system in crowded scenes based on feature regression
2012 -
Multi-view semi-supervised discriminant analysis: A new approach to audio-visual person recognition
2012 -
Speech overlap detection using convolutive non-negative sparse coding: New improvements and Insights
2012 -
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
2012 -
Cooperative communications with HARQ in a wireless mesh network based on 3GPP LTE
2012 -
User selection in the MIMO BC
2012 -
Adaptive transmission and multiple-access for sparse-traffic sources
2012 -
Low-latency transmission of low-rate analog sources
2012 -
LTE/LTE-A discontinuous reception modeling for machine type communications
2012 -
Dynamic rate allocation in Markovian quasi-static multiple access channels
2012 -
Towards assisted remediation of security vulnerabilities
2012 -
SCAMPI: Service platform for social aware mobile and pervasive computing
2012 -
Contention resolution and channel estimation in satellite random access channels
2012 -
Performance and complexity analysis of blind FIR channel identification algorithms based on deterministic maximum likelihood in SIMO systems
2012 -
Degrees of freedom in the MISO BC with delayed-CSIT and finite coherence time: a simple optimal scheme
2012 -
Research directions of departure in multi-antenna wireless communications
2012 -
OpenAirInterface traffic generator (OTG): A realistic traffic generation tool for emerging application scenarios
2012 -
Preprocessing for classification of sparse data : Application to trajectory recognition
2012 -
Application of wavelet based K-means algorithm in mammogram segmentation
2012 -
Transforming meteorological data into linked data
2012 -
Large-scale multimedia data collections
2012 -
Adapting contention-based forwarding to urban vehicular topologies for traffic safety applications
2012 -
On the two-user gaussian causal cognitive interference channel
2012 -
Enabling linked data publication with the Datalift platform
2012 -
Ghost is in the Air(Traffic)
2012 -
Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
2012 -
Delay analysis of epidemic schemes in sparse and dense heterogeneous contact environments
2012 -
Cooperative Markov decision processes: time consistency, greedy players satisfaction, and cooperation maintenance
2012 -
Preventing input validation vulnerabilities in web applications through automated type analysis
2012 -
A quantitative study of accuracy in system call-based malware detection
2012 -
PRISM - Privacy-Preserving Search in MapReduce
2012 -
Multi-channel operations at 5.9 GHz and ITS standardization activities at the ETSI
2012 -
Network tomography from an operator perspective
2012 -
Co-LDA: A semi-supervised approach to audio-visual person recognition
2012 -
Evaluation of visual privacy filters impact on video surveillance intelligibility
2012 -
Impact of online games and M2M applications traffic on performance of HSPA radio access networks
2012 -
SVC multicast video mobility support in MEDIEVAL project
2012 -
Soft biometrics for person recognition
2012 -
T-MATCH: Privacy-preserving item matching for storage-only RFID tags
2012 -
Large system analysis of linear precoding in correlated MISO broadcast channels under limited feedback
2012 -
Interference alignment for achieving both full DOF and full diversity in the broadcast channel with delayed CSIT
2012 -
On the degrees of freedom of time correlated MISO broadcast channel with delayed CSIT
2012 -
Feedback-aided complexity reductions in ML and Lattice decoding
2012 -
Fitting gaussian copulae for efficient visual codebooks generation
2012 -
An improved algorithm on viola-jones object detector
2012 -
Cunetsim: A GPU based simulation testbed for large scale mobile networks
2012 -
Analysis of the early flow discard (EFD) discipline in 802.11 wireless LANs
2012 -
Location-dependent information extraction for positioning
2012 -
PRICE: PRivacy preserving Incentives for Cooperation Enforcement
2012 -
An analysis of the information spreading delay in heterogeneous mobility DTNs
2012 -
Can mobility predictions be compatible with cooperative active safety for VANET?
2012 -
Robust data sharing with key-value stores
2012 -
Vers une meilleure interopérabilité des données géographiques françaises sur le Web de données
2012 -
PPS: Privacy-preserving statistics using RFID tags
2012 -
Enabling message security for RESTful services
2012 -
A practical introduction to geographical linked data : lift your data
2012 -
Direct posterior confidence for out-of-vocabulary spoken term detection
2012 -
HiPoLDS: A security policy language for distributed systems
2012 -
Large deviations estimates for the multiscale analysis of heart rate variability
2012 -
Forecasting DTN performance under heterogeneous mobility: The case of limited replication
2012 -
Interference management strategy for deploying energy efficient femtocells network
2012 -
Enhanced energy detector via algebraic approach for spectrum sensing in cognitive radio networks
2012 -
Android power management: Current and future trends
2012 -
Security and privacy for in-vehicle networks
2012 -
Sphere decoding complexity exponent for decoding full rate codes over the quasi-static MIMO channel
2012 -
Parametric least squares estimation for nonlinear satellite channels
2012 -
EventMedia: a LOD dataset of events illustrated with media
2012 -
On enhancing inter-user spatial separation for downlink multiuser MIMO systems
2012 -
CSI feedback allocation in multicell MIMO channels
2012 -
Quiver: a middleware for distributed gaming
2012 -
Exploring two spaces with one feature: Kernelized multidimensional modeling of visual alphabets
2012 -
Hybrid CPU-GPU distributed Framework for Large Scale Mobile Networks Simulation
2012 -
Aggregating social media for enhancing conference experiences
2012 -
Application distribution model and related security attacks in VANET
2012 -
Achieving a vanishing SNR gap to exact lattice decoding at a subexponential complexity
2012 -
From model-checking to automated testing of security protocols: Bridging the gap
2012 -
Cooperation based energy efficiency optimization using game theory framework for heterogeneous networks
2012 -
Confomaton: A conference enhancer with social media from the cloud
2012 -
RUBIX: a framework for improving data integration with linked data
2012 -
Social event discovery by topic inference
2012 -
Improving identification by pruning: a case study on face recognition and body soft biometric
2012 -
PostScript: danger ahead?!
2012 -
A comparison between one-way delays in operating HSPA and LTE networks
2012 -
Low complexity grouping for massive scheduling in 4G networks
2012 -
On discriminative properties of TPS warping parameters for 3D face recognition
2012 -
Classification of captured and recaptured images to detect photograph spoofing
2012 -
Robust foreground segmentation using improved Gaussian mixture model and optical flow
2012 -
Demographic classification: Do gender and ethnicity affect each other?
2012 -
Degrees of freedom region of the MISO broadcast channel with general mixed-CSIT
2012 -
Android stack integration in embedded systems
2012 -
Securing web applications by design
2012 -
A complete framework for spectrum sensing based on spectrum change points detection for wideband signals
2012 -
Contention based access for machine-type communications over LTE
2012 -
Location aided wireless communications
2012 -
New insights into hierarchical clustering and linguistic normalization for speaker diarization
2012 -
On the noisy MIMO interference channel with CSI through analog feedback
2012 -
Dynamic resource management in clouds: A probabilistic approach
2012 -
Effective and efficient security policy engines for automotive on-board networks
2012 -
NERD: A framework for unifying named entity recognition and disambiguation web extraction tools
2012 -
Anthropometry and soft biometrics for smart monitoring
2012 -
Further results on Bayesian and deterministic CRBs in the context of blind SIMO channel estimation
2012 -
Simulation of V2X applications with the iTETRIS system
2012 -
Dimension estimation based detector for multiple-antenna cognitive radio networks
2012 -
Physical-layer attacks on chirp-based ranging systems
2012 -
Adaptive modulation and coding with Hybrid-ARQ for latency-constrained networks
2012 -
CHECKER: On-site checking in RFID-based supply chains
2012 -
Topology management for mission critical networks: Applying supply and demand to manage public safety networks
2012 -
Enabling on-the-fly video shot detection on YouTube
2012 -
NERD meets NIF: Lifting NLP extraction results to the linked data cloud
2012 -
ANOSIP: Anonymizing the SIP Protocol
2012 -
Privacy preserving picture sharing : Enforcing usage control in distributed on-line social networks
2012 -
Security and privacy in online social networks
2012 -
Performance of preprocessing-aided relay-assisted uplink communication
2012 -
On greedy stream selection in MIMO BC
2012 -
Interference relay channel in 4G wireless networks
2012 -
Retrospective interference alignment for interference channels with delayed feedback
2012 -
Multi-user MIMO and carrier aggregation in 4G systems: the SAMURAI approach
2012 -
Link abstraction for multi-user MIMO in LTE using interference-aware receiver
2012 -
Sparse precoding in multicell MIMO systems
2012 -
A practical precoding scheme for multicell MIMO channels with partial user's data sharing
2012 -
3D face recognition: A robust multi-matcher approach to data degradations
2012 -
Moving face spoofing detection via 3D projective invariants
2012 -
On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
2012 -
A security analysis of amazon's elastic compute cloud service
2012 -
An empirical analysis of input validation mechanisms in web applications and languages
2012 -
Outage performance of double stratospheric platforms diversity systems
2012 -
Redundancy management for P2P backup
2012 -
Recent insights in the Bayesian and deterministic CRB for blind SIMO channel estimation
2012 -
Regional confidence score assessment for 3D face
2012 -
Speech overlap detection and attribution using convolutive non-negative sparse coding
2012 -
Dual amplifier and loudspeaker compensation using fast convergent and cascaded approaches to non-linear acoustic echo cancellation
2012 -
Diversity aspects of power delay profile based location fingerprinting
2012 -
Precoding on the broadcast MIMO channel with delayed CSIT : The finite SNR case
2012 -
Utilization of 3D data in face recognition
2012 -
Real time extraction of body soft biometric for telemedicine
2012 -
Cunetsim: A new simulation framework for large scale
2012 -
Mapping of IEEE 802.21 MIH primitives to EPS/LTE protocols
2012 -
Distributed troubleshooting of web sessions using clustering
2012 -
Detecting and profiling TCP connections experiencing abnormal performance
2012 -
Multi-Standard Processing using DAB and 802.11p on Software Defined Radio Platforms
2012 -
A survey on automated dynamic malware-analysis techniques and tools
2012 -
Complexity analysis for ML-based sphere decoder achieving a vanishing performance-gap to brute force ML decoding
2012 -
Degrees of freedom of time correlated MISO broadcast channel with delayed CSIT
2012 -
Peer-assisted Content Distribution on a Budget
2012 -
Automatic construction of multi-document multimedia summaries
2012 -
Dimension estimation-based spectrum sensing for cognitive radio
2012 -
Spatial interweave demo: Implementation in OpenAirInterface platform
2012 -
A longitudinal view of HTTP video streaming performance
2012 -
Rate-reliability-complexity limits in ML and lattice based decoding for MIMO, multiuser and cooperative communications
2012 -
Quorum systems: With applications to storage and consensus
2012 -
Combining training and quantized feedback in multiantenna reciprocal channels
2012 -
Insights into user behavior in dealing with internet attacks
2012 -
SMART: Secure and Minimal Architecture for (Establishing a Dynamic) Root of Trust
2012 -
On the noisy MIMO interference channel with analog feedback
2012 -
A comparative study of bottom-up and top-down approaches to speaker diarization
2012 -
Large families of asymptotically optimal two-dimensional optical orthogonal codes
2012 -
Game theory-based resource management strategy for cognitive radio networks
2012 -
Lattice reduction-aided minimum mean square error K-best detection for MIMO systems
2012 -
Bits and flops in non-ergodic MIMO: Can (a reasonable number of) flops provably offer ergodic-like behavior
2012 -
Fusion d'experts pour une biométrie faciale 3D robuste aux déformations
2012 -
OWL, un "chouette" langage pour représenter des ontologies
2012 -
Building the space scale or how to weigh a person with no gravity
2012 -
Spectrum sensing for cognitive radio exploiting spectrum discontinuities detection
2012 -
Traffic generation application for simulating online games and M2M applications via wireless networks
2012 -
Confidence intervals for Shapley value in Markovian dynamic games
2012 -
Cooperative Markov decision processes: Time consistency, greedy players satisfaction, and cooperation maintenance
2012 -
Efficient spatio-temporal edge descriptor
2012 -
On the relationship between QoS and QoE for web sessions
2012 -
Improving identification by pruning: a case study on face recognition and body soft biometric
2012 -
Video summarization based on balanced AV-MMR
2012 -
A multimedia retrieval framework based on automatic graded relevance judgments
2012 -
Primary outage-based resource allocation strategies
2012 -
Special section on security and social networking
2011 -
Optimized data sharing in multicell MIMO with finite backhaul capacity
2011 -
Message drop and scheduling in DTNs : theory and practice
2011 -
Multimedia, broadcasting, and eCulture
2011 -
Local key management in opportunistic networks
2011 -
Have things changed now? An empirical study on input validation vulnerabilities in web applications
2011 -
Automatic security analysis of SAML-based single sign-on protocols
2011 -
Methods for automated dataset interlinking
2011 -
An ontology-based evidential framework for video indexing using high-level multimodal fusion
2011 -
Interference suppression strategy for cell-edge users in the downlink
2011 -
A digital image forensics : A 2-step approach for identifying source and detecting forgeries
2011 -
Network-based botnet detection
2011 -
Automated measurements of novel internet threats
2011 -
Facial soft biometrics : Methods, applications, and solutions
2011 -
Online non-negative convolutive pattern learning for speech signals
2011 -
On the robustness of BitTorrent swarms to greedy peers
2011 -
Performance of distributed algorithms in DTNs : Towards an analytical framework for heterogeneous mobility
2011 -
Analysis of privacy in online social networks from the graph theory perspective
2011 -
Audio recurrence contribution to a video-based TV program structuring approach
2011 -
Interference alignment in partially connected interfering multiple-access and broadcast channels
2011 -
Mathematical modeling for network selection in heterogeneous wireless networks - A tutorial
2011 -
CHECKER: On-site checking in RFID-based supply chains
2011 -
Content Replication in Mobile Networks
2011 -
The landscape of multimedia ontologies in the last decade
2011 -
Research challenges towards the future internet
2011 -
3D face recognition: Where we are
2011 -
Static and dynamic video summaries
2011 -
Cap detection for moving people in entrance surveillance
2011 -
Marginal-based visual alphabets for local image descriptors aggregation
2011 -
Real time extraction of body soft biometric from 3D videos
2011 -
Prediction of dominant genes responsible for Lung adenocarcinoma using rough set theory
2011 -
Station management - Overview of other management functions
2011 -
Using social media to identify events
2011 -
The EVITA project : securing the networked vehicle
2011 -
Simulation vs. emulation for evaluating cooperative ITS applications for sustainable and safe mobility
2011 -
Dataset interlinking module
2011 -
EURECOM at TRECVID 2011: The light semantic indexing task
2011 -
VideoSense at TRECVID 2011 : Semantic indexing from light similarity functions-based domain adaptation with stacking
2011 -
IRIM at TRECVID 2011: Semantic indexing and instance search
2011 -
Interference management in femtocell networks with Hybrid-ARQ and interference cancellation
2011 -
Search pruning in video surveillance systems: Efficiency-reliability tradeoff
2011 -
Optimized data symbol allocation in multicell MIMO channels
2011 -
Comparison of various approaches for joint Wiener/Kalman filtering and parameter estimation with application to BASS
2011 -
The noisy MIMO interference channel with distributed CSI acquisition and filter computation
2011 -
Evolutionary discriminative confidence estimation for spoken term detection
2011 -
Measurement and evaluation of a real world deployment of a challenge-response spam filter
2011 -
mCoSS: a multi-constraints scheduling strategy for WiMAX networks
2011 -
OpenAirInterface large-scale wireless emulation platform and methodology
2011 -
Modeling and simulating ITS applications with iTETRIS
2011 -
Evaluating cooperative ITS applications for sustainable and safe mobility with iTETRIS
2011 -
TV program structuring techniques : A review
2011 -
TV content analysis: Techniques and applications
2011 -
Spectrum sensing for cognitive radio exploiting spectral masks
2011 -
Spatial interweave for a MIMO secondary interference channel with multiple primary users
2011 -
Reciprocity calibration techniques, implementation on the OpenAirInterface platform
2011 -
EventMedia : visualizing events and associated media
2011 -
Introduction to the DeRiVE 2011 Proceedings
2011 -
NERD: evaluating named entity recognition tools in the web of data
2011 -
NERD: A framework for evaluating named entity recognition tools in the Web of data
2011 -
EventMedia Live: reconciliating events descriptions in the web of data
2011 -
Distributed multi-level cooperative scheme for QoS support in public safety networks
2011 -
Multicast and virtual road side units for multi technology alert messages dissemination
2011 -
On the resilience of the dependability framework to the intrusion of new security threats
2011 -
Link abstraction for multi-user MIMO in LTE using interference-aware receiver
2011 -
Demo: The Ff hardware prototype for privacy-preserving authentication
2011 -
EphPub: Toward robust ephemeral publishing
2011 -
Non-linear acoustic echo cancellation using online loudspeaker linearization
2011 -
CoDE : An application-layer framework for confidentiality in distributed environments
2011 -
MU-MIMO transmission and reception techniques for the next generation of cellular wireless standards (LTE-A)
2011 -
Securing car2X applications with effective hardware-software co-design for vehicular on-board networks
2011 -
Average minimum transmit power to achieve SINR targets: performance comparison of various user selection algorithms
2011 -
Algorithms for uniform optimal strategies in two-player zero-sum stochastic games with perfect information
2011 -
Deterministic and Bayesian blind and semi-blind channel identification for wireless communications
2011 -
On the rate gap between multi- and single-cell processing under opportunistic scheduling
2011 -
Combined compressive sampling and distribution discontinuities detection approach to wideband spectrum sensing for cognitive radios
2011 -
A performance study of Kullback-Leibler distance-based spectrum sensing algorithm
2011 -
Application-specific instruction-set processor for digital front-end processing in wireless communications
2011 -
On the performance of calibration techniques for cognitive radio systems
2011 -
Reducing repair traffic in P2P backup systems: Exact regenerating codes on hierarchical codes
2011 -
Application level performance in wired and wireless environments
2011 -
Vanishing the gap to exact lattice search at a subexponential complexity: LR-aided regularized decoding
2011 -
MEDIEVAL : Multimedia transport for mobile video appLications
2011 -
Security vulnerabilities detection and protection using eclipse
2011 -
Challenges in intelligent transportation systems
2011 -
Key function interfacing for the MEDIEVAL project video-enhancing architecture
2011 -
PRICE: PRivacy preserving Incentives for Cooperation Enforcement
2011 -
MobiTrade : Trading content in disruption tolerant networks
2011 -
CrowdLoc : Wireless jammer localization with crowdsourcing measurements
2011 -
Evolving security requirements in multi-layered Service-Oriented-Architectures
2011 -
Semi-supervised face recognition with LDA self-training
2011 -
On the performance of dimension estimation-based spectrum sensing for cognitive radio
2011 -
Multiband time-of-arrival positioning technique for cognitive radio systems
2011 -
Catch the jammer in wireless sensor network
2011 -
Weighted sum rate maximization in the underlay cognitive MISO interference channel
2011 -
On optimum end-to-end distortion in delay-constrained wideband MIMO systems
2011 -
Bayesian and deterministic CRBs for semi-blind channel estimation in SIMO single carrier cyclic prefix systems
2011 -
Performance of LTE in rural areas - Benefits of opportunistic multi-user MIMO
2011 -
SINR balancing and beamforming for the MISO interference channel
2011 -
Pytomo : A tool for analyzing playback quality of YouTube videos
2011 -
On the feasibility of data exfiltration with storage-device backdoors
2011 -
A formal methodology applied to secure over-the-air automotive applications
2011 -
User/operator utility-based infrastructure deployment strategies for vehicular networks
2011 -
Car2X communication : securing the last meter - A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography
2011 -
Vehicular wireless networks: What should the future hold?
2011 -
On collaborative filtering techniques for Live TV and radio discovery and recommendation
2011 -
Two parallel approaches to network data analysis
2011 -
Robust speech recognition in multi-source noise environments using convolutive non-negative matrix factorization
2011 -
Social event detection at MediaEval 2011: Challenges, dataset and evaluation
2011 -
EURECOM @ MediaEval 2011 social event detection task
2011 -
Data transfer scheduling for P2P storage
2011 -
High throughput and low power enhancements for LDPC decoders
2011 -
Adaptive load balancing in KAD
2011 -
An empirical study of availability in friend-to-friend storage systems
2011 -
On the use of dynamic features in face biometrics: recent advances and challenges
2011 -
Semantic multimedia
2011 -
Plug2Cloud: an energy-efficient datacenter
2011 -
Frontal-to-side face re-identification based on hair, skin and clothes patches
2011 -
A co-training approach to automatic face recognition
2011 -
Interference alignment in the partially connected K-user MIMO interference channel
2011 -
Unbiased maximum SINR prefiltering for reduced-state equalization
2011 -
A performance of bayesian semi-blind FIR channel estimation algorithms in SIMO systems
2011 -
Parallel and hierarchical decision making for sparse coding in speech recognition
2011 -
Online pattern learning for non-negative convolutive sparse coding accepted for publication
2011 -
User scheduling for heterogeneous multiuser MIMO systems : A subspace viewpoint
2011 -
Synthetic and privacy-preserving visualization of video sensor network outputs
2011 -
A cascaded non-linear acoustic echo canceller combining power filtering and clipping compensation
2011 -
Privacy preserving products tracking in clustered supply chain
2011 -
Adaptive security on service-based SCM control system
2011 -
Trouble shooting interactive web sessions in a home environment
2011 -
Multimedia annotation tools
2011 -
The core ontology for multimedia
2011 -
Multimedia metadata standards
2011 -
Machine learning techniques for multimedia analysis
2011 -
Multimedia semantics: metadata, analysis and interaction
2011 -
Feature extraction for multimedia analysis
2011 -
The complexity of sphere decoding perfect codes under a vanishing gap to ML performance
2011 -
Vehicular delay tolerant networks
2011 -
Recursive stream selection for CF MU-MIMO BC precoders design
2011 -
Hash-and-forward relaying for two-way relay channel
2011 -
Interference mitigation in femto-macro coexistence with two-way relay channel
2011 -
Relay-aided interference neutralization for the multiuser uplink-downlink asymmetric setting
2011 -
The multiplexing gain of a two-cell MIMO channel with unequal CSI
2011 -
Public safety networks
2011 -
Broker-based private matching
2011 -
Improved combination of LBP and sparse representation based classification (SRC) for face recognition
2011 -
Female facial aesthetics based on soft biometrics and photo-quality
2011 -
Reverse social engineering attacks in online social networks
2011 -
Operating system interface obfuscation and the revealing of hidden operations
2011 -
A scalable frequency domain-based linear convolution architecture for speech enhancement
2011 -
Toward systematic methods comparison in traffic classification
2011 -
An unsupervised approach for recurrent tv program structuring
2011 -
Wireless access mechanisms and architecture definition in the MEDIEVAL project
2011 -
Bayesian blind FIR channel estimation algorithms in SIMO systems
2011 -
Linear precoding for capacity maximization in MU-MIMO BC channels
2011 -
Performance bounds and identifiability conditions for location estimation in NLOS dynamic environments
2011 -
Schutz von lieferketten mit RFID-tags
2011 -
Fingerprinting based localization of mobile terminals
2011 -
Sensor network aided agile spectrum access through low-latency multi-band communications
2011 -
ROTIV : RFID ownership transfer with issuer verification
2011 -
Bayesian semi-blind FIR channel estimation algorithms in SIMO systems
2011 -
Smart hybrid-ARQ (SHARQ) for cooperative communication via distributed relays in LTE-advanced
2011 -
Diversity-multiplexing tradeoff for the non-separated two-way relay DF channel
2011 -
Interference sensitivity for multi-user MIMO in LTE
2011 -
Near capacity linear closed form precoder design with recursive stream selection for MU-MIMO broadcast channels
2011 -
Weighted sum rate maximization of correlated MISO broadcast channels under linear precoding : A large system analysis
2011 -
The asymptotic limits of interference in multicell networks with channel aware scheduling
2011 -
Stumbl : using facebook to collect rich datasets for opportunistic networking research
2011 -
On the impact of seed scheduling in peer-to-peer networks
2011 -
Safebook : A distributed privacy preserving online social network
2011 -
Speech overlap detection using convolutive non-negative sparse coding
2011 -
Multimedia indexing
2011 -
Transmit beamforming for inter-operator spectrum sharing
2011 -
Adaptive Downlink Power Control for HSDPA Femtocells
2011 -
Spectrum aggregation : Initial outcomes from SAMURAI project
2011 -
IEEE 802.21 and proxy mobile IPv6 : a network controlled mobility solution
2011 -
An evolutionary confidence measurement for spoken term detection
2011 -
Saliency-aware color moments features for image categorization and retrieval
2011 -
Multi-video summarization based on OB-MMR
2011 -
Robust data sharing with key-value stores
2011 -
The complexity of robust atomic storage
2011 -
Cooperative space-time coded OFDM with timing errors and carrier frequency offsets
2011 -
Self-prioritization of audio and video traffic
2011 -
Maximum SINR prefiltering for reduced-state trellis-based equalization
2011 -
Stochastic games for cooperative network routing and epidemic spread
2011 -
Error exponents for multi-source multi-relay parallel relay networks with limited backhaul capacity
2011 -
Deterministic equivalent for the SINR of regularized zero-forcing precoding in correlated MISO broadcast channels with imperfect CSIT'
2011 -
Search pruning with soft biometric systems : efficiency-reliability tradeoff
2011 -
Honeypot trace forensics : The observation viewpoint matters
2011 -
Speaker diarization : A review of recent research
2011 -
Interference cancellation in HSDPA terminals
2011 -
Receiver designs and multi-user extensions
2011 -
Access and personnalisation of multimedia content in a vehicle
2011 -
Zenaminer : driving the SCORM standard towards the Web of data
2011 -
A tweet consumers' look at Twitter trends
2011 -
Cramer-Rao bounds for power delay profile fingerprinting based positioning
2011 -
Robust and low-cost cascaded non-linear acoustic echo cancellation
2011 -
Handling overlaps in spoken term detection
2011 -
Linguistic influences on bottom-up and top-down clustering for speaker diarization
2011 -
Future architectures for public warning systems
2011 -
Introduction to the special issue on "Multimedia Data Semantics"
2011 -
PRISM -- Privacy-Preserving Searches in MapReduce
2011 -
Réconcilier les événements dans le web de données
2011 -
Putting contacts into context : Mobility modeling beyond inter-contact times
2011 -
Pairwise error probability analysis for power delay profile fingerprinting based localization
2011 -
A close to capacity double iterative based precoder design for MU-MIMO broadcast channel with multi-streams support
2011 -
EFD: An efficient low-overhead scheduler
2011 -
Blind sensing techniques based on Kullback-Leibler distance for cognitive radio systems
2011 -
OpenAirInterface.org and Agile Spectrum Access
2011 -
Interference-aware receiver structure for Multi-User MIMO and LTE
2011 -
Intrusion-tolerant replication
2011 -
Mixed CSIT DL channel : gains with interference aware receivers
2011 -
Understanding the impact of the access technology: the case of Web search services
2011 -
Latency for real-time machine-to-machine communication in LTE-based system architecture
2011 -
On profiling residential customers
2011 -
Classification of facial expressions by sparse coding
2011 -
Saliency moments for image categorization
2011 -
Finding media illustrating events
2011 -
A complex network analysis of human mobility
2011 -
Equilibriums in slow fading interfering channels with partial knowledge of the channels
2011 -
Thwarting real-time dynamic unpacking
2011 -
The Ff-family of protocols for RFID-privacy and authentication
2011 -
Facial feature extraction using a 4D stereo camera system
2011 -
Utility/pricing-based resource allocation strategy for cognitive radio systems
2011 -
Methods and algorithms for network traffic classification
2011 -
Minimizing retrieval latency for content cloud
2011 -
Asymptotic capacity and optimal precoding in MIMO multi-hop relay networks
2011 -
Vehicular mobility simulation with VanetMobiSim
2011 -
Aspects of energy efficient LDPC decoders
2011 -
Exposing the lack of privacy in file hosting services
2011 -
Prophiler: a fast filter for the large-scale detection of malicious web pages
2011 -
Secure automotive on-board protocols : A case of over-the-air firmware updates
2011 -
Improving the recognition of faces occluded by facial accessories
2011 -
IP mobile multicast : problems and solutions
2011 -
MU-MIMO in LTE systems
2011 -
Time-dependent priority disciplines : A heavy traffic analysis
2011 -
Quo vadis? A study of the evolution of input validation vulnerabilities in Web applications
2011 -
Downlink decentralized multi-cell transmission
2011 -
Security by virtualization : A novel antivirus for personal computers
2011 -
MobiTrade: Trading content in disruption tolerant networks
2011 -
Exploring Second Life
2011 -
Content replication and placement in mobile networks
2011 -
Tracker : security and privacy for RFID-based supply chains
2011 -
Interference neutralization for separated multiuser uplink-downlink with distributed relays
2011 -
PiOS : Detecting privacy leaks in iOS applications
2011 -
EXPOSURE : Finding malicious domains using passive DNS analysis
2011 -
Automated discovery of parameter pollution vulnerabilities in web applications
2011 -
Deterministic annealing design and analysis of the noisy MIMO interference channel
2011 -
A URI-based approach for addressing fragments of media resources on the Web
2011 -
Introduction to biometry
2011 -
Efficient selective feedback design for multicell cooperative networks
2011 -
Large-scale multimedia retrieval and mining
2011 -
Cooperative Markov decision processes : Time consistency, greedy players satisfaction, and cooperation maintenance
2011 -
Improved depth map estimation in Stereo Vision
2011 -
People re-identification in camera networks based on probabilistic color histograms
2011 -
Automatic extraction of facial interest points based on 2D and 3D data
2011 -
Game theoretic analysis of distributed systems : design and incentives
2011 -
Publier des données liées sur le web
2011 -
Rate scaling laws in multicell networks under distributed power control and user scheduling
2011 -
On the reliability of eye color as a soft biometric trait
2011 -
Blind audio source separation using Short+Long Term AR source models and spectrum matching
2011 -
Ad hoc network connection continuity for security applications report
2010 -
Balancing egoism and altruism on the single beam MIMO interference channel
2010 -
Multiple antenna techniques in LTE and LTE advanced
2010 -
Fast access to distributed atomic memory
2010 -
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
2010 -
Multi-cell MIMO cooperative networks : A new look at interference
2010 -
Hardware optimized sample rate conversion for software defined radio
2010 -
A scalable interest-oriented peer-to-peer Pub/Sub network
2010 -
Performance analysis of IEEE 802.11p control channel
2010 -
Distributed transceiver design for the multi-antenna interference channel
2010 -
How Google is using linked data today and vision for tomorrow
2010 -
Federated secret handshakes with support for revocation
2010 -
Modeling and enhancement of wireless access and mesh infrastructure vehicular networks
2010 -
ROTIV: RFID ownership transfer with issuer verification
2010 -
Determination of genetic network from micro-array data using neural network approach
2010 -
Letter-to-sound pronunciation prediction using conditional random fields
2010 -
Safebook : privacy preserving online social network
2010 -
G-Free : defeating return-oriented programming through gadget-less binaries
2010 -
Optimal Training in large TDD multi-user downlink systems under zero-forcing and regularized zero-forcing precoding
2010 -
VAMPIRE : Future internet vulnerability assessment, monitoring and prevention
2010 -
Diversity analysis of equal gain transmission for singleuser and multiuser MIMO
2010 -
Some contributions to music signal processing and to mono-microphone blind audio source separation
2010 -
Dependable filtering : Philosophy and realizations
2010 -
Advanced reception techniques for 3GPP LTE wireless cellular telecommunications systems
2010 -
Interference mitigation in multi-antenna systems
2010 -
Bimodal emotion recognition
2010 -
Spectrum sensing and resource allocation strategies for cognitive radio
2010 -
Safebook : a decentralized on-line social network leveraging on real life trust
2010 -
EURECOM and ECNU at TrecVid 2010 : The semantic indexing task
2010 -
Cross-layer identities management in ITS stations
2010 -
Experiencing events through user-generated media
2010 -
Bargaining and beamforming in interference channels
2010 -
Beamforming on the interference MISO interference channel with multi-user decoding capability
2010 -
Low-complexity multiple-relay strategies for improving uplink coverage in 4G wireless networks
2010 -
Joint time-frequency spectrum sensing for cognitive radio
2010 -
On duality in the MISO interference channel
2010 -
Metadata aggregation for personalized music playlists
2010 -
A study of email usage and performance over cellular technology
2010 -
Performance of closed form and iterative MU-MIMO precoders for different broadcast channel configurations
2010 -
Browsing online music catalogs in a vehicle: connecting automotive user interfaces with the world wide web
2010 -
Weighting informativeness of bag-of-visual-words by Kernel optimization for video concept detection
2010 -
Security and Privacy in Online Social Networks
2010 -
Concept detector refinement using social videos
2010 -
Latency requirements in M2M application scenarios
2010 -
Spatial dynamics of indoor radio wideband channels
2010 -
Bag of soft biometrics for person identification : New trends and challenges
2010 -
VERT : automatic evaluation of video summaries
2010 -
BIOFACE, a biometric face demonstrator
2010 -
ACM international workshop on very-large-scale multimedia corpus, mining and retrieval
2010 -
Digital image forensics : a booklet for beginners
2010 -
A comparative assessment of noise and non-linear echo effects in acoustic echo cancellation
2010 -
Incentivizing the global wireless village
2010 -
Supply and demand, a dynamic topology control method for mesh networks
2010 -
Centralized collaborative compressed sensing of wideband spectrum for cognitive radios
2010 -
TrafRoute : a different approach to routing in vehicular networks
2010 -
Content replication in mobile wireless networks
2010 -
Flexible baseband architecture design & implementation for wireless communication systems
2010 -
QoS management and performance analysis of WiMAX networks in fixed and highly mobile environments
2010 -
AccessMiner: using system-centric models for malware protection
2010 -
Person recognition using a bag of facial soft biometrics (BoFSB)
2010 -
Back to the future : On predicting user uptime
2010 -
Cooperative diversity using per-user power control in the MAC channel
2010 -
Optimizing the noisy MIMO interference channel at high SNR
2010 -
Weight estimation from visual body appearance
2010 -
Soft biometrics systems : Reliability and asymptotic bounds
2010 -
Single Microphone Blind Audio Source Separation Using EM-Kalman Filter and Short+Long Term AR Modeling
2010 -
Network coded multi-way relaying with iterative decoding
2010 -
CRF-based stochastic pronunciation modeling for out-of-vocabulary spoken term detection
2010 -
Topology management for group oriented networks
2010 -
ETSI RRS - The standardization path to next generation cognitive radio systems
2010 -
System output combination for improved speaker diarization
2010 -
An integrated top-down/bottom-up approach to speaker diarization
2010 -
Maximum weighted sum rate multi-user MIMO amplify-and-forward for two-phase two-way relaying
2010 -
Weighted sum rate maximization in the MIMO interference channel
2010 -
Double iterative precoder & receiver design for MU-MIMO broadcast channel
2010 -
Power delay doppler profile fingerprinting for mobile localization in NLOS
2010 -
Making multiuser MIMO work for LTE
2010 -
Error exponents for backhaul-constrained parallel relay networks
2010 -
Securing P2P storage with a self-organizing payment scheme
2010 -
Searchable encryption for outsourced data analytics
2010 -
Video-enhancing functional architecture for the MEDIEVAL project
2010 -
Automatic concept detector refinement for large-scale video semantic annotation
2010 -
Characterization of frequency dependent behavior of wideband systems interference
2010 -
Hybrid iteration control on LDPC decoders
2010 -
On-the-fly syndrome check for LDPC decoders
2010 -
Direct posterior confidence for out-of-vocabulary spoken term detection
2010 -
Distributed resource allocation in wireless networks
2010 -
Performance analysis of low complexity soft detection for BICM MIMO system
2010 -
Cramer-Rao bounds for hybrid localization methods in LoS and NLoS environments
2010 -
Multi fault laser attacks on protected CRT-RSA
2010 -
Abusing social networks for automated user profiling
2010 -
Wireless public safety networks techniques and challenges
2010 -
Face recognition with DAISY descriptors
2010 -
On scheduling and redundancy for P2P backup
2010 -
Application-based feature selection for internet traffic classification
2010 -
A summary of two practical attacks against social networks
2010 -
Trends behind non-uniform patterns in vehicular networks
2010 -
ETSI reconfigurable radio systems : Status and future directions on software defined radio and cognitive radio standards
2010 -
Linking events with media
2010 -
A comparative study of bottom-up and top-down approaches to speaker diarization
2010 -
On the Security and Feasibility of Safebook : a Distributed privacy-preserving online social network
2010 -
A publish/subscribe model for secure content driven XML dissemination
2010 -
Distributed multicell-MISO precoding using the layered virtual SINR framework
2010 -
New models for characterizing mobile terminal loudspeaker distortions
2010 -
Single microphone blind audio source separation using short+long term AR modeling
2010 -
Low delay filtering for joint noise reduction and residual echo suppression
2010 -
Blind audio source separation using short+long term AR source models and iterative itakura-saito distance minimization
2010 -
Online data backup : a peer-assisted approach
2010 -
Acoustic echo cancellation in non-linear and noisy environment
2010 -
A Multimodal approach to initialisation for top-down speaker diarization of television shows
2010 -
Efficient scarf detection prior to face recognition
2010 -
Efficient low delay filtering for residual echo suppression
2010 -
Temporally consistent key frame selection from video for face recognition
2010 -
An experience in testing the security of real-world electronic voting systems
2010 -
Peer-to-peer storage : security and protocols
2010 -
An efficient iris and eye corners extraction method
2010 -
Static analysis for detecting taint-style vulnerabilities in web applications
2010 -
Privacy and confidentiality in context-based and epidemic forwarding
2010 -
Cloud-based content distribution on a budget
2010 -
Cooperative multicell precoding: Rate region characterization and distributed strategies with instantaneous and statistical CSI
2010 -
DMT optimality of LR-aided linear decoders for a general class of channels, lattice designs, and system models
2010 -
Cross-layer based analysis of multi-hop wireless networks
2010 -
Parallel bulk Insertion for large-scale analytics applications
2010 -
Algorithms for uniform optimal strategies in two-player zero-sum stochastic games with perfect information
2010 -
A Comparative Study between 802.11p and Mobile WiMAX-based V2I Communication Networks
2010 -
Stochastic pronunciation modeling for out-of-vocabulary spoken term detection
2010 -
Architecture and mechanisms to support mobility in the future internet
2010 -
Take a deep breath : a stealthy, resilient and cost-effective botnet using Skype
2010 -
Applications of statistical signal processing in mobile terminal localization
2010 -
Combining edge detection and region segmentation for lip contour extraction
2010 -
A Markov random field description of fuzzy color segmentation
2010 -
Towards multimodal emotion recognition : A new approach
2010 -
Dynamic power management on LDPC decoders
2010 -
Coding strategies for relay based networks
2010 -
Secure on-board protocols
2010 -
Document-based agile workflows : Models, interoperability and security
2010 -
Secret handshake protocols
2010 -
SimITS : An integrated and realistic simulation platform for vehicular networks
2010 -
A first look at traffic classification in enterprise networks
2010 -
Distributed power control for cooperative diversity in the MAC channel
2010 -
Security in opportunistic communications
2010 -
Exploiting diverse observation perspectives to get insights on the malware landscape
2010 -
Features for multimodal emotion recognition : An extensive study
2010 -
Wideband cognitive radio systems and techniques
2010 -
Efficient communication over wireless channels : New results in equalization, diversity and interference alignment
2010 -
Evaluation of video summaries
2010 -
Multi-Video summarization based on AV-MMR
2010 -
Automatic construction of multimedia summaries
2010 -
Wireless access architectures for video applications: the approach proposed in the MEDIEVAL project
2010 -
On the usage of antennas in MIMO and MISO interference channels
2010 -
Large system analysis of zero-forcing precoding in MISO broadcast channels with limited feedback
2010 -
Interference alignment feasibility in constant coefficients MIMO interference channels
2010 -
Optimal MU-MIMO precoder with MISO decomposition approach
2010 -
Bayesian equilibria in slow fading OFDM systems with partial channel state information
2010 -
Relative channel reciprocity calibration in MIMO/TDD systems
2010 -
Resource sharing in wireless networks: The SAPHYRE approach
2010 -
Implementation and performance of an opportunistic cognitive radio system
2010 -
Least attained recent service for packet scheduling over wireless LANs
2010 -
Performance comparison for low complexity blind sensing techniques in cognitive radio systems
2010 -
Fundamental rate-reliability-complexity limits in outage limited MIMO communications
2010 -
Effect of temporal correlation in the presence of spatial correlation on interference suppression
2010 -
Rate-of-decay of probability of isolation in dense sensor networks with bounding constraints
2010 -
Distribution discontinuities detection using algebraic technique for spectrum sensing in cognitive radio networks
2010 -
A Local Cognitive Pilot Channel (LCPC) for neighbourhood discovery, relaying and cluster based local cognitive information management
2010 -
Architectures for cognitive radio testbeds and demonstrators - An overview
2010 -
Beamforming for the underlay cognitive MISO interference channel via UL-DL duality
2010 -
LODE : une ontologie pour représenter des événements dans le web de données
2010 -
Is the internet for porn? An insight into the online adult industry
2010 -
Evaluating and improving the content access in KAD
2010 -
Second Life : a social network of humans and bots
2010 -
Competitive unlicensed spectrum sharing with partial information on slow fading channels
2010 -
Fractional frequency reuse and interference suppression for OFDMA networks
2010 -
Mobility management in WiMAX networks
2010 -
Experimental characterization and modeling of outdoor-to-indoor and indoor-to-indoor distributed channels
2010 -
Design and implementation of a single-frequency mesh network using OpenAirInterface
2010 -
Performance footprints of heavy-users in 3G networks via empirical measurement
2010 -
Secure automotive on-board electronics network architecture
2010 -
Color based soft biometry for hooligans detection
2010 -
On unitary beamforming for MIMO broadcast channels
2010 -
Performance analysis of preconditioned iterative inter-carrier interference cancellation for OFDM
2010 -
Multi-pair two-way relay channel with multiple antenna relay station
2010 -
Balancing egoism and altruism on interference channel : The MIMO case
2010 -
Near optimal linear precoder for multiuser MIMO for discrete alphabets
2010 -
Security issues in vehicular systems : threats, emerging solutions and standards
2010 -
A framework towards the efficient identification and modeling of security requirements
2010 -
A cooperative infrastructure discovery protocol for vehicle to internet opportunistic communications
2010 -
iTETRIS : adaptation of ITS technologies for large scale integrated simulation
2010 -
Identifying dormant functionality in malware programs
2010 -
Inspector Gadget : automated extraction of proprietary gadgets from malware binaries
2010 -
A practical attack to de-anonymize social network users
2010 -
Low complexity metrics for BICM SISO and MIMO systems
2010 -
Adaptive receiver structures for fiber communication systems employing polarization division multiplexing : High symbol rate case
2010 -
A taxonomy of IEEE 802.11 wireless parameters and open source measurement tools
2010 -
Roll-steering for improving SAOCOM-SAR performances
2010 -
iTETRIS- A system for the evaluation of cooperative traffic management solutions
2010 -
Resource allocation for multiuser uplink systems
2010 -
A multimodal approach to initialisation for top-down speaker diarization of television shows
2010 -
How much feedback is required for TDD multi-antenna broadcast channels with user selection ?
2010 -
Analysis of user-driven peer selection in peer-to-peer backup and storage systems
2010 -
What's on this evening ? Designing user support for event-based annotation and exploration of media
2010 -
Rushes video summarization and evaluation
2010 -
Honeybot, your man in the middle for automated social engineering
2010 -
Extending Mondrian memory protection
2010 -
Implementing the media fragments URI specification
2010 -
The insecurity of sharing MY Life on the Web : The butterfly effect of images and videos in social networks
2010 -
Towards collaborative annotation for video accessibility
2010 -
Obtaining MPEG-4 compliant animatable 3D face models by using TPS method
2010 -
Aspects of limited feedback, cooperation and coordination in multi-antenna cellular systems
2010 -
Experimental evaluation of proxy mobile IPv6 : an implementation perspective
2010 -
Tracker : security and privacy for RFID-based supply chains
2010 -
Propagation of public safety warning messages : a delay tolerant network approach
2010 -
A lightweight distributed solution to content replication in mobile networks
2010 -
Impact of imperfections on detectors for interference suppression
2010 -
A solution for the automated detection of clickjacking attacks
2010 -
Hybrid traffic identification
2010 -
Distributed power control and beamforming on MIMO interference channels
2010 -
Multi-link level simulation model of indoor peer-to-peer radio channels
2010 -
Low-complexity geometry-based modeling of diffuse scattering
2010 -
Performance of transmission-time optimized relaying schemes in real-world channels
2010 -
Multi-video summarization based on video-MMR
2010 -
VERT : a method for automatic evaluation of video summaries
2010 -
Traffic monitoring and analysis
2010 -
Low dimensional mimo systems with finite sized constellation inputs
2010 -
Video object tracking for interactive mobile television
2010 -
A multicriteria clustering approach to support attack attribution in cyberspace
2010 -
Bootstrapping security associations in opportunistic networks
2010 -
Secret interest groups (SIGs) in social networks with an implementation on Facebook
2010 -
CAPTCHA smuggling : Hijacking web browsing sessions to create CAPTCHA farms
2010 -
Asynchronous CDMA systems with random spreading – Part II : Design criteria
2010 -
Improving the efficiency of dynamic malware analysis
2010 -
On peer-assisted on-line backup system design choices
2010 -
Selected papers from multimedia modeling conference 2009
2010 -
An integrated and realistic simulation platform for vehicular networks
2010 -
The LIA-Eurecom RT'09 speaker diarization system : enhancements in speaker modelling and cluster purification
2010 -
Receiver diversity with blind FIR SIMO channel estimates
2010 -
First-order global AM-FM decomposition and application to music analysis and transformation
2010 -
An assessment of linear adaptive filter performance with nonlinear distortions
2010 -
Preconditioned iterative inter-carrier interference cancellation for OFDM reception in rapidly varying channels
2010 -
Password strength : an empirical analysis
2010 -
An optimized unitary beamforming technique for MIMO broadcast channels
2010 -
Achieving life-cycle compliance of service-oriented architectures : Open issues and challenges
2010 -
Traffic classification in enterprise network : Preliminary results
2010 -
Sliding-window raptor codes for efficient scalable wireless video broadcasting with unequal loss protection
2010 -
Techniques to support alert and crisis management in public safety networks
2010 -
Hardware optimized sample rate conversion for software defined radio
2010 -
Receiver diversity with blind and semi-blind FIR SIMO channel estimates
2010 -
Receiver and transmitter iterative optimization using maximum sum-rate criterion for multi-user MIMO systems
2010 -
Abusing social networks for automated user profiling
2010 -
Single-microphone blind audio source separation via Gaussian Short+Long Term AR Models
2010 -
Variational Bayesian blind and semiblind channel estimation
2010 -
Optimized linear receivers and power allocation for two multi-user MIMO downlink schemes with linear precoding
2010 -
Traffic classification : Application-based feature selection using logistic regression
2010 -
On the value of data sharing in constrained-backhaul network MIMO
2010 -
Hierarchical codes : a flexible trade-off for erasure codes in peer-to-peer storage systems
2010 -
Efficient detection of split personalities in malware
2010 -
Control of a speech robot via an optimum neural-network-based internal model with constraints
2010 -
Security issues in opportunistic networks
2010 -
Composing and coordinating transactional Web services
2010 -
Lip analysis for person recognition
2010 -
iTETRIS : The integrated wireless and traffic platform for real-time road traffic management solutions
2010 -
Flexible on-board stream processing for automotive sensor data
2010 -
Asynchronous CDMA systems with random spreading - Part I : Fundamental limits
2010 -
On optimum end-to-end distortion of spatially correlated MIMO systems
2010 -
Semi-blind methods for communications
2010 -
On the MIMO interference channel
2010 -
Team decision for the cooperative MIMO channel with imperfect CSIT sharing
2010 -
A provably secure secret handshake with dynamic controlled matching
2010 -
Distributed network formation for n-way broadcast applications
2010 -
Ad-hoc mobility in satellite-based networks for public safety applications
2010 -
Communication with channel uncertainties, feedback acquisition and optimization
2010 -
A game theoretical approach to resource allocation in wireless networks
2010 -
Data privacy management and autonomous spontaneous security
2010 -
Secure P2P data storage and maintenance
2010 -
Realistic and animatable face models for expression simulations in 3D
2010 -
A statistical approach to culture colors distribution in video sensors
2010 -
General DMT optimality of LR-aided linear MIMO-MAC transceivers with worst-case complexity at most linear in sum-rate
2010 -
Comparison between Viterbi detectors for magnetic recording channels based on regressive and autoregressive noise models
2010 -
VAMP : a service for validating MPEG-7 descriptions w.r.t. to formal profile definitions
2009 -
Information theoretic capacity of Wimax
2009 -
Long term study of peer behavior in the KAD DHT
2009 -
Exploiting multiuser diversity in MIMO broadcast channels with limited feedback
2009 -
Channel allocation and routing in wireless mesh networks : A survey and qualitative comparison between schemes
2009 -
Safebook : a privacy preserving online social network leveraging on real-life trust
2009 -
Data semantics for multimedia systems and applications (DSMSA)
2009 -
Two attacks against the Ff RFID protocol
2009 -
Systems and techniques for multicell-MIMO and cooperative relaying in wireless networks
2009 -
Investigating the efficiency of ITS cooperative systems for a better use of urban transport infrastructures : The iTETRIS simulation platform
2009 -
FIRE : Finding rogue networks
2009 -
A peer-to-peer architecture for networked virtual environments
2009 -
LODE : Linking open descriptions of events
2009 -
How to align media metadata schemas ? Design and implementation of the media ontology
2009 -
Secret handshakes with revocation support
2009 -
Adaptive receiver structures for fiber communication systems employing polarization-division multiplexing
2009 -
Distributed multicell and multiantenna precoding : Characterization and performance evaluation
2009 -
Low-power sleep mode and out-of-band wake-up for indoor access points
2009 -
Analysis of low complexity max log MAP detector and MMSE detector for interference suppression in correlated fading
2009 -
Secure joint source-channel coding for quasi-static fading channels
2009 -
Transmission strategies and sum rate maximization in multi-user TDD systems
2009 -
Hybrid pilot/quantization-based feedback in multi-antenna TDD systems
2009 -
Host identity protocol and proxy mobile IPv6 : a secure global and localized mobility management scheme for multihomed mobile nodes
2009 -
Distributed avatar management for Second Life
2009 -
Semantic multimedia
2009 -
Eurecom at TRECVID 2009 : High-level feature extraction
2009 -
The WOMBAT attack attribution method : Some results
2009 -
Cooperative spectrum sensing technique based on sub space analysis for cognitive radio networks
2009 -
Scheduling and CAC in IEEE 802.16 fixed BWNs : a comprehensive survey and taxonomy
2009 -
Analysis and design of multi-carrier systems for power line communications
2009 -
Secure in-VM monitoring using hardware virtualization
2009 -
PSP : private and secure payment with RFID
2009 -
Challenging statistical classification for operational usage : the adsl case
2009 -
Multi-radio multi-channel routing metrics in IEEE 802.11s-based wireless mesh networks
2009 -
Achieving broadcasting efficiency in V2X networks with a simple distance-based protocol
2009 -
Assessing cybercrime through the eyes of the WOMBAT
2009 -
Linear precoders for multiuser MIMO for finite constellations and a simplified receiver structure under controlled interference
2009 -
Monomicrophone blind audio source separation using EM-Kalman filters and short+long term AR modeling
2009 -
Resource allocation for cognitive radio networks with a beamforming user selection strategy
2009 -
On full diversity equalization for precoded block transmission systems
2009 -
Performance of different user selection algorithms for transmit power minimization
2009 -
Transmission techniques and channel estimation for spatial interweave TDD cognitive radio systems
2009 -
The waterfilling game - theoretical framework for distributed wireless network information flow
2009 -
Behavioral analysis of zombie armies
2009 -
Proceedings of the ACM SIGKDD Workshop on cybersecurity and intelligence informatics
2009 -
Client-side cross-site scripting protection
2009 -
Cyber SA : situational awareness for cyber defense
2009 -
Intelligent strategies of access point selection for vehicle to infrastructure opportunistic communications
2009 -
Toward environment-to-environment (E2E) affective sensitive communication systems
2009 -
iTETRIS : a large scale integrated simulation platform for V2X communications : Application to real-time traffic management
2009 -
A case for using MBMS in geographical networking
2009 -
Data redundancy and maintenance for peer-to-peer file backup systems
2009 -
Security requirements for automotive on-board networks
2009 -
Honeypot traces forensics : the observation view point matters
2009 -
Temporal normalization of videos using visual speech
2009 -
ACM SIGMM the first workshop on web-scale multimedia corpus
2009 -
Robust matching of complex visual forms, application to object detection
2009 -
Energy efficiency of SISO algorithms for turbo-decoding message-passing LDPC decoders
2009 -
Providing billing support in WiMAX mesh networks
2009 -
On congestion-aware broadcasting in V2X networks
2009 -
Application of smoothed estimators in spectrum sensing technique based on model selection
2009 -
Application of smoothed estimators in spectrum sensing technique based on distribution analysis
2009 -
Affective computing : display, recognition, and computer synthesis of emotions
2009 -
Face dynamics for biometric people recognition
2009 -
Object detection with a minimal set of examples using convolutional PCA
2009 -
Cross-layer design of FDD-OFDM systems based on ACK/NAK feedbacks
2009 -
Efficient access control for wireless sensor data
2009 -
Peer-to-peer content distribution
2009 -
Exploitation of reciprocity in measured mimo channels
2009 -
Honeypot traces forensics by means of attack event identification
2009 -
AnSta : anonymous statistics using RFID tags
2009 -
Computer aided design of a firmware flashing protocol for vehicular on-board networks
2009 -
A measurement of mixing time in social networks
2009 -
A method of adapting video images to small screen sizes
2009 -
Document-based dynamic workflows : towards flexible and stateful services
2009 -
Automatically generating models for botnet detection
2009 -
Layer 2 vs. Layer 3 mechanisms for improving TCP performance in 802.11 wireless lans
2009 -
Experimental characterization of indoor multi-link channels
2009 -
Low consumption home femto base stations
2009 -
Low-complexity distributed MIMO receiver and its implementation on the OpenAirInterface platform
2009 -
Channel capacity for linearly precoded multiuser MIMO for discrete constellations
2009 -
Hybrid TOA/AOD/doppler-shift localization algorithm for NLOS environments
2009 -
A linear beamforming scheme for multi-user MIMO AF two-phase two-way relaying
2009 -
Dynamic topology implementation and maintenance for the CHORIST Network
2009 -
A scalable interest-oriented peer-to-peer pub/sub network
2009 -
Automated spyware collection and analysis
2009 -
How many users should inform the BS about their channel Information?
2009 -
On the trade-off between feedback and capacity in measured MU-MIMO channels
2009 -
Technical perspective - They do click, don't they?
2009 -
Open platform for prototyping of advanced software defined radio and cognitive radio techniques
2009 -
Process for controlling the attachment of one mobile terminal to one particular attachment point belonging to one particular wireless access network technology
2009 -
DOCINER : A document indexation tool for learning objects
2009 -
Selfish neighbor selection in peer-to-peer backup and storage applications
2009 -
Interference alignment limits for K-user frequency-flat MIMO
2009 -
A stereo echo canceller with simultaneous 2-channel input slides for fast convergence and good sound localization
2009 -
Impostor detection using facial stereoscopic images
2009 -
Approximate full diversity equalizers for doubly selective channels
2009 -
Towards secure content based dissemination of XML documents
2009 -
On a selfish caching game
2009 -
Decentralising multi-cell cooperative processing on the downlink : a novel robust framework
2009 -
Optimum LDPC decoder : a memory architecture problem
2009 -
Bootstrapping security associations in content-based opportunistic networks
2009 -
Efficient access control for wireless sensor data
2009 -
A semantic policy management environment for end-users and its empirical study
2009 -
An experimental study of diversity with off-the-shelf antiVirus engines
2009 -
Defending browsers against drive-by downloads : mitigating heap-spraying code injection attacks
2009 -
Seed scheduling for peer-to-peer networks
2009 -
On MIMO systems with limited feedback : end-to-end distortion, analog channel feedback, and layer multiplexing
2009 -
Traffic to protocol reverse engineering
2009 -
User variance and its impact on video retrieval benchmarking
2009 -
Editorial : Cooperative communications in wireless networks
2009 -
Network-based mobility management in heterogeneous wireless networks
2009 -
P2P cache-and-forward mechanisms for mobile ad hoc networks
2009 -
Toward the detection of interpretation effects and playing defects
2009 -
Periodic signal modeling for the octave problem in music transcription
2009 -
Footstep recognition
2009 -
D-MG tradeoff and optimal codes for a class of AF and DF cooperative communication protocols
2009 -
Person recognition using facial video information : A state of the art
2009 -
The Ff-family of protocols for RFID-privacy and authentication
2009 -
Space-time codes achieving the DMD tradeoff of the MIMO-ARQ channel
2009 -
Distributed power allocation for interfering wireless links based on channel information partitioning
2009 -
A game theoretical approach in securing P2P storage against whitewashers
2009 -
Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making
2009 -
Secure diversity-multiplexing tradeoffs in MIMO relay channels
2009 -
LR-aided MMSE lattice decoding is DMT optimal for all approximately universal codes
2009 -
Space-time codes that are approximately universal for the parallel, multi-block and cooperative DDF channels
2009 -
The image text recognition graph (iTRG)
2009 -
Multi-document video summarization
2009 -
Automatic evaluation method for rushes summary content
2009 -
Low complexity cross-layer design for dense interference networks
2009 -
Distributed algorithm for minimizing delay in multi-hop wireless sensor networks
2009 -
A practical study of regenerating codes for peer-to-peer backup systems
2009 -
Unitary beamforming under constant modulus constraint in MIMO broadcast channels
2009 -
Combining mobility and heterogeneous networking for emergency management : a PMIPv6 and HIP-based approach
2009 -
Topology management for public safety networks
2009 -
On the gains of fixed relays in cellular networks with intercell interference
2009 -
Low complexity soft detection for spatially multiplexed BICM MIMO OFDM system
2009 -
Diversity order of linear equalizers for doubly selective channels
2009 -
SigmaDelta interference canceling ADC's for antenna arrays
2009 -
Structured spatio-temporal sample covariance matrix enhancement with application to blind channel estimation in cyclic prefix systems
2009 -
Evaluation of scalable proxy mobile IPv6 in wireless mesh networks
2009 -
A security pattern for untraceable secret handshakes
2009 -
Combination of ad hoc mobility with IPv6 mobility mechanisms report
2009 -
Security and cooperation for peer-to-peer data storage
2009 -
Privacy in context-based and epidemic forwarding
2009 -
Safebook : feasibility of transitive cooperation for privacy on a decentralized social network
2009 -
Blind spectrum sensing for cognitive radio based on signal space dimension estimation
2009 -
Adaptive equalization at Hsdpa symbol level
2009 -
Effective and efficient malware detection at the end host
2009 -
Wireless media streaming over IP-based in-vehicle
2009 -
Spatial interference cancellation and pairwise error probability analysis
2009 -
Increasing public safety communications interoperability : The chorist broadband and wideband rapidly deployable systems
2009 -
Multiuser extensions for closed loop transmit diversity in HSDPA
2009 -
Distributed communication control mechanisms for ad hoc networks
2009 -
Mobility, access heterogeneity and security for next generation public safety communications
2009 -
Enabling IEEE 802.21 in a B3G cellular experimental network
2009 -
Performance assessment of hybrid data fusion and tracking algorithms
2009 -
iTETRIS : the framework for large-scale research on the impact of cooperative wireless vehicular communications systems in traffic efficiency
2009 -
Experimental study of spectrum sensing based on distribution analysis
2009 -
Multi-level fusion for content-based semantic multimedia indexing and retrieval
2009 -
Cross-layer design of 802.11s-based wireless mesh networks
2009 -
Visualization of multi-video summaries demonstration
2009 -
Hierarchical ontology-based robust video shots indexing using global MPEG-7 visual descriptors
2009 -
Rushes video parsing using video sequence alignment
2009 -
UE demodulation performances
2009 -
Assessment of a footstep biometric verification system
2009 -
Automatic cross-biometric footstep database labelling using speaker recognition
2009 -
Extended proxy mobile IPv6 for scalability and route optimization in heterogeneous wireless mesh networks
2009 -
Privacy in content-based opportunistic networks
2009 -
The LIA-EURECOM RT`09 Speaker Diarization System
2009 -
Trustworthiness assessment of wireless sensor data for business applications
2009 -
A secure comparison technique for tree structured data
2009 -
A provably secure secret handshake with dynamic controlled matching
2009 -
Ontology-based secure XML content distribution
2009 -
Privacy-preserving content-based publish/subscribe networks
2009 -
Prospex : protocol specification extraction
2009 -
Automatic reverse engineering of malware emulators
2009 -
SWAP : mitigating XSS attacks using a reverse proxy
2009 -
Removing web spam links from search engine results
2009 -
Revisiting the performance of short TCP transfers
2009 -
Revealing the unknown ADSL traffic using statistical methods
2009 -
Where is my peer ? Evaluation of the Vivaldi network coordinate system in Azureus
2009 -
On the analysis of propagation channel based on sub band approach
2009 -
Path loss analysis based on UWB channel measurements
2009 -
Ontological reranking approach for hybrid concept similarity-based video shots indexing
2009 -
An efficient comparison technique for sanitized XML trees
2009 -
Server-side bot detection in massively multiplayer online games
2009 -
Efficient signaling for multicellular cooperative networks with reduced overhead
2009 -
Distributed and centralized architectures for relay-aided cellular systems
2009 -
Distributed beamforming coordination in multicell MIMO channels
2009 -
Interference suppression for next generation wireless systems
2009 -
ESPRIT-based estimation of location and motion dependent parameters
2009 -
PSP : private and secure payment with RFID
2009 -
Spatial dynamics of indoor radio channel
2009 -
Uncoordinated peer selection in P2P backup and storage applications
2009 -
Mitigating drive-by download attacks : challenges and open problems, open research problems
2009 -
Leveraging social links for trust and privacy in networks
2009 -
Tailored security and safety for pervasive computing
2009 -
New directions in RFID security
2009 -
Hierarchical codes : a flexible trade-off for erasure codes
2009 -
A view on current malware behavior
2009 -
A view on current malware behaviors
2009 -
All your contacts are belong to us : automated identity theft attacks on social networks
2009 -
A practical walsh layering scheme for reliable transmission
2009 -
Linear receivers for frequency-selective MIMO channels with redundant linear precoding can achieve full diversity
2009 -
Identifiability and performance concerns for location estimation
2009 -
Speaker diarization using unsupervised discriminant analysis of inter-channel delay features
2009 -
Perceptually motivated quasi-periodic signal selection for polyphonic music transcription
2009 -
Team and noncooperative solutions to access control with priorities
2009 -
P2P Second Life : experimental validation using Kad
2009 -
A walkable kademlia network for virtual worlds
2009 -
A document-based dynamic workflow system
2009 -
Low-complexity linear equalization for block transmission in multipath channels
2009 -
Multi-user diversity gain for oblivious and informed users in downlink channels
2009 -
Virtual access points for disaster scenarios
2009 -
Spatial interference cancellation algorithm
2009 -
Asymptotic analysis of correlated multi-antenna broadcast channels
2009 -
A novel distributed interference mitigation technique using power planning
2009 -
Transmit cooperation versus distributed coordination in interference links
2009 -
Fast available bandwidth sampling for ADSL links : rethinking the estimation for larger-scale measurements
2009 -
A framework for probabilistic, authentic aggregation in wireless sensor networks
2009 -
Report from HotMobile 2009
2009 -
Low-rate feedback for real measured temporally correlated MIMO channels
2009 -
Performance analysis of some fingerprinting based localization techniques using UWB signaling
2009 -
Relaying with wireless infrastructure links in cellular networks
2009 -
An information theoretic analysis on indoor PLC channel characterization
2009 -
Content-driven secure and selective XML dissemination
2009 -
RFID-based supply chain partner authentification and key agreement
2009 -
Operating point selection in multiple access rate regions
2009 -
WiMAX network capacity and radio resource management
2009 -
High-SNR analysis of outage-limited communications of bursty and delay-limited information
2009 -
Managing knowledge to enhance learning
2009 -
Cross layer optimization of wireless sensor and sensor-actuator networks
2009 -
Dynamic topology and communication control for highly dynamic wireless mesh networks
2009 -
Reduced complexity soft detection for BICM MIMO OFDM system
2009 -
Experimental characterization and modeling of outdoor-to-indoor and indoor-to-indoor distributed channels
2009 -
Differential feedback in MIMO communications : performance with delay and real channel measurements
2009 -
Coordination on the MISO interference channel using the virtual SINR framework
2009 -
On the characterization of measured multi-user MIMO channels
2009 -
Privacy in context-based and epidemic forwarding
2009 -
Honeypot traces forensics : the observation view point matters
2009 -
Scalable, behavior-based malware clustering
2009 -
Steganography in 3D geometries and images by adjacent bin mapping
2009 -
Similarité des séquences vidéo : application aux rushes
2009 -
Privacy preserving social networking through decentralization
2009 -
Reference signals and channel estimation
2009 -
Channel coding and link adaptation
2009 -
Radio frequency aspects
2009 -
Beyond LTE
2009 -
Multi-user scheduling and interference coordination
2009 -
Multiple antenna techniques
2009 -
Orthogonal Frequency Division Multiple Access (OFDMA)
2009 -
Scheduling for multiuser MIMO downlink channels with ranking-based feedback
2009 -
Revisiting the performance of short TCP transfers
2009 -
Optimally DoS resistant P2P topologies for live multimedia streaming
2009 -
Active objects in interactive mobile TV
2009 -
Towards a new image-based spectrogram segmentation speech coder optimised for intelligibility
2009 -
Integrating image segmentation and classification for fuzzy knowledge-based multimedia indexing
2009 -
Evidence theory based multimodal emotion recognition
2009 -
QoS-aware network-supported architecture to distribute application flows over multiple network interfaces for B3G users
2009 -
Formal verification of routing protocols for wireless ad hoc networks
2009 -
Scheduling and call admission control : A wimax mesh networks view
2009 -
Low-complexity distributed multibase transmission and scheduling
2009 -
Confidentiality and integrity for data aggregation in WSN using peer monitoring
2008 -
Advances in Multimedia Modeling
2008 -
Source-channel coding techniques applied to wireless sensor networks
2008 -
A large scale footstep database for biometric studies created using cross-biometrics for labelling
2008 -
On the impact of DoS attacks on secure service discovery
2008 -
Actionable knowledge discovery for threats intelligence support using a multi-dimensional data mining methodology
2008 -
Exploiting the wireless channel for communication
2008 -
Validating peer-to-peer storage audits with evolutionary game theory
2008 -
Virtual access points for stream based traffic dissemination
2008 -
Uplink allocation beyond choke/unchoke or how to divide and conquer best
2008 -
Is there life in Second Life?
2008 -
Capacity estimation of ADSL links
2008 -
Structures and algorithms for peer-to-peer cooperation
2008 -
Spectrum pooling based on centralized and distributed resource allocation strategies for cognitive radio networks
2008 -
Combining segmentation and classification techniques for fuzzy knowledge-based semantic image annotation
2008 -
A collaborative approach to video summarization
2008 -
Image and video text recognition using convolutional neural networks
2008 -
Cooperative communications for wireless ad hoc networks
2008 -
Principles of space-time coding
2008 -
Object tracking for interactive television
2008 -
SGNET : automated protocol learning for the observation of malicious threats
2008 -
On optimum end-to-end distortion of spatially correlated MIMO systems
2008 -
Direct location estimation for MIMO systems in multipath environments
2008 -
Multiuser MIMO downlink : multiplexing gain without free channel information
2008 -
Secure service discovery with distributed registries
2008 -
Parallel relay networks with phase fading
2008 -
Performance of multi-user MIMO precoding with limited feedback over measured channels
2008 -
Some systems aspects regarding compressive relaying with wireless infrastructure links
2008 -
A framework for decentralising multi-cell cooperative processing on the downlink
2008 -
Privacy-preserving content-based publish/Subscribe networks
2008 -
Physiological and behavioural approaches for person recognition using videos
2008 -
The Ff-family of protocols for RFID-privacy and authentication
2008 -
IPv6 mobility in cluster based heterogeneous wireless mesh networks
2008 -
A provably secure secret handshake with controlled matching
2008 -
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems
2008 -
K-Space at TRECVid 2008
2008 -
Enhanced multiuser random beamforming : dealing with the not-so-large number of users case
2008 -
Rushes video summarization using a collaborative approach
2008 -
Sequence alignment for redundancy removal in videorushes summarization
2008 -
Improving flow level fairness and interactivity in WLANs using size-based scheduling policies
2008 -
Perplexity-based evidential neural network classifier fusion using MPEG-7 low-level visual features
2008 -
Idromel : an open platform adressing advanced SDR challenges
2008 -
A novel framework for the utilisation of dynamic relays in cellular networks
2008 -
Diversity order of linear equalizers for block transmission in fading channels
2008 -
Combining MBMS and IEEE 802.21 for on-the-road emergency
2008 -
Social networking for pervasive adaptation
2008 -
Analysis of user-driven peer selection in peer-to-peer backup and storage systems
2008 -
The space frontier : physical limits of multiple antenna information transfer
2008 -
Towards fully automatic image segmentation evaluation
2008 -
Optimum end-to-end distortion of interleaved transmission via a rayleigh MIMO channel
2008 -
Portivity : Object Based Interactive Mobile TV System Networked and Electronic Media
2008 -
iTETRIS : An Integrated wireless and traffic platform for real-time road traffic management solutions
2008 -
A multimodal approach to music transcription
2008 -
A collaborative approach to automatic rushes video summarization
2008 -
Spatiotemporal modeling and matching of video shots
2008 -
Facial gender recognition using multiple sources of visual information
2008 -
Reversible watermarking of 3D mesh models by prediction-error expansion
2008 -
Singular block toeplitz matrix approximation and application to multi-microphone speech dereverberation
2008 -
Periodic signal extraction with frequency-selective amplitude modulation and global time-warping for music signal decomposition
2008 -
Revisiting web traffic from a DSL provider perspective : the case of YouTube
2008 -
Large scale malware collection : lessons learned
2008 -
Spatiotemporal semantic video segmentation
2008 -
Characterization of measured multi-user MIMO channels using the spectral divergence measure
2008 -
A mobile ad-hoc satellite and wireless mesh networking approach for public safety communications
2008 -
Binary power allocation for cognitive radio networks with centralized and distributed user selection strategies
2008 -
Dual-polarized wireless communications: From propagation models to system performance evaluation
2008 -
Exploiting limited feedback in tomorrow’s wireless communications networks
2008 -
Proxy mobile IPv6 for cluster based heterogeneous wireless mesh networks
2008 -
Multimedia indexing
2008 -
Broadcast channel : degrees of freedom with no CSIR
2008 -
Construction criteria and existence results for approximately universal linear space-time codes with reduced decoding complexity
2008 -
Transmission of correlated sources over gaussian multiple access channel with phase shifts
2008 -
Overbot - A botnet protocol based on Kademlia
2008 -
Assessment of objective quality measures for speech intelligibility
2008 -
Reputation and audits for self-organizing storage
2008 -
A key management solution for overlay-live-streaming
2008 -
Visual-similarity-based phishing detection
2008 -
Direct location estimation using single-bounce NLOS time-varying channel models
2008 -
Automating the analysis of honeypot data
2008 -
Leveraging user interactions for in-depth testing of web applications
2008 -
Correlation and capacity of measured multi-user MIMO channels
2008 -
Chip-sparsification and symbol-equalization for WCDMA downlink
2008 -
MIMO capacity pre-Log for flat fading stationary channels with no CSIR
2008 -
Asymptotic capacity of underspread and overspread doubly selective MIMO channels
2008 -
Performance analysis of general pilot-aided linear channel estimation in the LTE OFDMA systems with application to simplified MMSE schemes
2008 -
Efficient access control for wireless sensor data
2008 -
Dual stream low complexity BICM reception and MIMO broadcast strategy
2008 -
Downlink distributed binary power allocation for cognitive radio networks
2008 -
Distributed access control for XML document centric collaborations
2008 -
A game theoretic framework for decentralized power allocation in IDMA systems
2008 -
Downlink overhead reduction for multi-cell cooperative processing enabled wireless networks
2008 -
Comparative performance evaluation of MAC protocols in ad hoc networks with bandwidth partitioning
2008 -
Adaptive packet combining for IPv6 soft handoverapplied to Network Mobility
2008 -
Expanding human interactions for in-depth testing of web applications
2008 -
Spectrum sharing in multiple antenna channels: a distributed cooperative game theoretic approach
2008 -
Scalable proxy mobile IPv6 for heterogeneous wireless networks
2008 -
On the variance of the least attained service policy and its use in multiple bottleneck networks
2008 -
A security protocol for self-organizing data storage
2008 -
Faster content access in KAD
2008 -
Hierarchical codes: how to make erasure codes attractive for peer-to-peer storage systems
2008 -
On the impact of greedy strategies in BitTorrent networks : the case of BitTyrant
2008 -
Unveiling BitTyrant: when the devil is not so black as he is painted
2008 -
Aggregation and personalization of infotainment, an architecture illustrated with a collaborative scenario
2008 -
Flexible baseband architectures for future wireless systems
2008 -
Daidalos : scénarios pour une architecture réseau du futur
2008 -
Le Banc de Test Distribué Virtuel de UNITE
2008 -
An assessment of speech related information contained in GEMS signals
2008 -
Diversity-multiplexing tradeoff of simplified receivers for frequency-selective MIMO channels
2008 -
Facial video based response registration system
2008 -
Brief announcement : a dynamic exchange game
2008 -
Gossip-based aggregate computation, computing faster with non address-oblivious schemes
2008 -
Characterizing user mobility in Second Life
2008 -
Digging into KAD users’ shared folders
2008 -
Use of semantic networks as learning material and evaluation of the approach by students
2008 -
Activity-related biometric authentication
2008 -
Kinetic mobility management applied to vehicular ad hoc network protocols
2008 -
Cross-layer QoS routing framework for wireless mesh networks
2008 -
Audio-visual guitar transcription
2008 -
Privacy and confidentiality in content-based networking
2008 -
Reputation and audits for self-organizing storage
2008 -
Evolutionary game for peer-to-peer storage audits
2008 -
The quest for multi-headed worms
2008 -
Spectral efficiency of spectrum-pooling systems
2008 -
Capacity of linear multi-user MIMO precoding schemes with measured channel data
2008 -
Distributed transmit mode selection for MISO broadcast channels with limited feedback: switching from SDMA to TDMA
2008 -
Spontaneous security services for ubiquitous computing
2008 -
Orthogonal space-time block codes for analog channel feedback
2008 -
Beamforming for correlated broadcast channels with quantized channel state information
2008 -
Low complexity BICM demodulation for MIMO transmission
2008 -
Asymptotic analysis of channel division multiple access schemes for ultra-wideband systems
2008 -
A comparative study of network transport protocols for in-vehicle media streaming
2008 -
A root cause analysis toolkit for TCP
2008 -
Using cross-system diversity in heterogeneous networks : throughput optimization
2008 -
Low-level feature fusion models for soccer scene classification
2008 -
Keypoints labeling for backgroung substraction in tracking applications
2008 -
Representation and analysis of video content for automatic object extraction
2008 -
Early stage denial of service attacks in BitTorrent: an experimental study
2008 -
Toward emotion indexing of multimedia excerpts
2008 -
Automatic evaluation method for rushes summarization: experimentation and analysis
2008 -
A tracking repositioning algorithm using keypoint labeling
2008 -
Passive capacity estimation: comparison of existing tools
2008 -
A framework for attack patterns' discovery in honeynet data
2008 -
Advanced hybrid satellite and terrestrial system architecture for emergency mobile communications
2008 -
QoS provisioning for multimedia services on all- IP based hybrid networks
2008 -
Sensor networks for cognitive radio : theory and system design
2008 -
Wireless hybrid enhanced mobile radio estimators - WHERE
2008 -
Crawling Azureus
2008 -
A MIMO broadcast strategy and interference cancellation in single frequency cellular system
2008 -
OpenAirMesh- an experimental platform for cooperative mesh networks
2008 -
An overview of OpenAirInterface wireless network emulation methodology
2008 -
OpenAirInterface simulation platform
2008 -
Securing ad hoc storage through probabilistic cooperation assessment
2008 -
Receiver designs for MIMO HSDPA
2008 -
Underwater acoustic sensor networking using passive phase conjugation
2008 -
A data mapping method for steganography and its application to images
2008 -
Optimum power allocation in a hierarchical spectrum sharing scheme
2008 -
On the value of a feedback channel in reciprocal multiple-antenna TDD systems
2008 -
A dynamic clustering approach in wireless networks with multi-cell cooperative processing
2008 -
A reputation system for self-organizing storage
2008 -
Saner: composing static and dynamic analysis to validate sanitization in web applications
2008 -
Piano "Forte Pedal" analysis and detection
2008 -
Uplink distributed binary power allocation for cognitive radio networks
2008 -
Blind spectrum sensing for cognitive radio based on model selection
2008 -
An experimental comparison of layer 2 and 3 mechanisms for improving user perceived performance of 802.11 wireless LANs
2008 -
On the variance of the least attained service policy and its use in multiple bottleneck networks
2008 -
Optimal precoding and MMSE receiver designsfor MIMO WCDMA
2008 -
Improving ad hoc networks capacity and connectivity using dynamic blind beamforming
2008 -
Increasing connectivity in wireless sensor-actuator networks using dynamic actuator cooperation
2008 -
SGNET: a worldwide deployable framework to support the analysis of malware threat models
2008 -
Redundancy removing and event clustering for video summarization
2008 -
Impact of channel side information availability at the source node on the capacity of multi-hop MIMO relay networks
2008 -
Accelerated keypoint extraction
2008 -
Robust delay-&-predict equalization for blind simo channel dereverberation
2008 -
Source-channel coding for very-low bandwidth sources
2008 -
Adaptive feedback rate control in MIMO broadcast systems
2008 -
A performance based approach to selecting a secure service discovery architecture
2008 -
Asymptotic capacity and optimal precoding strategy of multi-level precode & forward in correlated channels
2008 -
When network coding and dirty paper coding meet in a cooperative ad hoc network
2008 -
The pervasive workflow: a decentralized workflow system supporting long running transactions
2008 -
Video person recognition strategies using head motion and facial appearance
2008 -
A distributed access control framework for XML document centric collaborations
2008 -
The leurre.com project: collecting internet threats information using a worldwide distributed honeynet
2008 -
Non-cooperative available bandwidth estimation towards ADSL links
2008 -
Measurements and mitigation of peer-to-peer-based botnets: a case study on storm wor
2008 -
Swarming on optimized graphs for n-way broadcast
2008 -
From single radio access technology to heterogeneous wireless networks
2008 -
SGNET: Implementation insights
2008 -
Footstep recognition for a smart home environment
2008 -
Cooperative multi-hop wireless sensor-actuator networks: exploiting actuator-cooperation and cross-layer optimizations
2008 -
On the performance bounds of OFDM-based 802.16 broadband wireless networks
2008 -
An intelligent tunneling framework for always best connected support in network mobility (NEMO)
2008 -
Large system design and analysis of protocols for decode-forward relay networks
2008 -
On LMMSE bias in CDMA SIMO/MIMO receivers
2008 -
Tomofaces: eigenfaces extended to videos of speakers
2008 -
Security scenario definition report
2008 -
IPv6 mobility and ad hoc network mobility overview report
2008 -
Multimedia security and 3D video objects
2008 -
Bounds on optimal end-to-end distortion of MIMO links
2008 -
Stability and delay analysis for multi-hop single-sink wireless sensor networks
2008 -
NLOS mobile terminal position and speed estimation
2008 -
Communicating bursty and delay-sensitive information over outage-limited channels
2008 -
A Markovian performance model for secure service discovery systems
2008 -
A new approach to efficient peer-to-peer backup systems
2008 -
Characterizing user mobility in Second Life
2008 -
An 802.16 Model for NS2 simulator with an Integrated QoS architecture
2008 -
WG Requirements for network monitoring from an IDS perspective
2008 -
Constrained cost-coupled stochastic games with independent state processes
2008 -
WG Intrusion and fraud detection for web services
2008 -
WG Attack taxonomy
2008 -
Understanding threats: A prerequisite to enhance survivability of computing systems
2008 -
Performance optimization of MIMO systems with partial channel state information
2008 -
Practical and unified process for developing the future mobile Internet with simultaneous access (MISA)
2008 -
General resource sharing problems in overlay networks
2008 -
Movement prediction for routing and medium access control in vehicular ad hoc networks
2008 -
MIMO transmission with limited feedback
2008 -
Audio conferencing enhancement through 3D sound and high quality speech
2008 -
Automatic network protocol analysis
2008 -
Virtual access points for vehicular networks
2008 -
Distributed resource allocation techniques in interference-limited cellular networks
2008 -
Real-time multi-user MIMO channel sounding and capacity evaluations
2008 -
Equalization techniques for wireless communications theory & applications
2008 -
Process for sensing vacant bands over the spectrum bandwidth and apparatus for performing the same based on sub space and distributions analysis
2008 -
Channel predictive proportional fair scheduling
2008 -
Rate and power allocation for discrete-rate link adaptation
2008 -
Stochastic graph processes for performance evaluation of content delivery applications in overlay networks
2008 -
Security and privacy issues in middleware for emergency and rescue applications
2008 -
Adaptive feedback rate control in MIMO broadcast systems with user scheduling
2008 -
Asymptotic capacity of underspread and overspread stationary time- and frequency-selective channels
2008 -
A security protocol for self-organizing data storage
2008 -
A distributed algorithm to achieve Cesaro-Wardrop equilibrium in wireless sensor networks
2008 -
Transactional composite applications
2008 -
Multiuser multi-antenna systems with limited feedback
2008 -
A design framework for scalar feedback in MIMO broadcast channels
2008 -
Mobility models for vehicular ad hoc networks: a survey and taxonomy
2008 -
Ultra wide bandwidth channel characterization in different environments
2008 -
3D Object Processing : Compression, Indexing and Watermarking
2008 -
Optimal and distributed scheduling for multicell capacity maximization
2008 -
Unveiling BitTyrant: when the devil is not so black as he is painted
2008 -
Automating the composition of transactional Web services
2008 -
Bridging security and fault management within distributed workflow management systems
2008 -
Operational comparison of available bandwidth estimation tools
2007 -
Space-time channel modeling for wireless communications
2007 -
Reconfigurable DSP architectures for SDR applications
2007 -
A networked virtual environment over KAD
2007 -
Building a reliable P2P system out of unreliable P2P clients: the case of KAD
2007 -
Proactive replication in distributed storage systems using machine availability estimation
2007 -
Empirical study of the impact of metasploit-related attacks in 4 years of attack traces
2007 -
SAMMI, Semantic affect-enhanced multimedia indexing
2007 -
Wireless bandwidth aggregation and load balancing in multi-homed NEMO
2007 -
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
2007 -
PULSE - an adaptive practical live streaming system
2007 -
Throughput guarantees for wireless networks with opportunistic scheduling: a comparative study
2007 -
Precoded distributed space-time block codes in cooperative diversity-based downlink
2007 -
Optimal constant-window backoff scheme for IEEE 802.11 DCF in single-hop wireless networks under finite load conditions
2007 -
Push-to-peer video-on-demand system: Design and evaluation
2007 -
Adaptation, coordination and distributed resource allocation in interference-limited wireless networks
2007 -
Graph based analysis of mesh overlay streaming systems
2007 -
Amplify-and-forward capacity with transmit beamforming for MIMO multiple-relay network
2007 -
Constrained stochastic games in wireless networks
2007 -
Bounds on the distortion for distributed sensing of slowly-varying random fields
2007 -
Spectral efficiency for cognitive radio
2007 -
Methodology for formal verification of routing protocols for ad hoc wireless networks
2007 -
Capacity maximizing power allocation for interfering wireless links: a distributed approach
2007 -
Towards secure and trusted collaboration environment for European public sector
2007 -
Introduction de paramètres dynamiques en reconnaissance faciale
2007 -
Improving flow level fairness and interactivity in WLANs using size-based scheduling policies
2007 -
Eurecom at TRECVid 2007: Extraction of high level features
2007 -
MIMO mobile terminal tracking using Bayesian probability estimation
2007 -
Lower bound on time-delay estimation error of UWBsignal
2007 -
Cognitive radio research and implementation challenges
2007 -
On the capacity of asynchronous CDMA systems
2007 -
PULSE: an adaptive, incentive-based, unstructured P2P live streaming system
2007 -
Seamless Handover and QoS mechanisms for efficient DVB-H and Mobile IPv6 integration
2007 -
NCR: A unifying parameter to characterize and evaluate data dissemination scenarios and its analytic study
2007 -
Modeling affective evaluation of multimedia contents: user models to associate subjective experience, physiological expression and contents description
2007 -
A global view of KAD
2007 -
Maximizing network-lifetime in large scale heterogeneous wireless sensor-actor networks: a near-optimal solution
2007 -
Power allocation game for fading MIMO multiple access channels with antenna correlation
2007 -
Cross-system resources allocation based on random matrix theory
2007 -
K-Space at TRECVid 2007
2007 -
Kinetic graphs: a framework for capturing the dynamics of mobile structures in MANET
2007 -
CrossAid (XAid): towards a new scalable cross-layer architecture for MANETs
2007 -
Technologies in support of multimode and flexible transceivers
2007 -
Cognitive radio approach and challenges
2007 -
EMOS platform: real-time capacity estimation of MIMO channels in the UMTS-TDD band
2007 -
Geometric invariants for 2D/3D face recognition
2007 -
Passive capacity estimation: comparison of existing tools
2007 -
Analyzing peer behavior in KAD
2007 -
Pervasive workflows: architecture, reliability and security
2007 -
Migrating a honeypot to hardware
2007 -
Understanding vehicular mobility in network simulation
2007 -
Performance analysis and optimization of the 802.11e EDCA transmission opportunity (TXOP) mechanism
2007 -
An adaptive QoS architecture for IEEE 802.16 wireless broadband networks
2007 -
Quality impact of diotic versus monaural hearing on processed speech
2007 -
Toward a 3D watermarking benchmark
2007 -
Movement prediction-based routing (MOPR) concept for position-based routing in vehicular networks
2007 -
Automatic speech recognition and speech variability: A review
2007 -
Diversity-multiplexing-delay tradeoff in half-duplex ARQ relay channels
2007 -
Introduction to the special issue on intrinsic speech variations
2007 -
Exploiting KAD: possible uses and misuses
2007 -
The Premio Paganini project: a multimodal gesture-based approach for explaining emotional processes in music performance
2007 -
DEMO: simulating realistic mobility patterns for vehicular networks with VanetMobiSim
2007 -
Rethinking the overhead of geo-localization information for vehicular communications
2007 -
Optimal PHY and MAC protocols for power-limited ad-hoc networks
2007 -
Capacity pre-log achieving schemes for stationary frequency-flat multi-antenna channels
2007 -
An iterative optimization method for unitary beamforming in MIMO broadcast channels
2007 -
Split-screen dynamically accelerated video summaries
2007 -
Biometrics and multimedia
2007 -
Load reduction in the KAD peer-to-peer system
2007 -
Fast annotation of video objects for interactive TV
2007 -
Information confinement, privacy, and security in RFID systems
2007 -
Traceability and integrity of execution in distributed workflow management systems
2007 -
Centralized and decentralized multi-user schemes for wireless communications
2007 -
Energy-based routing optimization in MANET: Cross-layer benefits
2007 -
Dynamic clustering in Delaunay-based P2P networked virtual environments
2007 -
ALICIA, an architecture for intelligent affective agents
2007 -
Video face recognition: a physiological and behavioural multimodal approach
2007 -
Using emotions to tag media
2007 -
Estimation of the parameters of sinusoidal signal components and of associated perceptual musical interpretation effects
2007 -
Modèle sinusoïdale: Estimation de la qualité de jeu d'un musicien, détection de certains effets d'interprétation
2007 -
SigNCode: A provably secure homomorphic signature scheme for network coding
2007 -
Mobile localization for NLoS propagation
2007 -
Effects of transmit beamforming on the capacity of multi-hop MIMO relay channels
2007 -
Multimedia indexing
2007 -
Comparison of two analog feedback schemes for transmit side MIMO channel estimation
2007 -
Enhancements for simultaneous access in network-based localized mobility management
2007 -
IPv6 soft handover applied to network mobility over heterogeneous access networks
2007 -
Emerging topics in Multiuser MIMO communications
2007 -
A two-stage approach to feedback design in MU-MIMO channels with limited channel state information
2007 -
Low-energy, adaptive, and distributed MAC protocol for wireless sensor-actuator networks
2007 -
Shifting the MIMO paradigm
2007 -
Secure and trusted in-network data processing in wireless sensor networks: a survey
2007 -
Dynamic clustering in Delaunay-Based P2P networked virtual environments
2007 -
Affective user modeling for adaptive intelligent user interfaces
2007 -
Statistical UWB channel model parameters estimation based on SAGE algorithm
2007 -
Optimal power allocation for cognitive radio based on a virtual noise threshold
2007 -
Optimistic fair exchange for secure forwarding
2007 -
Cognitive radio sensing information-theoretic criteria based
2007 -
Secure service publishing with untrusted registries - Securing Service Discovery
2007 -
Multimodal services for remote communications: the vote-registration example
2007 -
Multinet: Enabler for next generation pervasive wireless services
2007 -
Toward a computational model of subjective affective states associated with multimedia contents
2007 -
Indoor UWB channel characterization and modeling based on an information theoretic approach and SAGE algorithm
2007 -
Video shots key-frames indexing and retrieval through pattern analysis and fusion techniques
2007 -
Aggregation dynamics in service overlay networks
2007 -
SOAP-based secure conversation and collaboration
2007 -
Analysis of vector space model and spatiotemporal segmentation for video indexing and retrieval
2007 -
AR source modeling based on spatiotemporally diverse multichannel outputs and application to multimicrophone dereverberation
2007 -
A threshold-based channel state feedback algorithm for modern cellular systems
2007 -
Swarming on optimized graphs for n-way broadcast
2007 -
Watermark recovery from 2D views of a 3D object using texture or silhouette information
2007 -
Non atomic games for multiuser systems
2007 -
A user model of psycho-physiological measure of emotion
2007 -
Optimal matching in wireless sensor networks
2007 -
Cooperative diversity using per-user power control in the multiuser MAC channel
2007 -
Toward recognizing individual’s subjective emotion from physiological signals in practical application
2007 -
Modelling and predicting mobility in wireless ad hoc networks
2007 -
A game theoretic model of a protocol for data possession verification
2007 -
Capacity and positioning in dense scattering environments
2007 -
On the design of scalar feedback techniques for MIMO broadcast scheduling
2007 -
On the pre-log of the asymptotic capacity of stationary frequency-flat multi-antenna channels
2007 -
Optimal decoding order under target rate constraints
2007 -
Binary power control for multi-cell capacity maximization
2007 -
On the interaction between Internet applications and TCP
2007 -
A low complexity distributed multibase transmission scheme for improving the sumcapacity of wireless networks
2007 -
Verifying self-organized storage with bilinear pairings
2007 -
Some contributions to statistical signal processing and applications to audio enhancement and mobile localization
2007 -
Estimation of ultra wideband channel degrees of freedom
2007 -
Discovery: Threats and solutions
2007 -
Compliance proofs for collaborative interactions using aspect-oriented approach
2007 -
Enforcing integrity of execution in distributed workflow management systems
2007 -
Improving proactive routing in VANETs with the MOPR movement prediction framework
2007 -
Probabilistic matching algorithm for keypoint based object tracking using a Delaunay triangulation
2007 -
Multi-level fusion for semantic video content indexing and retrieval
2007 -
Video search using a visual dictionary
2007 -
Intrinsic subspace convergence in TDD MIMO communication
2007 -
Complex-valued matrix differentiation: techniques and key results
2007 -
On the diversity-multiplexing tradeoff for frequency-selective MIMO channels
2007 -
The Premio Paganini project: a multimodal gesture-based approach for explaining emotional processes in music performance
2007 -
Kinetic link state routing
2007 -
Context-aware security policy for the service discovery
2007 -
Modeling seed scheduling strategies in BitTorrent
2007 -
Graph based modeling of P2P streaming systems
2007 -
Introduction to digital watermarking
2007 -
Channel division multiple access : new multiple access approach for UWB networks
2007 -
Kinetic graphs: a framework for capturing the dynamics of mobile structures in MANET
2007 -
Service discovery: reviewing threats and security architectures
2007 -
Adapting psychologically grounded facial emotional expressions to different anthropomorphic embodiment platforms
2007 -
Utilisation des informations contextuelles pour assurer la sécurité d'un processus collaboratif distribué : un exemple dans l'e-Santé
2007 -
Sécurité, protection de la vie privée et disponibilité
2007 -
Sécurité dans les réseaux mobiles de télécommunications
2007 -
Multiple hypothesis feedback for robust speech recognition with a microphone array input
2007 -
Rethinking the overhead of geo-localization information for vehicular communications
2007 -
Resource allocation in multicell wireless networks:Some capacity scaling laws
2007 -
On stability and sampling schemes for wireless sensor networks
2007 -
Variational Bayesian learning of speech GMMS for feature enhancement based on Algonquin
2007 -
Person recognition from video using facial mimics
2007 -
Down-sampled impulse response least-squares channel estimation for LTE OFDMA
2007 -
Efficient metrics for scheduling in MIMO broadcast channels with limited feedback
2007 -
Multivariate LP based MMSE-ZF equalizer design considerations, and application to multimicrophone dereverberation
2007 -
Confidentiality and integrity for data aggregation in WSN using peer monitoring
2007 -
Wardrop equilibrium for CDMA systems
2007 -
Performance limitations of ADSL users : a case study
2007 -
Enforcing integrity of execution in distributed workflow management systems
2007 -
A UMTS-TDD software radio platform
2007 -
Hard fairness versus proportional fairness in wireless communications: the single-cell case
2007 -
Sécurité dans les réseaux mobiles de nouvelle génération
2007 -
Analyzing the performance of a self organizing framework for wireless sensor-actuator networks
2007 -
Vehicular mobility simulation for VANETs
2007 -
Power allocation policies over multi-band/multi-user cognitive radio system
2007 -
Achieving Cesaro-Wardrop equilibrium in wireless sensor networks
2007 -
Cesaro-Wardrop equilibrium in wireless sensor networks
2007 -
Balance of multiuser diversity and multiplexinggain in near-orthogonal MIMO systems withlimited feedback
2007 -
Maximizing multicell capacity using distributed power allocation and scheduling
2007 -
Orthogonal linear beamforming in MIMO broadcast channels
2007 -
Bounds on the distortion of distributed sensing of random fields
2007 -
Spectral efficiency of cognitive radio systems with correlated fading channels
2007 -
Comparison of two analog feedback schemes for transmit side MIMO channel estimation
2007 -
Optimal decoding order under target rate constraints
2007 -
When network coding and dirty paper coding cooperate
2007 -
Low SNR analysis for MIMO broadcast channels with different types of CSIT
2007 -
Channel division multiple access
2007 -
Non atomic games for CDMA systems
2007 -
Statistics and chip pulse design for efficient multiuser detection in asynchronous CDMA
2007 -
Multi-polarized MIMO communications: channel model, mutual information and array
2007 -
Maximum entropy characterization of spatially correlated MIMO wireless channels
2007 -
Generic object tracking for fast video annotation
2007 -
Video modeling using 3-D Hidden Markov model
2007 -
Bayesian adaptive filtering
2007 -
CDMA systems with correlated spatial diversity : a generalized resource pooling result
2007 -
Scheduling in practice
2007 -
Actively monitoring peers in KAD
2007 -
Diagnostics of speech recognition : on evaluating feature set performance
2007 -
VanetMobiSim: a configurable simulator for generating realistic mobility patterns for VANETs
2007 -
Information theory and wireless channel modeling
2007 -
Multidimensional hidden Markov model applied to image and video analysis
2007 -
Distributed power allocation for cognitive radio
2007 -
Cognitive radio platform: from achievable performance to architecture design
2007 -
A game theoretic model of a protocol for data possession verification
2007 -
Probabilistically secure cooperative distributed storage
2007 -
Schemes and architectures for wireless ad hoc networks and cooperative communication
2007 -
On the operational comparison of available bandwidth estimation tools
2007 -
SGNET: a distributed infrastructure to handle zero-day exploits
2007 -
Precoded orthogonal space-time block codes over correlated ricean MIMO channels
2007 -
Overlay architectures for file distribution: fundamental performance analysis for homogeneous and heterogeneous cases
2007 -
Watermarking attack: BOWS contest
2007 -
Survey of channel and radio propagation models for wireless MIMO systems
2007 -
Precoded orthogonal space–time block codes over correlated ricean MIMO channels
2007 -
Secure data aggregation with multiple encryption
2007 -
On the diversity-multiplexing tradeoff for frequency-selective MIMO channels
2007 -
Capacity of MIMO systems: impact of polarization, mobility and environment
2007 -
Capacity of dense scattering environments
2007 -
Neighborhood changing rate: an unifying parameter to charaterize and evaluate data dissemination scenarios
2007 -
Performance analysis of cooperative content distribution for wireless ad hoc networks
2007 -
Integration of broadcast technologies with heterogeneous networks – an IEEE 802.21 centric approach
2007 -
Neural network combining classifier based on Dempster-Shafer theory for semantic indexing in video content
2007 -
Semantic image segmentation with a multi-dimensional Hidden Markov Model
2007 -
Performance analysis of multiple classifier fusion for semantic video content indexing and retrieval
2007 -
Transmit diversity versus opportunistic beamforming in data packet mobile downlink transmission
2007 -
Challenges in peer-to-peer gaming
2006 -
Modeling and analysis of seed sheduling strategies in a BitTorrent network
2006 -
Investigations into tandem features
2006 -
Improved video verification method using digital watermarking
2006 -
Speech recognition in reverberant environments using remote microphones
2006 -
De la qualité de service à l'analyse de trafic
2006 -
Policy-based cryptography : theory and applications
2006 -
Size-based scheduling to improve fairness and performance in 802.11 networks
2006 -
DASR: A diagnostic tool for automatic speech recognition
2006 -
Evaluation of a video annotation tool based on the LSCOM ontology
2006 -
Secure Web service discovery: overcoming challenges of ubiquitous computing
2006 -
Shortcuts in a virtual world
2006 -
Achieving the optimal diversity-vs-multiplexing tradeoff for MIMO flat channels with QAM space-time spreading and DFE equalization
2006 -
On meaningful parameters for routing in VANETs urban environments under realistic mobility patterns
2006 -
La biométrie en mouvement
2006 -
Fast stochastic exploration of P2P file distribution architectures
2006 -
Content delivery in overlay networks: a stochastic graph processes perspective
2006 -
Blind detection for block coded interleaved division multiple access
2006 -
An early application of SCTP/mSCTP for multihomingin netLMM
2006 -
Diagnostics of speech recognition using classification phoneme diagnostic trees
2006 -
Securing cooperative backup for mobile systems
2006 -
IPv6 and 4G
2006 -
Eurecom in TrecVid 2006: high level features extractions and rushes study
2006 -
State of the art of mobility protocols
2006 -
Power allocation under quality of service constraints for uplink multi-user MIMO systems
2006 -
A twin-cluster MIMO channel model
2006 -
Towards secure SOAP message exchange in a SOA
2006 -
Diversity aspects of linear and decision-feedback equalizers for frequency-selective multi-antenna channels
2006 -
Steady-state performance comparison of bayesian and standard adaptive filtering
2006 -
Multiuser diversity - multiplexing tradeoff in MIMO broadcast channels with limited feedback
2006 -
Investigation of some bias and MSE issues in block-component-wise conditionally unbiased LMMSE
2006 -
UWB channel models
2006 -
Least squares filtering of speech signals for robust ASR
2006 -
K-Space at TRECVid 2006
2006 -
Root cause analysis of TCP throughput : methodology, techniques and applications
2006 -
Some results on the asymptotic downlink capacity of MIMO multi-user networks
2006 -
Estimation of frequency-selective block-fading MIMO channels using PARAFAC modeling and alternating least squares
2006 -
Wideband resource allocation for future cellular networks
2006 -
Adaptation d'une théorie psychologique pour la génération d'expressions faciales synthétiques pour des agents d'interface
2006 -
Rarest first and choke algorithms are enough
2006 -
Integrity verification system for video content by using digital watermarking
2006 -
Toward multimodal fusion of affective cues
2006 -
Lessons learned from the deployment of a high-interaction honeypot
2006 -
Towards transactional pervasive workflows
2006 -
Application-level performance of ADSL users
2006 -
An intelligent movement-based routing for VANETs
2006 -
Person recognition based on head and mouth dynamics
2006 -
Optimal constant-window backoff scheme for IEEE 802.11 DCF in finite load single-hop wireless networks
2006 -
MAUI avatars: Mirroring the user's sensed emotions via expressive multi-ethnic facial avatars
2006 -
A survey and qualitative analysis of MAC protocols for vehicular ad hoc networks
2006 -
On the need for signal-coherent watermarks
2006 -
Collusion-free policy-based encryption
2006 -
When network coding and dirty paper coding meet in a cooperative ad hoc network
2006 -
VanetMobiSim: generating realistic mobility patterns for VANETs
2006 -
Novel speech processing techniques for robust automatic speech recognition
2006 -
Cooperation incentive schemes
2006 -
Adaptive complexity equalization for the downlink in WCDMA systems
2006 -
Wideband channel allocation in distributed antenna systems
2006 -
Channel division multiple access based on high UWB channel temporal resolution
2006 -
Mobile terminal positioning via power delay profile fingerprinting: reproducible validation simulations
2006 -
Affective multimedia interaction grounded on a cognitive science approach : interpreting indirect measures of emotion and modeling the affective relationship to multimedia contents
2006 -
Generation of facial emotional expressions based on Scherer psychological theory
2006 -
Cross layer design of IEEE 802.11-based mobile ad hoc networks for QoS provisioning
2006 -
Avatar expressions with Scherer’s theory
2006 -
Automatic handling of protocol dependencies and reaction to 0-day attacks with ScriptGen based honeypots
2006 -
Augmenting Web services composition with transactional requirements
2006 -
Graph-based spatio-temporal region extraction
2006 -
Process for estimating the channel state in a transmitter of a digital communication system and apparatus for doing the same
2006 -
Iterated delay and predict equalization for blind speech dereverberation
2006 -
A size-based scheduling to improve fairness and performance in 802.11 networks
2006 -
Classifier fusion : combination methods for semantic indexing in video content
2006 -
A user-modeling approach to build user’s psycho-physiological maps of emotions using bio-sensors
2006 -
Proof-carrying proxy certificates
2006 -
Linear detectors for multi-user MIMO systems with correlated spatial diversity
2006 -
Transmit correlation-aided opportunistic beamforming and scheduling
2006 -
N-Best parallel maximum likelihood beamformers for robust speech recognition
2006 -
A novel voiced speech enhancement approach based on modulated periodic signal extraction
2006 -
Using GPU for fast block-matching
2006 -
A simple greedy scheme for multicell capacity maximization
2006 -
Probabilistic access functions for multi-cell wireless schemes
2006 -
Performance evaluation of supervised PARAFAC receivers for CDMA systems
2006 -
Eigen-mode/singular-modecharacteristics and capacity of the propagation channel
2006 -
On variable-scale piecewise stationary spectral analysis of speech signals for ASR
2006 -
Still image watermarking robust to local geometric distortions
2006 -
User-customized password speaker verification using multiple reference and background models
2006 -
Analysis of vehicular mobility patterns on routing protocols
2006 -
A survey of computational economics applied to computer networks
2006 -
Performance analysis of cooperative content distribution for wireless ad hoc networks
2006 -
The MIMO ARQ channel: diversity-multiplexing-delay tradeoff
2006 -
Channel allocation algorithms for multi-carrier multiple-antenna systems
2006 -
Advances in smart antennas
2006 -
The challenges of predicting mobility
2006 -
Impact of signal constellation expansion on the achievable diversity of pragmatic bit-interleaved space-time codes
2006 -
A new approach to probabilistic image modeling with multidimensional hidden Markov models
2006 -
Establishment of ad-hoc communities through policy-based cryptography
2006 -
Person recognition using human head motion information
2006 -
Continuous behaviour knowledge space for semantic indexing of video content
2006 -
A behavioural approach to person recognition
2006 -
Hard fairness versus proportional fairness in wireless communications: the single-cell case
2006 -
Maximizing the capacity of large wireless networks: optimal and distributed solutions
2006 -
Diversity and coding gain of Linear and decision-feedback equalizers for frequency-selective SIMO channels
2006 -
Protection of 3D object visual representations
2006 -
Fast video object selection for interactive television
2006 -
Adaptive support of inter-domain collaborative protocols using web services and software agents
2006 -
Design issues for MIMO systems in various fading situations
2006 -
Maximizing the capacity of wireless networks using multi-cell access schemes
2006 -
Low complexity scheduling and beamforming for multiuser MIMO systems
2006 -
A deterministic blind receiver for MIMO OFDM systems
2006 -
Optimization combined chip and symbol level equalization for downlink WCDMA reception
2006 -
A MIMO-OFDM testbed for wireless local area networks
2006 -
Daidalos : vers une architecture du futur pour les opérateurs réseaux
2006 -
Design and optimization of multiple access protocols for ad hoc wireless networks
2006 -
Empirical analysis and statistical modeling of attack processes based on honeypots
2006 -
Improving robustness of a likelihood-based beamformer in a real environment for automatic speech recognition
2006 -
Impact of variabilities on speech recognition
2006 -
Emotional aspects of intrinsic speech variabilities in automatic speech recognition
2006 -
Time signatures to detect multi-headed stealthy attack tools
2006 -
An early technical evaluation of convergence between cellular and broadcast media
2006 -
BDI+E Framework: an affective cognitive modeling for autonomous agents based on Scherer’s emotion theory
2006 -
Psychologically grounded avatars expressions
2006 -
Affective cognitive modeling for autonomous agents based on Scherer's emotion theory
2006 -
Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns
2006 -
Toward building adaptive user's psycho-physiological maps of emotions using bio-sensors
2006 -
Generation of facial emotional expressions based on psychological theory
2006 -
Reconnaissance robuste de parole en environnement reél à l'aide d'un réseau de microphones à formation de voie adaptative basée sur un critère des N-best vraisemblance maximale
2006 -
Confidence measures for tandem connectionist feature extraction
2006 -
Interference mitigation techniques for broadband satellite system
2006 -
Adaptive chip level equalization for HSDPA
2006 -
Precoding for distributed space-time codes in cooperative diversity-based downlink
2006 -
A realistic mobility simulator for vehicular ad hoc networks
2006 -
Simulation based performance evaluation of a user-centric group rekeying protocol
2006 -
Diversity-multiplexing tradeoff for frequency fading channels with CSIT
2006 -
A flexible framework for the support of heterogeneous wireless networks
2006 -
Détection d'intrusions : état de l'art, faiblesses et problèmes ouverts
2006 -
Automatic video summarization
2006 -
MoSAIC: Mobile System Availability Integrity and Confidentiality
2006 -
Rate optimal multiuser scheduling with reduced feedback load and analysis of delay effects
2006 -
Cooperation dans les reseaux ad-hoc: Application de la theorie des jeux et de l'evolution dans le cadre d'observabilité imparfaite
2006 -
An inline approach for secure SOAP requests and early validation
2006 -
Advanced receivers for high speed downlink packet access in UMTS
2006 -
Identity-based message authentication for dynamic networks
2006 -
Comparative study of different features on OLLO logatome recognition task
2006 -
Correlated equilibrium in access control for wireless communications
2006 -
Protection of 3D object through silhouette watermarking
2006 -
A maximum entropy approach to ultra-wideband channel modeling
2006 -
Multi-dimensional dependency-tree hidden Markov models
2006 -
Delay and predict equalization for blind speech dereverberation
2006 -
Unit selection speech synthesis in noise
2006 -
Receiver-enhanced cooperative spatial multiplexing with hybrid channel knowledge
2006 -
Transmit correlation-aided scheduling in multiuser MIMO networks
2006 -
Fepstrum and carrier signal decomposition of speech signals through homomorphic filtering
2006 -
Automatic speech recognition and intrinsic speech variation
2006 -
Flexible feature spaces based on generalized heteroscedastic linear discriminant analysis
2006 -
MIMO-OFDMA opportunistic beamforming with partial channel state information
2006 -
A peer-to-peer normative system to achieve social order
2006 -
Power allocation and feedback reduction for multi-user MIMO-OFDMA opportunistic beamforming
2006 -
Space-time wireless systems: from array processing to MIMO communications
2006 -
Blind and semiblind MIMO channel estimation
2006 -
Triangulating design science, behavioral science, and practice for technological advancement in tele-home health
2006 -
Le paradigme MAUI pour des agents multimodaux d'interface homme-machine socialement intelligents
2006 -
DDC: A dynamic and distributed clustering algorithm for networked virtual environments based on P2P networks
2006 -
PULSE, a flexible P2P live streaming system
2006 -
Enabling secure discovery with attribute based encryption
2006 -
Achieving a good trade-off between complexity and enhancement in cross layer architectures
2006 -
Impact of inner parameters and overlay structure on the performance of BitTorrent
2006 -
Mobilité: subir ou prédire ?
2006 -
Probabilistic image modeling with dependency-tree hidden Markov models
2006 -
A cross-layer feature for an efficient forwarding strategy in wireless ad hoc networks
2006 -
Enabling secure discovery in a pervasive environment
2006 -
State of the art in 3D face recognition
2006 -
Allocation opportuniste de spectre pour les radios cognitives
2006 -
A low-energy adaptive and distributed MAC protocol for wireless sensor-actuator networks
2006 -
Optimal power allocation and scheduling for two-cell capacity maximization
2006 -
Object-relational DBMS for packet-level traffic analysis: case study on performance optimization
2006 -
PPrate: a passive capacity estimation tool
2006 -
On the spatial and temporal degrees of freedom of UWB communications
2006 -
A novel self organizing framework for SANETs
2006 -
A theoretical high rate analysis of causal versus unitary on-line transform coding
2006 -
Collaborative allocation of orthogonal frequency division multiplex sub-carriers usingthe Swarm intelligence
2006 -
MULTI+: a robust and topology-aware peer-to-peer multicast service
2006 -
An application of policy-based signature: proof-carrying proxy certificates
2006 -
Augmenting Web services composition with transactional requirements
2006 -
Performance analysis of the actuator discovery protocol for static and mobile sensor and actuator networks
2006 -
An energy aware actuator discovery protocol for SANETs
2006 -
Process for regulating the traffic of an ad hoc network
2006 -
Policy-based encryption schemes from bilinear pairings
2006 -
Mobility models for vehicular ad hoc networks: a survey and taxonomy
2006 -
Ziv-Zakai lower bound on The time delay estimation of UWB signals
2006 -
A two-stage approach to Bayesian adaptive filtering
2006 -
Steady-state performance analysis of bayesian adaptive filtering
2006 -
Linear multiuser detection for CDMA systems with correlated spatial diversity
2006 -
Linear multiuser detection for asynchronous CDMA systems: chip pulse design and time delay distribution
2006 -
Channel division multiple access
2006 -
Music source separation via sparsified dictionaries vs. parametric models
2006 -
Performance testing of OLSR using mobility predictions
2006 -
Internet attack knowledge discovery via clusters and cliques of attack traces
2006 -
Precoding of orthogonal space-time block codes in arbitrarily correlated MIMO channels: iterative and closed-form solutions
2006 -
From content distribution networks to content networks — issues and challenges
2006 -
Secure data aggregation with multiple encryption
2006 -
Spectral efficiency of CDMA downlink cellular networks with matched filter
2006 -
Two-way radio networks with a star topology
2006 -
Cooperative spatial multiplexing with hybrid channel knowledge
2006 -
A statistical UWB channel model based on physical analysis
2006 -
Rarest first and choke algorithms are enough
2006 -
Maximum entropy MIMO wireless channel models with limited information
2006 -
Ad hoc networks security
2006 -
Efficient ocular expression analysis for synthetic reproduction
2006 -
Transmitting over Ill-conditioned MIMO channels: from spatial to constellation multiplexing
2006 -
Distributed system of honeypot sensors : discrimination and correlative analysis of attack processes
2006 -
Semantic feature extraction with multidimensional hidden Markov model
2006 -
Watermarking of 3D objects based on 2D apparent contours
2006 -
Energy consumption speed-based routing for mobile ad hoc networks
2006 -
CrossTalk: Cross-layer decision support based on global knowledge
2006 -
Coded modulation in the block-fading channel: coding theorems and code construction
2006 -
Error probability of bit-interleaved coded modulation
2005 -
Enabling pervasive execution of workflows
2005 -
Fountain codes for lossless data compression
2005 -
On the application of mobility predictions to multipoint relaying in MANETs: kinetic multipoint relays
2005 -
ScriptGen: an automated script generation tool for honeyd
2005 -
A secure public sector workflow management system
2005 -
Collusion issue in video watermarking
2005 -
Structurally enhanced latent semantic analysis for video object retrieval
2005 -
Optimal constant-window backoff scheme to increase throughput and fairness of IEEE 802.11 DCF in single-hop networks
2005 -
Hierarchical genetic fusion of possibilities
2005 -
PorTiVity: new Rich Media iTV services for handheld TV
2005 -
Minimum BER FIR receiver filters for DS-CDMA systems
2005 -
Fepstrum representation of speech signal
2005 -
Kinetic multipoint relaying: improvements using mobility predictions
2005 -
NEXUS: fusing the real & the virtual
2005 -
Uplink distributed resource allocation algorithm for maximized WLAN performance
2005 -
Eurecom at TRECVid 2005: extraction of high-level features
2005 -
Adaptive enhancement of speech signals for robust ASR
2005 -
Understanding BitTorrent: an experimental perspective
2005 -
Tatouage d'objets 3D via la carte de profondeur cylindrique
2005 -
Efficient OFDMA distributed optimization algorithm exploiting multi-user diversity
2005 -
The use of packet inter-arrival times for investigating unsolicited Internet traffic
2005 -
Comparative survey of local honeypot sensors to assist network forensics
2005 -
Méthode de segmentation par graphe pour le suivi de régions spatio-temporelles
2005 -
Online face detection and user authentication
2005 -
A MIMO-OFDM testbed for wireless local area networks
2005 -
Audio fingerprinting: nearest neighbor search in high dimensional binary spaces
2005 -
Multiuser-MIMO downlink TX-RX design based on SVD channel diagonalization and multiuser diversity
2005 -
Common and dedicated pilot-based channel estimates combining and Kalman filtering for WCDMA terminals
2005 -
Component-wise conditionally unbiased bayesian parameter estimation: general concept and applications to Kalman filtering and LMMSE channel estimation
2005 -
Spatial transmit prefiltering for frequency-flat MIMO transmission with mean and covariance information
2005 -
A realistic mobility simulator for vehicular ad hoc networks
2005 -
Root cause analysis for long-lived TCP connections
2005 -
DDC: A dynamic and distributed clustering algorithm for networked virtual environments based on P2P networks
2005 -
Trajectory knowledge for improving topology control in mobile ad-hoc networks
2005 -
A three-layered architecture for socially intelligent agents: modeling the multilevel process of emotions
2005 -
Intentional embodied agents
2005 -
On the interaction between Internet applications and TCP
2005 -
Regroupement de modèles de locuteurs par méthode Bayesienne variationnelle: applications à la sélection de modèles par méthode variationnelle pour l’indexation audio
2005 -
Alamouti-based space-frequency coding for OFDM
2005 -
Modelling and securing European justice workflows
2005 -
A lower bound for vehicles' trajectory duration
2005 -
Tatouage d'objets 3D et récupération 2D
2005 -
Perspectives of adopting interference mitigation techniques in the context of broadband multimedia satellite systems
2005 -
Variational Bayesian methods for audio indexing
2005 -
Large scale diffusion of information in publish/subscribe systems
2005 -
Reconfigurable Viterbi decoder for mobile platform
2005 -
Link-layer fragmentation and retransmission impact on TCP performance in 802.11-based networks
2005 -
Collection and analysis of attack data based on honeypots deployed on the Internet
2005 -
Towards person recognition using head dynamics
2005 -
Countermeasures for collusion attacks exploiting host signal redundancy
2005 -
Extended Erlang-B law for performance evaluation of radio resources sharing in GSM/(E)GPRS networks
2005 -
Maintaining the identity of dynamically embodied agents
2005 -
Social situated agents in virtual, real and mixed reality environments
2005 -
Blind dereverberation of quasi-periodic sources based on multichannel linear prediction
2005 -
A cross-layer on-demand routing protocol for delay-sensitive applications
2005 -
Resource allocation in wideband wireless systems
2005 -
On the application of mobility predictions to multipointrelaying in MANETs: kinetic multipoint relays
2005 -
An efficient algorithm for informed embedding of dirty paper trellis codes for watermarking
2005 -
A countermeasure to resist block replacement attacks
2005 -
Asymmetric 3D/2D processing: a novel approach for face recognition
2005 -
Code constructions for non-coherent on-off ultra-wideband systems
2005 -
Performance of channel inversion schemes for multi-user OFDMA
2005 -
Achievable diversity-multiplexing-delay tradeoff in half-duplex ARQ relay channels
2005 -
Optimal diversity vs multiplexing tradeoff for frequency selective mimo channels
2005 -
Variational Bayesian speaker change detection
2005 -
On variable-scale piecewise stationary spectral analysis of speech signals for ASR
2005 -
Rate-optimal multiuser scheduling with reduced feedback load and analysis of delay effects
2005 -
The diversity-multiplexing-delay tradeoff in MIMO ARQ channels
2005 -
Memory based opportunistic multi-user beamforming
2005 -
Generalized pilot assisted channel estimation for WCDMA
2005 -
Gallager bounds for linear codes in binary-Input output-symmetric memoryless channels
2005 -
Lossy transmission over slow-fading AWGN channels: a comparison of progressive, superposition and hybrid approaches
2005 -
When to synchronize in uplink CDMA
2005 -
Cooperative content distribution: scalability through self-organization
2005 -
Algorithms for iterative decoding in the presence of strong phase noise
2005 -
Spatial multiplexing over correlated MIMO channels with a closed form precoder
2005 -
QRST cancellation using bayesian estimation for the auricular fibrillation analysis
2005 -
Semantic peer-to-peer overlays for publish/subscribe networks
2005 -
A practical method for wireless channel reciprocity exploitation through relative calibration
2005 -
On the convergence of bayesian adaptive filtering
2005 -
An evolutionary game perspective to ALOHA with power control
2005 -
Interference cancellation with bayesian channel models and application to TDOA/IPDL mobile positioning
2005 -
An overview of the WIDENS MAC/PHY layer for rapidly deployable broadband public safety communication systems
2005 -
Cross-layer's paradigm features in MANET: benefits and challenges
2005 -
Affective intelligent car interfaces with emotion recognition
2005 -
A movement prediction-based routing protocol for vehicle-to-vehicle communications
2005 -
GMM-based multimodal biometric verification
2005 -
VALERIE: a virtual agent for a learning environment, reacting and interacting emotionally
2005 -
Multi-channel mono-path periodic signal extraction with global amplitude and phase modulation for music signal decomposition
2005 -
Bayesian adaptive filtering at linear cost
2005 -
Low complexity bayesian adaptive filtering with independent AR(1) filter coefficient models
2005 -
Real life experience of Cooperation Enforcement Based on Reputation (CORE) for MANETs
2005 -
SKiMPy: a simple key management protocol for MANETs in emergency and rescue operations
2005 -
Editorial
2005 -
Variational Bayesian methods for audio indexing
2005 -
A variable-scale piecewise stationary spectral analysis technique applied to the ASR
2005 -
Least squares filtering of speech signals for robust ASR
2005 -
Adaptive transmission opportunity for QoS enhancement in (EDCA) IEEE 802.11e WLANs
2005 -
Techniques de transmission et de modélisation de canal pour les systèmes de communications multi-antennes
2005 -
A pointillist approach for comparing honeypots
2005 -
Minimizing feedback load for nested scheduling algorithms
2005 -
Personalization of hyperlinked video in interactive television
2005 -
Hyperlinked video with moving objects in digital television
2005 -
Securing multicast communications in satellite networks: a user-centric approach
2005 -
A probabilistic model of face mapping with local transformations and its application to person recognition
2005 -
CrossTalk: a data dissemination-based crosslayer architecture for mobile ad-hoc networks
2005 -
General IP based mobility mechanisms in heterogeneous system fix/mobile
2005 -
White paper: Integration of honeypot data into an alert correlation engine
2005 -
Advanced coding techniques for multicasting and broadcasting in wireless communications
2005 -
Stochastic learning feedback hybrid automata for dynamic power management in embedded systems
2005 -
On MAC and routing protocols cooperation in inter-vehicle communications
2005 -
Analysis of signaling and coding schemes for non-coherent ultra-wideband systems
2005 -
On the use of multiple antennas in a downlink of wireless systems
2005 -
OLSR and MPR: mutual dependences and performances
2005 -
Region-based video content indexing and retrieval
2005 -
A low-complexity approach to space-time coding for multipath fading channels
2005 -
Channel models for ultra-wideband communications: an overview
2005 -
Opportunistic beamforming vs. space time coding in a queued downlink
2005 -
The DAIDALOS architecture for QoS over heterogeneous wireless networks
2005 -
WIDENS: advanced wireless ad-hoc networks for public safety
2005 -
A framework for mobility models generation and its application to inter-vehicular networks
2005 -
Security issue and collusion attacks in video watermarking
2005 -
How to combat block replacement attacks?
2005 -
Can we take this off-line? Credentials for Web services supported nomadic applications
2005 -
ARQ based half-duplex cooperative diversity protocol
2005 -
Robust multi-user opportunistic beamforming for sparse networks
2005 -
Pathwise MIMO channel modeling and estimation
2005 -
Linear precoding for MIMO transmission with partial CSIT
2005 -
Performance of the MIMO downlink channel with multi-mode adaptation and scheduling
2005 -
Impact of multiple transmit antennas in a queued SDMA/TDMA downlink
2005 -
A channel predictive proportional fair scheduling algorithm
2005 -
Bayesian approaches for combining noisy mean and covariance channel information
2005 -
Semantic video content indexing and retrieval
2005 -
The ‘Pure-IP’ Moby Dick 4G architecture
2005 -
Leurré.com : retour d'expérience sur plusieurs mois d'utilisation d'un pot de miel distribué mondialement
2005 -
Optimal location of intermodal freight hubs
2005 -
Distance-bounding proof of knowledge to avoid real-time attacks
2005 -
Exploiting multiuser diversity using multiple feedback thresholds
2005 -
QoS-based user scheduling for multi-user MIMO systems
2005 -
Precoding of orthogonal space-time block codes over correlated Ricean MIMO channels
2005 -
A self-balanced receiver-oriented MAC protocol for multiple channels multihop ad-hoc networks
2005 -
Modifications on NIST MarkIII array to improve coherence properties among input signals
2005 -
Reconfigurable radio access technology: overview
2005 -
A cross-layer stability-based on-demand routing protocol for mobile ad-hoc networks
2005 -
InTraBase: integrated traffic analysis based on a database management system
2005 -
Towards a fully distributed QoS-aware MAC protocol for multihop wireless networks
2005 -
Disambiguating network effects from edge effects in TCP connections
2005 -
A fully distributed peer to peer structure based on 3D Delaunay triangulation
2005 -
On the estimation of the degrees of freedom of in-door UWB channel
2005 -
A distributed time stamping scheme
2005 -
Non cooperative forwarding in ad hoc networks
2005 -
EARMultimedia : Approche modèle utilisateur du phénomène d’évaluation affective de l’environnement perceptif
2005 -
Partition sampling : an active learning selection strategy for large database annotation
2005 -
MIMO channel modelling and the principle of maximum entropy
2005 -
Provably secure policy-based cryptography
2005 -
CADHo: Collection and Analysis of Data from Honeypots
2005 -
Some game-theoretic problems in wireless ad hoc networks
2005 -
Une plate-forme radio logicielle UMTS-TDD
2005 -
Editorial of Special Issue on improved CDMA detection techniques for future wireless systems
2005 -
Signal coherent watermarking in video
2005 -
Multi-modal classifier fusion for video shot content retrieval
2005 -
Towards simulating the multi-level process theory of human emotions in Brahms multi-agent modeling system
2005 -
On the stationarity of TCP bulk data transfers
2005 -
Leurre.com: on the advantages of deploying a large scale distributed honeypot platform
2005 -
Clustering face images with application to image retrieval in large databases
2005 -
Watermark resynchronization based on Elastic Graph Matching
2005 -
OLSR and MPR: mutual dependences and performances
2005 -
Spectral efficiency of CDMA uplink cellular networks
2005 -
On the asymptotic performance of MIMO correlated Ricean channels
2005 -
On desensitizing the Mel-cepstrum to spurious spectral components for robust speech recognition
2005 -
Variational bayesian adaptation for speaker clustering
2005 -
Variational bayesian feature saliency for audio type classification
2005 -
Linear precoding and DFE equalization achieve the diversity vs multiplexing optimal tradeoff
2005 -
Periodic signal extraction with global amplitude and phase modulation for music signal decomposition
2005 -
On calibration and coherence signal analysis of the CHIL microphone network at IRST
2005 -
Generalized multi-carrier signaling for ultra-wideband systems
2005 -
Comparing the streaming of FGS encoded video at different aggregation levels: frame, GoP, and scene
2005 -
A macroanalysis of HSDPA receiver models
2005 -
Policy-based cryptography and applications
2005 -
On the performance of multiuser MIMO systems in Beyond 3G: beamforming, feedback and scheduling
2005 -
Efficient feedback signaling using multi-channel selection diversity for multi-user MIMO systems
2005 -
Subspace analysis of indoor UWB channels
2005 -
Sécurité des communications en multicast
2005 -
Structured peer-to-peer networks: faster, closer, smarter
2005 -
Size-based scheduling to improve the performance of short TCP flows
2005 -
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
2005 -
Biometrics person authentication: from theory to practice
2005 -
Spatial throughput of multi-hop wireless networks,
2005 -
The new MarkIII/IRST-Light microphone array
2005 -
CROMA: An enhanced slotted MAC protocol for MANETs
2005 -
State of the art in 3d face recognition
2005 -
A distributed time stamping scheme
2005 -
Collusion issue in video watermarking
2005 -
Downlink WCDMA receivers based on combined chip and symbol level equalizationchip and symbol level equalization
2005 -
Mécanismes de handover pour les réseaux IP sans-fil
2004 -
Cooperation enforcement and network security mechanisms for mobile ad hoc networks
2004 -
Subcarrier allocation scheme for multiuser OFDM systems
2004 -
A hierarchical P2P network: design and applications
2004 -
Understanding threats: a prerequisite to enhance survivability of computing systems
2004 -
Access control, code allocation, and adaptive scheduling for UMTS-TDD
2004 -
Approaches for scalable content distribution in the Internet
2004 -
Topology management for improving routing and network performances in mobile ad hoc networks
2004 -
Secure mobile business applications - Framework, architecture, and implementation
2004 -
Minimum exact SER precoding of orthogonal space-time block codes for correlated MIMO channels
2004 -
Multiuser channel allocation algorithms achieving hard fairness
2004 -
Empirical eigenanalysis of indoor UWB propagation channels
2004 -
Linear closed-form precoding of MIMO multiplexing systems in the presence of transmit correlation and Ricean channel
2004 -
Reliable group rekeying with a customer perspective
2004 -
A probabilistic model of face mapping applied to person recognition
2004 -
MIMO frequency-selective channel modeling based on pathwise dynamics
2004 -
Optimization issues in combined chip and symbol level equalization for downlink WCDMA receivers
2004 -
Window optimization issues in recursive least-squares adaptive filtering and tracking
2004 -
Extending orthogonal block codes with partial feedback
2004 -
Eurecom at video-TREC 2004: feature extraction task
2004 -
Semantic peer-to-peer overlays for publish/subscribe networks
2004 -
Efficient search in unstructured peer-to-peer networks
2004 -
OWL : Installation testing and validation
2004 -
Universal variable-length data compression of binary sources using fountain codes
2004 -
A comparison of conventional and online fraud
2004 -
Enhancing latent semantic analysis video object retrieval with structural information
2004 -
Multilevel emotion modeling for autonomous agents
2004 -
Collaborative backup for dependable mobile applications
2004 -
Proactive hot spot avoidance for web server dependability
2004 -
XNet: a reliable content based publish subscribe system
2004 -
Video waterscrambling: towards a video protection scheme based on the disturbance of motion vectors
2004 -
Latent semantic analysis for an effective region-based video shot retrieval system
2004 -
Trust establishment protocols for communicating devices
2004 -
Mécanismes de contrôle de qualité de service dans l'UMTS pour les applications sur IP
2004 -
Multicasting protocols for ad hod networks
2004 -
Superposition coding for gaussian dirty-paper
2004 -
Superposition coding for costa channels
2004 -
Turbo-like codes are good for the block-fading channel
2004 -
New simple evaluation of the error probability of bit-interleaved coded modulation using the saddlepoint approximation
2004 -
Antenna diversity versus multi-user diversity: Quantifying the trade-offs
2004 -
Practical schemes for interactive data exchange
2004 -
Resource allocation and opportunistic scheduling for UMTS-TDD
2004 -
Scoring unknown speaker clustering : VB vs. BIC
2004 -
Further results on selective multi-user diversity
2004 -
Overview of the WIDENS architecture, a wireless ad hoc network for public safety
2004 -
Bounds on the throughput capacity of wireless Ad Hoc networks with non-uniform traffic
2004 -
Security pitfalls of frame-by-frame approaches to video watermarking
2004 -
Variable-rate coding for slowly fading gaussian multiple-access channels
2004 -
Cooperative strategies for file replication in P2P networks
2004 -
Honeypot platform : analyses and results
2004 -
An information theoretic point of view to MIMO channel modelling
2004 -
Spatial throughput of multi-hop wireless networks under different retransmission protocols
2004 -
On the capacity of MIMO rice channels
2004 -
Efficient implementation of linear multiuser detectors for asynchronous CDMA
2004 -
Progressive hiding of a 3D object into its texture image
2004 -
Performance analysis of peer-to-peer networks for file distribution
2004 -
MULTI+: building topology-aware overlay multicast trees
2004 -
Multistage trellis quantization and its applications
2004 -
Elaboration d'une technique de tatouage video basée sur la perturbation des vecteurs de mouvements
2004 -
Channel allocation algorithms for multi-carrier systems
2004 -
On desensitizing the Mel-cepstrum to spurious spectral components for robust speech recognition
2004 -
On multi-scale piecewise stationary spectral analysis of speech signals for robust ASR
2004 -
Exploiting self-similarities to defeat digital watermarking systems - A case study on still images
2004 -
Impact of the users' distribution on the IEEE 802.11a MAC protocol fairness and performance
2004 -
Impact of inter-cell interference in a IEEE 802.11a network with overlapping cells
2004 -
Support de la qualité de service dans les routeurs accès de l'Internet
2004 -
A self-balanced receiver-oriented MAC protocol for multiple-channel ad-hoc networks
2004 -
An opportunistic scheduling with fairness for NRT traffic in presence of RT traffic for UMTS/TDD
2004 -
Honeynets: foundations for the development of early warning information systems
2004 -
Bayesian adaptive filtering: principles and practical approaches
2004 -
Impact of signal constellation expansion on the achievable diversity in quasistatic multiple-antenna channels
2004 -
Precoding for space-time block codes in (non-) Kronecker correlated MIMO channels
2004 -
A comparative study of different modes of perturbation for video watermarking based on motion vectors
2004 -
Robust score normalization for relational approaches to face authentication
2004 -
Downlink CDMA: to cell or not to cell
2004 -
A Bayesian method for iterative joint detection and decoding in the presence of phase noise
2004 -
Dynamic and efficient tuning of IEEE 802.11 for multimedia applications
2004 -
Voice over IEEE 802.11b capacity
2004 -
Asymptotic performance of successive interference cancellation in the context of linear precoded OFDM
2004 -
Noiseless data compression with low-density parity-check codes
2004 -
Blind MIMO eigenmode transmission based on the algebraic power method
2004 -
Iterative multiuser joint decoding: Optimal power allocation and low-complexity implementation
2004 -
Using noninvasive wearable computers to recognize human emotions from physiological signals
2004 -
The MarkIII microphone array: the modified version realized at ITC-irst
2004 -
Workshop on social and emotional intelligence in learning environments
2004 -
On de-emphasizing the spurious components in the spectral modulation for robust speech recognition
2004 -
Trajectory knowledge for improving topology management in mobile ad-hoc networks
2004 -
On the classification of routing protocols in mobile ad-hoc networks
2004 -
On the average course length in mobility models for mobile ad hoc networks
2004 -
Personalization of interactive objects in the GMF4iTV project
2004 -
Transmission and reception diversity process for wireless communications
2004 -
Watermark resynchronization based on elastic graph matching for enhanced robustness against local geometric distortions
2004 -
Guest editorial - Fundamental performance limits of wireless sensor networks
2004 -
Incremental redundancy hybrid ARQ schemes based on low-density parity-check codes
2004 -
Design methods for irregular repeat-accumulate codes
2004 -
Automatic detection and masking of non-atomic exception handling
2004 -
Using structure for video object retrieval
2004 -
Improved video content indexing by multiple latent semantic analysis
2004 -
Bayesian blind and semiblind channel estimation
2004 -
Blind FIR channel estimation in multichannel cyclic prefix systems
2004 -
The instrumental variable multichannel FAP-RLS and FAP algorithms
2004 -
ARMPIS: an active reliable multicasting protocol for ad hoc networks
2004 -
A specular approach to MIMO frequency-selective channel tracking and prediction
2004 -
Concatenated codes for block-fading channels
2004 -
Analyse de sous espaces propres, basee sur des mesures a l’interieur des batiments, d’un canal radio ultra large bande
2004 -
Group rekeying with a customer perspective
2004 -
Texture-based watermarking of 3D objects
2004 -
Ad hoc networks security
2004 -
Lattice coding and decoding achieve the optimal diversity-multiplexing tradeoff of MIMO channels
2004 -
IDHC: ID-based hash-chains for broadcast authentication in wireless nettworks
2004 -
A pull-based approach for a VoD service in P2P networks
2004 -
LAS scheduling approach to avoid bandwidth hogging in heterogeneous TCP networks
2004 -
An original adaptation of the UMTS protocols for a direct interconnection with IPv6
2004 -
Implementation and validation of a multicast routing protocol in an ad hoc network testbed
2004 -
Reconfigurable radio access technology: between myth and reality
2004 -
Applications and specificities of synthetic/synthetic projective registration
2004 -
Latent semantic indexing for semantic content detection of video shots
2004 -
The effect of line of sight components on the asymptotic capacity of MIMO systems
2004 -
Asymptotic design and analysis of multistage detectors for asynchronous CDMA systems
2004 -
On the optimality of lattice space-time (LAST) coding
2004 -
MMSE-GDFE Lattice decoding for solving under--determined linear systems with integer unknowns
2004 -
Decision-feedback equalization achieves full diversity for finite delay spread channels
2004 -
Efficient search in unstructured peer-to-peer networks
2004 -
On the scalability of H-ARQ systems in wireless multicast
2004 -
Bayesian and non-bayesian methods for joint decoding and detection in the presence of phase noise
2004 -
Turbo-like codes for the block-fading channel
2004 -
Distributed MAC protocols for heavily loaded ad hoc networks
2004 -
Protecting applications and devices in nomadic business environments
2004 -
How much feedback is multi-user diversity really worth?
2004 -
Denial of service prevention in satellite networks
2004 -
MAUI, a multimodal affective user interface based on appraisal theory
2004 -
Performance analysis of LAS-based scheduling disciplines in a packet switched network
2004 -
Exact-SER precoding of orthogonal space-time block coded correlated MIMO channels: An iterative approach
2004 -
Applying informed coding and embedding to design a robust high-capacity watermark
2004 -
Variational Bayesian speaker clustering
2004 -
Self-scaling networks for content distribution
2004 -
Un modèle probabiliste de transformation entre images appliqué à la reconnaissance de visages
2004 -
SEMANTIC-3D: compression, indexation et tatouage de données 3D
2004 -
A multilevel hierarchical topology of duplication and merging agents for mobile Ipv6- soft handover
2004 -
A reliable multicast protocol for ad hoc networks
2004 -
Efficient subscription management in content based networks
2004 -
Honeypot-based forensics
2004 -
Danger of low-dimensional watermarking subspaces
2004 -
From turbo hidden Markov models to turbo state-space models
2004 -
Variational Bayesian feature selection for gaussian mixture models
2004 -
Capacity of a downlink MC-CDMA multi-cell network
2004 -
Sensitivity analysis of noise robustness methods
2004 -
Linear versus channel coding trade-offs in full diversity full rate MIMO systems
2004 -
Analysis of quantization noise feedback in causal transform coding
2004 -
MMSE-GDFE lattice decoding for under-determined linear channels
2004 -
Distance-bounding proof of knowledge protocols to avoid terrorist fraud attacks
2004 -
Can we take this off-line? How to deal with credentials in federations without global connectivity
2004 -
Performance comparison and analysis on MIPv6, fast MIPv6 bi-casting and Eurecom IPv6 soft handover over IEEE802.11b WLANs
2004 -
Emotions as the quintessential multimodal phenomena: from emotion research to signal processing to HCI and back…
2004 -
Experiences, strategies and challenges in building fault-tolerant CORBA systems
2004 -
Performance analysis of peer-to-peer networks for file distribution
2004 -
Polynomial expansion WCDMA receivers refined by local MMSE functionalities
2004 -
Chip rate and symbol rate MMSE functionalities for CDMA receivers
2004 -
Towards a quantitative T-RAT
2004 -
Establishing trust with privacy
2004 -
Trajectory knowledge for improving topology management in mobile ad-hoc networks
2004 -
Partition sampling for active video database annotation
2004 -
Using data stream management systems for traffic analysis - a case study
2004 -
Dissecting BitTorrent: five months in a torrent's lifetime
2004 -
Regroupement bayesien variationnel des locuteurs
2004 -
Attack processes found on the Internet
2004 -
Coding and advanced signal processing for MIMO systems
2004 -
Performance analysis on IP- based soft handover across ALL-IP wireless networks
2004 -
Combining history-based trust establishment with distance-bounding protocols
2004 -
Protecting applications and devices in nomadic business environments
2004 -
Blind and semi-blind FIR multichannel estimation: (Global) identifiability conditions
2004 -
A probabilistic model for face transformation with application to person identification
2004 -
Suboptimality of TDMA in the low power regime
2004 -
Improving the MAC layer of multi-hop networks
2004 -
Techniques for face motion & expression analysis on monocular images
2004 -
MULTI+: building topology-aware overlay multicast trees
2004 -
Superposition coding for side-information channels
2004 -
History-based signature or how to trust anonymous documents
2004 -
Data indexing in peer-to-peer DHT networks
2004 -
Energy consumption speed-based routing for mobile ad hoc networks
2004 -
Cognitive modeling with emotion elicitation
2004 -
Signal processing challenges for wireless communications
2004 -
Almost noiseless joint source channel coding-decoding of sources of memory
2004 -
Error probability of bit-interleaved coded modulation using the Gaussian approximation
2004 -
Efficient comparison of enterprise privacy policies
2004 -
Untraceable secret credentials: trust establishment with privacy
2004 -
One-time capabilities for authorizations without trust
2004 -
Unified framework for optimal video streaming
2004 -
Honeypots : practical means to validate malicious fault assumptions
2004 -
Low-complexity turbo equalization and multiuser decoding for TD-CDMA
2004 -
Advanced coding techniques and applications to CDMA
2004 -
Downlink WCDMA receivers based on combined chip and symbol level equalization
2004 -
Achievable rates for UWB peer-to-peer networks
2004 -
Multipath: curse or blessing? A system performance analysis of MIMO wireless networks
2004 -
The effects of UWB interference on GSM systems
2004 -
Efficient support of IP multicast in the next generation of GEO satellites
2004 -
Analysis of cooperation strategies in mobile ad hoc networks with imperfect monitoring
2004 -
Improving the payload of watermarking channels via LDPC coding
2004 -
Security and trust issues in ubiquitous environments - The business-to-employee dimension
2004 -
Throughput of the multihop slotted ALOHA with multi packet reception
2004 -
Secure background watermarking based on video mosaicing
2004 -
Construction of finite length irregular repeat accumulate codes
2004 -
Performance of a link adaptive system in UMTS networks
2004 -
Affective computing in tele-home health: design science possibilities in recognition of adoption and diffusion issues
2004 -
Maximizing the spectral efficiency of coded CDMA under successive decoding
2004 -
Editorial of Special issue on adaptation methods for speech recognition
2003 -
Alert correlation
2003 -
Selective multi-user diversity
2003 -
A model of illumination variation for robust face recognition
2003 -
Process and apparatus for communication between a mobile node and a communication network
2003 -
How to address secure multicast with a customer perspective?
2003 -
A closed-form precoder for spatial multiplexing over correlated MIMO channels
2003 -
Hierarchical peer-to-peer systems
2003 -
Alert correlation: Review of the state of the art
2003 -
Maximum entropy discrimination (MED) feature subset selection for speech recognition
2003 -
Open-source experimental B3G networks based on software-radio technology
2003 -
Latent semantic indexing for video content modeling and analysis
2003 -
Augmenting the training sequence part in semiblind estimation for MIMO channels
2003 -
Throughput analysis for slotted regular ad hoc wireless networks
2003 -
Interference cancelling receivers with global MMSE-ZF structure and local MMSE operations
2003 -
Matched filter bounds without channel knowledge at the receiver
2003 -
Capacity complying MIMO channel models
2003 -
Method for hiding binary data in a digital image
2003 -
Semi-automatic parallelization of Java applications
2003 -
Optimal streaming of layered video: joint scheduling and error concealment
2003 -
Challenges in UWB signaling for ad-hoc networking
2003 -
Writing on dirty tape with LDPC codes
2003 -
Robust linear MIMO receivers: A minimum error-rate approach
2003 -
Suggested solutions for the near-far effect in multimode WLANs
2003 -
Low complexity semi-blind channel estimation with a pseudo random postfix OFDM modulator
2003 -
Maximum entropy discrimination (MED) feature subset selection for speech recognition
2003 -
Multi-hop coverage extension of an IEEE 802.11b WLAN in a corporate environment
2003 -
CROMA - a slotted MAC protocol for MANETs with multislot communications
2003 -
Speaker identification by knowledge inheritance and eigenvoices
2003 -
Secure video watermarking via embedding strength modulation
2003 -
IP-based handover management over heterogeneous wireless networks
2003 -
Construction automatique de résumés vidéos
2003 -
A low complexity approach to space-time coding for multipath channels
2003 -
Joint common-dedicated pilots based estimation of time-varying channels for W-CDMA receivers
2003 -
On maximum likelihood detection and the search for the closest lattice point
2003 -
Security in wireless ad hoc networks
2003 -
On the achievable rates of multiband UWB systems
2003 -
Authentification
2003 -
Trust and authorization in pervasive B2E scenarios
2003 -
On the role of MMSE in lattice decoding : achieving the optimal diversity-vs-multiplexing tradeoff
2003 -
Variational Bayesian features selection
2003 -
Game theoretic analysis of cooperation enforcement in mobile ad hoc networks
2003 -
Architecture and protocols for supporting routing and quality of service in mobile ad hoc networks
2003 -
Improving the MAC layer of multi-hop networks
2003 -
Visualizing user's emotions for enchanced human-computer interaction
2003 -
Architectural choices for video-on-demand systems
2003 -
Security in ad hoc networks
2003 -
Video content modeling with latent semantic analysis
2003 -
Efficient search in unstructured peer-to-peer networks
2003 -
Network and content adaptive streaming of layered-encoded video over the Internet
2003 -
Facial motion analysis on monocular images for telecom applications : coupling expression and pose understanding
2003 -
Blind iterative receiver for multiuser MIMO systems
2003 -
Dynamic pronunciation modeling using phonetic features and symbolic speaker adaptation for automatic speech recognition
2003 -
Topology-centric look-up service
2003 -
Watermarking video, hierarchical embedding in motion vectors
2003 -
Deformable face mapping for person identification
2003 -
White paper: honeypot, honeynet, honeytoken: terminological issues
2003 -
White paper: honeypot, honeynet: a comparative survey
2003 -
Influence du compromis entre exploitation de la diversité et gain de codage dans les systèmes OFDM multi-entrées multi-sorties
2003 -
Blind iterative receiver for multiuser space-time coding systems
2003 -
Analysis of semidefinite programming relaxation approach for m aximum likelihood MIMO detection
2003 -
A polynomial time algorithm for exact maximum likelihood decoding of MIMO channels: a discrete geometric approach
2003 -
Discrete-state and fluid SPN models for open-loop video-on-demand systems: a comparative case study
2003 -
Reducing the average complexity of LDPC decoding for incremental redundancy scheme
2003 -
Universal data compression with LDPC codes
2003 -
Turbo-like codes over the block fading channel: code design and construction
2003 -
Video watermarking : overview and challenges
2003 -
Variational bayesian GMM for speech recognition
2003 -
Automated delivery of Web documents through a caching infrastructure
2003 -
Hybrid performance modeling of open-loop video distribution with vcr fonctionality
2003 -
Hierarchical peer-to-peer systems
2003 -
Texture-based watermarking of 3-D video objects
2003 -
An adaptive hybrid rekeying protocol for dynamic multicast groups
2003 -
Iterative techniques for CDMA and algorithms for MIMO detection
2003 -
New intra-video collusion attack using mosaicing
2003 -
Switching between orthogonal watermarks for enhanced security against collusion in video
2003 -
Variational bayesian learning for gaussian mixture models and hidden markov models
2003 -
Structured interference cancellation at a WCDMA terminal
2003 -
On the effect of channel knowledge imperfections at the transmitter on the capacity of MIMO systems
2003 -
On the achievable throughput of a multi-antenna Gaussian broadcast channel
2003 -
L’itinérance GPRS
2003 -
Services de localisation en contexte d’itinérance
2003 -
Architecture pour un extranet adaptatif
2003 -
On the achievable rates of ultra-wideband systems in multipath fading environments
2003 -
Lossless data compression with error correcting codes
2003 -
Low complexity ML detection based on search for the closest lattice point
2003 -
Design methods for irregular repeat accumulate codes
2003 -
The throughput of LDPC-based incremental redundancy schemes with finite block length
2003 -
Some recent developments in wireless communications
2003 -
Eurecom IPv6 soft handover
2003 -
Automatic detection and masking of non-atomic exception handling
2003 -
Accounting for emotion and personality in multi-agent modeling and simulation systems
2003 -
Emotion recognition from physiological signals for user modeling of affect
2003 -
Making machines understand facial motion and expressions like humans do
2003 -
Background signature for sensor networks
2003 -
Implementation and evaluation of an end-to-end IP QoS architecture for networks beyond 3rd generation
2003 -
Direction of arrival estimation using quadratic time frequency distributions
2003 -
Mutual information without channel knowledge at the receiver
2003 -
Analysis of LAS scheduling for job size distributions with high variance
2003 -
An introduction to biometrics and face recognition
2003 -
Discriminative face recognition
2003 -
On the achievable rates of UWB systems
2003 -
Self-balanced receiver-oriented MAC for ultra-wide band mobile ad hoc networks
2003 -
On low-complexity space-time coding for quasi-static channels
2003 -
The many faces of publish/subscribe
2003 -
Evaluating the streaming of FGS–encoded video with rate–distortion traces
2003 -
One-time authorization for off-line interactions
2003 -
On the achievable rates of ultra-wideband PPM with non-coherent detection in multipath environments
2003 -
Overview of cross-layer QoS support in mobile ad hoc networks
2003 -
A scalable protocol for content-based routing in overlay networks
2003 -
Process for providing non repudiation of receipt (NRR) in an electronic transaction environment
2003 -
Data indexing in peer-to-peer DHT networks
2003 -
Iterative decoding of two-dimensional Hidden Markov Models
2003 -
Symbolic speaker adaptation with phone inventory expansion
2003 -
Channel modeling and associated inter-carrier interference equalization for OFDM systems with high doppler spread
2003 -
Rate-distortion analysis of backward adaptive coding schemes
2003 -
Minimum classification error /eigenvoices training for speaker identification
2003 -
A guide tour of video watermarking
2003 -
On MIMO capacity for various types of partial channel knowledge at the transmitter
2003 -
Analyzing the performance of TCP flows under LAS schedulers
2003 -
A new data compression algorithm for sources with memory based on error correcting codes
2003 -
A new data compression algorithm for sources with memory based on error correcting codes
2003 -
On the suboptimality of orthogonal transforms for single- and multi-stage lossless transform coding
2003 -
Lossy and lossless causal coding of vectorial signals
2003 -
Joint delay and angle of arrival estimation using EM algorithm for multipath signals arriving at antenna array
2003 -
Exact sphere constrained maximum likelihood detection of parameters in CDMA
2003 -
Design of space-time bit-interleaved coded modulation for block fading channels with iterative decoding
2003 -
Embedding distance bounding protocols within intuitive interactions
2003 -
Modeling of a slotted MAC protocol for MANETs
2003 -
Coding strategies for UWB interference-limited peer-to-peer networks
2003 -
A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks
2003 -
Improving routing and network performance in mobile ad hoc networks using quality of nodes
2003 -
Algorithms for scalable content distribution
2003 -
Ad hoc network security
2003 -
From still picture to real-time video watermarking
2003 -
Real time multicast authentication
2003 -
A scalable protocol for content-based routing in overlay networks
2003 -
On achievable rates and coding for UWB systems
2003 -
Throughput analysis for slotted peer-to-peer wireless networks
2003 -
Broadcasting of a common source : information-theoretic results and system challenges
2003 -
Design of space-time bit-interleaved coded modulation and threaded algebraic space-time codes with message passing decoding
2003 -
Challenges in UWB signaling for adhoc networking
2003 -
Tatouage d'images : gain en robustesse et intégrité des images
2003 -
Affective computing in tele-home health
2003 -
QoS-based adaptive error control for wireless networks
2003 -
Watermark recovery from 2D views of a 3D video object
2003 -
TurboWm: enhanced robustness in image watermarking using turbo codes
2003 -
Tatouage vidéo par marquage hiérarchique des vecteurs mouvements
2003 -
Protection de l'utilisation d'un objet vidéo 3D par tatouage de sa texture
2003 -
Classification sémantique des macro-blocs mpeg dans le domaine compressé
2003 -
Scalable filtering of XML data for Web services
2003 -
The long-term average capacity region per unit energy with application protocols for sensor networks
2003 -
Comparison of multi-episode video summarization algorithms
2003 -
Editorial of Special issue on multimedia signal processing
2002 -
A glance at quality of service models for mobile ad hoc networks
2002 -
Speaker adaptation : modelling variabilities
2002 -
Sécurité des communications multicast
2002 -
Online face analysis : coupling head pose-tracking with face expression analysis
2002 -
A scrambling method based on disturbance of motion vectors
2002 -
Introduction à la biométrie authentification des individus par traitement audio-vidéo
2002 -
EBBPS: an efficient weight assignment process for GPS servers
2002 -
Generating TV summaries for CE devices
2002 -
Eyebrow movement analysis over real-time video sequences for synthetic representation
2002 -
Extending tamper-proof hardware security to untrusted execution environments
2002 -
Method of marking a multimedia document having improved robustness
2002 -
Semantic feature extraction using Mpeg macro-block classification
2002 -
Spatial multiplexing by spatiotemporal spreading: receiver considerations
2002 -
On MIMO capacity with partial channel knowledge at the transmitter
2002 -
Multistage integer-to-integer multichannel prediction for scalable lossless audio coding
2002 -
Iterative constrained penalized likelihood estimation of parameters for CDMA
2002 -
Analysis and design of natural and threaded space-time codes with iterative decoding
2002 -
Reconciling replication and transactions for the end-to-end reliability of CORBA applications
2002 -
Spatial multiplexing by spatiotemporal spreading of multiple symbol streams
2002 -
Multi-stream coding for MIMO OFDM systems with space-time-frequency spreading
2002 -
Services évolués de signature et de contrôle d'accès basés sur de nouveaux concepts
2002 -
Cost optimal dimensioning of a large scale video on demand system
2002 -
A congestion control model for multicast overlay networks and its performance
2002 -
Incremental redundancy schemes based on LDPCs for transmission over Gaussian block-fading channels
2002 -
Probabilistic atomic broadcast
2002 -
Challenges in UWB signaling for ad-hoc networking
2002 -
Writing on dirty tape with LDPC codes
2002 -
Density evolution and power profile optimization for iterative multiuser decoders based on individually optimum multiuser detectors
2002 -
LDPC coding for interference mitigation at the transmitter
2002 -
Efficient filtering of XML documents with XPath expressions
2002 -
Power control and beamforming for systems with multiple transmit and receive antennas
2002 -
The throughput of some wireless multiaccess systems
2002 -
Authentication in ubiquitous computing
2002 -
CROMA - a new medium access protocol for mobile ad hoc networks
2002 -
Adaptative power-aware metric for mobile ad-hoc networks
2002 -
Solutions for IPv6-based mobility in the EU project MobyDick
2002 -
Dirty-paper trellis codes for watermarking
2002 -
Toward generic image dewatermarking?
2002 -
Lu factorization for feature transformation
2002 -
Iterative receiver for synchronous CDMA using hidden Markov model
2002 -
Iterative blind demodulation of synchronous CDMA
2002 -
Symbolic speaker adaptation for pronunciation modeling
2002 -
A study of characteristics of ad hoc networks applications
2002 -
Automatic video summarization
2002 -
A performance analysis of integer-to-integer transforms for lossless coding of vectorial signals
2002 -
ALM- Adaptive location management incorporating fuzzy logic for mobile Ad Hoc Networks
2002 -
Backward adaptive transform coding of vectorial signals : a comparison between unitary and causal approaches
2002 -
Image similarity for automatic video summarization
2002 -
Protection of 3-D object usage through texture watermarking
2002 -
Parallel computation on interval graphs: algorithms and experiments
2002 -
Guest editorial Internet proxy services
2002 -
IP-based soft handover in all-IP wireless networks
2002 -
Revisiting the fair queueing paradigm for end-to-end congestion control
2002 -
Open-loop video distribution with support of VCR functionnality
2002 -
Relational object recognition from large structural libraries
2002 -
Towards real-time video watermarking for system-on-chip
2002 -
Facial expression analysis robust to 3D head pose motion
2002 -
Caching video objects : layers vs versions?
2002 -
Implementation of adaptive streaming of stored MPEG-4 FGS video over TCP
2002 -
Tree pattern aggregation for scalable XML data dissemination
2002 -
Reliable multicast for ad hoc network with intermediate node support
2002 -
Colocated antenna arrays : design desiderata for wireless communications
2002 -
Enabling adaptive and secure extranets
2002 -
CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
2002 -
Multiple layer encryption for multicast groups
2002 -
An all-IP software radio architecture under RTLinux
2002 -
Dynamic parallel-access to replicated content in the Internet
2002 -
2LQoS– two-layered quality-of-service model for routing in mobile ad hoc networks
2002 -
An alternative packet distribution procedure for mobile network simulation
2002 -
User evaluation of multi-episode video summaries
2002 -
Multiple views in 3D metaphoric information visualization
2002 -
Iterative multiuser joint decoding : unified framework and asymptotic analysis
2002 -
Authenticating real time packet streams and multicasts
2002 -
Efficient implementation of iterative multiuser joint decoding
2002 -
Achieving multiuser diversity under hard fairness constraints
2002 -
Linear space-time coding at full rate and full diversity
2002 -
Is TDMA optimal in the low power regime?
2002 -
Fading multiaccess channels in the wideband regime: the impact of delay constraints
2002 -
Advanced mobile receivers and downlink channel estimation for 3G UMTS-FDD WCDMA systems
2002 -
Probabilistically-safe broadcast algorithms
2002 -
Optimised routing in hybrid active networks
2002 -
Evaluation automatique de résumés multi-vidéos
2002 -
Preventing denial of service and selfishness in ad hoc networks
2002 -
Performance of incremental redundancy schemes with turbo codes
2002 -
Sécurité des communications multicast
2002 -
A survey of watermarking algorithms for image authentication
2002 -
Distributing layered encoded video through caches
2002 -
Analysis of a large library of MPEG-4 FGS rate-distortion traces for streaming video
2002 -
Queuing analysis of simple FEC schemes for voice over IP
2002 -
Simulations des HARQ1 sur les couches RLC et physique de l'UMTS
2002 -
Network security in the multicast framework
2002 -
Multicast communication security
2002 -
Piecewise linear constraints for model space adaptation
2002 -
Recent advances in biometric person authentication
2002 -
Multistream space-time coding by spatial spreading
2002 -
Adaptive rate control for streaming stored fine-grained scalable video
2002 -
A novel high power and spectral efficient coded modulation for nonlinear satellite channels
2002 -
Comparison between unitary and causal approaches to backward adaptative transform coding of vectorial signals
2002 -
SAMU project : tests an improvement of UMTS for users in a car
2002 -
Editorial of Special issue on space-time coding and its applications - Part II
2002 -
Traffic engineering in a multipoint-to-point network
2002 -
Linear precoding for spatial multiplexing MIMO systems: blind channel estimation aspects
2002 -
Design and performance of a low-complexity iterative multiuser joint decoder based on Viterbi decoding and parallel interference cancellation
2002 -
Pathwise interference cancellation for a DS-CDMA uplink
2002 -
Internet content distribution
2002 -
Size based scheduling with differentiated services to improve response time of highly varying flow
2002 -
DDR-based multicast protocol with dynamic core (DMPDC)
2002 -
3D metaphoric information visualization
2002 -
Initial synchronization of DS-CDMA via bursty pilot signals
2002 -
An open software-radio architecture supporting advanced 3G+ systems
2002 -
Game theoretic analysis of security in mobile ad hoc networks
2002 -
An efficient scheduling policy for edge routers to speedup the Internet access
2002 -
A scheduling policy for dense and highly mobile ad hoc networks
2002 -
Full-rate full-diversity space-frequency coding for MIMO OFDM systems
2002 -
Full diversity spatial multiplexing based on SISO channel coding, spatial spreading and delay diversity
2002 -
Quality of service support for reactive routing inmobile ad hoc networks
2002 -
A performance analysis of integer-to-integer transforms for lossless coding of vectorial signals
2002 -
Multiple-access block-fading channels
2002 -
Advanced signal processing algorithms for 3rd generation wireless mobile systems
2002 -
Editorial of Special issue on space-time coding and its applications - Part I
2002 -
On reducing response time for VPN traffic
2002 -
Making greed work in mobile ad hoc networks
2002 -
Account of an experimental implementation of a completeley automatic camera calibration framework based on the Deriche-Giraudon corner extractor and Zhang's calibration algorithm
2002 -
Object replication strategies in content distribution networks
2002 -
Wideband-CDMA for the UMTS/IMT-2000 satellite component
2002 -
Estimation of time-varying wireless channels and application to the UMTS W-CDMA FDD downlink
2002 -
The long-term average capacity region per unit energy with application protocols for sensor networks
2002 -
Simulation-based analysis of security exposures in mobile ad hoc networks
2002 -
Multistage DS-CDMA receivers with pathwise interference mitigation
2002 -
FPGA implementation of a MIMO receiver front-end for the UMTS downlink
2002 -
Packet multiplexers with adversarial regulated traffic
2002 -
A framework for guaranteeing statistical QoS
2002 -
Combining physical and semantical navigation in three-dimensional information visualization
2002 -
Dewatermarking based on self-similarities
2002 -
Interactive video streaming with proxy servers
2002 -
Codage par transformation fractale
2002 -
Coding and modulation for power-constrained wireless channels
2002 -
Bringing the web to the network edge: large caches and satellite distribution
2002 -
Topology centric lookup service
2002 -
Data indexing and querying in P2P DHT networks
2002 -
Pose coupling with eye movement tracking
2002 -
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
2002 -
Adaptive replication and replacement in P2P caches
2001 -
Comparison between unitary and causal approaches to backward adaptive transform coding of vectorial signals
2001 -
Dynamic sharings of gaussian densities using phonetic features
2001 -
Construction of model-space constraints
2001 -
Service discovery in transient ad-hoc wireless network
2001 -
Guaranteeing deterministic QoS in a multipoint-to-point network
2001 -
Un panorama des méthodes de tatouage permettant d'assurer un service d'intégrité pour les images
2001 -
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile adhoc networks
2001 -
Authenticating real time packet streams and multicasts
2001 -
Ad hoc networks : multicasting issues
2001 -
Construction automatique de résumés multi-vidéos
2001 -
Attaque malveillante d'images tatouées basée sur l'auto-similarité
2001 -
On MIMO decoding algorithms for UMTS
2001 -
A RAKE structured SINR maximizing mobile receiver for the WCDMA downlink
2001 -
Semiblind channel estimation for MIMO spatial multiplexing systems
2001 -
Pathwise polynomial expansion interference cancellation for DS CDMA
2001 -
The effect of delay constraint and causal feedback on the wideband performance of multi-access block fading channels
2001 -
Rapid prototyping design of a 4 × 4 BLAST-over-UMTS system
2001 -
Comparison of PS, SRPT, and FB scheduling policies under exponential and heavy tail job sizes
2001 -
Protection of 3-d object usage through watermarking
2001 -
Causal transform coding, generalized MIMO linear prediction and application to vectorial DPCM coding of mulchannel audio
2001 -
SEVA: a framework to dynamically set up and run secure extranet
2001 -
Inter-domain authorization and delegation for business-to-business e-commerce
2001 -
Channel estimation for a discrete-time RAKE receiver in a WCDMA downlink: algorithms and repercussion on SINR
2001 -
Semiblind channel estimation for MIMO spatial multiplexing systems
2001 -
Relational skeletons for retrieval in patent drawings
2001 -
Eye state tracking for face cloning
2001 -
Design approaches for LDPC-encoded CDMA
2001 -
The optimal received power distribution for IC-based iterative multiuser joint decoders
2001 -
Path-wise wide-sense polynomial receiver for UMTS communications
2001 -
Comparison of multi-episode video summarization algorithms
2001 -
Linear convolutive space time precoding for spatial multiplexing MIMO systems
2001 -
Iterative soft-SIC joint decoding and parameter estimation
2001 -
Automatic video summarization
2001 -
DSS: a deterministic and scalable QoS provisioning scheme
2001 -
Optimal video summaries for simulated evaluation
2001 -
Comparison between unitary and causal approaches to transform coding of vectorial signals
2001 -
Wrapped space-time codes for quasi-static multiple-antenna channels
2001 -
Multicast routing protocol with dynamic core (MRDC)
2001 -
Performance evaluation of HARQ in UMTS-TDD
2001 -
Dynamic lexicon using phonetic features
2001 -
Dynamic information visualization using 3D metaphoric worlds
2001 -
HARP - Hybrid ad hoc routing protocol
2001 -
Outils de navigation dans les fichiers audio
2001 -
On the utility of FEC mechanisms for multimedia applications
2001 -
Structured multiuser channel estimation for block-synchronous DS/CDMA
2001 -
Adaptive power-aware metric in mobile ad hoc networks
2001 -
Integer multiflows and metric packings beyond the cut condition
2001 -
Generating summaries of multi-episodes video
2001 -
Self-adaptation using eigenvoices for large-vocabulary continuous speech recognition
2001 -
Analysis and reproduction of facial expressions for realistic communicating clones
2001 -
Coding efficiency of multi-ring and single-ring differential chain coding for telewriting application
2001 -
Analysis of Web caching architectures: hierarchical and distributed caching
2001 -
Bandwidth allocation policies for unicast and multicast flows
2001 -
Successive interference cancellation with SISO decoding and EM channel estimation
2001 -
Creating user-adapted Websites by the use of collaborative filtering
2001 -
Iterative multiuser joint decoding in DS-CDMA:unified framework and performance analysis
2001 -
Collaborative filtering on the Internet
2001 -
Performance evaluation on an adaptative error control protocol in wireless networks
2001 -
A new method for scalable and reliable multicast system for mobile networks
2001 -
A scheduling policy for dense and highly mobile ad hoc networks
2001 -
Iterative multiuser joint detection and parameter estimation : a factor graph approach
2001 -
The throughput of hybrid-ARQ protocols for the gaussian collision channel
2001 -
The ISCA technical and research workshop : adaptation methods in automatic speech recognition, Sophia-Antipolis, France
2001 -
Automatic visual mapping of abstract information
2001 -
Mocha : A quality adaptive multimedia proxy cache for Internet streaming
2001 -
On the performance of multiple description codes over bit error channels
2001 -
The optimal throughput of some wireless multiaccess systems
2001 -
Throughput performance of an incremental-redundancy ARQ scheme in the block-fading Gaussian collision channel
2001 -
On achievable rates in a multi-antenna gaussian broadcast channel
2001 -
Object replication strategies in content distribution networks
2001 -
Seamless navigation in audio files
2001 -
Asynchronous multimedia messaging
2001 -
Comparison of downlink transmit diversity schemes for RAKE and SINR maximizing receivers
2001 -
Automatic construction of multi-video summaries
2001 -
Serveurs vidéo : architecture et performance
2001 -
Acquisition à faible coût de modèles 3D réalistes de visages
2001 -
Supervision d’informations dynamiques et distribuées à l’aide de mondes 3D interactifs : Application à la gestion de réseaux
2001 -
Iterative multiuser joint decoding: unified framework and asymptotic analysis
2001 -
Analysis-synthesis cooperation for MPEG-4 realistic clone animation
2001 -
Evaluation des performances des HARQ dans l'UMTS
2001 -
Traitement du signal audio dans le domaine codé : techniques et applications.
2001 -
Improving collaborative filtering for new-users by smart object selection
2001 -
UMTS et la convergence des réseaux mobiles et de l'Internet
2001 -
Multi-episodes video summaries
2001 -
Vectorial DPCM coding and application to wideband speech coding
2001 -
Blind channel identification and projection receiver determination for multicode and multirate situations in DS-CDMA systems
2001 -
A SINR maximizing 2D rake receiver for multisensor WCDMA mobile terminals
2001 -
3D talking head customization by adapting a generic model to one uncalibrated picture
2001 -
Intercell interference cancellation at a WCDMA mobile terminal by exploiting excess codes
2001 -
Linear prediction based semi-blind estimation of MIMO FIR channels
2001 -
Limiting performance of block-fading channels with multiple antennas
2001 -
An open software-radio architecture supporting advanced 3G+ systems
2001 -
Protocoles d'authentification
2001 -
Adaptive streaming of stored video in a TCP-friendly context : multiple versions or multiple layers
2001 -
Queueing analysis of simple FEC schemes for IP telephony
2001 -
Distributing layered encoded video through caches
2001 -
Low cost 3D face acquisition and modeling
2001 -
Bandwidth allocation policies for unicast and multicast flows
2001 -
A comprehensive architecture for continuous media email
2001 -
On linear-channel based noised subspace parameterizations for blind multichannel identification
2001 -
Détection d'intrusions : une nouvelle approche par systèmes multi-agents
2001 -
Vidéo spatialisation : algorithmique et visualisation
2001 -
On space-time coding for quasi-static multiple-antenna channels
2001 -
A video conference system under MPEG-4 Overview of face animation in MPEG-4 and study of the compliance level of Eurecom's face animation-teleconferencing system
2001 -
A Toeplitz displacement method for blind multipath estimation for long code DS/CDMA signals
2001 -
Survey and taxonomy of IP address lookup algorithms
2001 -
How fading affects CDMA : an asymptotic analysis with linear receivers
2001 -
Secure data collection with updates
2001 -
A visual analysis/synthesis feedback loop for accurate face tracking
2001 -
Mobile code protection
2001 -
Process for securing the execution of a mobile code in an untrusted environment
2001 -
Adaptive streaming of layer-encoded multimedia presentations
2000 -
Optimal location of intermodal freight hubs
2000 -
Towards a new approach for intrusion detection with intelligent agents
2000 -
Cramer-Rao bounds for blind multichannel estimation
2000 -
Slot timing maximum likelihood estimation with bursty pilot signals for DS-CDMA in multipath fading channels
2000 -
Designing routing protocol for mobile ad hoc networks
2000 -
Un système multi-agents pour la détection d’intrusions
2000 -
Computer networking : a top-down approach featuring the Internet
2000 -
CDMA system design through asymptotic analysis
2000 -
Image watermaking for owner and content authentication
2000 -
A SINR maximizing RAKE receiver for DS-CDMA downlinks
2000 -
QoS control in wireless IP access networks
2000 -
Multicast congestion control for best effort networks
2000 -
Scalable content distribution in the Internet
2000 -
Acquisition et animation de clones réalistes pour les télécommunications
2000 -
Codage DPCM vectoriel et application au codage de la parole en bande élargie
2000 -
Résumés automatiques de séquences vidéo
2000 -
Regroupement par locuteur de messages vocaux
2000 -
Transmission and reception front-end architectures for software radio
2000 -
On achievable rates in a multi-antenna broadcast downlink
2000 -
A distributed access control model for Java
2000 -
Software engineering techniques for support of communication protocol implementation
2000 -
The fast subsampled-updating fast Newton transversal filter (FSU FNTF) algorithm for adaptive filtering
2000 -
Burst mode equalization: optimal approach and suboptimal continuous-processing approximation
2000 -
Blind channel estimation exploiting transmission filter knowledge
2000 -
Two-stage non-data aided adaptive linear receivers for DS/CDMA
2000 -
A software radio testbed for UMTS TDD systems
2000 -
Semi-blind downlink inter-cell interference cancellation for FDD DS-CDMA systems
2000 -
Metaphor-aware 3D navigation
2000 -
Spatio-temporal array processing for downlink transmission in DS-CDMA systems
2000 -
Software agents in network management
2000 -
A multi-agents system for network security management
2000 -
Userwise distortionless pathwise interference cancellation for the DS-CDMA uplink
2000 -
A software radio platform for new generations of wireless communication systems
2000 -
Open software radio platform for new generations of mobile systems
2000 -
La segmentation et le regroupement par locuteurs pour l'indexation de documents audio
2000 -
SINR maximizing equalizer receiver for DS-CDMA
2000 -
A software agent architecture for network management : case studies and experience-gained
2000 -
DISTBIC : A speaker-based segmentation for audio data indexing
2000 -
Modulation and coding for the Gaussian collision channel
2000 -
Process for marking a multimedia document, such as an image, by generating a mark
2000 -
DDR-Distributed dynamic routing algorithm for mobile ad hoc networks
2000 -
The fast subsampled-updating stabilized fast transversal filter (FSU SFTF) RLS algorithm for adaptive filtering
2000 -
Continuous media e-mail on the Internet : infrastructure inadequacies and a sender-side solution
2000 -
Scalable multicast security with dynamic recipient groups
2000 -
Using category-based collaborative filtering in the active webmuseum
2000 -
Real time 3D navigation in a static virtualized scene from a limited set of 2D data
2000 -
Optimal streaming of layer-encoded multimedia presentations
2000 -
Mapping information onto 3D virtual worlds
2000 -
Agent intelligent : émergence d'une nouvelle technologie pour la gestion de réseaux
2000 -
The navigation wizard: helped metaphor-aware navigation in virtual worlds
2000 -
Performance bounds for cochannel interference cancellation within the current GSM standard
2000 -
Coding for the fading channel : a survey
2000 -
Order-worker-entry: a system of patterns to structure communication protocol software
2000 -
Editorial : sécurité dans les réseaux
2000 -
ARQ protocols for the Gaussian collision channel
2000 -
Streaming stored continuous media over fair-share bandwidth
2000 -
Pathological behaviors for RLM and RLC
2000 -
CDMA with fading: effective bandwidth and spreading-coding tradeoff
2000 -
SPREAD: Scalable Platform for Reliable and Efficient Automated Distribution
2000 -
MA-FEC: A QoS-based adaptive FEC for multicast communication in wireless networks
2000 -
An intelligent agent approach for security management
2000 -
How layering protocol software violates separation of concerns
2000 -
Managing Web servers with SNMP
2000 -
A speaker tracking system based on speaker turn detection for NIST evaluation
2000 -
Audio-visual intent-to-speak detection for human-computer interaction
2000 -
Approximate Viterbi decoding for 2D-hidden Markov models
2000 -
Deterministic quadratic semi-blind FIR multichannel estimation : algorithms and performance
2000 -
Structured estimation of sparse channels in quasi-synchronous DS-CDMA
2000 -
PLM: Fast convergence for cumulative layered multicast transmission schemes
2000 -
Mobile code, Internet security and E-commerce
2000 -
Safe aspect composition
2000 -
Mobile code protection with Smartcards
2000 -
Experiments in information visualisation using 3D metaphoric worlds
2000 -
QoS for distributed objects by generating tailored protocols
2000 -
Millau: an encoding format for efficient representation and exchange of XML over the Web
2000 -
SPREAD: Scalable Platform for Reliable and Efficient Automated Distribution
2000 -
Performance evaluation of redirection schemes in content distribution networks
2000 -
On the performance of FEC for multicast communication on fading channel
2000 -
TPOT: Translucent Proxying of TCP
2000 -
Experimenting service-oriented 3D metaphors for managing networks using virtual reality
2000 -
A graduate program in integrated communication systems
2000 -
A RAKE receiver with intracell interference cancellation for a DS-CDMA synchronous downlink with orthogonal codes
2000 -
Millau: an encoding format for efficient representation and exchange of XML over the Web
2000 -
Multimedia information recommendation and filtering on the Web
2000 -
Blind maximum SINR receiver for the DS-CDMA downlink
2000 -
Agents intelligents et gestion de réseaux
2000 -
Performance study of satellite-linked web caches and filtering policies
2000 -
SPREAD: scalable platform for reliable and efficient automated distribution
2000 -
Network security management with intelligent agents
2000 -
When management agents become autonomous, how to ensure their reliability?
2000 -
Automatic configuration of PVCs in ATM networks with software agents
2000 -
An efficient polling layer for SNMP
2000 -
Enhancement of network and system management using virtual reality
2000 -
Blind detection of malicious alterations on still images using robust watermarks
2000 -
Performance comparision of centralized versus distributed error recovery for reliable multicast
2000 -
A component-based architecture for software communication systems
2000 -
CyberNet: A framework for managing networks using 3D metaphoric worlds
2000 -
A replicated architecture for the Domain Name System
2000 -
Replicating the DNS using satellite broadcast
2000 -
PSP-based space-time schemes for large spectral efficiency
2000 -
Optimal streaming of layered video
2000 -
PLM: fast convergence for cumulative layered multicast transmission schemes (extended version)
2000 -
Downlink intercell interference cancellation in WCDMA by exploiting excess codes
2000 -
Parallel-access for mirror sites in the Internet
2000 -
Eigenvoices : a compact representation of speakers in a model space
2000 -
A fractals-inspired approach to binary image database indexing and retrieval
2000 -
Un panorama sur l'indexation d'images fixes
2000 -
When network management agents become autonomous, how to ensure their reliability?
2000 -
Technologies du tatouage pour l'authentification et la protection des images
2000 -
Différentes stratégies pour le suivi de locuteur
2000 -
Face tracking and realistic animations for telecommunicant clones
2000 -
Modeling and performance comparison of reliability strategies for distributed video servers
2000 -
Mobile code security
2000 -
Technologies for personalized TV programs
2000 -
A Viterbi-like procedure for 2D-data modelling
2000 -
Performance evaluation of redirection schemes in content distribution networks
2000 -
TPOT: Translucent Proxying of TCP
2000 -
On coding for block fading channels
2000 -
Traitement du signal pour les communications mobiles multi-utilisateur en accès multiples par répartition de codes utilisant la méthode directe
2000 -
Automatic construction of dynamic 3D metaphoric worlds: an application to network management
2000 -
Possible counter-attacks against random geometric distortions
2000 -
Design of extensible component-based groupware
2000 -
Semi-blind methods for FIR multichannel estimation
2000 -
IP subnet mobility over general packet radio service
1999 -
Clonage de visage et spatialisation vidéo : outils pour la téléconférence virtuelle
1999 -
Using virtual reality for network management : automated construction of dynamic 3D metaphoric worlds
1999 -
Signature technique for electronically transmitted document
1999 -
Power control schemes for TDD systems with multiple transmit and receive antennas
1999 -
CDMA system design through asymptotic analysis
1999 -
Using BDI-oriented agents for network management
1999 -
ESA satellite wideband CDMA radio transmission technology for the IMT-2000/UMTS satellite component : features and performance
1999 -
Le multicast sans fil dans un environnement IP
1999 -
Distributed network security management using intelligent agents
1999 -
Method for blind equalization of communications channel
1999 -
Secure data collections with updates
1999 -
Design and performance of large scale video servers
1999 -
Beyond TCP-friendliness: a new paradigm for end-to-end congestion control
1999 -
Automatic construction of personalized TV news programs
1999 -
Improving collaborative filtering with multimedia indexing techniques to create user-adapting web sites
1999 -
Optimal streaming of synchronized multimedia presentations with layered objects
1999 -
Analyse, synthèse et animation de clones dans un contexte de téléréunion virtuelle
1999 -
Adaptive interference suppression for DS-CDMA in multipath channels
1999 -
Segmentation et indexation par locuteurs d'un document audio
1999 -
Séparation des sources d'informations caractéristiques du locuteur
1999 -
A visual analysis/synthesis feedback loop for unconstrained face tracking
1999 -
Privacy for mobile code
1999 -
L'internationalisation par les télécommunications et pour les télécommunications
1999 -
Scalable multicast security in dynamic groups
1999 -
Spatio-temporal array processing for aperiodic CDMA downlink transmission
1999 -
A first step into speaker-based indexing
1999 -
Using color and texture indexing to improve collaborative filtering of art paintings
1999 -
Stochastic models for face image analysis
1999 -
Towards a standard protocol for the evaluation of temporal video segmentation algorithms
1999 -
A fractals-inspired approach to content-based image indexing
1999 -
A novel replica placement strategy for video servers
1999 -
Performances des applications de transfert de données sur ATM
1999 -
A survey of current watermarking techniques
1999 -
Weighted RLS channel estimators for DS/CDMA signals in multipath
1999 -
Annulation d'interférences et égalisation pour les systèmes mobiles utilisant l’AMRT, application au système GSM
1999 -
Estimation et égalisation aveugles de canal pour les communications mobiles
1999 -
Training sequence-based multiuser channel estimation for block-synchronous CDMA
1999 -
CDMA design through asymptotic analysis : fading channels
1999 -
Blind multichannel estimation and joint order detection by MMSE ZF equalization
1999 -
Reducing the peak to average power ratio in OFDM systems
1999 -
Visualização tridimensional de grandes volumes de informação
1999 -
A novel indexing approach for multimedia image databases
1999 -
A fractal-inspired approach to data embedding in digital images for authentication services
1999 -
Analysis and reproduction of facial expressions for communicating clones
1999 -
Estimation multi-canal aveugle par égalisation MMSE ZF avec détection conjointe de l'étalement temporel
1999 -
Performance des égaliseurs à complexité réduite et application à la norme Edge
1999 -
MMSE-ZF receiver and blind adaptation for multirate CDMA
1999 -
Spatio-temporal array processing for FDD/CDMA/SDMA downlink transmission
1999 -
Maximum likelihood eigenspace and MLLR for speech recognition in noisy environments
1999 -
Blind channel estimation for DS-CDMA with long codes
1999 -
Detection of speaker changes in an audio document
1999 -
Fast computation of the Fisher information matrix for gaussian inputs
1999 -
Impact of channel-state information on coded transmission over fading channels with diversity reception
1999 -
On the capacity of some channels with channel state information
1999 -
Asynchronous audio conferencing on the Web
1999 -
Method of administration of computer network with the aid of intelligent agents
1999 -
Optimum power control over fading channels
1999 -
Function hiding based on error correcting codes
1999 -
Localisation d'un mobile dans un reseau GSM
1999 -
Identification de canal et égalisation aveugles et semi-aveugles pour les communications mobiles
1999 -
IP subnet mobility over general packet radio service
1999 -
MA-NID : a multi-agent system for network intrusion detection
1999 -
Limiting performance of block-fading channels with multiple antennas
1999 -
Blind decentralized projection receiver for asynchronous CDMA in multipath channels
1999 -
Object-oriented frameworks and components to support customization and tailoring in groupware
1999 -
Indexation d’images par fractale Viterbi
1999 -
Amélioration des taux de reconnaissance par filtrage de données
1999 -
Voix propres: Une représentation compacte de locuteurs dans l'espace des modèles
1999 -
Introduction au tatouage d’images
1999 -
Construction automatique de mondes virtuels représentant le comportement dynamique d’un réseau
1999 -
Outils stochastiques pour l'indexation vidéo
1999 -
Performance and reliability study for distributed video servers: mirroring or parity?
1999 -
Virtual 3D interactions between 2D real multi-views
1999 -
Capacity of multi-antenna block-fading channels
1999 -
Pilot-aided adaptive MMSE receivers for DS/CDMA
1999 -
Scalable feedback for large groups
1999 -
Flexible software agents for the automatic provision of PVCS in ATM networks
1999 -
Face tracking and realistic animations for telecommunicant clones
1999 -
Audio data indexing : use of second order statistics for speaker-based segmentation
1999 -
Network management and virtual reality
1999 -
Wireless ATM medium access
1999 -
Un modèle de surveillance utilisant des agents intelligents
1999 -
Agents intelligents et gestion de réseaux ATM
1999 -
Segmentation en locuteurs d'un document audio
1999 -
Fractal transform based large digital watermark embedding and robust full blind extraction
1999 -
Interworking RSVP and mobile IP Version 6 in wireless environments
1999 -
Intelligent agents for networks management : a fault detection experiment
1999 -
Improving reliability of intelligent agents for network management
1999 -
A BCH error recovery scheme for adaptive error in wireless networks
1999 -
Mécanismes de sécurité liés à la diffusion des images : tatouage d'image
1999 -
A fast Gaussian maximum-likelihood method for blind multichannel estimation
1999 -
A deterministic Schur method for multichannel blind identification
1999 -
Training sequence based multiuser channel identification for cochannel interference cancellation in GSM
1999 -
Multichannel estimation by blind MMSE ZF equalization
1999 -
Striping for interactive video: is it worth it?
1999 -
Synthetic natural hybrid video processings for virtual teleconferencing systems
1999 -
Internet security architecture
1999 -
Fractal-based video coding and slow motion replay
1999 -
Speaker-based segmentation for audio data indexing
1999 -
Locating copies of objects using the Domain Name System
1999 -
Pseudo two-dimensional Hidden Markov Models for face detection in colour images
1999 -
A Schur method for multiuser multichannel blind identification
1999 -
Cybernet : utilisation de métaphores et des techniques de réalité virtuelle pour la représentation de données Application à la gestion de réseau
1999 -
Performance and cost comparison of mirroring and parity-based reliability schemes for video servers
1999 -
1D and pseudo-2D hidden Markov models for image analysis : Implementation details
1999 -
1D and pseudo-2D hidden Markov models for image analysis : Theoretical introduction
1999 -
Blind MMSE-ZF receiver and channel identification for asynchronous CDMA in multipath channels
1999 -
Fractionally spaced equalization of linear polyphase channels and related blind techniques based on
1999 -
Fast speaker adaptation using "a priori" knowledge
1999 -
Blind channel and linear MMSE receiver determination in DS-CDMA systems
1999 -
N-best based supervised and unsupervised adaptation for native and non-native speakers in cars
1999 -
Implementing network protocols in Java - A framework for rapid prototyping
1999 -
Bandwidth allocation policies for unicast and multicast flows
1999 -
Web caching architectures: hierarchical and distributed caching
1999 -
Reliable multicast via satellite : uni-directional vs. bi-directional communication
1999 -
Periodic broadcasting with VBR-encoded video
1999 -
Guaranteeing statistical QoS to regulated traffic: the single node case
1999 -
Euclidean ordering via chamfer distance calculations
1999 -
Design and implementation of a tailorable awareness framework
1999 -
Clustering for collaborative filtering applications
1999 -
Performance of reed solomon error-correcting codes
1999 -
Adaptive linear receivers for DS/CDMA : steady-state performance analysis
1999 -
Synchronized delivery and playout of distributed stored multimedia streams
1999 -
Data striping and reliablity aspects in distributed video servers
1999 -
Blind source separation: models, concepts, algorithms and performance
1999 -
Discrete geometry for image processing
1999 -
Introduction aux systèmes temps réels
1998 -
Estimation aveugle de canal et accès multiple par répartition spatiale
1998 -
Guaranteeing statistical QoS to regulated traffic: the single node case
1998 -
Architecture multimédia interactive et multipoint supportant le travail coopératif sur Internet
1998 -
Les agents intelligents et leur rôle en administration de réseaux
1998 -
Image watermarking based on the fractal transform : a draft demonstration
1998 -
Eigenfaces and eigenvoices: dimensionality reduction for specialized pattern recognition
1998 -
System capacity of F-TDMA cellular systems
1998 -
Improving reliability of intelligent agents for network management
1998 -
Enhanced ASR by acoustic feature filtering
1998 -
The use of Meta-HMM in multistream HMM training for automatic speech recognition
1998 -
Eigenvoices for speaker adaptation
1998 -
Secret routing of messages in computer or cellular radio communications
1998 -
Improving the WWW: caching or multicast?
1998 -
RSVP support for mobile IP Version 6 in wireless environments
1998 -
Improving performance of wireless networks using collision resistent modulations
1998 -
Blind and semi-blind single user receiver techniques for asynchronous CDMA in multipath channels
1998 -
Training sequence aided multichannel identification in the presence of interference and noise
1998 -
Training sequence design for adaptive equalization of multi-user systems
1998 -
Subsidiarité de l'intelligence dans les grands systèmes
1998 -
High-performance prefetching protocols for VBR prerecorded video
1998 -
Spatio-temporal array processing for CDMA/SDMA downlink transmission
1998 -
Linear receivers for the DS-CDMA downlink exploiting orthogonality of spreading sequences
1998 -
Design and implementation of a scalable, reliable, and distributed VOD-server
1998 -
A CORBA-based architecture and synchronization support for distributed multimedia services
1998 -
Wireless multicasting in an IP environment
1998 -
3D face modeling and encoding for virtual teleconferencing
1998 -
Matched filter bound optimization for multiuser downlink transmit beamforming
1998 -
Cochannel interference cancellation within the current GSM standard
1998 -
Coding vs. spreading over block fading channels
1998 -
Bringing the web to the network edge: large caches and satellite distribution
1998 -
On coding for the fading channel
1998 -
Adaptive fractionally spaced MMSE receiver for asynchronous DS-CDMA
1998 -
Distributed multimedia services based on a Corba-platform
1998 -
Using content models to build audio-video summaries
1998 -
Blind multichannel estimation exploiting the finite symbol alphabet
1998 -
A fast prewhitened affine projection algorithm
1998 -
Performance of blind discrete source separation
1998 -
Self calibration in presence of correlated discrete sources
1998 -
Blind and semi-blind maximum likelihood techniques for multiuser multichannel identification
1998 -
Identifiability conditions for blind and semi-blind multiuser multichannel identification
1998 -
Blind multichannel identification in the stationary colored noise case
1998 -
Identifiability conditions for blind and semi-blind multichannel estimation
1998 -
Optimum array signal processing in the presence of imperfect spatial coherence of wavefront
1998 -
MAC protocol and traffic scheduling for wireless ATM networks
1998 -
Spatio-temporal array processing for matched filter bound optimization in SDMA downlink transmission
1998 -
Parallel computation on interval graphs using PC clusters: Algorithms and experiments
1998 -
Perceptual user-interface in a media space
1998 -
On blind channel identification for DS/CDMA communications
1998 -
Blind separation of discrete sources
1998 -
IP over wireless ATM
1998 -
Parity-based loss recovery for reliable multicast transmission
1998 -
Estimation of time delays between unknown colored signals
1998 -
Wireless ATM MAC
1998 -
Blind channel identification and extraction of more sources than sensors
1998 -
Blind equalization and source separation with MSK inputs
1998 -
Shared window system for large groups based on multicast
1998 -
A mobile agent-based security architecture for Intranets
1998 -
Cost-optimal data retrieval for video servers with variable bit rate video streams
1998 -
Estimation of time delays with fewer sensors than sources
1998 -
A more attractive and interactive TV
1998 -
Visual spatialization of meeting room from 2D uncalibrated views
1998 -
The impact of routing on multicast error recovery
1998 -
Digital-to-analog communication device and method
1998 -
Reliable multicast transport to large groups
1998 -
Localisation et identification de personnes dans les séquences vidéo
1998 -
Designing a wireless broadband IP system with QoS guarantees
1998 -
An analysis/synthesis cooperation for head tracking and video face cloning
1998 -
Improving the WWW : caching or multicast ?
1998 -
Scalable key distribution for secure multicast
1998 -
Questionnaires : a framework using mobile code for component-based tele-exams
1998 -
A dynamic programming methodology for managing prerecorded VBR sources in packet-switched networks
1998 -
A decentralized prefetching for VBR video on demand
1998 -
Semi-blind maximum-likehood multichannel estimation with gaussian prior for the symbols using soft decisions
1998 -
Power control for diversity reception in time-division duplex CDMA
1998 -
Gaussian maximum likelihood blind multichannel multiuser identification.
1998 -
Burst mode non-causal decision-feedback equalizer based on soft decisions
1998 -
Blind and semi-blind maximum likehood methods for FIR mutichannel identification
1998 -
A fast instrumental variable affine projection algorithm
1998 -
Software components for cooperation : a solution for the "get help" problem
1998 -
Geometric and photometric head modelingfor facial analysis technologies
1998 -
A performance comparison between graph and hypergraph : Topologies for passive star WDM lightwave networks
1998 -
Managing SNMP environments using mobile SnmpSql
1998 -
Network management system with intelligent agents, a first step with SLD
1998 -
Wireless ATM MAC dynamic control within WAND
1998 -
Optimal multicast feedback
1998 -
Packet multiplexers with adversarial regulated traffic
1998 -
Secret sets and applications
1998 -
How bad is reliable multicast without local recovery?
1998 -
Vers la téléconférence virtuelle
1998 -
Continuous multicast push of web documents over the Internet
1998 -
MANIA Project : managing awareness in networks through intelligent agents
1998 -
Un environnement de prototypage rapide d'applications multimédias collaboratives : Application à la marine nationale
1998 -
Blind channel identification based on cyclic statistics
1998 -
WATMIN (Wireless ATM INterconnection) Selector usage versus ATMARP server modifications for mobility management
1998 -
Beamspace low complexity partially adaptive beamforming and angle of arrival estimations
1998 -
Gestion des réseaux avec connaissance des besoins : utilisation des agents logiciel
1998 -
Introduction to speech recognition using neural networks
1998 -
A corpus-based approach to video indexing for TV news
1998 -
Intelligent agents in network management : a state of the art
1998 -
A survey about different architectures of IP over ATM
1997 -
On coding for block fading channels
1997 -
Survey of error recovery techniques for IP-based audio-visual multicast applications
1997 -
Scalable asynchronous interaction based on selective recording and replaying of X-protocol streams
1997 -
Asynchronous multicast push : AMP
1997 -
Optimal and suboptimal approaches for training sequence based spatio-temporal channel identification in colored noise
1997 -
Blind optimal MMSE receiver for asynchronous CDMA in the presence of multipath
1997 -
Asymptotic performance of ML methods for semi-blind channel estimation
1997 -
Hash-routing for collections of shared Web caches
1997 -
Keyword spotting for multimedia document indexing
1997 -
Validation of functional behavior specifications of distributed object frameworks
1997 -
Enhanced fractal image coding by combining IFS and VQ
1997 -
Platform support for development and deployment of multipoint multimedia applications
1997 -
Spécification et génération de tests du comportement dynamique des systèmes à objets répartis
1997 -
Simple power-controlled modulation schemes for fixed-rate transmission over fading channels
1997 -
Agent's sensors and effectors
1997 -
Impact of buffer sharing in multiple disk video server architectures
1997 -
Reliable ordered multicast service (ROMS) over NBMA networks
1997 -
Statistiques d'ordres supérieurs pour le traitement du signal
1997 -
On robustness of linear prediction based blind identification
1997 -
Weighted and unweighted subspace fitting without eigendecomposition
1997 -
Implementation of the access point and address resolution protocols in the context of interconnecti
1997 -
Une approche robuste à la surdétermination de l'ordre du canal pour l'estimation aveugle des canaux multiples RIF.
1997 -
Comparaison des performances de plusieurs méthodes de séparation aveugle de sources aux ordres supér
1997 -
Autocalibration analytique d'antenne
1997 -
Autocalibration d'antenne
1997 -
Parity-based loss recovery for reliable multicast transmission
1997 -
Convergence enhancement of the GMDF algorithm
1997 -
Object components for cooperation : a highly customizable tutoring-system with Java-Beans
1997 -
Real ATM traffic performance analysis in Beteus
1997 -
Active annotations in the Word Wide Web
1997 -
Environnement de prototypage d'applications coopératives
1997 -
Segmentation non canonique pour la classification supervisée par arbres
1997 -
Approches robustes à la surdétermination de l'ordre du canal pour l'estimation aveugle de canaux multiples RIF
1997 -
WATMIN (Wireless ATM INterconnection) Phase 1 Design document
1997 -
Capacity of the linear decorrelating detector for QS-CDMA
1997 -
IDAMN : an intrusion detection architecture for mobile networks
1997 -
WATMIN (Wireless ATM INterconnection) Phase 1 Implementation document
1997 -
An environnement for prototyping CSCW applications
1997 -
Behaviour of higher order blind source separation methods in the presence of cyclostationary correlated multipaths
1997 -
Cumulant tensors
1997 -
Problèmes d'estimation dans le canal téléphonique hybride
1997 -
Cochannel interference cancellation within the current GSM standard
1997 -
Channel-based blind multichannel identification without order overesttimation problems.
1997 -
Subspace fitting without eigendecomposition
1997 -
Linear prediction and subspace fitting blind channel identification based on cyclic statistics.
1997 -
Error control for real-time audio-visual services
1997 -
Maximizing diversity on block-fading channels
1997 -
Precise semantics for a behavior model in the context of object based distributed systems
1997 -
Automatic indexing of TV News
1997 -
Réunion virtuelle : aspects du traitement vidéo
1997 -
Coding and multiple-access over fading channels
1997 -
A multi-site teleconferencing system using VR paradigms
1997 -
Design and testing of information models in a virtual environment
1997 -
A platform for simulating cooperative multimedia applications
1997 -
Détection des mots-clés dans un flux de parole : application à l'indexation de documents multimédia
1997 -
Model-based coding and virtual teleconferencing
1997 -
Semiblind spatio-temporal channel and interference identification
1997 -
Maximum-likehood blind FIR multi-channel estimation with gaussian prior for the symbols
1997 -
Improved contrast dedicated to blind separation in communications
1997 -
REMAP for video soundtrack indexing
1997 -
Cramer-Rao bounds and methods for knowledge based estimation of multiple FIR channels.
1997 -
Cramer-Rao bounds for semi-blind, blind and training sequence based channel estimation
1997 -
Second-order cyclic statistics based blind channel identification and equalization.
1997 -
Cramer-rao bounds for semi-blind and training sequence based channel estimation
1997 -
Performance of contrast-based blind source separation
1997 -
A development and runtime platform for teleconferencing applications
1997 -
Center placement algorithms for large multicast groups
1997 -
Performance modeling of reliable multicast transmission
1997 -
Zooming using iterated function systems
1997 -
Mécanismes de sécurité liés à la transmission des images
1997 -
Classification automatique de segments vidéo
1997 -
Clonage de visages dans un contexte de téléréunion
1997 -
A CORBA-based platform for distributed multimedia applications
1997 -
A fault tolerant video server using combined raid 5 mirroring
1997 -
WINES : a flexible GSM simulator for intrusion detection and network planning applications
1997 -
Multiuser diversity
1997 -
Scalable feedback for satellite broadcasts
1997 -
An agent-based architecture for content-based multimedia browsing
1997 -
Active annotations of web pages
1997 -
Normalized sliding window constant modulus and decision-directed algorithms: a link between blind equalization and classical adaptive filtering
1997 -
From sinusoids in noise to blind deconvolution in communications
1997 -
Towards a "good" functional and executable behavior model
1997 -
Asynchronous interaction method for a remote teleteaching session
1997 -
Easing interaction through user awareness
1997 -
A new approach for a restricted concentrator location problem
1996 -
Méthode d'interaction asynchrone dans un environnement X-Window
1996 -
The information driveway [using analog telephone lines]
1996 -
MASCARA, a MAC protocol for wireless ATM
1996 -
Maximizing diversity in coded slow frequency-hopped communications
1996 -
CSCW and the Internet
1996 -
An interference cancelling multichannel matched filter
1996 -
Matched filter bounds for reduced-order multichannel models
1996 -
Burst mode non-causal decision-feedback equalization and blind MLSE
1996 -
A new class of constant data length retrieval algorithms for video servers with variable bit rate streams
1996 -
Multimedia collaborative applications
1996 -
Statistical admission control in video servers with constant data length retrieval of variable bit rate streams
1996 -
Iterated function systems for still image processing
1996 -
Blind subspace identification of a BPSK communication channel
1996 -
From intelligent agents towards management by request
1996 -
Joint document production server for the World Wide Web
1996 -
Adaptive filtering of electronic mail
1996 -
Automatic attribution of ACP 127 messages
1996 -
Méthodologie de conception de réseaux locaux embarqués ATM et application à la marine nationale
1996 -
Telecommunicating via CYBERWARE interfaces and virtual images
1996 -
Reliable multicast : where to use FEC
1996 -
Les activités d'EURECOM en imagerie virtuelle pour les télécommunications
1996 -
Obtention of abstract views of state graphs labelled with probabilities and time distributions
1996 -
Using PVM in wireless network environments
1996 -
Keyword spotting enhancement for video soundtrack indexing
1996 -
A comparative study of existing approaches for moving picture fractal coding using IFS
1996 -
A generic and executable model for the specification and validation of distributed behaviors
1996 -
Interconnection of wireless networks using an ATM backbone
1996 -
Image sequence coding using 3-D IFS
1996 -
Multi-resolution access control algorithm based on fractal coding
1996 -
Unbiased MMSE decision-feedback equalization for packet transmission
1996 -
Agents intelligents pour une gestion à la demande
1996 -
Etude de protocole de sécurisation de services à très fortes contraintes
1996 -
Moving picture fractal coding using a mixed approach IFS and motion
1996 -
The fast subsampled-updating stabilized fast transversal filter (FSU SFTF) RLS algorithm
1996 -
WATMIN : Wireless ATM interconnection
1996 -
Statistical admission control in video servers with variable bit rate streams and constant time length retrieval
1996 -
Enseignement à distance sur les autoroutes de l'information: pluralité des modèles
1996 -
NETPLAN A network planning tool for forecasting trunks dimensioning in a GSM network
1996 -
A scheme-based toolkit for the fast prototyping of TMN-systems
1996 -
Intelligent agents a new management style
1996 -
TIMS (a TMN-based Information Model Simulator) features and applications
1996 -
Guidelines for the specification of managed object behaviors with TIMS
1996 -
Using TIMS for the prototyping of SMFs
1996 -
Coding for bidimensional constellations based on the µ-law
1996 -
Towards an asynchronous application sharing system
1996 -
Customized network management based on applications requirements
1996 -
Intra and inter-stream synchronisation for stored multimedia streams
1996 -
Constant data length retrieval for video servers with variable bit rate streams
1996 -
Recording and replaying of an X-session: an approach for an asynchronous interaction method
1996 -
Beteus : Multipoint teleconferencing over the european ATM pilot
1996 -
Models of blocking probability in all-optical networks with and without wavelength changers
1996 -
Zero-forcing electrical filters for direct detection optical systems
1996 -
Un langage de description d'applications coopératives
1996 -
Traitements vidéo et espaces virtuels de réunion
1996 -
Image reconstruction and interpolation in trinocular vision
1996 -
Maximum-likelihood blind equalization of multiple FIR channels
1996 -
Spatio-temporal training-sequence-based channel equalization and adptive interference cancellation
1996 -
Keyword spotting for video soundtrack indexing
1996 -
About contractivity constraints when coding still grey-level images using fractal transforms
1996 -
WATMIN (Wireless ATM INterconnection) Basic concepts
1996 -
A multiaccess protocol for high-speed WLAN
1996 -
User-aware agents for a cooperative work
1996 -
Executable TMN specifications in TIMS
1996 -
Training sequence for a particular channel
1996 -
Predetermined criterion verification method for cellular telephone network
1996 -
Asynchronous interaction method for a remote teleteaching session
1996 -
Algorithmes des moindres carrés récursifs Doublement rapides : application à l'identification de réponses impulsionnelles longues
1996 -
Deterministic admission control strategies in video servers with variable bit rate streams
1996 -
A synchronization scheme for stored multimedia streams
1996 -
The server array : a scalable video server architecture
1996 -
A software platform for distributed multimedia applications
1996 -
A CORBA-based connection management Sheme for a multimedia platform with stream configuration support
1996 -
Defocalisation en spatialisation video a partir de trois vues de reference
1996 -
Spatialisation vidéo
1996 -
Codage par IFS de séquences video
1996 -
Indexation et représentation des documents video
1996 -
Architecture de sécurité pour réseaux mobiles
1996 -
WINES : a wireless network simulator for network management applications
1996 -
WINES : current status and perspectives
1996 -
Méthodes de reconstruction denses pour la vision active
1996 -
Channel control and multiple-access
1996 -
An ATM WAN for CSCW applications: The BETEUS Network (Broadband Exchange for Trans-European USage)
1996 -
Generation automatique de tests pour les systemes du RGT
1996 -
Moving picture fractal coding using IFS : a review
1996 -
Demultiplexing on the ATM adapter : experiments with internet protocols in user space
1995 -
The Beteus application programming interface
1995 -
Control and performance monitoring of a multimedia platform over the ATM Pilot
1995 -
A semi-distributed platform for the support of CSCW applications
1995 -
Untraceability in mobile networks
1995 -
Performance analysis and FTF version of the generalized sliding window recursive least-squares (GSWRLS) algorithm
1995 -
Digital equaliser e.g. for mobile digital telephone
1995 -
Intelligent agents : a way to reduce the gap between applications and networks
1995 -
TIMS : a TMN-based information model simulator, principles and application to a simple case study
1995 -
Proposition d'une solution pour le télé-tuteurat sur ATM
1995 -
Multiple-accessing over frequency-selective fading channels
1995 -
Space-time characteristics of ALOHA protocols in high-speed bidirectional bus networks
1995 -
Génération d'une simulation de réseau à partir des descriptions GDMO
1995 -
Behavior simulation and analysis techniques for ntegration of management action policies within TIMS
1995 -
Un algorithme des moindres carrés à fenêtre glissante généralisée : le GSW RLS
1995 -
Active contours for lipreading- combining snakes with templates
1995 -
Stream synchronization in a scalable video server array
1995 -
Improving downlink performance in cellular radio communications
1995 -
A generic tool for content-based multimedia browsing
1995 -
Management object behavior inheritance and distribution support in TIMS
1995 -
A framework for multi-agent multimedia indexing
1995 -
A structured video browsing tool
1995 -
A probabilistic approach to document classification
1995 -
Zooming using iterated function systems
1995 -
A coding scheme for stereoscopic television sequences based on motion estimation-compensation using a 3D approach
1995 -
Schedeling policies for protocol stacks for user application requierements
1995 -
The generalized sliding window recursive least-square (GSW RLS)
1995 -
A GSM simulation platform for intrusion detection
1995 -
Information capacity and power control in single-cell multiuser communications
1995 -
Algorithmes pour grammaires probabilistes
1995 -
Improvements in IFS formulation for its use in still image codings
1995 -
Performance management for a real full scale ATM network
1995 -
Prediction error methods for time-domain blind identification of multichannel FIR filters
1995 -
Further results on blind identification and equalization of multiple FIR channels
1995 -
Robust and secure password and key change method
1995 -
Edge detection on ultrasound cardiac images for assisting medical diagnosis
1995 -
WAVE : a new multicast routing algorithm for static and dynamic multicast groups
1995 -
Models of blocking probability in all-optical networks with and without wavelength changers
1995 -
Méthodes d'égalisation et d'identification aveugle pour les canaux linéaires
1995 -
Video representation tools using a unified object and perspective-based approach
1995 -
The generalized sliding window recursive least-squares (SGW RLS) algorithm
1995 -
Experimenting with 3D vision on a robotic head
1995 -
Reference transmission schemes for phase noise-immunity
1995 -
KryptoKnight family of light-weight protocols for authentication and key distribution
1995 -
Analysis of the performance of a distributed simulator
1995 -
Compression fractale
1995 -
Computation of ego-motion using vertical cue
1995 -
Expérience de télé-enseignement dans le cadre du projet BETEL
1995 -
Automatic face and gestual recognition for video indexing
1995 -
A scalable video server : architecture, design, and implentation
1995 -
A practical method for the synchronization of life continuous media streams
1995 -
Formalisation et simulation de comportements pour le test d'objets gérés
1995 -
Modèles probabilistes et étiquetage automatique
1994 -
The fast subsampled-updating recursive least-squares (FSU RLS) algorithm for adaptive filtering based on displacement structure and the FFT
1994 -
Interfaces sonores pour collecticiels
1994 -
Gestion de la collaboration dans les espaces partagés multimedia
1994 -
The fast subsampled-updating fast affine projection (FSU FAP) algorithm
1994 -
Accentuation automatique de textes par des méthodes probabilistes
1994 -
A method providing identity privacy to mobile users during authentication
1994 -
Edge detection on ultrasound cardiac images using mathematical morphology and active contours
1994 -
Application access control at network level
1994 -
The fast subsampled-updating fast newton transversal filter (FSU FNTF) algorithm for adaptive filtering based on a schur procedure and the FFT
1994 -
The fast subsampled-updating stabilized fast transversal filter (FSU SFTF) algorithm for adaptive filtering based on a Schur procedure and the FFT
1994 -
A video server architecture based on server arrays
1994 -
On the decision-directed equalization of constant modulus signals
1994 -
The fast subsampled-updating fast newton transversal filter (FSU FNTF) for long FIR filter
1994 -
Blind joint equalization of multiple synchronous mobile users using oversampling and/or multiple antennas
1994 -
Distributed multimedia application theory and practise
1994 -
Authentication of mobile users
1994 -
Untraceability in mobile networks
1994 -
Towards automatic annotation of video documents
1994 -
Heterogeneous network management tutorial
1994 -
Strong authentication in intelligent networks
1994 -
M-ary phase coding for correlated Rayleigh fading channels
1994 -
Towards globally convergent blind equalization of constant modulus signals : a bilinear approach
1994 -
Multimedia teletutoring over a trans-european ATM network
1994 -
An architecture for a network management simulator
1994 -
Méthode de calcul d'Alias pour utilisateur mobile
1994 -
A terminal-based approach to multimedia service provision
1994 -
Buffer allocation for frame reassembly and queueing in ATM networks
1994 -
Teletutoring over a trans-European broadband network : BETEL (Broadband Exchange over Trans-European Links)
1994 -
WINES Wireless network simulation / Plateforme de simulation du réseau GSM
1994 -
Blind fractionally-spaced equalization based on cyclostationarity
1994 -
Zero-forcing electrical filters for direct detection optical systems
1994 -
Data transmission on the full rate GSM voice channel
1994 -
Blind fractionally-spaced equalization, perfect-reconstruction filter banks and multichannel linear
1994 -
New adaptive blind equalization algorithms for constant modulus constellations
1994 -
Architectures of multimedia communication subsystems
1994 -
A terminal-based approach for distributed multimedia applications
1994 -
Teletutoring over the BETEL network
1994 -
Authentication of mobile users
1994 -
Architecture of a light-weight multimedia adapter
1994 -
On the number of wavelengths and switches in all-optical networks
1994 -
Designing cooperative media-integrated mobile applications
1994 -
An authentication protocol for mobile users
1994 -
Blind radio channel identification and equalization based on oversampling and/or antenna arrays
1994 -
The fast subsampled-updating fast transversal filter (FSU FTF) RLS algorithm
1993 -
Remote technology project evaluation : an assessment of a teleteaching environment (DRAFT)
1993 -
A bilinear approach to constant modulus blind equalization
1993 -
Un algorithme des moindres carrés récursif rapides : Le FSU RLS
1993 -
Normalized sliding window constant modulus algorithms for blind equalization
1993 -
2D and 3D motion estimation from binocular sequences by cooperation between motion and disparity in 3DTV context
1993 -
On the convergence behavior of the LMS and the normalized LMS algorithms
1993 -
Improved hidden Markov models for speech recognition through neural network learning
1993 -
Blind fractionally-spaced equalization and channel identification from second-order statistics or data
1993 -
Tagging english text with a probabilistic model
1993 -
Introduction to wireless communications
1993 -
On the convergence of normalized constant modulus algorithms for blind equalization
1993 -
A timer-based connection management protocol with synchronized clocks and its verification
1993 -
Improved hidden Markov models for speech recognition through neural network learning
1993 -
FSU RLS : a fast recursive least squares algorithm based on displacement structure and the FFT
1993 -
Systematic design of a family of attack-resistant authentication protocols
1993 -
Remote teaching application : ergonomics & UI specifications
1993 -
Performance evaluation of forward error correction in an ATM environment
1993 -
Authentication method with impersonal token cards
1993 -
The order-recursive Chandrasekhar equations for fast square-root Kalman filtering
1993 -
On the locality of the forward-backward algorithm (speech recognition)
1993 -
Performance of the IEEE 802.2 type-2 logical link protocol with selective retransmission
1992 -
The fast subsampled-updating recursive least-squares (FSU RLS) algorithm for adaptive filtering based on displacement structure and the FFT
1992 -
The block underdetermined covariance (BUC) fast transversal filter (FTF) algorithm for adaptive filtering
1992 -
On the normalization of the step size in nonsymmetric stochastic gradient algorithms
1992 -
Authentication method with impersonal token cards
1992 -
On stepsize normalization in stochastic gradient algorithms
1992 -
Protocoles d'authentification dans le réseau intelligent : contribution au premier rapport semestriel Ernestine II
1992 -
Performance evaluation of forward error correction in ATM networks
1992 -
A modular multichannel multiexperiment fast transversal filter RLS algorithm
1992 -
A modular prewindowing framework for covariance FTF RLS algorithms
1992 -
Backward consistency concept and round-off error propagation dynamics in recursive least-squares algorithms
1992 -
Signal-adapted multiresolution transform for image-coding
1992 -
KryptoKnight authentication and Key distribution system
Map and Access
EURECOM tools
Legal notice
Webmaster
All people
All publications
All seminars